From fc1f456066cdddbef71e12f73a3261f61e06449a Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Thu, 23 May 2024 14:24:13 +0000 Subject: [PATCH] cleanup: remove v1.15.0 release since windows image build is broken --- README.md | 1 - charts/README.md | 2 +- charts/v1.15.0/csi-driver-smb-v1.15.0.tgz | Bin 4916 -> 0 bytes charts/v1.15.0/csi-driver-smb/Chart.yaml | 5 - .../csi-driver-smb/templates/NOTES.txt | 5 - .../csi-driver-smb/templates/_helpers.tpl | 29 --- .../templates/csi-proxy-windows.yaml | 48 ----- .../templates/csi-smb-controller.yaml | 137 -------------- .../templates/csi-smb-driver.yaml | 8 - .../templates/csi-smb-node-windows.yaml | 171 ------------------ .../templates/csi-smb-node.yaml | 163 ----------------- .../templates/rbac-csi-smb.yaml | 65 ------- charts/v1.15.0/csi-driver-smb/values.yaml | 167 ----------------- deploy/v1.15.0/csi-smb-controller.yaml | 111 ------------ deploy/v1.15.0/csi-smb-driver.yaml | 8 - deploy/v1.15.0/csi-smb-node-windows.yaml | 162 ----------------- deploy/v1.15.0/csi-smb-node.yaml | 129 ------------- deploy/v1.15.0/rbac-csi-smb.yaml | 56 ------ docs/install-csi-driver-v1.15.0.md | 45 ----- docs/install-smb-csi-driver.md | 1 - 20 files changed, 1 insertion(+), 1312 deletions(-) delete mode 100644 charts/v1.15.0/csi-driver-smb-v1.15.0.tgz delete mode 100644 charts/v1.15.0/csi-driver-smb/Chart.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/NOTES.txt delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/_helpers.tpl delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/csi-proxy-windows.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/csi-smb-controller.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/csi-smb-driver.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/csi-smb-node-windows.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/csi-smb-node.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/templates/rbac-csi-smb.yaml delete mode 100644 charts/v1.15.0/csi-driver-smb/values.yaml delete mode 100644 deploy/v1.15.0/csi-smb-controller.yaml delete mode 100644 deploy/v1.15.0/csi-smb-driver.yaml delete mode 100644 deploy/v1.15.0/csi-smb-node-windows.yaml delete mode 100644 deploy/v1.15.0/csi-smb-node.yaml delete mode 100644 deploy/v1.15.0/rbac-csi-smb.yaml delete mode 100644 docs/install-csi-driver-v1.15.0.md diff --git a/README.md b/README.md index 54213be8303..52a1dd07ec0 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,6 @@ This driver allows Kubernetes to access [SMB](https://wiki.wireshark.org/SMB) se |Driver Version | supported k8s version | supported [Windows csi-proxy](https://github.com/kubernetes-csi/csi-proxy) version | |---------------|-----------------------|-------------------------------------| |master branch | 1.21+ | v0.2.2+ | -|v1.15.0 | 1.21+ | v0.2.2+ | |v1.14.0 | 1.21+ | v0.2.2+ | |v1.13.0 | 1.21+ | v0.2.2+ | diff --git a/charts/README.md b/charts/README.md index 9926192edd7..39cee34a6e3 100644 --- a/charts/README.md +++ b/charts/README.md @@ -15,7 +15,7 @@ ```console helm repo add csi-driver-smb https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/master/charts -helm install csi-driver-smb csi-driver-smb/csi-driver-smb --namespace kube-system --version v1.15.0 +helm install csi-driver-smb csi-driver-smb/csi-driver-smb --namespace kube-system --version v1.14.0 ``` ### install driver with customized driver name, deployment name diff --git a/charts/v1.15.0/csi-driver-smb-v1.15.0.tgz b/charts/v1.15.0/csi-driver-smb-v1.15.0.tgz deleted file mode 100644 index 05865f95386608dd21f04bf5b0d1eaf602c808b1..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4916 zcmV-46U*!$iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PJ0RZyPtZ&))*_9SEhswtF*r`H{T?_>aU++n^iAu#zr{^&+5V zjwD{s3};D>Vy)}%e!<7QInwB1C*6ugV`+vwhmZ64k%y!_P8^?+1u%z)lm7V}Gtpb( zFnG4VG#Cs9r^mXPlvBgPLD>T(X+wucyKg$h6a1ALt{#~!0g#z zXI|CD{Xr6r$*;gTp^=Lg!w!z)!q?vLq&MjJz&%D{p&pLkzd`5Ycj!XN44P7gen}?4 zA`rkk5e~scWtr+Mssz7wn-3{Z75!h}AOXH-1F%~Ehl8V6M^*hFy&4|$|0xm)@eJG! zLKDp48e-}q1~bA1TlQ}M#(RYJIhi?JP=;sFL5PPFnH?bpG37*1wp>}H&%;R^Br_7J zQUcF%Lm(f-Nf2DofOtz6y_;TAam9c`Bsxgikt;?QL|PAEn{kzL9p{A$ypMZ>^{fN3 zfCxChVsrwVaZZcIvS@+ts5cy~XB<%UMX4~Pw7Q}5qc0=~&;(2oU%96xO?qey0tt$yIN*TDR6aysaHJk49OQR~=$EJ` z`O!!)8U(E4L_pVMmXOTYT8_I58vH=}ZBO zgej4O2u}j|3B<27NJ1D3EVv=rDbz6|Rj+GD4O>7w%w06>Amm3p?e+5@;R4u?gmLi? zBIZ9+E-pbJ^a9}pCV}LQv^#Lo1x#@gh?h;J$}c(yg&-L5_!VWsMWg>cJwCQ8)f{jj z=6NR!^ZHwQlnpxcVR(TZ5g&ZBd2c3{&{wngd? zzWWqqx~LVnEbA>4>ZrwNbpjG4ce%;&GsETc%aUo4MbQi7V+d))K`6`fly*h-b^yXf z{RL+IfK2-4iG0Tgz1 zf{|#3LckG6zOLc-Ret@HO#cVN`ijAn+!>a!`mzH*NzwB@|6o@ot3*}o+ml+HM%eO) zHF6yTWJ+qG@xu%BDGGpdg(7gk0Q*Zc$G%h(q%aR65f?ZJz<-Ghon8v3dWPDW!ZU=c znh^$mgT6^bWz)G#75;MW-YhV?3CQHeJp79ihmbB{{Qk{*9LFS@T_jS>K1HFzRjG!r zw9^&iM)|geb0^U}*=i7vcM;7USw5a<8Wv?}UK7t$q9oEy#m{7t0;j?ABoQdYO9_`V zX+vX(?3mX0%Pax2|U%Wu)5(9g(I*3jYjv^{_u7h;ea$1Hkx?