Prefix openshift/keytab

Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
This commit is contained in:
Aurélien Bompard 2024-11-28 17:51:53 +01:00
parent 39f2e86658
commit cf82a481be
No known key found for this signature in database
GPG key ID: 31584CFEB9BF64AD
17 changed files with 86 additions and 85 deletions

View file

@ -173,10 +173,10 @@
- role: openshift/ipa-client - role: openshift/ipa-client
app: badges app: badges
- role: openshift/keytab - role: openshift/keytab
app: badges keytab_app: badges
key: fedbadges.keytab keytab_key: fedbadges.keytab
secret_name: fedbadges-keytab keytab_secret_name: fedbadges-keytab
service: fedbadges keytab_service: fedbadges
# Deployment config # Deployment config
- role: openshift/object - role: openshift/object

View file

@ -74,11 +74,11 @@
object_file: pvc.yml object_file: pvc.yml
object_objectname: pvc.yml object_objectname: pvc.yml
- role: openshift/keytab - role: openshift/keytab
app: bodhi keytab_app: bodhi
key: koji-keytab keytab_key: koji-keytab
secret_name: bodhi-keytab keytab_secret_name: bodhi-keytab
service: bodhi keytab_service: bodhi
host: "bodhi{{ env_suffix }}.fedoraproject.org" keytab_host: "bodhi{{ env_suffix }}.fedoraproject.org"
- role: openshift/secret-file - role: openshift/secret-file
app: bodhi app: bodhi
secret_name: bodhi-fedora-messaging-ca secret_name: bodhi-fedora-messaging-ca

View file

@ -60,10 +60,10 @@
- role: openshift/ipa-client - role: openshift/ipa-client
app: bugzilla2fedmsg app: bugzilla2fedmsg
- role: openshift/keytab - role: openshift/keytab
app: bugzilla2fedmsg keytab_app: bugzilla2fedmsg
key: service.keytab keytab_key: service.keytab
secret_name: keytab keytab_secret_name: keytab
service: bugzilla2fedmsg keytab_service: bugzilla2fedmsg
- role: openshift/imagestream - role: openshift/imagestream
app: bugzilla2fedmsg app: bugzilla2fedmsg

View file

@ -27,11 +27,11 @@
# Create a keytab. The default username will be like: # Create a keytab. The default username will be like:
# coreos-koji-tagger/coreos-koji-tagger.fedoraproject.org@FEDORAPROJECT.ORG # coreos-koji-tagger/coreos-koji-tagger.fedoraproject.org@FEDORAPROJECT.ORG
- role: openshift/keytab - role: openshift/keytab
app: coreos-koji-tagger keytab_app: coreos-koji-tagger
key: koji-keytab keytab_key: koji-keytab
secret_name: coreos-koji-tagger-keytab keytab_secret_name: coreos-koji-tagger-keytab
service: coreos-koji-tagger keytab_service: coreos-koji-tagger
host: "coreos-koji-tagger{{ env_suffix }}.fedoraproject.org" keytab_host: "coreos-koji-tagger{{ env_suffix }}.fedoraproject.org"
# Copy in a kerberos config that is unique to fedora infra # Copy in a kerberos config that is unique to fedora infra
- role: openshift/object - role: openshift/object

View file

@ -45,11 +45,11 @@
- appowners - appowners
- role: openshift/keytab - role: openshift/keytab
app: elections keytab_app: elections
key: service.keytab keytab_key: service.keytab
secret_name: elections-keytab keytab_secret_name: elections-keytab
service: HTTP keytab_service: HTTP
host: "elections{{ env_suffix }}.fedoraproject.org" keytab_host: "elections{{ env_suffix }}.fedoraproject.org"
- role: openshift/ipa-client - role: openshift/ipa-client
app: elections app: elections

View file

@ -56,11 +56,11 @@
# Keytabs # Keytabs
- role: openshift/keytab - role: openshift/keytab
app: fasjson keytab_app: fasjson
key: http keytab_key: http
secret_name: fasjson-keytab-http keytab_secret_name: fasjson-keytab-http
service: HTTP keytab_service: HTTP
host: "fasjson{{ env_suffix }}.fedoraproject.org" keytab_host: "fasjson{{ env_suffix }}.fedoraproject.org"
# Session secret key # Session secret key
- role: openshift/secret-file - role: openshift/secret-file

