Improving yamllint configuration (#11389)

Signed-off-by: Bas Meijer <bas.meijer@enexis.nl>
This commit is contained in:
Bas
2024-07-26 03:42:20 +02:00
committed by GitHub
parent 5394715d9b
commit 8f5f75211f
154 changed files with 342 additions and 334 deletions

View File

@@ -3,7 +3,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
loop:
- { name: coredns, file: coredns-clusterrole.yml, type: clusterrole }
- { name: coredns, file: coredns-clusterrolebinding.yml, type: clusterrolebinding }
@@ -31,7 +31,7 @@
template:
src: "{{ item.src }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: coredns, src: coredns-deployment.yml, file: coredns-deployment-secondary.yml, type: deployment }
- { name: coredns, src: coredns-svc.yml, file: coredns-svc-secondary.yml, type: svc }

View File

@@ -3,7 +3,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { file: dashboard.yml, type: deploy, name: kubernetes-dashboard }
register: manifests

View File

@@ -3,7 +3,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { file: etcd_metrics-endpoints.yml, type: endpoints, name: etcd-metrics }
- { file: etcd_metrics-service.yml, type: service, name: etcd-metrics }

View File

@@ -29,7 +29,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ netchecker_templates }}"
register: manifests
when:

View File

@@ -20,7 +20,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: nodelocaldns, file: nodelocaldns-config.yml, type: configmap }
- { name: nodelocaldns, file: nodelocaldns-sa.yml, type: sa }
@@ -51,7 +51,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: nodelocaldns, file: nodelocaldns-second-daemonset.yml, type: daemonset }
register: nodelocaldns_second_manifests

View File

@@ -36,7 +36,7 @@
url: "{{ item.url }}"
unarchive: false
owner: "root"
mode: 0644
mode: "0644"
sha256: ""
download: "{{ download_defaults | combine(download_argocd) }}"
with_items: "{{ argocd_templates | selectattr('url', 'defined') | list }}"
@@ -73,7 +73,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ argocd_templates | selectattr('url', 'undefined') | list }}"
loop_control:
label: "{{ item.file }}"

View File

@@ -7,7 +7,7 @@
template:
src: controller-manager-config.yml.j2
dest: "{{ kube_config_dir }}/controller-manager-config.yml"
mode: 0644
mode: "0644"
when: inventory_hostname == groups['kube_control_plane'][0]
- name: "OCI Cloud Controller | Slurp Configuration"
@@ -24,7 +24,7 @@
template:
src: oci-cloud-provider.yml.j2
dest: "{{ kube_config_dir }}/oci-cloud-provider.yml"
mode: 0644
mode: "0644"
when: inventory_hostname == groups['kube_control_plane'][0]
- name: "OCI Cloud Controller | Apply Manifests"

View File

@@ -15,7 +15,7 @@
template:
src: "node-crb.yml.j2"
dest: "{{ kube_config_dir }}/node-crb.yml"
mode: 0640
mode: "0640"
register: node_crb_manifest
when:
- rbac_enabled
@@ -70,7 +70,7 @@
copy:
src: k8s-cluster-critical-pc.yml
dest: "{{ kube_config_dir }}/k8s-cluster-critical-pc.yml"
mode: 0640
mode: "0640"
when: inventory_hostname == groups['kube_control_plane'] | last
- name: PriorityClass | Create k8s-cluster-critical

View File

@@ -3,7 +3,7 @@
copy:
src: "oci-rbac.yml"
dest: "{{ kube_config_dir }}/oci-rbac.yml"
mode: 0640
mode: "0640"
when:
- cloud_provider is defined
- cloud_provider == 'oci'

View File

@@ -26,14 +26,14 @@
path: "{{ kube_config_dir }}/addons/container_engine_accelerator"
owner: root
group: root
mode: 0755
mode: "0755"
recurse: true
- name: Container Engine Acceleration Nvidia GPU | Create manifests for nvidia accelerators
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/container_engine_accelerator/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: nvidia-driver-install-daemonset, file: nvidia-driver-install-daemonset.yml, type: daemonset }
- { name: k8s-device-plugin-nvidia-daemonset, file: k8s-device-plugin-nvidia-daemonset.yml, type: daemonset }

