From 7bfd64b8c84bd9ae53ec6b665efe65ac8cb54562 Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Sat, 20 Aug 2022 02:35:06 +0000 Subject: [PATCH] doc: cut v1.9.0 release --- README.md | 2 +- charts/README.md | 2 +- charts/index.yaml | 61 +++++-- charts/latest/csi-driver-smb-v1.9.0.tgz | Bin 0 -> 4257 bytes charts/latest/csi-driver-smb/Chart.yaml | 4 +- charts/latest/csi-driver-smb/values.yaml | 4 +- charts/v1.9.0/csi-driver-smb-v0.0.0.tgz | Bin 0 -> 4288 bytes charts/v1.9.0/csi-driver-smb-v1.9.0.tgz | Bin 0 -> 4256 bytes charts/v1.9.0/csi-driver-smb/Chart.yaml | 5 + .../v1.9.0/csi-driver-smb/templates/NOTES.txt | 5 + .../csi-driver-smb/templates/_helpers.tpl | 29 +++ .../templates/csi-smb-controller.yaml | 127 +++++++++++++ .../templates/csi-smb-driver.yaml | 8 + .../templates/csi-smb-node-windows.yaml | 169 ++++++++++++++++++ .../templates/csi-smb-node.yaml | 152 ++++++++++++++++ .../templates/rbac-csi-smb.yaml | 65 +++++++ charts/v1.9.0/csi-driver-smb/values.yaml | 154 ++++++++++++++++ deploy/csi-smb-controller.yaml | 2 +- deploy/csi-smb-node-windows.yaml | 2 +- deploy/csi-smb-node.yaml | 2 +- deploy/v1.9.0/csi-smb-controller.yaml | 109 +++++++++++ deploy/v1.9.0/csi-smb-driver.yaml | 8 + deploy/v1.9.0/csi-smb-node-windows.yaml | 160 +++++++++++++++++ deploy/v1.9.0/csi-smb-node.yaml | 130 ++++++++++++++ deploy/v1.9.0/rbac-csi-smb.yaml | 56 ++++++ docs/install-csi-driver-v1.9.0.md | 45 +++++ docs/install-smb-csi-driver.md | 2 +- 27 files changed, 1276 insertions(+), 27 deletions(-) create mode 100644 charts/latest/csi-driver-smb-v1.9.0.tgz create mode 100644 charts/v1.9.0/csi-driver-smb-v0.0.0.tgz create mode 100644 charts/v1.9.0/csi-driver-smb-v1.9.0.tgz create mode 100644 charts/v1.9.0/csi-driver-smb/Chart.yaml create mode 100644 charts/v1.9.0/csi-driver-smb/templates/NOTES.txt create mode 100644 charts/v1.9.0/csi-driver-smb/templates/_helpers.tpl create mode 100644 charts/v1.9.0/csi-driver-smb/templates/csi-smb-controller.yaml create mode 100644 charts/v1.9.0/csi-driver-smb/templates/csi-smb-driver.yaml create mode 100644 charts/v1.9.0/csi-driver-smb/templates/csi-smb-node-windows.yaml create mode 100644 charts/v1.9.0/csi-driver-smb/templates/csi-smb-node.yaml create mode 100644 charts/v1.9.0/csi-driver-smb/templates/rbac-csi-smb.yaml create mode 100644 charts/v1.9.0/csi-driver-smb/values.yaml create mode 100644 deploy/v1.9.0/csi-smb-controller.yaml create mode 100644 deploy/v1.9.0/csi-smb-driver.yaml create mode 100644 deploy/v1.9.0/csi-smb-node-windows.yaml create mode 100644 deploy/v1.9.0/csi-smb-node.yaml create mode 100644 deploy/v1.9.0/rbac-csi-smb.yaml create mode 100644 docs/install-csi-driver-v1.9.0.md diff --git a/README.md b/README.md index e8111622e..f8bf325e8 100644 --- a/README.md +++ b/README.md @@ -12,9 +12,9 @@ This driver allows Kubernetes to access [SMB](https://wiki.wireshark.org/SMB) se |Driver Version | supported k8s version | supported [Windows csi-proxy](https://github.com/kubernetes-csi/csi-proxy) version | |---------------|-----------------------|-------------------------------------| |master branch | 1.20+ | v0.2.2+ | +|v1.9.0 | 1.20+ | v0.2.2+ | |v1.8.0 | 1.20+ | v0.2.2+ | |v1.7.0 | 1.20+ | v0.2.2+ | -|v1.6.0 | 1.20+ | v0.2.2+ | ### Driver parameters Please refer to `smb.csi.k8s.io` [driver parameters](./docs/driver-parameters.md) diff --git a/charts/README.md b/charts/README.md index 06b11c5a0..24b0b7c89 100644 --- a/charts/README.md +++ b/charts/README.md @@ -9,7 +9,7 @@ ### install a specific version ```console helm repo add csi-driver-smb https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/charts -helm install csi-driver-smb csi-driver-smb/csi-driver-smb --namespace kube-system --version v1.8.0 +helm install csi-driver-smb csi-driver-smb/csi-driver-smb --namespace kube-system --version v1.9.0 ``` ### install driver with customized driver name, deployment name diff --git a/charts/index.yaml b/charts/index.yaml index 3ab462b18..c9bf10d3b 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -1,9 +1,27 @@ apiVersion: v1 entries: csi-driver-smb: + - apiVersion: v1 + appVersion: v1.9.0 + created: "2022-08-20T02:34:29.828469462Z" + description: SMB CSI Driver for Kubernetes + digest: 5c78c650b9755e508afecb3f6a554c549509023f7b0610b53853a41783d1c08f + name: csi-driver-smb + urls: + - https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/charts/v1.9.0/csi-driver-smb-v1.9.0.tgz + version: v1.9.0 + - apiVersion: v1 + appVersion: v1.9.0 + created: "2022-08-20T02:34:29.807965626Z" + description: SMB CSI Driver for Kubernetes + digest: c8b14ea69c01fbafb5f0604581847f11e5a09e8041d0ba039bbf9cbe738d09c8 + name: csi-driver-smb + urls: + - https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/charts/latest/csi-driver-smb-v1.9.0.tgz + version: v1.9.0 - apiVersion: v1 appVersion: v1.8.0 - created: "2022-08-05T09:02:53.348974028Z" + created: "2022-08-20T02:34:29.826637841Z" description: SMB CSI Driver for Kubernetes digest: d19d156c2143d753085bcbcb32506f8ebd7ebdee275e726f9c8d774a1f0b9f34 name: csi-driver-smb @@ -12,7 +30,7 @@ entries: version: v1.8.0 - apiVersion: v1 appVersion: v1.7.0 - created: "2022-08-05T09:02:53.348117918Z" + created: "2022-08-20T02:34:29.825255625Z" description: SMB CSI Driver for Kubernetes digest: 65594a1ff09d912a33ee0674bba1fad1f7c717638a281fb68bcfa2c98c288453 name: csi-driver-smb @@ -21,7 +39,7 @@ entries: version: v1.7.0 - apiVersion: v1 appVersion: v1.6.0 - created: "2022-08-05T09:02:53.346532699Z" + created: "2022-08-20T02:34:29.82399831Z" description: SMB CSI Driver for Kubernetes digest: 31dd4c8b0b0d4a61565631aa5b433b18b5375aeb24812bf4fa9958d5b7917485 name: csi-driver-smb @@ -30,7 +48,7 @@ entries: version: v1.6.0 - apiVersion: v1 appVersion: v1.5.0 - created: "2022-08-05T09:02:53.345894991Z" + created: "2022-08-20T02:34:29.820781173Z" description: SMB CSI Driver for Kubernetes digest: b7dc9e9dc5d46df12a6d1a5643efe86439bff6c36867968f772e6899692083d6 name: csi-driver-smb @@ -39,7 +57,7 @@ entries: version: v1.5.0 - apiVersion: v1 appVersion: v1.4.0 - created: "2022-08-05T09:02:53.345173883Z" + created: "2022-08-20T02:34:29.819765262Z" description: SMB CSI Driver for Kubernetes digest: 9b1a6166ab72c09d0eefb448ecc998639b9f6255afb00bfc0ae0a4fdad76f119 name: csi-driver-smb @@ -48,7 +66,7 @@ entries: version: v1.4.0 - apiVersion: v1 appVersion: v1.3.0 - created: "2022-08-05T09:02:53.343988468Z" + created: "2022-08-20T02:34:29.818463447Z" description: SMB CSI Driver for Kubernetes digest: d2236d36f1cb24139ddf87ea87229369ed856efc42330e656330f6cfa7635858 name: csi-driver-smb @@ -57,7 +75,7 @@ entries: version: v1.3.0 - apiVersion: v1 appVersion: v1.2.0 - created: "2022-08-05T09:02:53.343412462Z" + created: "2022-08-20T02:34:29.81705613Z" description: SMB CSI Driver for Kubernetes digest: 9d7099165db24d5412c95b298a59cca9b233ab8800d04efd34bb055812390915 name: csi-driver-smb @@ -66,7 +84,7 @@ entries: version: v1.2.0 - apiVersion: v1 appVersion: v1.1.0 - created: "2022-08-05T09:02:53.342813754Z" + created: "2022-08-20T02:34:29.815703815Z" description: SMB CSI Driver for Kubernetes digest: 5b39613c9104db06815ee2d42fec8507c3bb2038264513449079a4eb5b6530a8 name: csi-driver-smb @@ -75,7 +93,7 @@ entries: version: v1.1.0 - apiVersion: v1 appVersion: v1.0.0 - created: "2022-08-05T09:02:53.342108746Z" + created: "2022-08-20T02:34:29.814303599Z" description: SMB CSI Driver for Kubernetes digest: 3e4721dd007cc51750f7221be8f66ec7e287c83a8cdcfeb9a71c30f526b06dc4 name: csi-driver-smb @@ -84,7 +102,7 @@ entries: version: v1.0.0 - apiVersion: v1 appVersion: v0.6.0 - created: "2022-08-05T09:02:53.341574239Z" + created: "2022-08-20T02:34:29.813214086Z" description: SMB CSI Driver for Kubernetes digest: 6fc9d05bc78ca98fb17071b7f5ad05b4c071f2403114d72feae99fb89ca1fc9f name: csi-driver-smb @@ -93,7 +111,7 @@ entries: version: v0.6.0 - apiVersion: v1 appVersion: v0.5.0 - created: "2022-08-05T09:02:53.341156834Z" + created: "2022-08-20T02:34:29.812375277Z" description: SMB CSI Driver for Kubernetes digest: 8264c6630806325613234c2d7951c188d073607e6f0f89d781ec32afed04157b name: csi-driver-smb @@ -102,7 +120,7 @@ entries: version: v0.5.0 - apiVersion: v1 appVersion: v0.4.0 - created: "2022-08-05T09:02:53.34077833Z" + created: "2022-08-20T02:34:29.811660568Z" description: SMB CSI Driver for Kubernetes digest: fb6d581ba5d4d1d78ca468f6daa4a24c47bb147b74d005d3c394521b4e534a3e name: csi-driver-smb @@ -111,7 +129,7 @@ entries: version: v0.4.0 - apiVersion: v1 appVersion: v0.3.0 - created: "2022-08-05T09:02:53.340406325Z" + created: "2022-08-20T02:34:29.810519955Z" description: SMB CSI Driver for Kubernetes digest: ee9e58db6d4a95491e2012c6607126bbff827b9c439e90e9a9798d2a73b0cb22 name: csi-driver-smb @@ -120,7 +138,7 @@ entries: version: v0.3.0 - apiVersion: v1 appVersion: v0.2.0 - created: "2022-08-05T09:02:53.340067421Z" + created: "2022-08-20T02:34:29.809341042Z" description: SMB CSI Driver for Kubernetes digest: 8d8667106306d78dea9f63e5a3e8ee7ad2b60f86bd625f5968e37ca6a0cad317 name: csi-driver-smb @@ -129,11 +147,20 @@ entries: version: v0.2.0 - apiVersion: v1 appVersion: latest - created: "2022-08-05T09:02:53.339699217Z" + created: "2022-08-20T02:34:29.827509951Z" description: SMB CSI Driver for Kubernetes - digest: b7479364f1283da159355acb1b7740592badade3b7e48300c1793b3b09b3f003 + digest: 37a15bd85f6f9f2df20aed317d9baa3774128552488d02c2897d561e67777963 + name: csi-driver-smb + urls: + - https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/charts/v1.9.0/csi-driver-smb-v0.0.0.tgz + version: v0.0.0 + - apiVersion: v1 + appVersion: latest + created: "2022-08-20T02:34:29.807192717Z" + description: SMB CSI Driver for Kubernetes + digest: 37a15bd85f6f9f2df20aed317d9baa3774128552488d02c2897d561e67777963 name: csi-driver-smb urls: - https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/charts/latest/csi-driver-smb-v0.0.0.tgz version: v0.0.0 -generated: "2022-08-05T09:02:53.338833107Z" +generated: "2022-08-20T02:34:29.806147705Z" diff --git a/charts/latest/csi-driver-smb-v1.9.0.tgz b/charts/latest/csi-driver-smb-v1.9.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..621027d4bb8dd721ebbe071d403eebbab30dc5a0 GIT binary patch literal 4257 zcmV;S5MJ*eiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PJ1=Z`(Ms@6Y}#2zPj~ocoXmhbA{cegr%Bfc)_;4wUiojY|9bGEe|*&I^^T8wC#NrZ{o`K$=mqNSu@5UtEF|VH zdOPzf5AHiDI3m9T7lef_n)O>aigI5&f9v#GJ_wJKNa|<9_ixep@Ey9)Duc$1qhI3@ z@DL=3R)_;|QBkE@vl6|pJ>o;jmy-R@FpWX%*#T^@|I=RoxNQG}ljDQ^KSv<}o`Bmz zXoLmaK*U_cVM2uD^UmGRqC;3$kclHC<9GrsghVh>)e+(lF+n8b^R-R7A{a$9o{&(t zl6bQ81nPSfQ+mxP@#ZdiH@;%>nuCB)wvh58*PP9W@*cpqW2)3T${OcbA9V(sSyM8D z5QMnqYy{hJPMb!mX^!upbGn&t$b2xa^~SKk4aTjAq&Ce{GKHR;bo%Ri(h|UD#Dh1U z$Kp_`K6o6k1Q$sj1A2-6IfYPveua{{2%E|R-4jaD2$CkgUM1!%?w}z^BpDiGDgcqO zdWi0Es2|1x)OU{9eb`a_SSUH86u4PYL@;u)XO6&$xU#o;+yb{+e1yGnmsM@OI;kb8 zWu)WgA9g%J5{b52W56=zdgdX-BMQHO{GHJ_fT6@vBqUq8J}yaB``XgeM~R1pik zqQT!@A0OLwc?y`yX;y8Zx)_Ha!uME_bIlB;56{g=t|<;7dqvsgH<$r+(Mb!Td&cib zIC-xW;DT@$wYxHi+Ir}M#oPm7Slf(R^)Vn)q~Fv)0mUG%s}w0{T`Jjrt57W=>!3TB zyQr;ggEI=9yJfhhd`F-syq$1lk!r1|wJ#rtkRp8n<1u*BMeQp#^rqm)6xy}uCsq(C z-Fb2@&JJu^+LtIB!VjOqr7aqRt=QE`#QWFIR)vW?hNxTC8KWg#IAQ%@t2&zvzq71we`F82(5b(`s`j5)Ft)L zHhppKNodoV<<$Oo?%vKYzole!n>_qcPg}rdFns^^J&qz0PA+0j!pWyF(7{2fp=+H_ z$zqvk>J4^Mp_4|!KHf!zc4YZkH5gQ{MhD@4i zRdE{jef@`0B&UEP=8IOu{5M%GI~l53tf5fsgL17ZqD2^8bHX^0^K*)YCIF#`c@izE z)=0#BMrN?o4J4+FOFRLgNO2guXewnS+-|q1hCcIzT0K07r2a4_li28RH)6gMC9Iu@ z0|Yt;(rrcg{um<@b0HycJmWDPj}u8eOcnPbc(JOj16p{HXrg+m2F{|0aT%-SK#hvW zp{|2T2pnO7LKbqyBpS_;04Yg0K^TdI+_|BqIE>~99&iv*K(6{;s^X$YMf;8TBvfeE z@Adj<(W+Kj95OS1!cxlrNC+Z|C5Z0ThmV)Tj(m{2^VpRCJsOnrKPM;slSBUJIm*W= z=!EX@{o6FDO9YxE{>F!hvN>pft=(M~1v9cz5O2#vw~AWAO?_6tDp0e%w|P zXLyn#$5DZYh_DA|kB_Kx1G--4Dt(F;3)Kfh%yC2#BA>Onsaa`-7K=7=oO>+2>A{a} zQC8aj=PA$#xai1e*HrKZ`|qE;?w9QU^>Kf2u>a>MkB{BIq8SNX6=R?=p&;iGoCQiO z-V|K)*Y0A`YUyg14-pQ19lI#|RZ*S#>}kwU*L!?)kPl-L0&0t3)KS&i$jRR5{bprgdVYm{Jwda*$?vmm%_ssZ|YzrhcX@x!!8P z<2tLP*p{EUx)I0W1lG1wTU;}1N_hDJ*gvZ7d~Jg-m6iU#n#XR83ajb z-tlSg;QybaIF8f0Bcbo23mxkP5Xx5mPymi1(Vg{M0Z8m)i8G`_>3nM7nUaLYog}q% zG-s;Xf;{CbNa)enFFEE;-c2kPEfIl+bTS~t&OLo^dXUDACL0o{;PAJlw^s#6(dKca zHjz+S%ArQzUmFTrFf*m(vzFPB)R~n0Yxe#N3KP~pm+9qvQIT{mb(6KpWqn+WM=v#7 z4*2Ji=hG=HJ$LHiJ&{w}@YAe#j(wUZ&+}f-rjYu!i+NcgYf}U|ugZ#De4V3}Q7Gi_ z*A6pZv$Rld8k*TV<@2X5(on%FmC4&ghV13&tw)4h)NYrxXSIHondK3~8Y~O&&05Y| zq~6v|L@raEiMWuy-ePLBEb@M!5P{g8K^DYhiCQNIAm@)RB(k1jam_(T!QFN-D(MtK z)lPO;Ag@3OnX?`y_A9hc&wilAqVjGXZFf^`i6=T{)Iy^IYW8P;Jc~Aj5ayGd$c@e`t*c8A5fV9 z4I^D+IW_$#^)NZ1!Mr<=j!$^*b%q5Y%c@ui3zCYZ?&j9Z{vhAsRA?!@2L);g~I%ZfjxK#>iYU_E@0U+YGBO zcGOUtoej3Ki6ZSLCb358RatE@4NRiY+l>|>f>9kaPz&K+mA^u;s(`9WLq%^wy{y!m z^&*W9Y}#O7nVi`w^-WHntXL{SKVl@5XFvROK79B2^6KLH!@H}Gw#6$s+p;vgUPu4W zwX@Bggt2orxdf#u`Hq{X={CpGEIB{sXvJ0vzhc;>b7m!C%G@hLT*g}FB+hQ$AYG13 zjsKM1MVv|IG3ug^=hscTQ53J0b5f-yXY26@Q^uIkn8U{@2Qg*TH|LnLGL zcDt(=Gw4LSd3Sr?sU1jRZU*7_IQ>riYdth?O-2k(}$JosWf`&p5YNE=VfB z$1a~WsP?_w*qX@5x!tdwH~ViX8}q-3>)z!?$R_-MFgPmVf2Sv>hx;GTQXI!Aq`iarkC^cMA;pOK@4_+r5WdfyB>dVU`BRmR z_Me^`_1S&Xdtn>!pOb#Sg8!WMPY?G09Hq2|rxTqVCtfU4a7Z5+9zp|bC?#nQBtIQA z6h}UmFq9lin9P%FQ;bp)PCn^ZX`oX+;h*cPKB-)MpGF^Y9)XK)@&ub8Og3pe6~JWU zwGxg=EAKToUc^SyepaE3gn6}BdO{lECU#PLLYh|N5ZYZXL5MW|-3DXQ7dxH|T_`0q zx8ARuySJ-$EasM{-ZmWaq|cQnEhTvNmMPWN(mY4H`+oe~y;Yi~|JfdusF#6VznxA! zV$)2i{T^-&)397K*{^|YWKdOFTa$*y@)X?b8BS40w>PHbO4M>THI^4)IX(N~r;D3+ zzhB;bzPbG6^YFv@ub;2qeEi2>>Sf~K!9+0m;;|sWprVjV{(^ zlg**7T<}or>-yLuZC=pEO+@mQcUTQ90yv;&-!OV+LYlR>SrhbXHQH9GsCq#Bvmbsc z8g;p1Jyg!