View file

@ -209,10 +209,10 @@
- role: openshift/ipa-client - role: openshift/ipa-client
app: fmn app: fmn
- role: openshift/keytab - role: openshift/keytab
app: fmn keytab_app: fmn
key: service.keytab keytab_key: service.keytab
secret_name: keytab keytab_secret_name: keytab
service: fmn keytab_service: fmn
# Cron jobs # Cron jobs
- role: openshift/object - role: openshift/object

View file

@ -22,10 +22,11 @@
- openshift/project - openshift/project
- role: openshift/keytab - role: openshift/keytab
secret_name: keytab keytab_app: "{{ app }}"
key: krb5.keytab keytab_secret_name: keytab
service: koschei keytab_key: krb5.keytab
host: "koschei-backend01{{ env_suffix }}.iad2.fedoraproject.org" keytab_service: koschei
keytab_host: "koschei-backend01{{ env_suffix }}.iad2.fedoraproject.org"
- role: openshift/route - role: openshift/route
route_routename: frontend route_routename: frontend

View file

@ -43,11 +43,11 @@
- kevin - kevin
- role: openshift/keytab - role: openshift/keytab
app: maubot keytab_app: maubot
key: service.keytab keytab_key: service.keytab
secret_name: maubot-keytab keytab_secret_name: maubot-keytab
service: HTTP keytab_service: HTTP
host: "maubot.apps.ocp{{env_suffix}}.fedoraproject.org" keytab_host: "maubot.apps.ocp{{env_suffix}}.fedoraproject.org"
- role: openshift/ipa-client - role: openshift/ipa-client
app: maubot app: maubot

View file

@ -25,10 +25,10 @@
user_sent_topics: ^org\.fedoraproject\.{{ env_short }}\.monitor-gating\..* user_sent_topics: ^org\.fedoraproject\.{{ env_short }}\.monitor-gating\..*
- role: openshift/keytab - role: openshift/keytab
app: monitor-gating keytab_app: monitor-gating
key: monitor-gating-keytab keytab_key: monitor-gating-keytab
secret_name: monitor-gating-keytab keytab_secret_name: monitor-gating-keytab
service: packagerbot keytab_service: packagerbot
- role: openshift/secret-file - role: openshift/secret-file
app: monitor-gating app: monitor-gating

View file

@ -55,18 +55,18 @@
object_template: osh-hub-httpd-configmap.yml object_template: osh-hub-httpd-configmap.yml
object_objectname: osh-hub-httpd-configmap object_objectname: osh-hub-httpd-configmap
- role: openshift/keytab - role: openshift/keytab
app: openscanhub keytab_app: openscanhub
key: service.keytab keytab_key: service.keytab
secret_name: openscanhub-keytab keytab_secret_name: openscanhub-keytab
service: HTTP keytab_service: HTTP
host: "openscanhub.stg.fedoraproject.org" keytab_host: "openscanhub.stg.fedoraproject.org"
when: env == "staging" when: env == "staging"
- role: openshift/keytab - role: openshift/keytab
app: openscanhub keytab_app: openscanhub
key: service.keytab keytab_key: service.keytab
secret_name: openscanhub-keytab keytab_secret_name: openscanhub-keytab
service: HTTP keytab_service: HTTP
host: "openscanhub.fedoraproject.org" keytab_host: "openscanhub.fedoraproject.org"
when: env == "production" when: env == "production"
- role: openshift/object - role: openshift/object
object_app: openscanhub object_app: openscanhub

View file

@ -21,11 +21,11 @@
# Keytabs # Keytabs
- role: openshift/keytab - role: openshift/keytab
app: planet keytab_app: planet
key: http keytab_key: http
secret_name: planet-keytab-http keytab_secret_name: planet-keytab-http
service: HTTP keytab_service: HTTP
host: "planet.apps.ocp{{env_suffix}}.fedoraproject.org" keytab_host: "planet.apps.ocp{{env_suffix}}.fedoraproject.org"
- role: openshift/imagestream - role: openshift/imagestream
app: planet app: planet

