Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

prepare release 0.31 #42

Merged
merged 3 commits into from
Aug 28, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Changelog

## Unreleased
## 0.31.0

### Improvements

Expand Down
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,4 +84,5 @@ For example, CSI `0.99` would be compatible with Kubernetes versions `1.99`, `1.

| CSI version | supported Kubernetes versions |
|-------------|-------------------------------|
| 0.31 | 1.31, 1.30 |
| 0.29 | 1.29, 1.28, 1.27 |
144 changes: 144 additions & 0 deletions deployment/0.31.0/controller-rbac.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,144 @@
kind: ServiceAccount
apiVersion: v1
metadata:
name: exoscale-csi-controller
namespace: kube-system
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: exoscale-csi-provisioner
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
verbs: ["get", "list", "watch", "delete"]
- apiGroups: [""]
resources: ["persistentvolumeclaims"]
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["storageclasses"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["list", "watch", "create", "patch"]
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["csinodes"]
verbs: ["get", "list", "watch"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments", "volumeattachments/status"]
verbs: ["get", "list", "watch", "update", "create", "patch"]
- apiGroups: ["snapshot.storage.k8s.io"]
resources: ["volumesnapshots", "volumesnapshots/status", "volumesnapshotclasses", "volumesnapshotcontents", "volumesnapshotcontents/status"]
verbs: ["get", "list", "watch", "update", "create", "patch"]
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: exoscale-csi-controller
subjects:
- kind: ServiceAccount
name: exoscale-csi-controller
namespace: kube-system
roleRef:
kind: ClusterRole
name: exoscale-csi-provisioner
apiGroup: rbac.authorization.k8s.io
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: exoscale-csi-attacher
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
verbs: ["get", "watch", "list", "update", "patch"]
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "watch", "list"]
- apiGroups: ["storage.k8s.io"]
resources: ["csinodes"]
verbs: ["get", "watch", "list", "update", "patch"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments", "volumeattachments/status"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: exoscale-csi-attacher
subjects:
- kind: ServiceAccount
name: exoscale-csi-controller
namespace: kube-system
roleRef:
kind: ClusterRole
name: exoscale-csi-attacher
apiGroup: rbac.authorization.k8s.io
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: exoscale-csi-snapshotter
rules:
- apiGroups: [""]
resources: ["persistentvolumes", "persistentvolumeclaims", "events"]
verbs: ["get", "watch", "list", "create", "update", "patch"]
- apiGroups: ["storage.k8s.io"]
resources: ["storageclasses"]
verbs: ["get", "watch", "list"]
- apiGroups: ["snapshot.storage.k8s.io"]
resources: ["volumesnapshots", "volumesnapshots/status", "volumesnapshotclasses", "volumesnapshotcontents"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
- apiGroups: ["apiextensions.k8s.io"]
resources: ["customresourcedefinitions", "leases"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: exoscale-csi-snapshotter
subjects:
- kind: ServiceAccount
name: exoscale-csi-controller
namespace: kube-system
roleRef:
kind: ClusterRole
name: exoscale-csi-snapshotter
apiGroup: rbac.authorization.k8s.io
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: external-resizer
rules:
- apiGroups: [""]
resources: ["persistentvolumes", "persistentvolumeclaims", "persistentvolumeclaims/status"]
verbs: ["get", "watch", "list", "create", "update", "patch"]
- apiGroups: [""]
resources: ["pods", "events"]
verbs: ["get", "watch", "list"]
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: csi-resizer-role
subjects:
- kind: ServiceAccount
name: exoscale-csi-controller