+SfB9`X?=86DBJYi<)Axk5kumxE_ zrY(riDHC`GT#{lib!Zh*FS&rw@wCr%JVpfZa3Hyl!AoRrH9LYkfo8I%vf(t2DHDktWZ5c~L@Ey^5io=~ zifF_r6=Jooi~6!(@rz4u^37$d%tKSzL54X}{*5xSSUZ2ZJGc=vXpw z@H`sESBy@HgiZHi8H0HNTF)Q9f0M516OLv^QGJL5x&&qDl$|oBq1Wkrq{y3tcUvv3 zEt$X~;V)4f0Ola|*6kR`;)wt`j`RRL#vYvA-=p3&sC>Q4^eK9Hkaf_+9ETfMaMs0f zTmdDLQjG|Dc<3U>`GSQvKj`_Y)TsZT=Mcoecu&N;h62{;|M28=SkeE}L{ICGVh!5y@2~i^togS%=BpfGGIi2o0 zIWdTQ^;uWVz%n`CoCX~n){Tn-#*rt%s?Ee$%Y-<>Gw_|svQlbn zR;!x|8dQ9Lk5Vlxc4DuwTozwd+;rc*&f>VHnCz7vpZC>Zm9m<~IQf&blIXQC8<`D|{t2+W*pg zPt72=4hpZa|3`yY75hIL91lka`~MWFq8&|(RSyr(JGUhAU38)5{bLZ%JH@>tIF5OL zF?`+$L0}&X>^{!|Q&Ksa=t%DQ-37LkUOC`asGM z$MFUol&WV+Fz@RYy>gmWcXP%FnckH0@`Z?bbGgDQP=R4_ZRmN?MdbDSn;G8JY^Fu4 zbNsvwhWCd!rHisOr(9ey>H#+~)8fl)9pQ4Ve5T7)=y&w*gbFn?NlDFhkm3tvw`Crs z<*PP*RxFSTd7BQZQC32luDKQZFk6P(uZELY3r_yj{jIIj%FPbUkyEIDT;m9vv+i@MzUeZeZSKdvsH2_?*|8F!Hj%xVt z)#(BMJwuj*DAS96n4eiieTQH}woJ3S9h%3S_(A%v_yPfQn zOW*4X@=}DUh|U_onYEc2CM!d-wur0|kXe}(d}GUlWL+Dpg{?YS(a0vzD9^PlQ>{&eWh10s2kK2Y zJ==oa4y+gUWR?-{9uRvYZ7Z5C<~EqR2;N&__dW3}Yc)cc%?e$vyS?iy&PLtZLq`q- z_I(DNpMCfJ>x+x)x8v~-mW%;lAD9DXzr*?*E#i0v z%av(B=^fHr3SA^|tNg#msdu~Stf$!frMXXm&_Zp-R@;kf1E986U12fT^{CX)Z1|?$ zEeOXathgYN?T@lqj1qt`87tK-SdrnVT;ZxsD%FYs_CG|y@|sfdBMCt704cf0yyMet zTaG^3&_bU}8@=|c&MQdQHLIL?OJ&{{$2O{5R@x?^);ZN^ID&*g6LEILYZ>N3#12G$ zOi3ip0_x#FVjZttl_gMjPo^nf5j+wnB+yYSzFlRIF6nC($q-PTHuI zbk2KKrW(PzK+7y!D$X|4t4gw7wo=4mlPJ5lbQWg~DqwcmH@L4J?3v%Db3RK|LC{=;QfS;hlB=uufA+%3b)k;D+3Y6yMs9% zP8$4+Zog%AWo?)`P@+z~-9OYy)N5MG{9wd?=JyXAA{HfAf{ZEge?XU%GP5kd(!Nou`O1t z)k=vIQzp);=6U<|>D`w>&fOa+Y3iTNBTVg9zgI6Gq-J{4RqC{<_N$> zErYty+KOzcERVsxo#K>bbaQ1gS3YE;sp7IR7W1?3zQ4GB_v_p1&)08%`aJ${{>$g9 z*B^iWq1{3%+-X=@x~|3^Y4MUY zt|L;+yn{Eebii7laELm7y{MyxG%Mqc+eH1Eqm;FbvIfLI`|kU)Qdcvoz^9xLJ2McD z)*XinEO@b2=K8{(?e0Q*>-056YN;vI7Zo|ax~a%X^i@S?78AGfZlm4emK$Nrbe7Q& z8GN$vWs3l%?cFyYc5LS@AHy3}?!~TWXyLBbJD3!=taJ`5T>Qhs&0{#O{Os?PJ28pD zsdYht(9KQnMrOJx6w3m-)sl4Yyg*_O9F#h6gc%?%ND!oJ6}~w@9>!RZ z2?>Z;zLX`Fe_?DA8Q>*yzj=u-7CjNUosPF$69UmX!zfX}Wfhcu2Y@g9zP4E!=wfDti zMSkm?bow(K9NkNtSC;7HuCe{GQPcCgo)|61Tib@w_0i5f2GI=+_#;QVYrUaI=$k${ zxobSU&2H#JH2lBk^wy4X@u!JgYrXrLr>hRJ?{6*kZ9kb@%eGsjxGwNd5%#uZ{$@hn z>z4RW+AQL4bqssQ5Vy7=`RYU8tUmM`S0A=J3%=hl@)oC6w+SNmw+bOw&GI3DdJ8sWfN164-ZisIBV0*fM+f1nL@yY=ZwyK3h@z_y15 zWHrm`U$f+!dC`sHoh^een}eTLk(Uh!i8 z+eSG*gx~(8sWJY?CfIXK5b#mse}kjrSFh^vzr*i8JxQu9&6h8(RAxk3h3Y}^>}2@3 zRAhBDaLv7#`wR^}Mt$?B%sy*+f1g_6Y7kB8;HoiD?{OmLl#%}^zf?cBuYa)Xng+1C zsfw1t4G!E1IbjTn_cy95I9oT0C4mMxjs)R9F`C5OMgQz}|JA9Wseg83*&Z$+5(XTZ zObcKWm0<>=`x12n!qs2(vtIIp?i%^Ym#!XExh)ua0VZKUmV;)-rASnRLuz7Oe;4(X7#PX8YO0RR8;;dQY9kN^PQqNO1K diff --git a/charts/v1.15.0/csi-driver-smb/Chart.yaml b/charts/v1.15.0/csi-driver-smb/Chart.yaml deleted file mode 100644 index cca2a32e79f..00000000000 --- a/charts/v1.15.0/csi-driver-smb/Chart.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -appVersion: v1.15.0 -description: SMB CSI Driver for Kubernetes -name: csi-driver-smb -version: v1.15.0 diff --git a/charts/v1.15.0/csi-driver-smb/templates/NOTES.txt b/charts/v1.15.0/csi-driver-smb/templates/NOTES.txt deleted file mode 100644 index 9d8ca4f2a0b..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/NOTES.txt +++ /dev/null @@ -1,5 +0,0 @@ -The CSI SMB Driver is getting deployed to your cluster. - -To check CSI SMB Driver pods status, please run: - - kubectl --namespace={{ .Release.Namespace }} get pods --selector="app.kubernetes.io/name={{ .Release.Name }}" --watch diff --git a/charts/v1.15.0/csi-driver-smb/templates/_helpers.tpl b/charts/v1.15.0/csi-driver-smb/templates/_helpers.tpl deleted file mode 100644 index 5394ab92ba2..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/_helpers.tpl +++ /dev/null @@ -1,29 +0,0 @@ -{{/* vim: set filetype=mustache: */}} - -{{/* Expand the name of the chart.*/}} -{{- define "smb.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* labels for helm resources */}} -{{- define "smb.labels" -}} -labels: - app.kubernetes.io/instance: "{{ .Release.Name }}" - app.kubernetes.io/managed-by: "{{ .Release.Service }}" - app.kubernetes.io/name: "{{ template "smb.name" . }}" - app.kubernetes.io/version: "{{ .Chart.AppVersion }}" - helm.sh/chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}" - {{- if .Values.customLabels }} -{{ toYaml .Values.customLabels | indent 2 -}} - {{- end }} -{{- end -}} - -{{/* pull secrets for containers */}} -{{- define "smb.pullSecrets" -}} -{{- if .Values.imagePullSecrets }} -imagePullSecrets: -{{- range .Values.imagePullSecrets }} - - name: {{ . }} -{{- end }} -{{- end }} -{{- end -}} diff --git a/charts/v1.15.0/csi-driver-smb/templates/csi-proxy-windows.yaml b/charts/v1.15.0/csi-driver-smb/templates/csi-proxy-windows.yaml deleted file mode 100644 index bd2d1c7aa9f..