|
@@ -3,9 +3,6 @@ admissionConfig:
|
|
pluginConfig:{{ openshift.master.admission_plugin_config | to_padded_yaml(level=2) }}
|
|
pluginConfig:{{ openshift.master.admission_plugin_config | to_padded_yaml(level=2) }}
|
|
{% endif %}
|
|
{% endif %}
|
|
apiLevels:
|
|
apiLevels:
|
|
-{% if not openshift.common.version_gte_3_1_or_1_1 | bool %}
|
|
|
|
-- v1beta3
|
|
|
|
-{% endif %}
|
|
|
|
- v1
|
|
- v1
|
|
apiVersion: v1
|
|
apiVersion: v1
|
|
assetConfig:
|
|
assetConfig:
|
|
@@ -44,10 +41,9 @@ assetConfig:
|
|
- {{ cipher_suite }}
|
|
- {{ cipher_suite }}
|
|
{% endfor %}
|
|
{% endfor %}
|
|
{% endif %}
|
|
{% endif %}
|
|
-{% if openshift.master.audit_config | default(none) is not none and openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
|
|
+{% if openshift.master.audit_config | default(none) is not none %}
|
|
auditConfig:{{ openshift.master.audit_config | to_padded_yaml(level=1) }}
|
|
auditConfig:{{ openshift.master.audit_config | to_padded_yaml(level=1) }}
|
|
{% endif %}
|
|
{% endif %}
|
|
-{% if openshift.common.version_gte_3_3_or_1_3 | bool %}
|
|
|
|
controllerConfig:
|
|
controllerConfig:
|
|
election:
|
|
election:
|
|
lockName: openshift-master-controllers
|
|
lockName: openshift-master-controllers
|
|
@@ -55,7 +51,6 @@ controllerConfig:
|
|
signer:
|
|
signer:
|
|
certFile: service-signer.crt
|
|
certFile: service-signer.crt
|
|
keyFile: service-signer.key
|
|
keyFile: service-signer.key
|
|
-{% endif %}
|
|
|
|
controllers: '*'
|
|
controllers: '*'
|
|
corsAllowedOrigins:
|
|
corsAllowedOrigins:
|
|
# anchor with start (\A) and end (\z) of the string, make the check case insensitive ((?i)) and escape hostname
|
|
# anchor with start (\A) and end (\z) of the string, make the check case insensitive ((?i)) and escape hostname
|
|
@@ -74,11 +69,7 @@ dnsConfig:
|
|
bindNetwork: tcp4
|
|
bindNetwork: tcp4
|
|
{% endif %}
|
|
{% endif %}
|
|
etcdClientInfo:
|
|
etcdClientInfo:
|
|
-{% if openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
ca: {{ "ca-bundle.crt" if (openshift.master.embedded_etcd | bool) else "master.etcd-ca.crt" }}
|
|
ca: {{ "ca-bundle.crt" if (openshift.master.embedded_etcd | bool) else "master.etcd-ca.crt" }}
|
|
-{% else %}
|
|
|
|
- ca: {{ "ca.crt" if (openshift.master.embedded_etcd | bool) else "master.etcd-ca.crt" }}
|
|
|
|
-{% endif %}
|
|
|
|
certFile: master.etcd-client.crt
|
|
certFile: master.etcd-client.crt
|
|
keyFile: master.etcd-client.key
|
|
keyFile: master.etcd-client.key
|
|
urls:
|
|
urls:
|
|
@@ -92,20 +83,12 @@ etcdConfig:
|
|
peerServingInfo:
|
|
peerServingInfo:
|
|
bindAddress: {{ openshift.master.bind_addr }}:7001
|
|
bindAddress: {{ openshift.master.bind_addr }}:7001
|
|
certFile: etcd.server.crt
|
|
certFile: etcd.server.crt
|
|
-{% if openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
clientCA: ca-bundle.crt
|
|
clientCA: ca-bundle.crt
|
|
-{% else %}
|
|
|
|
- clientCA: ca.crt
|
|
|
|
-{% endif %}
|
|
|
|
keyFile: etcd.server.key
|
|
keyFile: etcd.server.key
|
|
servingInfo:
|
|
servingInfo:
|
|
bindAddress: {{ openshift.master.bind_addr }}:{{ openshift.master.etcd_port }}
|
|
bindAddress: {{ openshift.master.bind_addr }}:{{ openshift.master.etcd_port }}
|
|
certFile: etcd.server.crt
|
|
certFile: etcd.server.crt
|
|
-{% if openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
clientCA: ca-bundle.crt
|
|
clientCA: ca-bundle.crt
|
|
-{% else %}
|
|
|
|
- clientCA: ca.crt
|
|
|
|
-{% endif %}
|
|
|
|
keyFile: etcd.server.key
|
|
keyFile: etcd.server.key
|
|
storageDirectory: {{ r_openshift_master_data_dir }}/openshift.local.etcd
|
|
storageDirectory: {{ r_openshift_master_data_dir }}/openshift.local.etcd
|
|
{% endif %}
|
|
{% endif %}
|
|
@@ -123,21 +106,12 @@ imagePolicyConfig:{{ openshift.master.image_policy_config | to_padded_yaml(level
|
|
kind: MasterConfig
|
|
kind: MasterConfig
|
|
kubeletClientInfo:
|
|
kubeletClientInfo:
|
|
{# TODO: allow user specified kubelet port #}
|
|
{# TODO: allow user specified kubelet port #}
|
|
-{% if openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
ca: ca-bundle.crt
|
|
ca: ca-bundle.crt
|
|
-{% else %}
|
|
|
|
- ca: ca.crt
|
|
|
|
-{% endif %}
|
|
|
|
certFile: master.kubelet-client.crt
|
|
