Remove nginx from vagrant

This commit is contained in:
derekwaynecarr 2015-06-23 13:07:50 -04:00
parent 5e25827919
commit db202d4904
6 changed files with 15 additions and 21 deletions

View File

@ -9,7 +9,7 @@
{% endif %} {% endif %}
{% endif %} {% endif %}
{% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce' ] %} {% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce', 'vagrant' ] %}
/srv/kubernetes/basic_auth.csv: /srv/kubernetes/basic_auth.csv:
file.managed: file.managed:
- source: salt://kube-apiserver/basic_auth.csv - source: salt://kube-apiserver/basic_auth.csv

View File

@ -52,7 +52,7 @@
{% set client_ca_file = "" -%} {% set client_ca_file = "" -%}
{% set secure_port = "6443" -%} {% set secure_port = "6443" -%}
{% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce' ] %} {% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce', 'vagrant' ] %}
{% set secure_port = "443" -%} {% set secure_port = "443" -%}
{% set client_ca_file = "--client_ca_file=/srv/kubernetes/ca.crt" -%} {% set client_ca_file = "--client_ca_file=/srv/kubernetes/ca.crt" -%}
{% endif -%} {% endif -%}
@ -71,7 +71,7 @@
{% endif -%} {% endif -%}
{% endif -%} {% endif -%}
{% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce' ] %} {% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce', 'vagrant'] %}
{% set basic_auth_file = "--basic_auth_file=/srv/kubernetes/basic_auth.csv" -%} {% set basic_auth_file = "--basic_auth_file=/srv/kubernetes/basic_auth.csv" -%}
{% endif -%} {% endif -%}

View File

@ -16,7 +16,7 @@
{% endif -%} {% endif -%}
# TODO: remove nginx for other cloud providers. # TODO: remove nginx for other cloud providers.
{% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce' ] %} {% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce', 'vagrant' ] %}
{% set api_servers_with_port = api_servers -%} {% set api_servers_with_port = api_servers -%}
{% else -%} {% else -%}
{% set api_servers_with_port = api_servers + ":6443" -%} {% set api_servers_with_port = api_servers + ":6443" -%}

View File

@ -31,7 +31,7 @@ base:
- kube-controller-manager - kube-controller-manager
- kube-scheduler - kube-scheduler
- monit - monit
{% if grains['cloud'] is defined and not grains.cloud in [ 'aws', 'gce' ] %} {% if grains['cloud'] is defined and not grains.cloud in [ 'aws', 'gce', 'vagrant' ] %}
- nginx - nginx
{% endif %} {% endif %}
- cadvisor - cadvisor
@ -45,15 +45,7 @@ base:
{% if grains['cloud'] is defined and grains['cloud'] == 'azure' %} {% if grains['cloud'] is defined and grains['cloud'] == 'azure' %}
- openvpn - openvpn
{% endif %} {% endif %}
{% if grains['cloud'] is defined and grains['cloud'] == 'vagrant' %} {% if grains['cloud'] is defined and grains['cloud'] in [ 'vagrant', 'gce', 'aws' ] %}
- docker
- kubelet
{% endif %}
{% if grains['cloud'] is defined and grains['cloud'] == 'aws' %}
- docker
- kubelet
{% endif %}
{% if grains['cloud'] is defined and grains['cloud'] == 'gce' %}
- docker - docker
- kubelet - kubelet
{% endif %} {% endif %}

View File

@ -226,12 +226,12 @@ EOF
done done
fi fi
# Configure nginx authorization
mkdir -p /srv/salt-overlay/salt/nginx readonly BASIC_AUTH_FILE="/srv/salt-overlay/salt/kube-apiserver/basic_auth.csv"
if [[ ! -f /srv/salt-overlay/salt/nginx/htpasswd ]]; then if [ ! -e "${BASIC_AUTH_FILE}" ]; then
python "${KUBE_ROOT}/third_party/htpasswd/htpasswd.py" \ mkdir -p /srv/salt-overlay/salt/kube-apiserver
-b -c "/srv/salt-overlay/salt/nginx/htpasswd" \ (umask 077;
"$MASTER_USER" "$MASTER_PASSWD" echo "${MASTER_USER},${MASTER_PASSWD},admin" > "${BASIC_AUTH_FILE}")
fi fi
echo "Running release install script" echo "Running release install script"

View File

@ -131,6 +131,8 @@ function create-provision-scripts {
echo "SERVICE_CLUSTER_IP_RANGE='${SERVICE_CLUSTER_IP_RANGE}'" echo "SERVICE_CLUSTER_IP_RANGE='${SERVICE_CLUSTER_IP_RANGE}'"
echo "MASTER_USER='${MASTER_USER}'" echo "MASTER_USER='${MASTER_USER}'"
echo "MASTER_PASSWD='${MASTER_PASSWD}'" echo "MASTER_PASSWD='${MASTER_PASSWD}'"
echo "KUBE_USER='${KUBE_USER}'"
echo "KUBE_PASSWORD='${KUBE_PASSWORD}'"
echo "ENABLE_NODE_MONITORING='${ENABLE_NODE_MONITORING:-false}'" echo "ENABLE_NODE_MONITORING='${ENABLE_NODE_MONITORING:-false}'"
echo "ENABLE_NODE_LOGGING='${ENABLE_NODE_LOGGING:-false}'" echo "ENABLE_NODE_LOGGING='${ENABLE_NODE_LOGGING:-false}'"
echo "LOGGING_DESTINATION='${LOGGING_DESTINATION:-}'" echo "LOGGING_DESTINATION='${LOGGING_DESTINATION:-}'"
@ -186,7 +188,7 @@ function verify-cluster {
# verify master has all required daemons # verify master has all required daemons
echo "Validating master" echo "Validating master"
local machine="master" local machine="master"
local -a required_daemon=("salt-master" "salt-minion" "nginx" "kubelet") local -a required_daemon=("salt-master" "salt-minion" "kubelet")
local validated="1" local validated="1"
until [[ "$validated" == "0" ]]; do until [[ "$validated" == "0" ]]; do
validated="0" validated="0"