Add a bootstrap role.
This commit is contained in:
parent
38b2b9ebf4
commit
1753b5b4a6
@ -102,8 +102,9 @@
|
|||||||
# nix.sshServe.enable = true;
|
# nix.sshServe.enable = true;
|
||||||
# nix.sshServe.keys = [ "ssh-dss AAAAB3NzaC1k... bob@example.org" ];
|
# nix.sshServe.keys = [ "ssh-dss AAAAB3NzaC1k... bob@example.org" ];
|
||||||
|
|
||||||
me.worker_node.enable = true;
|
me.bootstrap.enable = true;
|
||||||
me.dont_use_substituters.enable = true;
|
me.dont_use_substituters.enable = true;
|
||||||
me.minimal_base.enable = true;
|
me.minimal_base.enable = true;
|
||||||
|
me.worker_node.enable = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@ -17,7 +17,7 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
bootstrap.manifests = lib.mkOption {
|
bootstrap.manifests = lib.mkOption {
|
||||||
type = lib.types.listOf lib.types.path;
|
type = lib.types.listOf lib.types.str;
|
||||||
default = [ ];
|
default = [ ];
|
||||||
example = lib.literalExpression ''[ ${./files/clusterrole.yaml} ]'';
|
example = lib.literalExpression ''[ ${./files/clusterrole.yaml} ]'';
|
||||||
description = "List of kubernetes manifests to load into the cluster.";
|
description = "List of kubernetes manifests to load into the cluster.";
|
||||||
@ -29,8 +29,9 @@
|
|||||||
{
|
{
|
||||||
systemd.services.kube-bootstrap = {
|
systemd.services.kube-bootstrap = {
|
||||||
enable = true;
|
enable = true;
|
||||||
description = "Load initial kubernetes manifests into the cluster.";
|
description = "Load initial kubernetes manifests into the cluster";
|
||||||
after = [ "kubernetes.target" ];
|
after = [ "kubernetes.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
path = with pkgs; [
|
path = with pkgs; [
|
||||||
kubectl
|
kubectl
|
||||||
];
|
];
|
||||||
@ -40,13 +41,13 @@
|
|||||||
};
|
};
|
||||||
script =
|
script =
|
||||||
let
|
let
|
||||||
manifests = (lib.concatMapStringsSep " " lib.escapeShellArgs config.me.bootstrap.manifests);
|
manifests = (lib.concatMapStringsSep "," lib.escapeShellArg config.me.bootstrap.manifests);
|
||||||
in
|
in
|
||||||
''
|
''
|
||||||
set -o pipefail
|
set -o pipefail
|
||||||
IFS=$'\n\t'
|
IFS=$'\n\t'
|
||||||
|
|
||||||
kubectl apply --server-side --force-conflicts -f ${manifests}
|
kubectl --kubeconfig=/.persist/keys/kube/kubelet.kubeconfig apply --server-side --force-conflicts -f ${manifests}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@ -10,7 +10,7 @@ let
|
|||||||
name = "my-cni-plugins";
|
name = "my-cni-plugins";
|
||||||
paths = with pkgs; [
|
paths = with pkgs; [
|
||||||
cni-plugins
|
cni-plugins
|
||||||
cni-plugin-flannel
|
# cni-plugin-flannel
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
my-cni-configs = pkgs.callPackage ./package/cni_conf/package.nix { };
|
my-cni-configs = pkgs.callPackage ./package/cni_conf/package.nix { };
|
||||||
|
|||||||
@ -18,6 +18,10 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkIf config.me.worker_node.enable {
|
config = lib.mkIf config.me.worker_node.enable {
|
||||||
|
me.bootstrap.manifests = [
|
||||||
|
"${../bootstrap/files/initial_clusterrole.yaml}"
|
||||||
|
"${../bootstrap/files/cilium.yaml}"
|
||||||
|
];
|
||||||
me.cilium.enable = true;
|
me.cilium.enable = true;
|
||||||
me.containerd.enable = true;
|
me.containerd.enable = true;
|
||||||
me.firewall.enable = true;
|
me.firewall.enable = true;
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user