@RX5>rW+U%RKsv?<9U-w4`Qar$cG0o@(uJL=i= zvB8JAGZs!nB5*1q$Pv1|?cAzLx4CA7LXyNNwXCvGmfwVjYFBFV63HnD(B>cz=75AG zl%`1!Ke_Y~L|Bp$p+wGKsTT7eIiOg8Un0grI#;W!zNEx_P|IvWQ9T-g#3;EilipuC zAHGAnd$r}NsO%uzYV)-c-kzHgbGhBN@l6Bdc!Ls7nJ}F$x})thvaU96$*iQBdsE9j zspK~5xQm#Jw6@aAMgq6F=i%-LT2;Ul6X-%vHhL-G1}lY{lHV zHtZ~kHG9%^z5Bq=^%>-E`C8kd)GW2|-yMGsbOZi-)IToY|2`cY^$+;(bCeSPtM3%; z6a6&=57@6=7EguzRympSXSi3m7o1nMXl2Xn707$W?+S-J?Y9jR$?tm6um}Rzh0)E8 zz&(QKNk~yeyK_CSyhUHoA2E|)Md6KnzUd2iyF%o3j`SV?^6&d1(T?!=^8nb!)(-IX ze+ztVzmQs~wj0=6Ro3S~t}T_n8Ps}Ha{Z)E`n=KY+Z|DAWB=K{znkp)yDRto&8`6N z7YS}~>9Gk8+--ycmtE=s13qBDTVJ_c1p_y`o%uCz-~&GU{o=Em7n^StoBgJ)VwM`O zTXwCB5N8pdVDn$qdP{trTqi7C9vUxpLATNVWvd&Z<>hKCNUtWouzi$K3tXr%3C+9M zs0SJ(;PnCjd5%(X z6UE=V(=JEbarvU~@@DX`&}2OtwBhIU_6ZF=MSrub{62g7_?Y_5GKivVaNQi}_c)eQ z#>s#50#LoTZGIQ;hEZ5QR81>cpdEOSY70d3KSZa0xv%!1cuY++;i%B>7tZ2HxaeQ) z_P<-Du;pLvNR3BG2xSt5B$Z~sN4mlUWcw9rQzGb%{u!DC}rXIZ*AOFqkT(4pM;b8W?$dPOFuN}j1pG0!S{Idf8fc)%B{{d zi&D4wP1QQiRXL+%t66n)&D|SXPU0Fd=REe;UcL|IP!8o#8kheM009607QD2c0Du4h DItqSQ literal 0 HcmV?d00001 diff --git a/charts/latest/csi-driver-smb/Chart.yaml b/charts/latest/csi-driver-smb/Chart.yaml index 947c56ec1..b6ae58344 100755 --- a/charts/latest/csi-driver-smb/Chart.yaml +++ b/charts/latest/csi-driver-smb/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v1 -appVersion: latest +appVersion: v1.9.0 description: SMB CSI Driver for Kubernetes name: csi-driver-smb -version: v0.0.0 +version: v1.9.0 diff --git a/charts/latest/csi-driver-smb/values.yaml b/charts/latest/csi-driver-smb/values.yaml index 313114f6c..11c8bcbd8 100755 --- a/charts/latest/csi-driver-smb/values.yaml +++ b/charts/latest/csi-driver-smb/values.yaml @@ -1,8 +1,8 @@ image: baseRepo: registry.k8s.io/sig-storage smb: - repository: gcr.io/k8s-staging-sig-storage/smbplugin - tag: canary + repository: registry.k8s.io/sig-storage/smbplugin + tag: v1.9.0 pullPolicy: IfNotPresent csiProvisioner: repository: registry.k8s.io/sig-storage/csi-provisioner diff --git a/charts/v1.9.0/csi-driver-smb-v0.0.0.tgz b/charts/v1.9.0/csi-driver-smb-v0.0.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b412574ac01de86da6ddd393b96d319e9b38742d GIT binary patch literal 4288 zcmV;x5I^r9iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PJ0TZ`(N1@89|qguB4*-BbB3Z~F+yA8nG`D|YjOxZT5p%ORkp zvCSuvs3j>UzSQ6SKvJ^aXj_(@w7oTf-PjU2GbCq*!}*b}%ZcqVG6iPyVAwgEU?$o# z9Qbc`SGwJ9_xSKo{q1(U<-gtDasN&4uzzygJ2>o~9KGrG4!ix6H>kTq8J3oq3(Veh zx8_yu+;>uNM1BXx2@M@I?O8aA7GHfVfD6k5?lKYy^=xqY0i6v#qI0D(Xha$MH68*B zK>)Wx9Dsw0DrHR<P%J$zsIoR9(YZMaT zF*p`NL(Jh8BI+OpW5NZSwI6=wZ9+SojBPF`!(*@z;=xc>M~Fd0IT4i295i;BtoiUW zx4FP$5{~U$s}2u_kspsqs2U19c94rh%x3C)6#M=S^@%%k(8tjg6*mkxgu+77mE15o zCDMTatMXkTYDa2zlr_#+PY>Gtc6S|XpG+YH&TkkU!e*S)rjcx#eoG>$S+kT(L6W0(Z?z;A2R0=xymwt1heFEWGQa{HBv=gSE&9g;)VY2vAcVn*XO8h}88q7n8vATp8<(IXDk!Ggf>c#jOHH3oT+AIL2i^;LI_l>z!m%$9dW-NB6JPQ|+7B;YzC&kz z%muK&5yr(oh?xAHa&ZNv7ZySR2u56fLz!?;|9_7U56!wf0ql!OR;@2ZjKk~j5=(N9 zo}u*NneNGrk3+~_`E>jnOu={1k%iDBWe+4AUrGfyC(J>ujtHWb>N=+}bAfBtCZm=z z21M}mo9sxSRQ;gay(Gy~27koB^R?V4c2KVyRGRhER))SWXV%-2*}^$4XVKq^1s;t^ zNW{!R&+|n42jGJ%C`%p*>I1_vT1&{<=mBO9YAM@b)Q9%NB4U%iBTy6GN;uL;wwBad z7f*x>p1y$52wdTy))gJN6YydmTD9mWRuD3LjupUY1(MMiTm()L-^u>N8p-E>JQ~TqYb2r88&L_jW(kYZuE zF&8xW4G+QR$^*T9i_T=&;>w9cbcApiQlY0+#%b8|)F0nRVge|l9=9Uuz0Ycy$@q%J z3JOITq-&KCEyC!A5z2^|o%xt60ub_;CDEd6jd;waWC{!2Kzu@(z+>Q&6oZk2CPGBq z>2!)}=uwx;)x(8Is1GADj_+VA;iE0;0pPhxu>>+-(`{lilJ=jiC5x6l8)M)@=WmCzkren^wLgrjldY&?j3Is@gbm9I_Q zTidceQRGg*eJHoq-dJD}^LHrn0dtVP$FY(i!xcWVZ5eg&2)l6l{EXVSpz5`+(x+%X zmojK#w#}3H__W1z%}OgYpSO^0KVsod_D*brvef?XC*ViGcw0o#?2H(Mp8BjsOG3*LWoQC^kZlo=Q7&Cw6Vsn%w2Y&uv_~N!7dUjmK`oQV zF}4YCh{xdB!&#}-AW4!gYp9clvPo)%`9W+iZMOi}6gNG#?-w{;(oBv@n@>7wvIw&iDzYQ%6jhL!E){#MVL9K3u7 z%pavVU)$hIWvTzKCb1i%f~)<1uh&267X5#}d(=JL`~TM{wryJvB=j6~u426aLSf|( z1>h*+ooUYsKwu9GoWUGY=TigElqA&dB&nsMIbGEh-&+~L_%dT4mD&y))Y2irc23ZEm9+?Gb#Dk z?EM!MCaixh)64myBI#V-CTo*R`8WoTUTU`J@XsaBr}9^7?&QNqA||Hprz!Cq`!q?O z=e?RuA@6M-=0%09O%dh1Dl2yJb&gg>p^(5|+0A^-(n7heYkKdLPo6qR;RMT6CT|lN zte2y=8V+($t5w#X<@#A>mWK;#uq-kFcUv_Pxiob)#D(1T22-QPBJT$Z5s29t zWI;@prL}YDasJ#wGS(B!Zy2a3xYH^|CG8@j+Rjc2gxNSZ z!>U*a3zCW@adYcsub&q<9kdi%vh`V>8n#$KqjqbGD@a$ZqFA}1A?}J}9WyK%+%kpK zHPvj`f&@TgaeBZj6*TZ}N0fydBOG5bem&nmK+|l zm10YUU()T;A+r)OY3`LlT*O-X7|wRyAYG1hjenQkMT`pSQr|(J&Tg8BQ5;?)=cGza z&c?G5x{NUKV+Nll4ETilo<78sm5C71FCd&UC+&5X41nsJ>7Cro5$vCXk7omLY3OkW z9drwI5`VsU-7CJ1fD!7M8!wG|^6GC6ed3TjIi1e31*eRX7e!)ZN_-gS4rwi@e-oC&J^{15{^HsS81SA zKHi^`RUK0;QaP(oM#8)*m70)7 zxQUt6j*zD1ID~SS3lJiWe>cIH)UA#eLl;U3&5idfXU^TS9gDu=skROKJn3uYNlOWy zon=auwKUI>ZoeNtbMB<3ssC+`O4Q51uHH_k9v zV|fYg^$e$|qnjI3avy3jn+nT|u$Y|w@YDJ2$KNk*?{6=DxgT7g{d#}%{?p(8QZEw+ zPdb9h7ncSB4!!bYDaY~~-fegSLxb%E&!_~{gHto9(qghC-*>z^-?!t8-YO50ku!DQ zOx6%tC4-SaDS3C-lK+!`=JUHdy(sd#yQQ1tHS+!X`NPHi)%E$s{nh)+3zKAjV>GDh z$%ugO-NLB)CV8jVa~TaP^SaXa02lMO*2S7^vN_b13m%HHu8uv@<^^qBMr2){&Rc1x3FrVMO#0r=k8+@ACBW_0|0=qHXH)mKrXWhMfqq50;A-@OnQImZ152&@oJB&q_V}}R-3OJ;mx_}VJ^4Z zG`?wo9IsKr3FTVoqC475BkOA8hRjN;xihugkxFi&j@t}#k=90f*=WGc{8ohXtGKN8 zy2)1TKK=2uq8rxv{d2-pnz=ggX1Cv5nvIwn*M_Y}V#S_xm2}taOr1ggmanz#OU+UX z|K0NUK-b{E2ff4c{qK|h;n5!deT`DWf7P9$U8295;2!%mkHt$Nzg14U{2A^Q?gZzR zEv#&ry#nz_*+b!wr}?&FGV$tC*$6tCn5kBE)Ef$5{WXS|5m~lIw(qi$mi@ z5mX!HUpBfCT3)U;g7j+Q3!6t7wZMfMlh9nmMiMNUgRKW@0Z26yYe~rSH81DxfuZlF zEX9A=5W98)0=+2y(>*vmDgXO#C;h|z9{+ibQgIW--@8*TN7-@tqVVEo@SxCSH5#<$ z=k#_74ZVcCSyq0Rl0HADezOdsNE=)=2kJeJ#e_2QZ?yna?``Yf#k-|GtnR9!l`POU zJPEl4^7B7Lr+&GwcBfeE>uAE3q2Diz#u0bWKU=MTS*5V$pRGvthYJWr5``p{roe`( z!WcyB9cuZ6tH0`3-sJ~9H1d-t*HlpL8ZdNyOoG~6HP~q4RlGcJ;+)iQeav~ye%9<0 zOd%8vMlR{iJJgDnv0L9QmlJ6lJMGX`1YJs*N5Z^Kn0P3weVIWs&VB+)8TkE68F$ra zKakKP;kdrp*EjOg4^7&`gjH?uJs$o)xFWG~qjSxo)J=XM%YOm@0RR7AV$7`ofB*ni^=bwH literal 0 HcmV?d00001 diff --git a/charts/v1.9.0/csi-driver-smb-v1.9.0.tgz b/charts/v1.9.0/csi-driver-smb-v1.9.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..ce280e0016c4ffbb87a1b8ae9c08daf2da9d51b4 GIT binary patch literal 4256 zcmV;R5MS>fiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PJ0TZ`(N1@8A9uguB4*-BbB3FWnQ6KiVX>SL`+o;&u-YE{B4a z#x|c&qL!qb_)>rO2P7ryjkaakN!wfVaE&dIGvsh)IGi8p^#pNzPG-Oz5sbR$Q_N*& zjsyB)f2G&!^-hnE_1|8vSN_}UpAKI1kB@r2-tlqowD+RdKkoHTUZCC{`>?XaLSp`+ zw==Ku;J%ZBBl0_NL0IUbS-*v&DEGDVw@$C+gYY=`ZXQ_ z4?%)xg*X5g6;-M=E7AMfBR-UTDcS!F(-_2_9l!?rf8FaJm+gOWe0s3|=O`q=6L4Dy zjj(_lh?t8wOo)(t-nsi(bO`GTGI4}t98aKykO)SqIzk*GCWvHwzP3qM1fz(?6B6oH z5>J+%Kz)y5O0O9u-rPm+##c;Ua}W^97E*rXnzI>E-UIk{OqE(kS>qh*qt0M6Yf5Gi zf)Ll7jbJ;@Y12qG&G8*{UT@|bG9Qdb3f~1MBSBW``J7@?JNruLl3P5D6 z9-@03>W8ra^_?SjA9fT!7D~=21#VUp5saMdnImu_uI#NIx4^9yA7QWDWmQ|RPHIVN z8R@wBhaFFlM53+M7_f}Fo_PrIh{7)*e`hofU?{N^3CUKjk4sY3zP9xAQQ~3YA|-e~ z6sgoNV2oob5qgR63=^t&A>)LXFJGZ^8Vd>h?