From 1a8bc64666f790d05e6212faf6f49f961633f670 Mon Sep 17 00:00:00 2001
From: Steve Milner <smilner@redhat.com>
Date: Wed, 8 Feb 2017 14:07:45 -0500
Subject: Removed adhoc s3_registry

s3 items are now supported directly in the openshift_hosted role.
---
 playbooks/adhoc/s3_registry/s3_registry.j2  | 23 --------
 playbooks/adhoc/s3_registry/s3_registry.yml | 81 -----------------------------
 2 files changed, 104 deletions(-)
 delete mode 100644 playbooks/adhoc/s3_registry/s3_registry.j2
 delete mode 100644 playbooks/adhoc/s3_registry/s3_registry.yml

(limited to 'playbooks/adhoc')

diff --git a/playbooks/adhoc/s3_registry/s3_registry.j2 b/playbooks/adhoc/s3_registry/s3_registry.j2
deleted file mode 100644
index 10454ad11..000000000
--- a/playbooks/adhoc/s3_registry/s3_registry.j2
+++ /dev/null
@@ -1,23 +0,0 @@
-version: 0.1
-log:
-  level: debug
-http:
-  addr: :5000
-storage:
-  cache:
-    layerinfo: inmemory
-  s3:
-    accesskey: {{ aws_access_key }}
-    secretkey: {{ aws_secret_key }}
-    region: {{ aws_bucket_region }}
-    bucket: {{ aws_bucket_name }}
-    encrypt: true
-    secure: true
-    v4auth: true
-    rootdirectory: /registry
-auth:
-  openshift:
-    realm: openshift
-middleware:
-  repository:
-    - name: openshift
diff --git a/playbooks/adhoc/s3_registry/s3_registry.yml b/playbooks/adhoc/s3_registry/s3_registry.yml
deleted file mode 100644
index d6758dae5..000000000
--- a/playbooks/adhoc/s3_registry/s3_registry.yml
+++ /dev/null
@@ -1,81 +0,0 @@
----
-# This playbook creates an S3 bucket named after your cluster and configures the docker-registry service to use the bucket as its backend storage.
-# Usage:
-#  ansible-playbook s3_registry.yml -e clusterid="mycluster" -e aws_bucket="clusterid-docker" -e aws_region="us-east-1"
-#
-# The AWS access/secret keys should be the keys of a separate user (not your main user), containing only the necessary S3 access role.
-# The 'clusterid' is the short name of your cluster.
-
-- hosts: tag_clusterid_{{ clusterid }}:&tag_host-type_openshift-master
-  remote_user: root
-  gather_facts: False
-
-  vars:
-    aws_access_key: "{{ lookup('env', 'S3_ACCESS_KEY_ID') }}"
-    aws_secret_key: "{{ lookup('env', 'S3_SECRET_ACCESS_KEY') }}"
-    aws_bucket_name: "{{ aws_bucket | default(clusterid ~ '-docker') }}"
-    aws_bucket_region: "{{ aws_region | default(lookup('env', 'S3_REGION') | default('us-east-1', true)) }}"
-    aws_create_bucket: "{{ aws_create | default(True) }}"
-    aws_tmp_path: "{{ aws_tmp_pathfile | default('/root/config.yml')}}"
-    aws_delete_tmp_file: "{{ aws_delete_tmp | default(True) }}"
-
-  tasks:
-
-  - name: Check for AWS creds
-    fail:
-      msg: "Couldn't find {{ item }} creds in ENV"
-    when: "{{ item }} == ''"
-    with_items:
-    - aws_access_key
-    - aws_secret_key
-
-  - name: Scale down registry
-    command: oc scale --replicas=0 dc/docker-registry
-
-  - name: Create S3 bucket
-    when: aws_create_bucket | bool
-    local_action:
-      module: s3 bucket="{{ aws_bucket_name }}" mode=create
-
-  - name: Set up registry environment variable
-    command: oc env dc/docker-registry REGISTRY_CONFIGURATION_PATH=/etc/registryconfig/config.yml
-
-  - name: Generate docker registry config
-    template: src="s3_registry.j2" dest="/root/config.yml" owner=root mode=0600
-
-  - name: Determine if new secrets are needed
-    command: oc get secrets
-    register: secrets
-
-  - name: Create registry secrets
-    command: oc secrets new dockerregistry /root/config.yml
-    when: "'dockerregistry' not in secrets.stdout"
-
-  - name: Load lib_openshift modules
-    include_role:
-      name: lib_openshift
-
-  - name: Add secrets to registry service account
-    oc_serviceaccount_secret:
-      service_account: registry
-      secret: dockerregistry
-      namespace: default
-      state: present
-
-  - name: Determine if deployment config contains secrets
-    command: oc volume dc/docker-registry --list
-    register: dc
-
-  - name: Add secrets to registry deployment config
-    command: oc volume dc/docker-registry --add --name=dockersecrets -m /etc/registryconfig --type=secret --secret-name=dockerregistry
-    when: "'dockersecrets' not in dc.stdout"
-
-  - name: Wait for deployment config to take effect before scaling up
-    pause: seconds=30
-
-  - name: Scale up registry
-    command: oc scale --replicas=1 dc/docker-registry
-
-  - name: Delete temporary config file
-    file: path={{ aws_tmp_path }} state=absent
-    when: aws_delete_tmp_file | bool
-- 
cgit v1.2.3