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/csi-proxy-windows.yaml +++ /dev/null @@ -1,48 +0,0 @@ -{{- if .Values.windows.csiproxy.enabled}} -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.windows.csiproxy.dsName }} - namespace: {{ .Release.Namespace }} -{{ include "smb.labels" . | indent 2 }} -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: {{ .Values.node.maxUnavailable }} - type: RollingUpdate - selector: - matchLabels: - app: {{ .Values.windows.csiproxy.dsName }} - template: - metadata: -{{ include "smb.labels" . | indent 6 }} - app: {{ .Values.windows.csiproxy.dsName }} - spec: -{{- with .Values.windows.csiproxy.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - securityContext: - windowsOptions: - hostProcess: true - runAsUserName: {{ .Values.windows.csiproxy.username | quote }} - hostNetwork: true - nodeSelector: -{{- with .Values.windows.csiproxy.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} -{{- with .Values.node.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} - {{- include "smb.pullSecrets" . | indent 6 }} - containers: - - name: csi-proxy -{{- if hasPrefix "/" .Values.image.csiproxy.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiproxy.repository }}:{{ .Values.image.csiproxy.tag }}" -{{- else }} - image: "{{ .Values.image.csiproxy.repository }}:{{ .Values.image.csiproxy.tag }}" -{{- end }} - imagePullPolicy: {{ .Values.image.csiproxy.pullPolicy }} -{{- end -}} diff --git a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-controller.yaml b/charts/v1.15.0/csi-driver-smb/templates/csi-smb-controller.yaml deleted file mode 100644 index 5f86404efa5..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-controller.yaml +++ /dev/null @@ -1,137 +0,0 @@ ---- -kind: Deployment -apiVersion: apps/v1 -metadata: - name: {{ .Values.controller.name }} - namespace: {{ .Release.Namespace }} -{{ include "smb.labels" . | indent 2 }} -spec: - strategy: - type: Recreate - replicas: {{ .Values.controller.replicas }} - selector: - matchLabels: - app: {{ .Values.controller.name }} - template: - metadata: -{{ include "smb.labels" . | indent 6 }} - app: {{ .Values.controller.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.controller.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - hostNetwork: true - dnsPolicy: {{ .Values.controller.dnsPolicy }} - serviceAccountName: {{ .Values.serviceAccount.controller }} - nodeSelector: -{{- with .Values.controller.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - kubernetes.io/os: linux - {{- if .Values.controller.runOnMaster}} - node-role.kubernetes.io/master: "" - {{- end}} - {{- if .Values.controller.runOnControlPlane}} - node-role.kubernetes.io/control-plane: "" - {{- end}} - priorityClassName: {{ .Values.priorityClassName | quote }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} -{{- with .Values.controller.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - {{- include "smb.pullSecrets" . | indent 6 }} - containers: - - name: csi-provisioner -{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" -{{- else }} - image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" -{{- end }} - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--leader-election-namespace={{ .Release.Namespace }}" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} - securityContext: - readOnlyRootFilesystem: true - - name: liveness-probe -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --http-endpoint=localhost:{{ .Values.controller.livenessProbe.healthPort }} - - --v=2 - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} - securityContext: - readOnlyRootFilesystem: true - - name: smb -{{- if hasPrefix "/" .Values.image.smb.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" -{{- else }} - image: "{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" -{{- end }} - imagePullPolicy: {{ .Values.image.smb.pullPolicy }} - args: - - "--v={{ .Values.controller.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--working-mount-dir={{ .Values.controller.workingMountDir }}" - ports: - - containerPort: {{ .Values.controller.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - host: localhost - path: /healthz - port: {{ .Values.controller.livenessProbe.healthPort }} - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - securityContext: - privileged: true - readOnlyRootFilesystem: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.controller.workingMountDir }} - name: tmp-dir - resources: {{- toYaml .Values.controller.resources.smb | nindent 12 }} - volumes: - - name: socket-dir - emptyDir: {} - - name: tmp-dir - emptyDir: {} diff --git a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-driver.yaml b/charts/v1.15.0/csi-driver-smb/templates/csi-smb-driver.yaml deleted file mode 100644 index 16094379923..