View File

@@ -4,7 +4,7 @@
path: "{{ kube_config_dir }}/addons/gvisor"
owner: root
group: root
mode: 0755
mode: "0755"
recurse: true
- name: GVisor | Templates List
@@ -16,7 +16,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/gvisor/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ gvisor_templates }}"
register: gvisor_manifests
when:

View File

@@ -5,7 +5,7 @@
path: "{{ kube_config_dir }}/addons/kata_containers"
owner: root
group: root
mode: 0755
mode: "0755"
recurse: true
- name: Kata Containers | Templates list
@@ -17,7 +17,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/kata_containers/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ kata_containers_templates }}"
register: kata_containers_manifests
when:

View File

@@ -3,7 +3,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: aws-ebs-csi-driver, file: aws-ebs-csi-driver.yml}
- {name: aws-ebs-csi-controllerservice, file: aws-ebs-csi-controllerservice-rbac.yml}

View File

@@ -7,7 +7,7 @@
src: "azure-csi-cloud-config.j2"
dest: "{{ kube_config_dir }}/azure_csi_cloud_config"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
when: inventory_hostname == groups['kube_control_plane'][0]
- name: Azure CSI Driver | Get base64 cloud-config
@@ -20,7 +20,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: azure-csi-azuredisk-driver, file: azure-csi-azuredisk-driver.yml}
- {name: azure-csi-cloud-config-secret, file: azure-csi-cloud-config-secret.yml}

View File

@@ -7,5 +7,5 @@
src: "{{ cinder_cacert }}"
dest: "{{ kube_config_dir }}/cinder-cacert.pem"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
delegate_to: "{{ delegate_host_to_write_cacert }}"

View File

@@ -18,7 +18,7 @@
src: "cinder-csi-cloud-config.j2"
dest: "{{ kube_config_dir }}/cinder_cloud_config"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
when: inventory_hostname == groups['kube_control_plane'][0]
- name: Cinder CSI Driver | Get base64 cloud-config
@@ -31,7 +31,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: cinder-csi-driver, file: cinder-csi-driver.yml}
- {name: cinder-csi-cloud-config-secret, file: cinder-csi-cloud-config-secret.yml}

View File

@@ -3,7 +3,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: volumesnapshotclasses, file: volumesnapshotclasses.yml}
- {name: volumesnapshotcontents, file: volumesnapshotcontents.yml}

View File

@@ -9,7 +9,7 @@
src: "{{ gcp_pd_csi_sa_cred_file }}"
dest: "{{ kube_config_dir }}/cloud-sa.json"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
when: inventory_hostname == groups['kube_control_plane'][0]
- name: GCP PD CSI Driver | Get base64 cloud-sa.json
@@ -22,7 +22,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: gcp-pd-csi-cred-secret, file: gcp-pd-csi-cred-secret.yml}
- {name: gcp-pd-csi-setup, file: gcp-pd-csi-setup.yml}

View File

@@ -16,7 +16,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: upcloud-csi-cred-secret, file: upcloud-csi-cred-secret.yml}
- {name: upcloud-csi-setup, file: upcloud-csi-setup.yml}

View File

@@ -6,7 +6,7 @@
template:
src: "{{ item }}.j2"
dest: "{{ kube_config_dir }}/{{ item }}"
mode: 0640
mode: "0640"
with_items:
- vsphere-csi-cloud-config
when: inventory_hostname == groups['kube_control_plane'][0]
@@ -15,7 +15,7 @@
template:
src: "{{ item }}.j2"
dest: "{{ kube_config_dir }}/{{ item }}"
mode: 0644
mode: "0644"
with_items:
- vsphere-csi-namespace.yml
- vsphere-csi-driver.yml

View File

@@ -4,7 +4,7 @@
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
with_items:
- {name: external-hcloud-cloud-secret, file: external-hcloud-cloud-secret.yml}
- {name: external-hcloud-cloud-service-account, file: external-hcloud-cloud-service-account.yml}

View File

@@ -24,7 +24,7 @@
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
with_items:
- {name: external-huawei-cloud-config-secret, file: external-huawei-cloud-config-secret.yml}
- {name: external-huawei-cloud-controller-manager-roles, file: external-huawei-cloud-controller-manager-roles.yml}

