summaryrefslogtreecommitdiffstats
path: root/ansible
AgeCommit message (Collapse)AuthorFilesLines
2018-12-19Merge "Add application-install role"Simon Hrabos3-0/+40
2018-12-19Merge "Add the playbook for deploying the helm app"Simon Hrabos1-0/+23
2018-12-19Merge "Add the wrapper for running the ansible"Simon Hrabos1-0/+132
2018-12-19Merge "Add .gitignore to the ansible directory"Simon Hrabos1-0/+1
2018-12-19Merge "Add empty application directory with README"Simon Hrabos1-0/+58
2018-12-19Add the wrapper for running the ansiblePetr Ospalý1-0/+132
This script can run ansible playbook inside the docker container or (default) in the chroot environment. Change-Id: I713d6d76a4e20fc365a0ac7f47482004608354f6 Issue-ID: OOM-1551 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add the playbook for deploying the helm appPetr Ospalý1-0/+23
The application specific stuff should be in the directory application - look at the README.md there Change-Id: I59d103246d0f54ea329a04d43479c4f31952b902 Issue-ID: OOM-1551 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add application-install roleTomas Levora3-0/+40
This role adds helm install handling to ansible installer Change-Id: I31f62a815822f5375cc7e5b138bec27e359127b0 Issue-ID: OOM-1551 Signed-off-by: Tomáš Levora <t.levora@partner.samsung.com>
2018-12-19Add the setup playbook for distributing ssh keysPetr Ospalý1-0/+26
Change-Id: I76773122de3d0b85a5bd772353614834df382c54 Issue-ID: OOM-1551 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add .gitignore to the ansible directoryPetr Ospalý1-0/+1
To avoid including the untarred chroot directory into git Issue-ID: OOM-1551 Change-Id: I4f760a2a5068a78fb5a05ebb1874544d55a2fc83 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add empty application directory with READMEPetr Ospalý1-0/+58
Issue-ID: OOM-1551 Change-Id: I9bd50199d441bcc33d9a8019297950e556f378e4 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Merge "Add control variables for the ansible deploy"Michal Ptacek2-0/+165
2018-12-19Add the template for the hosts inventory filePetr Ospalý1-0/+32
Issue-ID: OOM-1551 Change-Id: I6ed8cae7fae5b482b5934d0e974434083714cf75 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add control variables for the ansible deployPetr Ospalý2-0/+165
all.yml should be set or redefined per application infrastructure.yml should be modified only with a care Issue-ID: OOM-1551 Change-Id: I05dd6b83d980101214881420e3825949e75afc73 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Merge "Adding nginx role"Michal Ptacek2-0/+142
2018-12-19Merge "Add nexus ansible role"Michal Ptacek8-0/+136
2018-12-19Add ansible library for creating the k8n env.Petr Ospalý1-0/+341
Issue-ID: OOM-1551 Change-Id: I485f58e560086345bd27a4a7f94d2651a0cd357e Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Merge "Adding rancher role"Tomáš Levora4-0/+85
2018-12-19Add ansible library to modify jsonPetr Ospalý1-0/+90
Issue-ID: OOM-1551 Change-Id: I791bf7163a023ddc140cee22d474fcf532beae17 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Merge "Add a wrapper script to run ansible in chroot"Tomáš Levora1-0/+465
2018-12-19Merge "Add .gitignore to docker directory"Petr Ospalý1-0/+3
2018-12-19Add a wrapper script to run ansible in chrootPetr Ospalý1-0/+465
Script uses namespaces and overlayfs to be more robust. Also it supports bind mounting to extend the chroot with external files and directories. Issue-ID: OOM-1551 Change-Id: I8c554e1b86fca86f86e6c0d0e1b106c97a08ef15 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Adding nginx roleMichal Ptacek2-0/+142
nginx is crucial part of our offline solution, within this role we are covering deployment of this lightweight http server together with its configuration. Change-Id: I89695074349f4c6938340ab3bb735108c8c278f4 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Adding rancher roleMichal Ptacek4-0/+85
In kubernetes cluster configuration we still use rancher tool, this ansible role is providing handling for both rancher server and agent. Change-Id: I508a42a98902788b940b06cf95009a899c50a3b8 Issue-ID: OOM-1551 Signed-off-by: Michal Ptacek <m.ptacek@partner.samsung.com>
2018-12-19Add a script to convert the docker into chrootPetr Ospalý1-0/+220
The docker image will be exported into a tar archive containing the chroot directory Issue-ID: OOM-1551 Change-Id: I8709ffd59156243e42bebbaf03838120149d47b0 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add .gitignore to docker directoryPetr Ospalý1-0/+3
To avoid including the created image in the git by accident Issue-ID: OOM-1551 Change-Id: I7144a063ed45ee8511912adb2aa1024965d452d0 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Add ansible docker imagePetr Ospalý2-0/+86
Dockerfile and script for building the image Change-Id: If1e83095463ae209e284ba92898447a1205a2244 Issue-ID: OOM-1551 Signed-off-by: Petr Ospalý <p.ospaly@partner.samsung.com>
2018-12-19Merge "Add ansible nfs role"Michal Ptacek3-0/+41
2018-12-19Merge "Add ansible certificates role"Michal Ptacek3-0/+119
2018-12-19Add ansible kubectl roleMichal Zegan1-0/+7
This role install kubectl tool. Change-Id: Ie446a68c94138593770f323ec3ee3dc607fdd8e0 Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-19Add nexus ansible roleMichal Zegan8-0/+136
This role deploys the internal nexus used as offline source of docker images/npm packages for onap. Change-Id: Iaf398eb03614749d2b3c100c241726144ccae1a0 Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-19Add ansible nfs roleMichal Zegan3-0/+41
This commit adds role for creating /dockerdata-nfs and exporting i over nfs for later use during onap deployment. Change-Id: I0ea8e858d581534b983eaab6e1ee570068fc623c Issue-ID: OOM-1551 Signed-off-by: Michal Zegan <m.zegan@samsung.com>
2018-12-19Add ansible certificates roleMichal Zegan3-0/+119
This role is used to generate and install certificates on instances, incl. root ca. Those certificates are used mainly to allow secure access to internal docker registry with proper certificate verification. Issue-ID: OOM-1551 Change-Id: I74782dd2938cb51da293f88483d5362981269196 Signed-off-by: Michal Zegan <m.zegan@samsung.com>