}Q8aPa>!PU_xF&=|u~n03;`#xMp0s zXz;hw<72xnPXSXo&8iJl7vu0l_#P{Au9>0q;kg;fHN_!huPB@R1~Z^8I%y$v&-fh) zC-0R4ToCS}c2@>bTMu2Zn0p`$YnxH4J_baJ^qU$;pjG{-*LzQrryTx>LF8+BQS73A zFQ_ydq^&GtU(Kw)BeSJvT+L#z6AL^ZlaR={iyjw=_78!ACmBy3Nk)NV6{;m<9drkC z7qzu*a7LkXw+z>m?+EmSw-b&mQmqxW_T>W+Qlu|nJO)p?sC~tT-W2?pLc13I#0ny% zJ5SEV*?~<<`x0eC_~BEyv_)gE6}vjA7(fjxJE}2-ElR@pA@e)_(tG*hs^DK#Q}hz~ z7y=dwklOt`rE^gtryyO_onhXkWYkTb*!9jT{*p6zR`XoBwtlxBp>raJOLVTn7EetiVq=8EkV!MG zDo(?`um4brzX$U@GTM58$pASDSW2qTe@J2%u6htV9t0}dhz$W`Afr9-H#NM}uM?xK69}ks)si-d(x1amW(OSiC|J1uQ_hAGejn z8J?ubaa7I;vV5IoTV%AMF^F zQQK|jcY`>nnjdDsIq?B~QCo`8L#IdjBMFA_cuXEp+sTMQ=Ye{rDW*kj{2H7qF zS^H(G8)D|O3Yc*em9{A)6cUFXxTtOOIMy}+4)FwhXEZOh8YX$tRSix4P&G-dFfYW; z%63bDO>;A{eY3>zl4eRO9Wm|d$tqM$2IFK;(w1Lz-cq^a_W!g|`*S;?rKCy5%c;w6 zA&?d}lI(wRKJ&DOC|I2Wh5v86vNkTGe1^>SxN5>#YVn zuCq#tZTXq28*v;?U~N0K#Wl00gqI(H{iEv6*EaZ4S?T|)dF;lh;Clbx?+;%0ivEAl zJ3bv8{Qq+l$8lPBB=lW$p<}%OLfOh63cyh$y0d;O0EvApafWm#olgxsQ*Ew1lg+dO0 z?J)B-OAFM8$X<@#dPK-Y?RHsvR_kY(SspR0!Lk6~tmV8# z>TTUbd+-(=5l1>p+ z?PP}q@(P5IIqP9!ze4-;><3ybD(}|Ob~n|Qc%oxQEi@{iW`Fj_vuHyIVLr);+=#vH z%+3bw%0ov@1onLnLY)2Z)0>Nno6F(wFP4fFun*jUB-_2YMve4`g$O)IjvaHT!AX~) zGs$DfSB7v_9-z^yWB`SC$iRUvQsJKZe@8Iyt~^E8xnm-mq@NurDGGk3PfzIc0hI~R zFw!-aQ`3)950eub%)0~W_=M+PXIK!jtcr!OAgNgDZf?Eo5Aq#Og_gogjycX#!xjsG z)P7BI4e6>?6e~A0#C>tBV}?b8Tcwburk)K)k^opN&yGZ;g2CRMh;eylj|Gao&9M4n zM-8>v*QbjB|VCf~4|$ z?DAQIYTwI^t%;1B+x^;kv;UT|G5?#m?pHz zAiY~K>nGXa^Wi%K@UKq<7Z>_v+7?TRz3C175fh$2q!=;(T{vbR!uPq8gkM`Ef2y+4 z{?l`#KD%#vFKh$;bJFiu@SoTH{=xpAqmgDmhLU3mlX-G&icw0!$tV3P4Rp#U{BwQPCzXru)96FaBXH48o?sJ%$tI1b0+?*P zR>Co9<-O*{i`Yoo&nlFWFt7GXPe>!=5YNYiQ@Lc7Z)2$9CW+h9!kV#kxA3#EkS z*87!n_jc8e#oY4L+lE7)^ttk+r3BC3GNsyDn&(J&-;bZWw@TCWKii`c^)j&Qx6`Rd zY?>*x-@~n88kTD&`!$e_45~_NYtqnIo`QQl!zt?M_QsT4iCWI4#_}R8r)NL>baC_U z_sg5lHb=$=lnu`bYg)EN*Yjq9|@}S8kFw z^zYYCZ!bSzeYm*%eD&u2rLAXw=Pan|$(R83Z(v+~le{zQxrzq0d0m;SfXn&Y=wfX) z*&OQ11rNo(u8%#^<^^rsL?mB%htj~brT+EHuBB{q+^WG5fV$0A71if7aiL#UD%15`@lLq6qp;qj<2r-JF&SF zd}i^LYcCP+2IOrOtTu!24nW#|m))mW)=Ix+R;^HD-P^oUr2){|Rc1}Buvpwa#R`}l z8+@2MW8p+30;eK^9HHCW&aJ9+n`=fWBuR`?%PI?H`AvAJcBLjSk(`16Z4Lrq4oFBs zX`1x#lS>~#ge4gfO62^NYBB$j1BwOsC1Nb3bG5qaOG?ZKwag|I)uRzejFJm8>HVei z;X9uTec%u1@cH?`c8 zN^YZ$yNJ0+Yb(8MByc;wHR1d^F6+H+vK9NB{(f4~4V(P_1>ri)Tot_C?KkhuR?Mwy z!_JaevnO5GyAS+apF#eXueBXY%~A{h-SPK8H{icV{p0fe@7IID(E7D3>;FuJ)B zxJM8@2`Q>*cdqA^x9AJ{BW4n;D7=x+H+=zbSBSjMk=_G9{(WC0+7TXq9st|e+5x`) zZ-KAv7g8(Lb_08>%K9A0wWabmgIaG&uAkINpEtUFyCX_%>_6N0cawd8cjdmn*%jdZ zBEbzVJvPCCyNyubvP(T+zy}O?>noS5VBluAGrtB7e86YFUwn4+V)LzHv)|NJ%u?fZ z%dT}1;w-`wZ2qfSZ;7vy>x6~NL*vCR=r-EFY;_~Fyj*Ps>D9y+wvRGufeSSzp?Mb@ z^@27yAl0l}D?*;Hc{%q041G6cCH})l*mDvP=t=RP-qG>v*H!$dcffz1qg32P z@%Qeu%h7gRz9_uB89XdBS&s&7_&L3OLPJl{-z+P?&z?R$rhc;wq9_|&HwXGXj^&hb z@*lkbRPSw@-^IIO6xI(_(@GX-2Ogx_0@3^r(dl3At34vp5ni`d7RC z?^Y>n`Bytq;}H@n<8%DehtM58|WYE1>*t^q@jViMHm zYQRPtuj1u-8|S2kN3jq!$60esFoRGwkX$mFSEwDWVz+r%o*>FL_Bx=Q2zrchpM-gv zu<_7V`!qtc&VB+)S@`{18+X-c-;&TL;iSIV*EjOg4^29wgjH?uJs$lZcrvkat8>kw z)NOuKwT^RD&M4VxRvle)_lA~}xJJx5kNvfm??XA1LphYj<^KZ!0RR8Wv(Om;fB*oN CCQax7 literal 0 HcmV?d00001 diff --git a/charts/v1.9.0/csi-driver-smb/Chart.yaml b/charts/v1.9.0/csi-driver-smb/Chart.yaml new file mode 100644 index 000000000..b6ae58344 --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +appVersion: v1.9.0 +description: SMB CSI Driver for Kubernetes +name: csi-driver-smb +version: v1.9.0 diff --git a/charts/v1.9.0/csi-driver-smb/templates/NOTES.txt b/charts/v1.9.0/csi-driver-smb/templates/NOTES.txt new file mode 100644 index 000000000..8351aa7bf --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/NOTES.txt @@ -0,0 +1,5 @@ +The CSI SMB Driver is getting deployed to your cluster. + +To check CSI SMB Driver pods status, please run: + + kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.9.0/csi-driver-smb/templates/_helpers.tpl b/charts/v1.9.0/csi-driver-smb/templates/_helpers.tpl new file mode 100644 index 000000000..5394ab92b --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/_helpers.tpl @@ -0,0 +1,29 @@ +{{/* vim: set filetype=mustache: */}} + +{{/* Expand the name of the chart.*/}} +{{- define "smb.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* labels for helm resources */}} +{{- define "smb.labels" -}} +labels: + app.kubernetes.io/instance: "{{ .Release.Name }}" + app.kubernetes.io/managed-by: "{{ .Release.Service }}" + app.kubernetes.io/name: "{{ template "smb.name" . }}" + app.kubernetes.io/version: "{{ .Chart.AppVersion }}" + helm.sh/chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}" + {{- if .Values.customLabels }} +{{ toYaml .Values.customLabels | indent 2 -}} + {{- end }} +{{- end -}} + +{{/* pull secrets for containers */}} +{{- define "smb.pullSecrets" -}} +{{- if .Values.imagePullSecrets }} +imagePullSecrets: +{{- range .Values.imagePullSecrets }} + - name: {{ . }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.9.0/csi-driver-smb/templates/csi-smb-controller.yaml b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-controller.yaml new file mode 100644 index 000000000..b3e07ed41 --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-controller.yaml @@ -0,0 +1,127 @@ +--- +kind: Deployment +apiVersion: apps/v1 +metadata: + name: {{ .Values.controller.name }} + namespace: {{ .Release.Namespace }} +{{ include "smb.labels" . | indent 2 }} +spec: + replicas: {{ .Values.controller.replicas }} + selector: + matchLabels: + app: {{ .Values.controller.name }} + template: + metadata: +{{ include "smb.labels" . | indent 6 }} + app: {{ .Values.controller.name }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: +{{- with .Values.controller.affinity }} + affinity: +{{ toYaml . | indent 8 }} +{{- end }} + dnsPolicy: {{ .Values.controller.dnsPolicy }} + serviceAccountName: {{ .Values.serviceAccount.controller }} + nodeSelector: +{{- with .Values.controller.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + kubernetes.io/os: linux + {{- if .Values.controller.runOnMaster}} + node-role.kubernetes.io/master: "" + {{- end}} + {{- if .Values.controller.runOnControlPlane}} + node-role.kubernetes.io/control-plane: "" + {{- end}} + priorityClassName: system-cluster-critical +{{- with .Values.controller.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + {{- include "smb.pullSecrets" . | indent 6 }} + containers: + - name: csi-provisioner +{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- else }} + image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- end }} + args: + - "-v=2" + - "--csi-address=$(ADDRESS)" + - "--leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - "--extra-create-metadata=true" + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} + - name: liveness-probe +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port={{ .Values.controller.livenessProbe.healthPort }} + - --v=2 + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} + - name: smb +{{- if hasPrefix "/" .Values.image.smb.