View File

@@ -24,7 +24,7 @@
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
group: "{{ kube_cert_group }}"
mode: 0640
mode: "0640"
with_items:
- {name: external-openstack-cloud-config-secret, file: external-openstack-cloud-config-secret.yml}
- {name: external-openstack-cloud-controller-manager-roles, file: external-openstack-cloud-controller-manager-roles.yml}

View File

@@ -6,7 +6,7 @@
template:
src: "{{ item }}.j2"
dest: "{{ kube_config_dir }}/{{ item }}"
mode: 0640
mode: "0640"
with_items:
- external-vsphere-cpi-cloud-config
when: inventory_hostname == groups['kube_control_plane'][0]
@@ -15,7 +15,7 @@
template:
src: "{{ item }}.j2"
dest: "{{ kube_config_dir }}/{{ item }}"
mode: 0644
mode: "0644"
with_items:
- external-vsphere-cpi-cloud-config-secret.yml
- external-vsphere-cloud-controller-manager-roles.yml

View File

@@ -33,7 +33,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -54,7 +54,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/cephfs_provisioner/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ cephfs_provisioner_templates }}"
register: cephfs_provisioner_manifests
when: inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -5,7 +5,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -13,7 +13,7 @@
file:
path: "{{ local_path_provisioner_claim_root }}"
state: directory
mode: 0755
mode: "0755"
- name: Local Path Provisioner | Render Template
set_fact:
@@ -30,7 +30,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/local_path_provisioner/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ local_path_provisioner_templates }}"
register: local_path_provisioner_manifests
when: inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -12,7 +12,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
- name: Local Volume Provisioner | Templates list
set_fact:
@@ -29,7 +29,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/local_volume_provisioner/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ local_volume_provisioner_templates }}"
register: local_volume_provisioner_manifests
when: inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -33,7 +33,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -54,7 +54,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/rbd_provisioner/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ rbd_provisioner_templates }}"
register: rbd_provisioner_manifests
when: inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -32,7 +32,7 @@
copy:
src: "{{ local_release_dir }}/helm-{{ helm_version }}/linux-{{ image_arch }}/helm"
dest: "{{ bin_dir }}/helm"
mode: 0755
mode: "0755"
remote_src: true
- name: Helm | Get helm completion
@@ -45,5 +45,5 @@
copy:
dest: /etc/bash_completion.d/helm.sh
content: "{{ helm_completion.stdout }}"
mode: 0755
mode: "0755"
become: True

View File

@@ -6,13 +6,13 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
- name: ALB Ingress Controller | Create manifests
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/alb_ingress/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: alb-ingress-clusterrole, file: alb-ingress-clusterrole.yml, type: clusterrole }
- { name: alb-ingress-clusterrolebinding, file: alb-ingress-clusterrolebinding.yml, type: clusterrolebinding }

View File

@@ -24,7 +24,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -38,7 +38,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/cert_manager/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ cert_manager_templates }}"
register: cert_manager_manifests
when:

View File

@@ -6,7 +6,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -50,7 +50,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/ingress_nginx/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ ingress_nginx_templates }}"
register: ingress_nginx_manifests
when:

View File

@@ -8,13 +8,13 @@
template:
src: krew.j2
dest: /etc/bash_completion.d/krew
mode: 0644
mode: "0644"
- name: Krew | Copy krew manifest
template:
src: krew.yml.j2
dest: "{{ local_release_dir }}/krew.yml"
mode: 0644
mode: "0644"
- name: Krew | Install krew # noqa command-instead-of-shell
shell: "{{ local_release_dir }}/krew-{{ host_os }}_{{ image_arch }} install --archive={{ local_release_dir }}/krew-{{ host_os }}_{{ image_arch }}.tar.gz --manifest={{ local_release_dir }}/krew.yml"
@@ -33,6 +33,6 @@
copy:
dest: /etc/bash_completion.d/krew.sh
content: "{{ krew_completion.stdout }}"
mode: 0755
mode: "0755"
become: True
when: krew_completion.rc == 0