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-driver.yaml +++ /dev/null @@ -1,8 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: {{ .Values.driver.name }} -spec: - attachRequired: false - podInfoOnMount: true diff --git a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-node-windows.yaml b/charts/v1.15.0/csi-driver-smb/templates/csi-smb-node-windows.yaml deleted file mode 100644 index b033b151c97..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-node-windows.yaml +++ /dev/null @@ -1,171 +0,0 @@ -{{- if .Values.windows.enabled}} -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.windows.dsName }} - namespace: {{ .Release.Namespace }} -{{ include "smb.labels" . | indent 2 }} -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: {{ .Values.node.maxUnavailable }} - type: RollingUpdate - selector: - matchLabels: - app: {{ .Values.windows.dsName }} - template: - metadata: -{{ include "smb.labels" . | indent 6 }} - app: {{ .Values.windows.dsName }} - spec: -{{- with .Values.windows.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - nodeSelector: - kubernetes.io/os: windows -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} -{{- with .Values.node.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} - serviceAccountName: {{ .Values.serviceAccount.node }} - {{- include "smb.pullSecrets" . | indent 6 }} - containers: - - name: liveness-probe - volumeMounts: - - mountPath: C:\csi - name: plugin-dir -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=$(CSI_ENDPOINT) - - --probe-timeout=3s - - --health-port={{ .Values.node.livenessProbe.healthPort }} - - --v=2 - env: - - name: CSI_ENDPOINT - value: unix://C:\\csi\\csi.sock - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - resources: {{- toYaml .Values.windows.resources.livenessProbe | nindent 12 }} - - name: node-driver-registrar -{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- else }} - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- end }} - args: - - --v=2 - - --csi-address=$(CSI_ENDPOINT) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - livenessProbe: - exec: - command: - - /csi-node-driver-registrar.exe - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --mode=kubelet-registration-probe - initialDelaySeconds: 60 - timeoutSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix://C:\\csi\\csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.windows.kubelet | replace "\\" "\\\\" }}\\plugins\\{{ .Values.driver.name }}\\csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - fieldPath: spec.nodeName - imagePullPolicy: {{ .Values.image.nodeDriverRegistrar.pullPolicy }} - volumeMounts: - - name: plugin-dir - mountPath: C:\csi - - name: registration-dir - mountPath: C:\registration - resources: {{- toYaml .Values.windows.resources.nodeDriverRegistrar | nindent 12 }} - - name: smb -{{- if hasPrefix "/" .Values.image.smb.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" -{{- else }} - image: "{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" -{{- end }} - imagePullPolicy: {{ .Values.image.smb.pullPolicy }} - args: - - "--v={{ .Values.node.logLevel }}" - - "--drivername={{ .Values.driver.name }}" - - --endpoint=$(CSI_ENDPOINT) - - --nodeid=$(KUBE_NODE_NAME) - - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" - - "--remove-smb-mapping-during-unmount={{ .Values.windows.removeSMBMappingDuringUnmount }}" - ports: - - containerPort: {{ .Values.node.livenessProbe.healthPort }} - name: healthz - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix://C:\\csi\\csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - volumeMounts: - - name: kubelet-dir - mountPath: {{ .Values.windows.kubelet }}\ - - name: plugin-dir - mountPath: C:\csi - - name: csi-proxy-fs-pipe-v1 - mountPath: \\.\pipe\csi-proxy-filesystem-v1 - - name: csi-proxy-smb-pipe-v1 - mountPath: \\.\pipe\csi-proxy-smb-v1 - # these paths are still included for compatibility, they're used - # only if the node has still the beta version of the CSI proxy - - name: csi-proxy-fs-pipe-v1beta1 - mountPath: \\.\pipe\csi-proxy-filesystem-v1beta1 - - name: csi-proxy-smb-pipe-v1beta1 - mountPath: \\.\pipe\csi-proxy-smb-v1beta1 - resources: {{- toYaml .Values.windows.resources.smb | nindent 12 }} - volumes: - - name: csi-proxy-fs-pipe-v1 - hostPath: - path: \\.\pipe\csi-proxy-filesystem-v1 - - name: csi-proxy-smb-pipe-v1 - hostPath: - path: \\.\pipe\csi-proxy-smb-v1 - # these paths are still included for compatibility, they're used - # only if the node has still the beta version of the CSI proxy - - name: csi-proxy-fs-pipe-v1beta1 - hostPath: - path: \\.\pipe\csi-proxy-filesystem-v1beta1 - - name: csi-proxy-smb-pipe-v1beta1 - hostPath: - path: \\.\pipe\csi-proxy-smb-v1beta1 - - name: registration-dir - hostPath: - path: {{ .Values.windows.kubelet }}\plugins_registry\ - type: Directory - - name: kubelet-dir - hostPath: - path: {{ .Values.windows.kubelet }}\ - type: Directory - - name: plugin-dir - hostPath: - path: {{ .Values.windows.kubelet }}\plugins\{{ .Values.driver.name }}\ - type: DirectoryOrCreate -{{- end -}} diff --git a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-node.yaml b/charts/v1.15.0/csi-driver-smb/templates/csi-smb-node.yaml deleted file mode 100644 index 6865e227ada..