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" +{{- else }} + image: "{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" +{{- end }} + imagePullPolicy: {{ .Values.image.smb.pullPolicy }} + args: + - "--v={{ .Values.controller.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" + - "--drivername={{ .Values.driver.name }}" + - "--working-mount-dir={{ .Values.controller.workingMountDir }}" + ports: + - containerPort: {{ .Values.controller.livenessProbe.healthPort }} + name: healthz + protocol: TCP + - containerPort: {{ .Values.controller.metricsPort }} + name: metrics + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + securityContext: + privileged: true + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: {{- toYaml .Values.controller.resources.smb | nindent 12 }} + volumes: + - name: socket-dir + emptyDir: {} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.9.0/csi-driver-smb/templates/csi-smb-driver.yaml b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-driver.yaml new file mode 100644 index 000000000..160943799 --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-driver.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: {{ .Values.driver.name }} +spec: + attachRequired: false + podInfoOnMount: true diff --git a/charts/v1.9.0/csi-driver-smb/templates/csi-smb-node-windows.yaml b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-node-windows.yaml new file mode 100644 index 000000000..3d55a7ff6 --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-node-windows.yaml @@ -0,0 +1,169 @@ +{{- if .Values.windows.enabled}} +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: {{ .Values.windows.dsName }} + namespace: {{ .Release.Namespace }} +{{ include "smb.labels" . | indent 2 }} +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: {{ .Values.node.maxUnavailable }} + type: RollingUpdate + selector: + matchLabels: + app: {{ .Values.windows.dsName }} + template: + metadata: +{{ include "smb.labels" . | indent 6 }} + app: {{ .Values.windows.dsName }} + spec: +{{- with .Values.windows.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + nodeSelector: + kubernetes.io/os: windows +{{- with .Values.node.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} +{{- with .Values.node.affinity }} + affinity: +{{ toYaml . | indent 8 }} +{{- end }} + priorityClassName: system-node-critical + serviceAccountName: {{ .Values.serviceAccount.node }} + {{- include "smb.pullSecrets" . | indent 6 }} + containers: + - name: liveness-probe + volumeMounts: + - mountPath: C:\csi + name: plugin-dir +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=$(CSI_ENDPOINT) + - --probe-timeout=3s + - --health-port={{ .Values.node.livenessProbe.healthPort }} + - --v=2 + env: + - name: CSI_ENDPOINT + value: unix://C:\\csi\\csi.sock + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + resources: {{- toYaml .Values.windows.resources.livenessProbe | nindent 12 }} + - name: node-driver-registrar +{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- else }} + image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- end }} + args: + - --v=2 + - --csi-address=$(CSI_ENDPOINT) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + livenessProbe: + exec: + command: + - /csi-node-driver-registrar.exe + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --mode=kubelet-registration-probe + initialDelaySeconds: 60 + timeoutSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix://C:\\csi\\csi.sock + - name: DRIVER_REG_SOCK_PATH + value: {{ .Values.windows.kubelet | replace "\\" "\\\\" }}\\plugins\\{{ .Values.driver.name }}\\csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + imagePullPolicy: {{ .Values.image.nodeDriverRegistrar.pullPolicy }} + volumeMounts: + - name: plugin-dir + mountPath: C:\csi + - name: registration-dir + mountPath: C:\registration + resources: {{- toYaml .Values.windows.resources.nodeDriverRegistrar | nindent 12 }} + - name: smb +{{- if hasPrefix "/" .Values.image.smb.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" +{{- else }} + image: "{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" +{{- end }} + imagePullPolicy: {{ .Values.image.smb.pullPolicy }} + args: + - "--v={{ .Values.node.logLevel }}" + - "--drivername={{ .Values.driver.name }}" + - --endpoint=$(CSI_ENDPOINT) + - --nodeid=$(KUBE_NODE_NAME) + - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" + - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" + - "--remove-smb-mapping-during-unmount={{ .Values.windows.removeSMBMappingDuringUnmount }}" + ports: + - containerPort: {{ .Values.node.livenessProbe.healthPort }} + name: healthz + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix://C:\\csi\\csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + volumeMounts: + - name: kubelet-dir + mountPath: {{ .Values.windows.kubelet }}\ + - name: plugin-dir + mountPath: C:\csi + - name: csi-proxy-fs-pipe-v1 + mountPath: \\.\pipe\csi-proxy-filesystem-v1 + - name: csi-proxy-smb-pipe-v1 + mountPath: \\.\pipe\csi-proxy-smb-v1 + # these paths are still included for compatibility, they're used + # only if the node has still the beta version of the CSI proxy + - name: csi-proxy-fs-pipe-v1beta1 + mountPath: \\.\pipe\csi-proxy-filesystem-v1beta1 + - name: csi-proxy-smb-pipe-v1beta1 + mountPath: \\.\pipe\csi-proxy-smb-v1beta1 + resources: {{- toYaml .Values.windows.resources.smb | nindent 12 }} + volumes: + - name: csi-proxy-fs-pipe-v1 + hostPath: + path: \\.\pipe\csi-proxy-filesystem-v1 + - name: csi-proxy-smb-pipe-v1 + hostPath: + path: \\.\pipe\csi-proxy-smb-v1 + # these paths are still included for compatibility, they're used + # only if the node has still the beta version of the CSI proxy + - name: csi-proxy-fs-pipe-v1beta1 + hostPath: + path: \\.\pipe\csi-proxy-filesystem-v1beta1 + - name: csi-proxy-smb-pipe-v1beta1 + hostPath: + path: \\.