View File

@@ -16,7 +16,7 @@
template:
src: "metallb.yaml.j2"
dest: "{{ kube_config_dir }}/metallb.yaml"
mode: 0644
mode: "0644"
register: metallb_rendering
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -47,7 +47,7 @@
ansible.builtin.template:
src: pools.yaml.j2
dest: "{{ kube_config_dir }}/pools.yaml"
mode: 0644
mode: "0644"
register: pools_rendering
- name: MetalLB | Create address pools configuration
@@ -67,7 +67,7 @@
ansible.builtin.template:
src: layer2.yaml.j2
dest: "{{ kube_config_dir }}/layer2.yaml"
mode: 0644
mode: "0644"
register: layer2_rendering
- name: MetalLB | Create layer2 configuration
@@ -87,7 +87,7 @@
ansible.builtin.template:
src: layer3.yaml.j2
dest: "{{ kube_config_dir }}/layer3.yaml"
mode: 0644
mode: "0644"
register: layer3_rendering
- name: MetalLB | Create layer3 configuration

View File

@@ -19,7 +19,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -39,7 +39,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/metrics_server/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ metrics_server_templates }}"
register: metrics_server_manifests
when:

View File

@@ -5,7 +5,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when:
- inventory_hostname == groups['kube_control_plane'][0]
@@ -31,7 +31,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/node_feature_discovery/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ node_feature_discovery_templates }}"
register: node_feature_discovery_manifests
when:

View File

@@ -3,7 +3,7 @@
template:
src: "aws-ebs-csi-storage-class.yml.j2"
dest: "{{ kube_config_dir }}/aws-ebs-csi-storage-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -3,7 +3,7 @@
template:
src: "azure-csi-storage-class.yml.j2"
dest: "{{ kube_config_dir }}/azure-csi-storage-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -3,7 +3,7 @@
template:
src: "cinder-csi-storage-class.yml.j2"
dest: "{{ kube_config_dir }}/cinder-csi-storage-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -3,7 +3,7 @@
template:
src: "gcp-pd-csi-storage-class.yml.j2"
dest: "{{ kube_config_dir }}/gcp-pd-csi-storage-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -3,7 +3,7 @@
template:
src: "openstack-storage-class.yml.j2"
dest: "{{ kube_config_dir }}/openstack-storage-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -3,7 +3,7 @@
template:
src: "upcloud-csi-storage-class.yml.j2"
dest: "{{ kube_config_dir }}/upcloud-csi-storage-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -3,7 +3,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: calico-kube-controllers, file: calico-kube-controllers.yml, type: deployment}
- {name: calico-kube-controllers, file: calico-kube-sa.yml, type: sa}

View File

@@ -31,7 +31,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
- name: Registry | Templates list
set_fact:
@@ -54,7 +54,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/registry/{{ item.file }}"
mode: 0644
mode: "0644"
with_items: "{{ registry_templates }}"
register: registry_manifests
when: inventory_hostname == groups['kube_control_plane'][0]
@@ -74,7 +74,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/addons/registry/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: registry-pvc, file: registry-pvc.yml, type: pvc }
register: registry_manifests

View File

@@ -5,7 +5,7 @@
state: directory
owner: root
group: root
mode: 0755
mode: "0755"
when: inventory_hostname == groups['kube_control_plane'][0]
tags:
- scheduler_plugins
@@ -14,7 +14,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/scheduler-plugins/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- { name: appgroup, file: appgroup.diktyo.x-k8s.io_appgroups.yaml, type: crd }
- { name: networktopology, file: networktopology.diktyo.x-k8s.io_networktopologies.yaml, type: crd }

View File

@@ -3,7 +3,7 @@
template:
src: "cinder-csi-snapshot-class.yml.j2"
dest: "{{ kube_config_dir }}/cinder-csi-snapshot-class.yml"
mode: 0644
mode: "0644"
register: manifests
when:
- inventory_hostname == groups['kube_control_plane'][0]

View File

@@ -13,7 +13,7 @@
template:
src: "{{ item.file }}.j2"
dest: "{{ kube_config_dir }}/{{ item.file }}"
mode: 0644
mode: "0644"
with_items:
- {name: snapshot-ns, file: snapshot-ns.yml, apply: not snapshot_namespace_exists}
- {name: rbac-snapshot-controller, file: rbac-snapshot-controller.yml}