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/csi-smb-node.yaml +++ /dev/null @@ -1,163 +0,0 @@ -{{- if .Values.linux.enabled}} -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.linux.dsName }} - namespace: {{ .Release.Namespace }} -{{ include "smb.labels" . | indent 2 }} -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: {{ .Values.node.maxUnavailable }} - type: RollingUpdate - selector: - matchLabels: - app: {{ .Values.linux.dsName }} - template: - metadata: -{{ include "smb.labels" . | indent 6 }} - app: {{ .Values.linux.dsName }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.node.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - hostNetwork: true - dnsPolicy: {{ .Values.linux.dnsPolicy }} - serviceAccountName: {{ .Values.serviceAccount.node }} - nodeSelector: - kubernetes.io/os: linux -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} -{{- with .Values.linux.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - {{- include "smb.pullSecrets" . | indent 6 }} - containers: - - name: liveness-probe - volumeMounts: - - mountPath: /csi - name: socket-dir -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --http-endpoint=localhost:{{ .Values.node.livenessProbe.healthPort }} - - --v=2 - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - resources: {{- toYaml .Values.linux.resources.livenessProbe | nindent 12 }} - securityContext: - readOnlyRootFilesystem: true - - name: node-driver-registrar -{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- else }} - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- end }} - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock - imagePullPolicy: {{ .Values.image.nodeDriverRegistrar.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: {{- toYaml .Values.linux.resources.nodeDriverRegistrar | nindent 12 }} - - name: smb -{{- if hasPrefix "/" .Values.image.smb.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" -{{- else }} - image: "{{ .Values.image.smb.repository }}:{{ .Values.image.smb.tag }}" -{{- end }} - imagePullPolicy: {{ .Values.image.smb.pullPolicy }} - args: - - "--v={{ .Values.node.logLevel }}" - - "--drivername={{ .Values.driver.name }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--nodeid=$(KUBE_NODE_NAME)" - - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" - - "--krb5-prefix={{ .Values.linux.krb5Prefix }}" - livenessProbe: - failureThreshold: 5 - httpGet: - host: localhost - path: /healthz - port: {{ .Values.node.livenessProbe.healthPort }} - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - securityContext: - readOnlyRootFilesystem: true - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.linux.kubelet }} - mountPropagation: Bidirectional - name: mountpoint-dir -{{- if ne .Values.linux.krb5CacheDirectory "" }} - - mountPath: {{ .Values.linux.kubelet }}/kerberos/ - mountPropagation: Bidirectional - name: krb5Cache-dir -{{- end }} - resources: {{- toYaml .Values.linux.resources.smb | nindent 12 }} - volumes: - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir -{{- if ne .Values.linux.krb5CacheDirectory "" }} - - hostPath: - path: {{ .Values.linux.krb5CacheDirectory }} - type: DirectoryOrCreate - name: krb5Cache-dir -{{- end }} -{{- end -}} diff --git a/charts/v1.15.0/csi-driver-smb/templates/rbac-csi-smb.yaml b/charts/v1.15.0/csi-driver-smb/templates/rbac-csi-smb.yaml deleted file mode 100644 index 03561d1be18..00000000000 --- a/charts/v1.15.0/csi-driver-smb/templates/rbac-csi-smb.yaml +++ /dev/null @@ -1,65 +0,0 @@ -{{- if .Values.serviceAccount.create -}} ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -{{ include "smb.labels" . | indent 2 }} ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -{{ include "smb.labels" . | indent 2 }} -{{ end }} - -{{- if .Values.rbac.create -}} ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: {{ .Values.rbac.name }}-external-provisioner-role -{{ include "smb.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get"] ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-provisioner-binding -{{ include "smb.