diff options
| author | Scott Dodson <sdodson@redhat.com> | 2017-08-04 09:47:58 -0400 | 
|---|---|---|
| committer | Scott Dodson <sdodson@redhat.com> | 2017-08-04 09:47:58 -0400 | 
| commit | fe55a08dc2798dec78da10b5e71904f5e6f976e8 (patch) | |
| tree | 8e8c9935a41c79d2d9fa98e09cea3246e99fbd8b /roles | |
| parent | bdcf0cc6a0213036656da8573d6e62e28b08e1f9 (diff) | |
| download | openshift-fe55a08dc2798dec78da10b5e71904f5e6f976e8.tar.gz openshift-fe55a08dc2798dec78da10b5e71904f5e6f976e8.tar.bz2 openshift-fe55a08dc2798dec78da10b5e71904f5e6f976e8.tar.xz openshift-fe55a08dc2798dec78da10b5e71904f5e6f976e8.zip | |
Add v3.7 hosted templates
Diffstat (limited to 'roles')
| -rw-r--r-- | roles/openshift_hosted_templates/files/v3.7/enterprise/registry-console.yaml | 124 | ||||
| -rw-r--r-- | roles/openshift_hosted_templates/files/v3.7/origin/registry-console.yaml | 124 | 
2 files changed, 248 insertions, 0 deletions
| diff --git a/roles/openshift_hosted_templates/files/v3.7/enterprise/registry-console.yaml b/roles/openshift_hosted_templates/files/v3.7/enterprise/registry-console.yaml new file mode 100644 index 000000000..bbaf76c17 --- /dev/null +++ b/roles/openshift_hosted_templates/files/v3.7/enterprise/registry-console.yaml @@ -0,0 +1,124 @@ +kind: Template +apiVersion: v1 +metadata: +  name: "registry-console" +  annotations: +    description: "Template for deploying registry web console. Requires cluster-admin." +    tags: infrastructure +labels: +  createdBy: "registry-console-template" +objects: +  - kind: DeploymentConfig +    apiVersion: v1 +    metadata: +      name: "registry-console" +      labels: +        name: "registry-console" +    spec: +      triggers: +      - type: ConfigChange +      replicas: 1 +      selector: +        name: "registry-console" +      template: +        metadata: +          labels: +            name: "registry-console" +        spec: +          containers: +            - name: registry-console +              image: ${IMAGE_PREFIX}registry-console:${IMAGE_VERSION} +              ports: +                - containerPort: 9090 +                  protocol: TCP +              livenessProbe: +                failureThreshold: 3 +                httpGet: +                  path: /ping +                  port: 9090 +                  scheme: HTTP +                initialDelaySeconds: 10 +                periodSeconds: 10 +                successThreshold: 1 +                timeoutSeconds: 5 +              readinessProbe: +                failureThreshold: 3 +                httpGet: +                  path: /ping +                  port: 9090 +                  scheme: HTTP +                periodSeconds: 10 +                successThreshold: 1 +                timeoutSeconds: 5 +              env: +                - name: OPENSHIFT_OAUTH_PROVIDER_URL +                  value: "${OPENSHIFT_OAUTH_PROVIDER_URL}" +                - name: OPENSHIFT_OAUTH_CLIENT_ID +                  value: "${OPENSHIFT_OAUTH_CLIENT_ID}" +                - name: KUBERNETES_INSECURE +                  value: "false" +                - name: COCKPIT_KUBE_INSECURE +                  value: "false" +                - name: REGISTRY_ONLY +                  value: "true" +                - name: REGISTRY_HOST +                  value: "${REGISTRY_HOST}" +  - kind: Service +    apiVersion: v1 +    metadata: +     name: "registry-console" +     labels: +       name: "registry-console" +    spec: +      type: ClusterIP +      ports: +        - name: registry-console +          protocol: TCP +          port: 9000 +          targetPort: 9090 +      selector: +        name: "registry-console" +  - kind: ImageStream +    apiVersion: v1 +    metadata: +      name: registry-console +      annotations: +        description: Atomic Registry console +    spec: +      tags: +        - annotations: null +          from: +            kind: DockerImage +            name: ${IMAGE_PREFIX}registry-console +          name: ${IMAGE_VERSION} +  - kind: OAuthClient +    apiVersion: v1 +    metadata: +      name: "${OPENSHIFT_OAUTH_CLIENT_ID}" +      respondWithChallenges: false +    secret: "${OPENSHIFT_OAUTH_CLIENT_SECRET}" +    redirectURIs: +      - "${COCKPIT_KUBE_URL}" +parameters: +  - description: 'Specify "registry/repository" prefix for container image; e.g. for "registry.access.redhat.com/openshift3/registry-console:latest", set prefix "registry.access.redhat.com/openshift3/"' +    name: IMAGE_PREFIX +    value: "registry.access.redhat.com/openshift3/" +  - description: 'Specify image version; e.g. for "registry.access.redhat.com/openshift3/registry-console:v3.7", set version "v3.7"' +    name: IMAGE_VERSION +    value: "v3.7" +  - description: "The public URL for the Openshift OAuth Provider, e.g. https://openshift.example.com:8443" +    name: OPENSHIFT_OAUTH_PROVIDER_URL +    required: true +  - description: "The registry console URL. This should be created beforehand