\pipe\csi-proxy-smb-v1beta1 + - name: registration-dir + hostPath: + path: {{ .Values.windows.kubelet }}\plugins_registry\ + type: Directory + - name: kubelet-dir + hostPath: + path: {{ .Values.windows.kubelet }}\ + type: Directory + - name: plugin-dir + hostPath: + path: {{ .Values.windows.kubelet }}\plugins\{{ .Values.driver.name }}\ + type: DirectoryOrCreate +{{- end -}} diff --git a/charts/v1.9.0/csi-driver-smb/templates/csi-smb-node.yaml b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-node.yaml new file mode 100644 index 000000000..9c874060b --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/csi-smb-node.yaml @@ -0,0 +1,152 @@ +{{- if .Values.linux.enabled}} +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: {{ .Values.linux.dsName }} + namespace: {{ .Release.Namespace }} +{{ include "smb.labels" . | indent 2 }} +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: {{ .Values.node.maxUnavailable }} + type: RollingUpdate + selector: + matchLabels: + app: {{ .Values.linux.dsName }} + template: + metadata: +{{ include "smb.labels" . | indent 6 }} + app: {{ .Values.linux.dsName }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: +{{- with .Values.node.affinity }} + affinity: +{{ toYaml . | indent 8 }} +{{- end }} + hostNetwork: true + dnsPolicy: {{ .Values.linux.dnsPolicy }} + serviceAccountName: {{ .Values.serviceAccount.node }} + nodeSelector: + kubernetes.io/os: linux +{{- with .Values.node.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} +{{- with .Values.linux.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + {{- include "smb.pullSecrets" . | indent 6 }} + containers: + - name: liveness-probe + volumeMounts: + - mountPath: /csi + name: socket-dir +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port={{ .Values.node.livenessProbe.healthPort }} + - --v=2 + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + resources: {{- toYaml .Values.linux.resources.livenessProbe | nindent 12 }} + - name: node-driver-registrar +{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- else }} + image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- end }} + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=2 + livenessProbe: + exec: + command: + - /csi-node-driver-registrar + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --mode=kubelet-registration-probe + initialDelaySeconds: 30 + timeoutSeconds: 15 + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock + imagePullPolicy: {{ .Values.image.nodeDriverRegistrar.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: {{- toYaml .Values.linux.resources.nodeDriverRegistrar | nindent 12 }} + - name: smb +{{- if hasPrefix "/" .Values.image.smb.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" +{{- else }} + image: "{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" +{{- end }} + imagePullPolicy: {{ .Values.image.smb.pullPolicy }} + args: + - "--v={{ .Values.node.logLevel }}" + - "--drivername={{ .Values.driver.name }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--nodeid=$(KUBE_NODE_NAME)" + - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" + - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" + ports: + - containerPort: {{ .Values.node.livenessProbe.healthPort }} + name: healthz + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + securityContext: + privileged: true + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir + resources: {{- toYaml .Values.linux.resources.smb | nindent 12 }} + volumes: + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} + type: DirectoryOrCreate + name: socket-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/ + type: DirectoryOrCreate + name: mountpoint-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} +{{- end -}} diff --git a/charts/v1.9.0/csi-driver-smb/templates/rbac-csi-smb.yaml b/charts/v1.9.0/csi-driver-smb/templates/rbac-csi-smb.yaml new file mode 100644 index 000000000..03561d1be --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/templates/rbac-csi-smb.yaml @@ -0,0 +1,65 @@ +{{- if .Values.serviceAccount.create -}} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +{{ include "smb.labels" . | indent 2 }} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} +{{ include "smb.labels" . | indent 2 }} +{{ end }} + +{{- if .Values.rbac.create -}} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ .Values.rbac.name }}-external-provisioner-role +{{ include "smb.labels" . | indent 2 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get"] +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-provisioner-binding +{{ include "smb.labels" . | indent 2 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-provisioner-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.9.0/csi-driver-smb/values.yaml b/charts/v1.9.0/csi-driver-smb/values.yaml new file mode 100644 index 000000000..11c8bcbd8 --- /dev/null +++ b/charts/v1.9.0/csi-driver-smb/values.yaml @@ -0,0 +1,154 @@ +image: + baseRepo: registry.k8s.io/sig-storage + smb: + repository: registry.k8s.io/sig-storage/smbplugin + tag: v1.9.0 + pullPolicy: IfNotPresent + csiProvisioner: + repository: registry.k8s.io/sig-storage/csi-provisioner + tag: v3.2.0 + pullPolicy: IfNotPresent + livenessProbe: + repository: registry.k8s.io/sig-storage/livenessprobe + tag: v2.7.0 + pullPolicy: IfNotPresent + nodeDriverRegistrar: + repository: registry.k8s.io/sig-storage/csi-node-driver-registrar + tag: v2.5.1 + pullPolicy: IfNotPresent + +serviceAccount: + create: true # When true, service accounts will be created for you. Set to false if you want to use your own. + controller: csi-smb-controller-sa + node: csi-smb-node-sa + +rbac: + create: true + name: smb + +driver: + name: smb.csi.k8s.io + +feature: + enableGetVolumeStats: true + +controller: + name: csi-smb-controller + replicas: 1 + dnsPolicy: Default # available values: Default, ClusterFirstWithHostNet, ClusterFirst + metricsPort: 29644 + livenessProbe: + healthPort: 29642 + runOnMaster: false + runOnControlPlane: false + logLevel: 5 + workingMountDir: "/tmp" + resources: + csiProvisioner: + limits: + memory: 300Mi + requests: + cpu: 10m + memory: 20Mi + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + smb: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - key: "node-role.kubernetes.io/master" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/controlplane" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/control-plane" + operator: "Exists" + effect: "NoSchedule" + +node: + maxUnavailable: 1 + metricsPort: 29645 + logLevel: 5 + livenessProbe: + healthPort: 29643 + affinity: {} + nodeSelector: {} + +linux: + enabled: true + dsName: csi-smb-node # daemonset name + dnsPolicy: Default # available values: Default, ClusterFirstWithHostNet, ClusterFirst + kubelet: /var/lib/kubelet + tolerations: + - operator: "Exists" + resources: + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + nodeDriverRegistrar: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + smb: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 20Mi + +windows: + enabled: false + dsName: csi-smb-node-win # daemonset name + kubelet: 'C:\var\lib\kubelet' + removeSMBMappingDuringUnmount: true + tolerations: + - key: "node.kubernetes.io/os" + operator: "Exists" + effect: "NoSchedule" + resources: + livenessProbe: + limits: + memory: 150Mi + requests: + cpu: 10m + memory: 40Mi + nodeDriverRegistrar: + limits: + memory: 150Mi + requests: + cpu: 10m + memory: 40Mi + smb: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 40Mi + +customLabels: {} +## Collection of annotations to add to all the pods +podAnnotations: {} +## Collection of labels to add to all the pods +podLabels: {} +## Leverage a PriorityClass to ensure your pods survive resource shortages +## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ +priorityClassName: system-cluster-critical +## Security context give the opportunity to run container as nonroot by setting a securityContext +## by example : +## securityContext: { runAsUser: 1001 } +securityContext: {} diff --git a/deploy/csi-smb-controller.yaml b/deploy/csi-smb-controller.yaml index 45d3389c2..ec2f8f7a1 100644 --- a/deploy/csi-smb-controller.yaml +++ b/deploy/csi-smb-controller.yaml @@ -69,7 +69,7 @@ spec: cpu: 10m memory: 20Mi - name: smb - image: gcr.io/k8s-staging-sig-storage/smbplugin:canary + image: registry.k8s.io/sig-storage/smbplugin:v1.9.0 imagePullPolicy: IfNotPresent args: - "--v=5" diff --git a/deploy/csi-smb-node-windows.yaml b/deploy/csi-smb-node-windows.yaml index 3593cc56a..572bc59f9 100644 --- a/deploy/csi-smb-node-windows.yaml +++ b/deploy/csi-smb-node-windows.yaml @@ -82,7 +82,7 @@ spec: cpu: 10m memory: 40Mi - name: smb - image: gcr.io/k8s-staging-sig-storage/smbplugin:canary + image: registry.k8s.io/sig-storage/smbplugin:v1.9.0 imagePullPolicy: IfNotPresent args: - --v=5 diff --git a/deploy/csi-smb-node.yaml b/deploy/csi-smb-node.yaml index 5d3465090..90dce605d 100644 --- a/deploy/csi-smb-node.yaml +++ b/deploy/csi-smb-node.yaml @@ -73,7 +73,7 @@ spec: cpu: 10m memory: 20Mi - name: smb - image: gcr.io/k8s-staging-sig-storage/smbplugin:canary + image: registry.k8s.io/sig-storage/smbplugin:v1.9.0 imagePullPolicy: IfNotPresent args: - "--v=5" diff --git a/deploy/v1.9.0/csi-smb-controller.yaml b/deploy/v1.9.0/csi-smb-controller.yaml new file mode 100644 index 000000000..ec2f8f7a1 --- /dev/null +++ b/deploy/v1.9.0/csi-smb-controller.yaml @@ -0,0 +1,109 @@ +--- +kind: Deployment +apiVersion: apps/v1 +metadata: + name: csi-smb-controller + namespace: kube-system +spec: + replicas: 1 + selector: + matchLabels: + app: csi-smb-controller + template: + metadata: + labels: + app: csi-smb-controller + spec: + dnsPolicy: Default # available values: Default, ClusterFirstWithHostNet, ClusterFirst + serviceAccountName: csi-smb-controller-sa + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-cluster-critical + tolerations: + - key: "node-role.kubernetes.io/master" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/controlplane" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/control-plane" + operator: "Exists" + effect: "NoSchedule" + containers: + - name: csi-provisioner + image: registry.k8s.io/sig-storage/csi-provisioner:v3.2.0 + args: + - "-v=2" + - "--csi-address=$(ADDRESS)" + - "--leader-election" + - "--leader-election-namespace=kube-system" + - "--extra-create-metadata=true" + env: + - name: ADDRESS + value: /csi/csi.sock + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: + limits: + cpu: 1 + memory: 300Mi + requests: + cpu: 10m + memory: 20Mi + - name: liveness-probe + image: registry.k8s.io/sig-storage/livenessprobe:v2.7.0 + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port=29642 + - --v=2 + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: + limits: + cpu: 1 + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + - name: smb + image: registry.k8s.io/sig-storage/smbplugin:v1.9.0 + imagePullPolicy: IfNotPresent + args: + - "--v=5" + - "--endpoint=$(CSI_ENDPOINT)" + - "--metrics-address=0.0.0.0:29644" + ports: + - containerPort: 29642 + name: healthz + protocol: TCP + - containerPort: 29644 + name: metrics + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + securityContext: + privileged: true + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 20Mi + volumes: + - name: socket-dir + emptyDir: {} diff --git a/deploy/v1.9.0/csi-smb-driver.yaml b/deploy/v1.9.0/csi-smb-driver.yaml new file mode 100644 index 000000000..6450d22b3 --- /dev/null +++ b/deploy/v1.9.0/csi-smb-driver.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: smb.csi.k8s.io +spec: + attachRequired: false + podInfoOnMount: true diff --git a/deploy/v1.9.0/csi-smb-node-windows.yaml b/deploy/v1.9.0/csi-smb-node-windows.yaml new file mode 100644 index 000000000..572bc59f9 --- /dev/null +++ b/deploy/v1.9.0/csi-smb-node-windows.yaml @@ -0,0 +1,160 @@ +--- +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: csi-smb-node-win + namespace: kube-system +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate + selector: + matchLabels: + app: csi-smb-node-win + template: + metadata: + labels: + app: csi-smb-node-win + spec: + tolerations: + - key: "node.kubernetes.io/os" + operator: "Exists" + effect: "NoSchedule" + nodeSelector: + kubernetes.io/os: windows + priorityClassName: system-node-critical + serviceAccountName: csi-smb-node-sa + containers: + - name: liveness-probe + volumeMounts: + - mountPath: C:\csi + name: plugin-dir + image: registry.k8s.io/sig-storage/livenessprobe:v2.7.0 + args: + - --csi-address=$(CSI_ENDPOINT) + - --probe-timeout=3s + - --health-port=29643 + - --v=2 + env: + - name: CSI_ENDPOINT + value: unix://C:\\csi\\csi.sock + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 40Mi + - name: node-driver-registrar + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1 + args: + - --v=2 + - --csi-address=$(CSI_ENDPOINT) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + livenessProbe: + exec: + command: + - /csi-node-driver-registrar.exe + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --mode=kubelet-registration-probe + initialDelaySeconds: 60 + timeoutSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix://C:\\csi\\csi.sock + - name: DRIVER_REG_SOCK_PATH + value: C:\\var\\lib\\kubelet\\plugins\\smb.csi.k8s.io\\csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + volumeMounts: + - name: kubelet-dir + mountPath: "C:\\var\\lib\\kubelet" + - name: plugin-dir + mountPath: C:\csi + - name: registration-dir + mountPath: C:\registration + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 40Mi + - name: smb + image: registry.k8s.io/sig-storage/smbplugin:v1.9.0 + imagePullPolicy: IfNotPresent + args: + - --v=5 + - --endpoint=$(CSI_ENDPOINT) + - --nodeid=$(KUBE_NODE_NAME) + - "--metrics-address=0.0.0.0:29645" + - "--remove-smb-mapping-during-unmount=true" + ports: + - containerPort: 29643 + name: healthz + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix://C:\\csi\\csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + volumeMounts: + - name: kubelet-dir + mountPath: "C:\\var\\lib\\kubelet" + - name: plugin-dir + mountPath: C:\csi + - name: csi-proxy-fs-pipe-v1 + mountPath: \\.