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-provisioner-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.15.0/csi-driver-smb/values.yaml b/charts/v1.15.0/csi-driver-smb/values.yaml deleted file mode 100644 index 407c4bcb306..00000000000 --- a/charts/v1.15.0/csi-driver-smb/values.yaml +++ /dev/null @@ -1,167 +0,0 @@ -image: - baseRepo: registry.k8s.io/sig-storage - smb: - repository: registry.k8s.io/sig-storage/smbplugin - tag: v1.15.0 - pullPolicy: IfNotPresent - csiProvisioner: - repository: registry.k8s.io/sig-storage/csi-provisioner - tag: v4.0.0 - pullPolicy: IfNotPresent - livenessProbe: - repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.12.0 - pullPolicy: IfNotPresent - nodeDriverRegistrar: - repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.10.0 - pullPolicy: IfNotPresent - csiproxy: - repository: ghcr.io/kubernetes-sigs/sig-windows/csi-proxy - tag: v1.1.2 - pullPolicy: IfNotPresent - -serviceAccount: - create: true # When true, service accounts will be created for you. Set to false if you want to use your own. - controller: csi-smb-controller-sa - node: csi-smb-node-sa - -rbac: - create: true - name: smb - -driver: - name: smb.csi.k8s.io - -feature: - enableGetVolumeStats: true - -controller: - name: csi-smb-controller - replicas: 1 - dnsPolicy: ClusterFirstWithHostNet # available values: Default, ClusterFirstWithHostNet, ClusterFirst - metricsPort: 29644 - livenessProbe: - healthPort: 29642 - runOnMaster: false - runOnControlPlane: false - logLevel: 5 - workingMountDir: "/tmp" - resources: - csiProvisioner: - limits: - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - livenessProbe: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - smb: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/control-plane" - operator: "Exists" - effect: "NoSchedule" - -node: - maxUnavailable: 1 - logLevel: 5 - livenessProbe: - healthPort: 29643 - affinity: {} - nodeSelector: {} - -linux: - enabled: true - dsName: csi-smb-node # daemonset name - dnsPolicy: ClusterFirstWithHostNet # available values: Default, ClusterFirstWithHostNet, ClusterFirst - kubelet: /var/lib/kubelet - krb5CacheDirectory: "" # directory for kerberos credential cache, empty string means default(/var/lib/kubelet/kerberos/) - krb5Prefix: "" # prefix for kerberos credential cache, empty string means default(krb5cc_) - tolerations: - - operator: "Exists" - resources: - livenessProbe: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - nodeDriverRegistrar: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - smb: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - -windows: - enabled: false # Unless you already had csi proxy installed, windows.csiproxy.enabled=true is required - dsName: csi-smb-node-win # daemonset name - kubelet: 'C:\var\lib\kubelet' - removeSMBMappingDuringUnmount: true - tolerations: - - key: "node.kubernetes.io/os" - operator: "Exists" - effect: "NoSchedule" - resources: - livenessProbe: - limits: - memory: 150Mi - requests: - cpu: 10m - memory: 40Mi - nodeDriverRegistrar: - limits: - memory: 150Mi - requests: - cpu: 10m - memory: 40Mi - smb: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 40Mi - csiproxy: - enabled: false # required if windows.enabled is true, but may be installed manually also - dsName: csi-proxy-win # daemonset name - tolerations: {} - affinity: {} - username: "NT AUTHORITY\\SYSTEM" - nodeSelector: - "kubernetes.io/os": windows - -customLabels: {} -## Collection of annotations to add to all the pods -podAnnotations: {} -## Collection of labels to add to all the pods -podLabels: {} -## Leverage a PriorityClass to ensure your pods survive resource shortages -## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ -priorityClassName: system-cluster-critical -## Security context give the opportunity to run container as nonroot by setting a securityContext -## by example : -## securityContext: { runAsUser: 1001 } -securityContext: { seccompProfile: {type: RuntimeDefault} } diff --git a/deploy/v1.15.0/csi-smb-controller.yaml b/deploy/v1.15.0/csi-smb-controller.yaml deleted file mode 100644 index be76a09e557..00000000000 --- a/deploy/v1.15.0/csi-smb-controller.yaml +++ /dev/null @@ -1,111 +0,0 @@ ---- -kind: Deployment -apiVersion: apps/v1 -metadata: - name: csi-smb-controller - namespace: kube-system -spec: - replicas: 1 - selector: - matchLabels: - app: csi-smb-controller - template: - metadata: - labels: - app: csi-smb-controller - spec: - hostNetwork: true - dnsPolicy: ClusterFirstWithHostNet # available values: Default, ClusterFirstWithHostNet, ClusterFirst - serviceAccountName: csi-smb-controller-sa - nodeSelector: - kubernetes.io/os: linux - priorityClassName: system-cluster-critical - securityContext: - seccompProfile: - type: RuntimeDefault - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/control-plane" - operator: "Exists" - effect: "NoSchedule" - containers: - - name: csi-provisioner - image: registry.k8s.io/sig-storage/csi-provisioner:v4.0.0 - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--leader-election-namespace=kube-system" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: - limits: - cpu: 1 - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --http-endpoint=localhost:29642 - - --v=2 - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: - limits: - cpu: 1 - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - - name: smb - image: registry.k8s.io/sig-storage/smbplugin:v1.15.0 - imagePullPolicy: IfNotPresent - args: - - "--v=5" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:29644" - ports: - - containerPort: 29644 - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - host: localhost - path: /healthz - port: 29642 - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - volumes: - - name: socket-dir - emptyDir: {} diff --git a/deploy/v1.15.0/csi-smb-driver.yaml b/deploy/v1.15.0/csi-smb-driver.yaml deleted file mode 100644 index 6450d22b3e9..00000000000 --- a/deploy/v1.15.0/csi-smb-driver.yaml +++ /dev/null @@ -1,8 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: smb.csi.k8s.io -spec: - attachRequired: false - podInfoOnMount: true diff --git a/deploy/v1.15.0/csi-smb-node-windows.yaml b/deploy/v1.15.0/csi-smb-node-windows.yaml deleted file mode 100644 index e1ff65730f1..00000000000 --- a/deploy/v1.15.0/csi-smb-node-windows.yaml +++ /dev/null @@ -1,162 +0,0 @@ ---- -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: csi-smb-node-win - namespace: kube-system -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: 1 - type: RollingUpdate - selector: - matchLabels: - app: csi-smb-node-win - template: - metadata: - labels: - app: csi-smb-node-win - spec: - tolerations: - - key: "node.kubernetes.io/os" - operator: "Exists" - effect: "NoSchedule" - nodeSelector: - kubernetes.io/os: windows - priorityClassName: system-node-critical - securityContext: - seccompProfile: - type: RuntimeDefault - serviceAccountName: csi-smb-node-sa - containers: - - name: liveness-probe - volumeMounts: - - mountPath: C:\csi - name: plugin-dir - image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 - args: - - --csi-address=$(CSI_ENDPOINT) - - --probe-timeout=3s - - --health-port=29643 - - --v=2 - env: - - name: CSI_ENDPOINT - value: unix://C:\\csi\\csi.sock - resources: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 40Mi - - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0 - args: - - --v=2 - - --csi-address=$(CSI_ENDPOINT) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - livenessProbe: - exec: - command: - - /csi-node-driver-registrar.exe - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --mode=kubelet-registration-probe - initialDelaySeconds: 60 - timeoutSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix://C:\\csi\\csi.sock - - name: DRIVER_REG_SOCK_PATH - value: C:\\var\\lib\\kubelet\\plugins\\smb.csi.k8s.io\\csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - fieldPath: spec.nodeName - volumeMounts: - - name: kubelet-dir - mountPath: "C:\\var\\lib\\kubelet" - - name: plugin-dir - mountPath: C:\csi - - name: registration-dir - mountPath: C:\registration - resources: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 40Mi - - name: smb - image: registry.k8s.io/sig-storage/smbplugin:v1.15.0 - imagePullPolicy: IfNotPresent - args: - - --v=5 - - --endpoint=$(CSI_ENDPOINT) - - --nodeid=$(KUBE_NODE_NAME) - - "--remove-smb-mapping-during-unmount=true" - ports: - - containerPort: 29643 - name: healthz - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix://C:\\csi\\csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - volumeMounts: - - name: kubelet-dir - mountPath: "C:\\var\\lib\\kubelet" - - name: plugin-dir - mountPath: C:\csi - - name: csi-proxy-fs-pipe-v1 - mountPath: \\.\pipe\csi-proxy-filesystem-v1 - - name: csi-proxy-smb-pipe-v1 - mountPath: \\.\pipe\csi-proxy-smb-v1 - # these paths are still included for compatibility, they're used - # only if the node has still the beta version of the CSI proxy - - name: csi-proxy-fs-pipe-v1beta1 - mountPath: \\.\pipe\csi-proxy-filesystem-v1beta1 - - name: csi-proxy-smb-pipe-v1beta1 - mountPath: \\.\pipe\csi-proxy-smb-v1beta1 - resources: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 40Mi - volumes: - - name: csi-proxy-fs-pipe-v1 - hostPath: - path: \\.\pipe\csi-proxy-filesystem-v1 - - name: csi-proxy-smb-pipe-v1 - hostPath: - path: \\.\pipe\csi-proxy-smb-v1 - # these paths are still included for compatibility, they're used - # only if the node has still the beta version of the CSI proxy - - name: csi-proxy-fs-pipe-v1beta1 - hostPath: - path: \\.\pipe\csi-proxy-filesystem-v1beta1 - - name: csi-proxy-smb-pipe-v1beta1 - hostPath: - path: \\.