File tree Expand file tree Collapse file tree 4 files changed +25
-18
lines changed Expand file tree Collapse file tree 4 files changed +25
-18
lines changed Original file line number Diff line number Diff line change 4
4
5
5
set -o pipefail
6
6
7
- export KUBECONFIG=" /var/local/csr_approver/kubeconfig"
7
+ CSR_KUBECONFIG=/var/local/csr_approver/kubeconfig
8
+ NODE_KUBECONFIG=/etc/kubernetes/static-pod-resources/kube-apiserver-certs/secrets/node-kubeconfigs/localhost.kubeconfig
8
9
9
10
# wait until API is online
10
- until oc --request-timeout=30s get csr; do
11
+ until oc --request-timeout=30s --kubeconfig " ${CSR_KUBECONFIG} " get csr; do
11
12
sleep 10
12
13
done
13
14
14
- count=30
15
15
go_template=' {{range .items}}{{if not .status}}{{if or (eq .spec.signerName "kubernetes.io/kubelet-serving") (eq .spec.signerName "kubernetes.io/kube-apiserver-client-kubelet")}}{{.metadata.name}}{{"\n"}}{{end}}{{end}}{{end}}'
16
- while [[ ${count} -gt 0 ]] ; do
17
- oc --request-timeout=30s get csr -o go-template=" ${go_template} " | xargs --no-run-if-empty oc --request-timeout=30s adm certificate approve
16
+ until oc --request-timeout=30s --kubeconfig " ${NODE_KUBECONFIG} " get node ; do
17
+ oc --request-timeout=30s --kubeconfig " ${CSR_KUBECONFIG} " get csr -o go-template=" ${go_template} " | xargs --no-run-if-empty oc --request-timeout=30s --kubeconfig " ${CSR_KUBECONFIG} " adm certificate approve
18
18
sleep 20
19
- count=$(( count - 1 ))
20
- echo " ${count} checks remaining"
21
19
done
22
- echo " CSR Approver complete"
Original file line number Diff line number Diff line change 4
4
apiVersion : v1
5
5
kind : ServiceAccount
6
6
metadata :
7
- name : ztpfw- csr-approver
7
+ name : csr-approver
8
8
namespace : openshift-infra
9
9
apply : true
10
10
state : present
17
17
apiVersion : rbac.authorization.k8s.io/v1
18
18
kind : ClusterRole
19
19
metadata :
20
- name : ztpfw- csr-approver
20
+ name : csr-approver
21
21
rules :
22
22
- apiGroups :
23
23
- certificates.k8s.io
50
50
apiVersion : rbac.authorization.k8s.io/v1
51
51
kind : ClusterRoleBinding
52
52
metadata :
53
- name : ztpfw- csr-approver
53
+ name : csr-approver
54
54
subjects :
55
55
- kind : ServiceAccount
56
- name : ztpfw- csr-approver
56
+ name : csr-approver
57
57
namespace : openshift-infra
58
58
roleRef :
59
59
kind : ClusterRole
60
- name : ztpfw- csr-approver
60
+ name : csr-approver
61
61
apiGroup : rbac.authorization.k8s.io
62
62
apply : true
63
63
state : present
70
70
apiVersion : v1
71
71
kind : Secret
72
72
metadata :
73
- name : ztpfw- csr-approver-secret
73
+ name : csr-approver-secret
74
74
namespace : openshift-infra
75
75
annotations :
76
- kubernetes.io/service-account.name : ztpfw- csr-approver
76
+ kubernetes.io/service-account.name : csr-approver
77
77
type : kubernetes.io/service-account-token
78
78
apply : true
79
79
state : present
84
84
kubernetes.core.k8s_info :
85
85
api_version : v1
86
86
kind : Secret
87
- name : ztpfw- csr-approver-secret
87
+ name : csr-approver-secret
88
88
namespace : openshift-infra
89
89
register : csr_secret
90
90
until : csr_secret.resources[0].data.token is defined
Original file line number Diff line number Diff line change @@ -9,9 +9,9 @@ contexts:
9
9
- name: default-context
10
10
context:
11
11
cluster: "{{ metadata.name }}"
12
- user: ztpfw- csr-approver
12
+ user: csr-approver
13
13
current-context: default-context
14
14
users:
15
- - name: ztpfw- csr-approver
15
+ - name: csr-approver
16
16
user:
17
17
token: "{{ csr_secret.resources[0] .data.token | b64decode }}"
Original file line number Diff line number Diff line change
1
+ - name : Wait for all Pods to be ready
2
+ kubernetes.core.k8s_info :
3
+ kind : Pod
4
+ field_selectors :
5
+ - status.phase=Pending
6
+ register : pending_pod_list
7
+ until : pending_pod_list.resources | length | int == 0
8
+ retries : 60
9
+ delay : 10
10
+
1
11
- name : Get ICSPs
2
12
kubernetes.core.k8s_info :
3
13
api_version : operator.openshift.io/v1alpha1
You can’t perform that action at this time.
0 commit comments