View file

@ -47,10 +47,10 @@
- appowners - appowners
- role: openshift/keytab - role: openshift/keytab
app: poddlers keytab_app: poddlers
key: service.keytab keytab_key: service.keytab
secret_name: keytab keytab_secret_name: keytab
service: toddlers keytab_service: toddlers
- role: openshift/ipa-client - role: openshift/ipa-client
app: poddlers app: poddlers

View file

@ -30,19 +30,19 @@
- zlopez - zlopez
- role: openshift/keytab - role: openshift/keytab
app: the-new-hotness keytab_app: the-new-hotness
key: koji-keytab keytab_key: koji-keytab
secret_name: the-new-hotness-keytab keytab_secret_name: the-new-hotness-keytab
service: the-new-hotness keytab_service: the-new-hotness
host: "release-monitoring.org" keytab_host: "release-monitoring.org"
when: env == "production" when: env == "production"
- role: openshift/keytab - role: openshift/keytab
app: the-new-hotness keytab_app: the-new-hotness
key: koji-keytab keytab_key: koji-keytab
secret_name: the-new-hotness-keytab keytab_secret_name: the-new-hotness-keytab
service: the-new-hotness keytab_service: the-new-hotness
host: "stg.release-monitoring.org" keytab_host: "stg.release-monitoring.org"
when: env == "staging" when: env == "staging"
- role: openshift/secret-file - role: openshift/secret-file

View file

@ -61,10 +61,10 @@
sent_topics: ^org\.fedoraproject\.{{ env_short }}\.toddlers\..* sent_topics: ^org\.fedoraproject\.{{ env_short }}\.toddlers\..*
- role: openshift/keytab - role: openshift/keytab
app: toddlers keytab_app: toddlers
key: service.keytab keytab_key: service.keytab
secret_name: toddlers-keytab keytab_secret_name: toddlers-keytab
service: toddlers keytab_service: toddlers
- role: openshift/ipa-client - role: openshift/ipa-client
app: toddlers app: toddlers

View file

@ -102,10 +102,10 @@
- role: openshift/ipa-client - role: openshift/ipa-client
app: webhook2fedmsg app: webhook2fedmsg
- role: openshift/keytab - role: openshift/keytab
app: webhook2fedmsg keytab_app: webhook2fedmsg
key: service.keytab keytab_key: service.keytab
secret_name: keytab keytab_secret_name: keytab
service: webhook2fedmsg keytab_service: webhook2fedmsg
# Deployment config # Deployment config
- role: openshift/object - role: openshift/object

View file

@ -3,16 +3,16 @@
include_role: include_role:
name: keytab/service name: keytab/service
vars: vars:
kt_location: "/etc/openshift_apps/{{app}}/{{key}}.kt" kt_location: "/etc/openshift_apps/{{keytab_app}}/{{keytab_key}}.kt"
- name: Call `oc secrets new` on the copied file - name: Call `oc secrets new` on the copied file
shell: oc -n {{app}} secrets new {{secret_name}} {{key}}=/etc/openshift_apps/{{app}}/{{key}}.kt shell: oc -n {{keytab_app}} secrets new {{keytab_secret_name}} {{keytab_key}}=/etc/openshift_apps/{{keytab_app}}/{{keytab_key}}.kt
register: create_out register: create_out
when: not ocp4 when: not ocp4
failed_when: "create_out.rc != 0 and 'AlreadyExists' not in create_out.stderr" failed_when: "create_out.rc != 0 and 'AlreadyExists' not in create_out.stderr"
- name: Call `oc create secret generic` on the copied file - name: Call `oc create secret generic` on the copied file
shell: oc -n {{app}} create secret generic {{secret_name}} --from-file={{key}}=/etc/openshift_apps/{{app}}/{{key}}.kt shell: oc -n {{keytab_app}} create secret generic {{keytab_secret_name}} --from-file={{keytab_key}}=/etc/openshift_apps/{{keytab_app}}/{{keytab_key}}.kt
register: create_out register: create_out
when: ocp4 and not keytab_status.stat.exists when: ocp4 and not keytab_status.stat.exists
failed_when: "create_out.rc != 0 and 'AlreadyExists' not in create_out.stderr" failed_when: "create_out.rc != 0 and 'AlreadyExists' not in create_out.stderr"