certFile: master.kubelet-client.crt
|
|
keyFile: master.kubelet-client.key
|
|
keyFile: master.kubelet-client.key
|
|
port: 10250
|
|
port: 10250
|
|
{% if openshift.master.embedded_kube | bool %}
|
|
{% if openshift.master.embedded_kube | bool %}
|
|
kubernetesMasterConfig:
|
|
kubernetesMasterConfig:
|
|
-{% if not openshift.common.version_gte_3_1_or_1_1 | bool %}
|
|
|
|
- apiLevels:
|
|
|
|
- - v1beta3
|
|
|
|
- - v1
|
|
|
|
-{% endif %}
|
|
|
|
apiServerArguments: {{ openshift.master.api_server_args | default(None) | to_padded_yaml( level=2 ) }}
|
|
apiServerArguments: {{ openshift.master.api_server_args | default(None) | to_padded_yaml( level=2 ) }}
|
|
{% if r_openshift_master_etcd3_storage or ( r_openshift_master_clean_install and openshift.common.version_gte_3_6 ) %}
|
|
{% if r_openshift_master_etcd3_storage or ( r_openshift_master_clean_install and openshift.common.version_gte_3_6 ) %}
|
|
storage-backend:
|
|
storage-backend:
|
|
@@ -160,21 +134,17 @@ kubernetesMasterConfig:
|
|
{% endif %}
|
|
{% endif %}
|
|
masterClients:
|
|
masterClients:
|
|
{# TODO: allow user to set externalKubernetesKubeConfig #}
|
|
{# TODO: allow user to set externalKubernetesKubeConfig #}
|
|
-{% if openshift.common.version_gte_3_3_or_1_3 | bool %}
|
|
|
|
externalKubernetesClientConnectionOverrides:
|
|
externalKubernetesClientConnectionOverrides:
|
|
acceptContentTypes: application/vnd.kubernetes.protobuf,application/json
|
|
acceptContentTypes: application/vnd.kubernetes.protobuf,application/json
|
|
contentType: application/vnd.kubernetes.protobuf
|
|
contentType: application/vnd.kubernetes.protobuf
|
|
burst: {{ openshift_master_external_ratelimit_burst | default(400) }}
|
|
burst: {{ openshift_master_external_ratelimit_burst | default(400) }}
|
|
qps: {{ openshift_master_external_ratelimit_qps | default(200) }}
|
|
qps: {{ openshift_master_external_ratelimit_qps | default(200) }}
|
|
-{% endif %}
|
|
|
|
externalKubernetesKubeConfig: ""
|
|
externalKubernetesKubeConfig: ""
|
|
-{% if openshift.common.version_gte_3_3_or_1_3 | bool %}
|
|
|
|
openshiftLoopbackClientConnectionOverrides:
|
|
openshiftLoopbackClientConnectionOverrides:
|
|
acceptContentTypes: application/vnd.kubernetes.protobuf,application/json
|
|
acceptContentTypes: application/vnd.kubernetes.protobuf,application/json
|
|
contentType: application/vnd.kubernetes.protobuf
|
|
contentType: application/vnd.kubernetes.protobuf
|
|
burst: {{ openshift_master_loopback_ratelimit_burst | default(600) }}
|
|
burst: {{ openshift_master_loopback_ratelimit_burst | default(600) }}
|
|
qps: {{ openshift_master_loopback_ratelimit_qps | default(300) }}
|
|
qps: {{ openshift_master_loopback_ratelimit_qps | default(300) }}
|
|
-{% endif %}
|
|
|
|
openshiftLoopbackKubeConfig: openshift-master.kubeconfig
|
|
openshiftLoopbackKubeConfig: openshift-master.kubeconfig
|
|
masterPublicURL: {{ openshift.master.public_api_url }}
|
|
masterPublicURL: {{ openshift.master.public_api_url }}
|
|
networkConfig:
|
|
networkConfig:
|
|
@@ -208,11 +178,7 @@ oauthConfig:
|
|
{% for line in translated_identity_providers.splitlines() %}
|
|
{% for line in translated_identity_providers.splitlines() %}
|
|
{{ line }}
|
|
{{ line }}
|
|
{% endfor %}
|
|
{% endfor %}
|
|
-{% if openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
masterCA: ca-bundle.crt
|
|
masterCA: ca-bundle.crt
|
|
-{% else %}
|
|
|
|
- masterCA: ca.crt
|
|
|
|
-{% endif %}
|
|
|
|
masterPublicURL: {{ openshift.master.public_api_url }}
|
|
masterPublicURL: {{ openshift.master.public_api_url }}
|
|
masterURL: {{ openshift.master.api_url }}
|
|
masterURL: {{ openshift.master.api_url }}
|
|
sessionConfig:
|
|
sessionConfig:
|
|
@@ -245,11 +211,7 @@ serviceAccountConfig:
|
|
- default
|
|
- default
|
|
- builder
|
|
- builder
|
|
- deployer
|
|
- deployer
|
|
-{% if openshift.common.version_gte_3_2_or_1_2 | bool %}
|
|
|
|
masterCA: ca-bundle.crt
|
|
masterCA: ca-bundle.crt
|
|
-{% else %}
|
|
|
|
- masterCA: ca.crt
|
|
|
|
-{% endif %}
|
|
|
|
privateKeyFile: serviceaccounts.private.key
|
|
privateKeyFile: serviceaccounts.private.key
|
|
publicKeyFiles:
|
|
publicKeyFiles:
|
|
- serviceaccounts.public.key
|
|
- serviceaccounts.public.key
|