\pipe\csi-proxy-filesystem-v1 + - name: csi-proxy-smb-pipe-v1 + mountPath: \\.\pipe\csi-proxy-smb-v1 + # these paths are still included for compatibility, they're used + # only if the node has still the beta version of the CSI proxy + - name: csi-proxy-fs-pipe-v1beta1 + mountPath: \\.\pipe\csi-proxy-filesystem-v1beta1 + - name: csi-proxy-smb-pipe-v1beta1 + mountPath: \\.\pipe\csi-proxy-smb-v1beta1 + resources: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 40Mi + volumes: + - name: csi-proxy-fs-pipe-v1 + hostPath: + path: \\.\pipe\csi-proxy-filesystem-v1 + - name: csi-proxy-smb-pipe-v1 + hostPath: + path: \\.\pipe\csi-proxy-smb-v1 + # these paths are still included for compatibility, they're used + # only if the node has still the beta version of the CSI proxy + - name: csi-proxy-fs-pipe-v1beta1 + hostPath: + path: \\.\pipe\csi-proxy-filesystem-v1beta1 + - name: csi-proxy-smb-pipe-v1beta1 + hostPath: + path: \\.\pipe\csi-proxy-smb-v1beta1 + - name: registration-dir + hostPath: + path: C:\var\lib\kubelet\plugins_registry\ + type: Directory + - name: kubelet-dir + hostPath: + path: C:\var\lib\kubelet\ + type: Directory + - name: plugin-dir + hostPath: + path: C:\var\lib\kubelet\plugins\smb.csi.k8s.io\ + type: DirectoryOrCreate diff --git a/deploy/v1.9.0/csi-smb-node.yaml b/deploy/v1.9.0/csi-smb-node.yaml new file mode 100644 index 000000000..90dce605d --- /dev/null +++ b/deploy/v1.9.0/csi-smb-node.yaml @@ -0,0 +1,130 @@ +--- +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: csi-smb-node + namespace: kube-system +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate + selector: + matchLabels: + app: csi-smb-node + template: + metadata: + labels: + app: csi-smb-node + spec: + hostNetwork: true + dnsPolicy: Default # available values: Default, ClusterFirstWithHostNet, ClusterFirst + serviceAccountName: csi-smb-node-sa + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + tolerations: + - operator: "Exists" + containers: + - name: liveness-probe + volumeMounts: + - mountPath: /csi + name: socket-dir + image: registry.k8s.io/sig-storage/livenessprobe:v2.7.0 + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port=29643 + - --v=2 + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + - name: node-driver-registrar + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1 + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=2 + livenessProbe: + exec: + command: + - /csi-node-driver-registrar + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --mode=kubelet-registration-probe + initialDelaySeconds: 30 + timeoutSeconds: 15 + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/smb.csi.k8s.io/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + - name: smb + image: registry.k8s.io/sig-storage/smbplugin:v1.9.0 + imagePullPolicy: IfNotPresent + args: + - "--v=5" + - "--endpoint=$(CSI_ENDPOINT)" + - "--nodeid=$(KUBE_NODE_NAME)" + - "--metrics-address=0.0.0.0:29645" + ports: + - containerPort: 29643 + name: healthz + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + securityContext: + privileged: true + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: /var/lib/kubelet/ + mountPropagation: Bidirectional + name: mountpoint-dir + resources: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 20Mi + volumes: + - hostPath: + path: /var/lib/kubelet/plugins/smb.csi.k8s.io + type: DirectoryOrCreate + name: socket-dir + - hostPath: + path: /var/lib/kubelet/ + type: DirectoryOrCreate + name: mountpoint-dir + - hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir +--- diff --git a/deploy/v1.9.0/rbac-csi-smb.yaml b/deploy/v1.9.0/rbac-csi-smb.yaml new file mode 100644 index 000000000..fc1f03ffa --- /dev/null +++ b/deploy/v1.9.0/rbac-csi-smb.yaml @@ -0,0 +1,56 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-smb-controller-sa + namespace: kube-system +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-smb-node-sa + namespace: kube-system +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: smb-external-provisioner-role +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get"] +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: smb-csi-provisioner-binding +subjects: + - kind: ServiceAccount + name: csi-smb-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: smb-external-provisioner-role + apiGroup: rbac.authorization.k8s.io diff --git a/docs/install-csi-driver-v1.9.0.md b/docs/install-csi-driver-v1.9.0.md new file mode 100644 index 000000000..8312c11a6 --- /dev/null +++ b/docs/install-csi-driver-v1.9.0.md @@ -0,0 +1,45 @@ +## Install SMB CSI driver v1.9.0 version on a Kubernetes cluster +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +### Install by kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/v1.9.0/deploy/install-driver.sh | bash -s v1.9.0 -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-csi/csi-driver-smb.git +cd csi-driver-smb +git checkout v1.9.0 +./deploy/install-driver.sh v1.9.0 local +``` + + - check pods status: +```console +kubectl -n kube-system get pod -o wide --watch -l app=csi-smb-controller +kubectl -n kube-system get pod -o wide --watch -l app=csi-smb-node +``` + +example output: + +``` +NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES +csi-smb-controller-788486959d-5qmn7 3/3 Running 0 23s 10.244.0.45 aks-agentpool-60632172-vmss000006 +csi-smb-node-4gwzl 3/3 Running 0 15s 10.244.1.34 aks-agentpool-60632172-vmss000007 +csi-smb-node-hg76w 3/3 Running 0 27s 10.244.0.44 aks-agentpool-60632172-vmss000006 +``` + +### clean up SMB CSI driver + - Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/v1.9.0/deploy/uninstall-driver.sh | bash -s -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-csi/csi-driver-smb.git +cd csi-driver-smb +git checkout v1.9.0 +./deploy/uninstall-driver.sh v1.9.0 local +``` diff --git a/docs/install-smb-csi-driver.md b/docs/install-smb-csi-driver.md index 9dab89a1a..4695bd8f8 100644 --- a/docs/install-smb-csi-driver.md +++ b/docs/install-smb-csi-driver.md @@ -1,6 +1,6 @@ ## Install SMB CSI driver on a Kubernetes cluster - [install CSI driver master version](./install-csi-driver-master.md)(only for testing purpose) + - [install CSI driver v1.9.0 version](./install-csi-driver-v1.9.0.md) - [install CSI driver v1.8.0 version](./install-csi-driver-v1.8.0.md) - [install CSI driver v1.7.0 version](./install-csi-driver-v1.7.0.md) - - [install CSI driver v1.6.0 version](./install-csi-driver-v1.6.0.md)