\pipe\csi-proxy-smb-v1beta1 - - name: registration-dir - hostPath: - path: C:\var\lib\kubelet\plugins_registry\ - type: Directory - - name: kubelet-dir - hostPath: - path: C:\var\lib\kubelet\ - type: Directory - - name: plugin-dir - hostPath: - path: C:\var\lib\kubelet\plugins\smb.csi.k8s.io\ - type: DirectoryOrCreate diff --git a/deploy/v1.15.0/csi-smb-node.yaml b/deploy/v1.15.0/csi-smb-node.yaml deleted file mode 100644 index 92caa1e5137..00000000000 --- a/deploy/v1.15.0/csi-smb-node.yaml +++ /dev/null @@ -1,129 +0,0 @@ ---- -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: csi-smb-node - namespace: kube-system -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: 1 - type: RollingUpdate - selector: - matchLabels: - app: csi-smb-node - template: - metadata: - labels: - app: csi-smb-node - spec: - hostNetwork: true - dnsPolicy: ClusterFirstWithHostNet # available values: Default, ClusterFirstWithHostNet, ClusterFirst - serviceAccountName: csi-smb-node-sa - nodeSelector: - kubernetes.io/os: linux - priorityClassName: system-node-critical - securityContext: - seccompProfile: - type: RuntimeDefault - tolerations: - - operator: "Exists" - containers: - - name: liveness-probe - volumeMounts: - - mountPath: /csi - name: socket-dir - image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --http-endpoint=localhost:29643 - - --v=2 - resources: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0 - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: /var/lib/kubelet/plugins/smb.csi.k8s.io/csi.sock - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - - name: smb - image: registry.k8s.io/sig-storage/smbplugin:v1.15.0 - imagePullPolicy: IfNotPresent - args: - - "--v=5" - - "--endpoint=$(CSI_ENDPOINT)" - - "--nodeid=$(KUBE_NODE_NAME)" - livenessProbe: - failureThreshold: 5 - httpGet: - host: localhost - path: /healthz - port: 29643 - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: /var/lib/kubelet/ - mountPropagation: Bidirectional - name: mountpoint-dir - resources: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - volumes: - - hostPath: - path: /var/lib/kubelet/plugins/smb.csi.k8s.io - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: /var/lib/kubelet/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: /var/lib/kubelet/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir ---- diff --git a/deploy/v1.15.0/rbac-csi-smb.yaml b/deploy/v1.15.0/rbac-csi-smb.yaml deleted file mode 100644 index fc1f03ffa79..00000000000 --- a/deploy/v1.15.0/rbac-csi-smb.yaml +++ /dev/null @@ -1,56 +0,0 @@ ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-smb-controller-sa - namespace: kube-system ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-smb-node-sa - namespace: kube-system ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: smb-external-provisioner-role -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get"] ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: smb-csi-provisioner-binding -subjects: - - kind: ServiceAccount - name: csi-smb-controller-sa - namespace: kube-system -roleRef: - kind: ClusterRole - name: smb-external-provisioner-role - apiGroup: rbac.authorization.k8s.io diff --git a/docs/install-csi-driver-v1.15.0.md b/docs/install-csi-driver-v1.15.0.md deleted file mode 100644 index 5ebbe2b5d2c..00000000000 --- a/docs/install-csi-driver-v1.15.0.md +++ /dev/null @@ -1,45 +0,0 @@ -## Install SMB CSI driver v1.15.0 version on a Kubernetes cluster -If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). - -### Install by kubectl - - Option#1. remote install -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/v1.15.0/deploy/install-driver.sh | bash -s v1.15.0 -- -``` - - - Option#2. local install -```console -git clone https://github.com/kubernetes-csi/csi-driver-smb.git -cd csi-driver-smb -git checkout v1.15.0 -./deploy/install-driver.sh v1.15.0 local -``` - - - check pods status: -```console -kubectl -n kube-system get pod -o wide --watch -l app=csi-smb-controller -kubectl -n kube-system get pod -o wide --watch -l app=csi-smb-node -``` - -example output: - -``` -NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES -csi-smb-controller-788486959d-5qmn7 3/3 Running 0 23s 10.244.0.45 aks-agentpool-60632172-vmss000006 -csi-smb-node-4gwzl 3/3 Running 0 15s 10.244.1.34 aks-agentpool-60632172-vmss000007 -csi-smb-node-hg76w 3/3 Running 0 27s 10.244.0.44 aks-agentpool-60632172-vmss000006 -``` - -### clean up SMB CSI driver - - Option#1. remote uninstall -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-csi/csi-driver-smb/v1.15.0/deploy/uninstall-driver.sh | bash -s -- -``` - - - Option#2. local uninstall -```console -git clone https://github.com/kubernetes-csi/csi-driver-smb.git -cd csi-driver-smb -git checkout v1.15.0 -./deploy/uninstall-driver.sh v1.15.0 local -``` diff --git a/docs/install-smb-csi-driver.md b/docs/install-smb-csi-driver.md index e05aafc2823..68da2f506de 100644 --- a/docs/install-smb-csi-driver.md +++ b/docs/install-smb-csi-driver.md @@ -1,6 +1,5 @@ ## Install SMB CSI driver on a Kubernetes cluster - [install CSI driver master version](./install-csi-driver-master.md)(only for testing purpose) - - [install CSI driver v1.15.0 version](./install-csi-driver-v1.15.0.md) - [install CSI driver v1.14.0 version](./install-csi-driver-v1.14.0.md) - [install CSI driver v1.13.0 version](./install-csi-driver-v1.13.0.md)