using 'oc create route passthrough --service registry-console --port registry-console -n default', e.g. https://registry-console-default.example.com" +    name: COCKPIT_KUBE_URL +    required: true +  - description: "Oauth client secret" +    name: OPENSHIFT_OAUTH_CLIENT_SECRET +    from: "user[a-zA-Z0-9]{64}" +    generate: expression +  - description: "Oauth client id" +    name: OPENSHIFT_OAUTH_CLIENT_ID +    value: "cockpit-oauth-client" +  - description: "The integrated registry hostname exposed via route, e.g. registry.example.com" +    name: REGISTRY_HOST +    required: true diff --git a/roles/openshift_hosted_templates/files/v3.7/origin/registry-console.yaml b/roles/openshift_hosted_templates/files/v3.7/origin/registry-console.yaml new file mode 100644 index 000000000..80cc4233b --- /dev/null +++ b/roles/openshift_hosted_templates/files/v3.7/origin/registry-console.yaml @@ -0,0 +1,124 @@ +kind: Template +apiVersion: v1 +metadata: +  name: "registry-console" +  annotations: +    description: "Template for deploying registry web console. Requires cluster-admin." +    tags: infrastructure +labels: +  createdBy: "registry-console-template" +objects: +  - kind: DeploymentConfig +    apiVersion: v1 +    metadata: +      name: "registry-console" +      labels: +        name: "registry-console" +    spec: +      triggers: +      - type: ConfigChange +      replicas: 1 +      selector: +        name: "registry-console" +      template: +        metadata: +          labels: +            name: "registry-console" +        spec: +          containers: +            - name: registry-console +              image: ${IMAGE_NAME}:${IMAGE_VERSION} +              ports: +                - containerPort: 9090 +                  protocol: TCP +              livenessProbe: +                failureThreshold: 3 +                httpGet: +                  path: /ping +                  port: 9090 +                  scheme: HTTP +                initialDelaySeconds: 10 +                periodSeconds: 10 +                successThreshold: 1 +                timeoutSeconds: 5 +              readinessProbe: +                failureThreshold: 3 +                httpGet: +                  path: /ping +                  port: 9090 +                  scheme: HTTP +                periodSeconds: 10 +                successThreshold: 1 +                timeoutSeconds: 5 +              env: +                - name: OPENSHIFT_OAUTH_PROVIDER_URL +                  value: "${OPENSHIFT_OAUTH_PROVIDER_URL}" +                - name: OPENSHIFT_OAUTH_CLIENT_ID +                  value: "${OPENSHIFT_OAUTH_CLIENT_ID}" +                - name: KUBERNETES_INSECURE +                  value: "false" +                - name: COCKPIT_KUBE_INSECURE +                  value: "false" +                - name: REGISTRY_ONLY +                  value: "true" +                - name: REGISTRY_HOST +                  value: "${REGISTRY_HOST}" +  - kind: Service +    apiVersion: v1 +    metadata: +     name: "registry-console" +     labels: +       name: "registry-console" +    spec: +      type: ClusterIP +      ports: +        - name: registry-console +          protocol: TCP +          port: 9000 +          targetPort: 9090 +      selector: +        name: "registry-console" +  - kind: ImageStream +    apiVersion: v1 +    metadata: +      name: registry-console +      annotations: +        description: Atomic Registry console +    spec: +      tags: +        - annotations: null +          from: +            kind: DockerImage +            name: ${IMAGE_NAME} +          name: ${IMAGE_VERSION} +  - kind: OAuthClient +    apiVersion: v1 +    metadata: +      name: "${OPENSHIFT_OAUTH_CLIENT_ID}" +      respondWithChallenges: false +    secret: "${OPENSHIFT_OAUTH_CLIENT_SECRET}" +    redirectURIs: +      - "${COCKPIT_KUBE_URL}" +parameters: +  - description: "Container image name" +    name: IMAGE_NAME +    value: "cockpit/kubernetes" +  - description: 'Specify image version; e.g. for "cockpit/kubernetes:latest", set version "latest"' +    name: IMAGE_VERSION +    value: latest +  - description: "The public URL for the Openshift OAuth Provider, e.g. https://openshift.example.com:8443" +    name: OPENSHIFT_OAUTH_PROVIDER_URL +    required: true +  - description: "The registry console URL. This should be created beforehand using 'oc create route passthrough --service registry-console --port registry-console -n default', e.g. https://registry-console-default.example.com" +    name: COCKPIT_KUBE_URL +    required: true +  - description: "Oauth client secret" +    name: OPENSHIFT_OAUTH_CLIENT_SECRET +    from: "user[a-zA-Z0-9]{64}" +    generate: expression +  - description: "Oauth client id" +    name: OPENSHIFT_OAUTH_CLIENT_ID +    value: "cockpit-oauth-client" +  - description: "The integrated registry hostname exposed via route, e.g. registry.example.com" +    name: REGISTRY_HOST +    required: true | 
