summaryrefslogtreecommitdiffstats
path: root/ansible/roles
AgeCommit message (Collapse)AuthorFilesLines
2019-01-08Revert "Fix the problem with ansible_host for ..."Petr Ospalý1-5/+1
This reverts commit a22f6b34a424d0ce25be7e560d8072a2e84e3ab8. This commit was merged by mistake. Change-Id: Ic73bfd8e9d97c3a23629cba69047cc0edefb9cd0 Issue-ID: OOM-1573 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2019-01-07Fix the problem with ansible_host for dockerPetr Ospalý1-1/+5
WIP This solves the problem with domain name without dropping the ansible_host. Ansible_host is just resolved to the ip. By using the ping command we can avoid another dependencies. Change-Id: Ic1963d3af6a8bdd68089ac8b599731e35475d81f Issue-ID: OOM-1573 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2019-01-04Fix docker config handling in offline installerMichal Zegan1-1/+1
This fixes adding of dns address to /etc/docker/daemon.json to always use infra's ip address instead of possibly using it's hostname. It is done by replacing usage of "ansible_host" by "ansible_default_ipv4.address" fact. Change-Id: If6a29f3bf11ece7f883b099a1ab503341859cb90 Issue-ID: OOM-1573 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-20Update ansible nexus roleMichal Zegan2-1/+2
Looks like this one was a bit out of date, updating it... Change-Id: I7734fc5ccdba001d3c409244cd1625453ab232ed Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-20Merge "Adding role for application handling"Tomáš Levora4-5/+49
2018-12-20Merge "Add ansible role for dns simulation"Michal Ptacek3-0/+53
2018-12-20Merge "Add ansible firewall role"Michal Ptacek2-0/+19
2018-12-19Adding role for application handlingMichal Ptacek4-5/+49
this ansible role contains application specific tasks, it is written in generic way and different helm charts can be used as application. In addition operator can provide proprietary pre_install and post_install hooks. Change-Id: Ibe4b330e5a725dde41aca9f6a59d702cfaba6f52 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Add ansible role for dns simulationTomáš Levora3-0/+53
Adding role to simulate domain names for offline installation from private nexus repositories Issue-ID: OOM-1551 Change-Id: Ia3fe274e95ef078332627af9229195bd6e9a667d Signed-off-by: Tomáš Levora <t.levora@partner.samsung.com>
2018-12-19Add ansible role for docker installationTomáš Levora2-0/+40
Adding ansible role for installation of docker and its setup Issue-ID: OOM-1551 Change-Id: I49bca8eab46a2750cd627cbf709bed6744c88df5 Signed-off-by: Tomáš Levora <t.levora@partner.samsung.com>
2018-12-19Add ansible firewall roleTomáš Levora2-0/+19
Adding role to disable firewall to prevent any issue with communication during the installation Change-Id: I2390f0bc5062933e6a8bf4dcbc0b255b283f993d Issue-ID: OOM-1551 Signed-off-by: Tomáš Levora <t.levora@partner.samsung.com>
2018-12-19Merge "Adding ansible helm role"Petr Ospalý1-0/+7
2018-12-19Merge "Adding ansible vncserver role"Petr Ospalý1-0/+19
2018-12-19Merge "Add resource-data handling role"Petr Ospalý3-0/+113
2018-12-19Add application-install roleTomas Levora3-0/+40
This role adds helm install handling to ansible installer Change-Id: I31f62a815822f5375cc7e5b138bec27e359127b0 Issue-ID: OOM-1551 Signed-off-by: Tomáš Levora <t.levora@partner.samsung.com>
2018-12-19Merge "Adding nginx role"Michal Ptacek2-0/+142
2018-12-19Merge "Add nexus ansible role"Michal Ptacek8-0/+136
2018-12-19Adding nginx roleMichal Ptacek2-0/+142
nginx is crucial part of our offline solution, within this role we are covering deployment of this lightweight http server together with its configuration. Change-Id: I89695074349f4c6938340ab3bb735108c8c278f4 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Adding rancher roleMichal Ptacek4-0/+85
In kubernetes cluster configuration we still use rancher tool, this ansible role is providing handling for both rancher server and agent. Change-Id: I508a42a98902788b940b06cf95009a899c50a3b8 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Add resource-data handling roleMichal Ptacek3-0/+113
In this role we mostly cover uploading of data resource using either default ssh way or if nfs server is configured it can be used as well for distributing data to infra node. Change-Id: I4784c6ca931b00c1033aedb33e388badfba83650 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Adding ansible vncserver roleMichal Ptacek1-0/+19
Local VNCserver is expected to be good tool for accessing onap component GUI APIs howerver its not crucial part of the installation. Change-Id: If8105d5ab564f30d9da002a5bf2b1f0f3c017f78 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Adding ansible helm roleMichal Ptacek1-0/+7
This role is providing handling of helm binary, as of now its very lightweight. Change-Id: I7b9368f31b40d3a818dfdaa9293b0013d963b39c Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Merge "Add ansible nfs role"Michal Ptacek3-0/+41
2018-12-19Merge "Add ansible certificates role"Michal Ptacek3-0/+119
2018-12-19Add ansible kubectl roleMichal Zegan1-0/+7
This role install kubectl tool. Change-Id: Ie446a68c94138593770f323ec3ee3dc607fdd8e0 Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-19Add nexus ansible roleMichal Zegan8-0/+136
This role deploys the internal nexus used as offline source of docker images/npm packages for onap. Change-Id: Iaf398eb03614749d2b3c100c241726144ccae1a0 Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-19Add ansible nfs roleMichal Zegan3-0/+41
This commit adds role for creating /dockerdata-nfs and exporting i over nfs for later use during onap deployment. Change-Id: I0ea8e858d581534b983eaab6e1ee570068fc623c Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-19Add ansible certificates roleMichal Zegan3-0/+119
This role is used to generate and install certificates on instances, incl. root ca. Those certificates are used mainly to allow secure access to internal docker registry with proper certificate verification. Issue-ID: OOM-1551 Change-Id: I74782dd2938cb51da293f88483d5362981269196 Signed-off-by: Michal Zegan <m.zegan@samsung.com>