namespace: kube-system
roleRef:
kind: ClusterRole
name: external-resizer
apiGroup: rbac.authorization.k8s.io
186 changes: 186 additions & 0 deletions deployment/0.31.0/controller.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,186 @@
kind: Deployment
apiVersion: apps/v1
metadata:
name: exoscale-csi-controller
namespace: kube-system
spec:
selector:
matchLabels:
app: exoscale-csi-controller
replicas: 2
template:
metadata:
labels:
app: exoscale-csi-controller
spec:
dnsPolicy: Default
priorityClassName: system-cluster-critical
serviceAccount: exoscale-csi-controller
containers:
- name: exoscale-csi-plugin
image: exoscale/csi-driver:0.31.0
imagePullPolicy: Always
args :
- "--endpoint=$(CSI_ENDPOINT)"
- "--mode=controller"
- "--v=4"
env:
- name: CSI_ENDPOINT
value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock
securityContext:
privileged: true # needed for the controller to be able to read instance metadata from CD-ROM device
envFrom:
- secretRef:
name: exoscale-credentials
volumeMounts:
- name: socket-dir
mountPath: /var/lib/csi/sockets/pluginproxy/
- name: device-dir
mountPath: /dev
ports:
- name: healthz
containerPort: 9808
protocol: TCP
livenessProbe:
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 10
timeoutSeconds: 3
periodSeconds: 2
failureThreshold: 5
resources:
limits:
cpu: 1000m
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-provisioner
image: registry.k8s.io/sig-storage/csi-provisioner:v3.6.0
args:
- "--v=5"
- "--csi-address=$(CSI_ADDRESS)"
- "--leader-election"
- "--leader-election-lease-duration=30s"
- "--leader-election-renew-deadline=20s"
- "--leader-election-retry-period=10s"
- "--feature-gates=Topology=true"
- "--default-fstype=ext4"
env:
- name: CSI_ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /var/lib/csi/sockets/pluginproxy/
resources:
limits:
cpu: 1000m
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-attacher
image: registry.k8s.io/sig-storage/csi-attacher:v4.4.1
args:
- "--v=5"
- "--csi-address=$(CSI_ADDRESS)"
- "--leader-election"
- "--leader-election-lease-duration=30s"
- "--leader-election-renew-deadline=20s"
- "--leader-election-retry-period=10s"
env:
- name: CSI_ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /var/lib/csi/sockets/pluginproxy/
resources:
limits:
cpu: 1000m
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-snapshotter
image: registry.k8s.io/sig-storage/csi-snapshotter:v6.3.0
args:
- "--v=5"
- "--csi-address=$(CSI_ADDRESS)"
- "--leader-election"
- "--leader-election-lease-duration=30s"
- "--leader-election-renew-deadline=20s"
- "--leader-election-retry-period=10s"
env:
- name: CSI_ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /var/lib/csi/sockets/pluginproxy/
resources:
limits:
cpu: 400m
memory: 200Mi
requests:
cpu: 10m
memory: 20Mi
- name: snapshot-controller
image: registry.k8s.io/sig-storage/snapshot-controller:v6.3.0
args:
- "--v=5"
- "--leader-election"
- "--leader-election-lease-duration=30s"
- "--leader-election-renew-deadline=20s"
- "--leader-election-retry-period=10s"
resources:
limits:
cpu: 400m
memory: 200Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-resizer
image: registry.k8s.io/sig-storage/csi-resizer:v1.9.0
args:
- "--v=5"
- "--csi-address=$(CSI_ADDRESS)"
- "--leader-election"
- "--leader-election-lease-duration=30s"
- "--leader-election-renew-deadline=20s"
- "--leader-election-retry-period=10s"
env:
- name: CSI_ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /var/lib/csi/sockets/pluginproxy/
resources:
limits:
cpu: 1000m
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: liveness-probe
image: registry.k8s.io/sig-storage/livenessprobe:v2.11.0
args:
- "--csi-address=$(CSI_ADDRESS)"
env:
- name: CSI_ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /var/lib/csi/sockets/pluginproxy/
resources:
limits:
cpu: 200m
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
volumes:
- name: socket-dir
emptyDir: {}
- name: device-dir
hostPath:
path: /dev
Loading