From ab7a57d1cf767d2d54a94a591d7fe77522de7ea6 Mon Sep 17 00:00:00 2001 From: Michael Edegware Date: Wed, 12 May 2021 07:56:41 -0400 Subject: [PATCH] Inject sidecar in PowerMax (#86) * merging all commmits to one to prevent having changes from main * file changes form testing * commit test updates (#94) * Updated spec to next release version (#96) * sanitize and introduced new test cases * merging all commits to one to prevent having changes from main * file changes form testing * sanitize and introduced new test cases * adds insecure flag * removes error * removes changes * debugging * fixes failing test Co-authored-by: sharmilarama <72404078+sharmilarama@users.noreply.github.com> Co-authored-by: Trevor Dawe --- cmd/karavictl/cmd/inject.go | 732 ++++++-- cmd/karavictl/cmd/inject_test.go | 246 ++- .../kubectl_get_all_in_ns_without_karavi.yaml | 1324 -------------- .../kubectl_get_all_in_powermax_new.yaml | 1166 +++++++++++++ .../kubectl_get_all_in_powermax_update.yaml | 1530 +++++++++++++++++ .../testdata/kubectl_get_all_in_vxflexos.yaml | 1037 +++++++++++ cmd/proxy-server/main.go | 2 +- docs/GETTING_STARTED_GUIDE.md | 2 +- docs/TROUBLESHOOTING.md | 39 +- internal/proxy/powermax_handler.go | 33 +- internal/proxy/powermax_handler_test.go | 30 +- internal/web/client_install_handler.go | 52 +- internal/web/client_install_handler_test.go | 14 + policies/powermax_url.rego | 35 +- 14 files changed, 4696 insertions(+), 1546 deletions(-) delete mode 100644 cmd/karavictl/cmd/testdata/kubectl_get_all_in_ns_without_karavi.yaml create mode 100644 cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_new.yaml create mode 100644 cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_update.yaml create mode 100644 cmd/karavictl/cmd/testdata/kubectl_get_all_in_vxflexos.yaml diff --git a/cmd/karavictl/cmd/inject.go b/cmd/karavictl/cmd/inject.go index bf207f02..599411df 100644 --- a/cmd/karavictl/cmd/inject.go +++ b/cmd/karavictl/cmd/inject.go @@ -25,6 +25,8 @@ import ( "log" "os" "path/filepath" + "strconv" + "strings" "github.com/spf13/cobra" appsv1 "k8s.io/api/apps/v1" @@ -35,12 +37,6 @@ import ( "sigs.k8s.io/yaml" ) -// Common constants. -const ( - CSIDriverContainerName = "driver" - CSIDriverEndpointEnvName = "X_CSI_VXFLEXOS_ENDPOINT" -) - // NewInjectCmd creates a new inject command func NewInjectCmd() *cobra.Command { injectCmd := &cobra.Command{ @@ -56,8 +52,9 @@ func NewInjectCmd() *cobra.Command { Examples: # Inject into an existing vxflexos CSI driver kubectl get secrets,deployments,daemonsets -n vxflexos -o yaml \ - | karavictl inject --image-addr 10.0.0.1:5000/sidecar-proxy:latest --proxy-host 10.0.0.1 \ - | kubectl apply -f -`, + | karavictl inject --image-addr 10.0.0.1:5000/sidecar-proxy:latest --proxy-host 10.0.0.1\ + | kubectl apply -f - + `, Run: func(cmd *cobra.Command, args []string) { info, err := os.Stdin.Stat() if err != nil { @@ -89,6 +86,16 @@ func NewInjectCmd() *cobra.Command { log.Fatal(err) } + proxyPortFlags, err := cmd.Flags().GetStringSlice("proxy-port") + if err != nil { + log.Fatal(err) + } + + portRanges, err := getStartingPortRanges(proxyPortFlags) + if err != nil { + log.Fatal(err) + } + buf := bufio.NewReaderSize(os.Stdin, 4096) reader := yamlDecoder.NewYAMLReader(buf) @@ -110,11 +117,12 @@ func NewInjectCmd() *cobra.Command { var resource interface{} switch meta.Kind { case "List": - resource, err = injectUsingList(bytes, imageAddr, proxyHost, rootCertificate, insecure) + resource, err = injectUsingList(bytes, imageAddr, proxyHost, rootCertificate, portRanges, insecure) if err != nil { fmt.Fprintf(os.Stderr, "error: %+v\n", err) return } + default: fmt.Fprintln(os.Stderr, "This command works with a List of Kubernetes resources from within a CSI driver namespace.") return @@ -132,10 +140,11 @@ func NewInjectCmd() *cobra.Command { injectCmd.Flags().String("image-addr", "", "Help message for image-addr") injectCmd.Flags().Bool("insecure", false, "Allow insecure connections from sidecar-proxy to proxy-server (default: false)") injectCmd.Flags().String("root-certificate", "", "The root certificate file used by the proxy server") + injectCmd.Flags().StringSlice("proxy-port", []string{}, "proxy start port in the form =") return injectCmd } -func buildProxyContainer(imageAddr, proxyHost string, insecure bool) *corev1.Container { +func buildProxyContainer(ns, configName, imageAddr, proxyHost string, insecure bool) *corev1.Container { proxyContainer := corev1.Container{ Image: imageAddr, Name: "karavi-authorization-proxy", @@ -151,7 +160,7 @@ func buildProxyContainer(imageAddr, proxyHost string, insecure bool) *corev1.Con }, corev1.EnvVar{ Name: "PLUGIN_IDENTIFIER", - Value: "csi-vxflexos", // TODO(ian): Get this dynamically; can we rely on the namespace name? + Value: ns, }, corev1.EnvVar{ Name: "ACCESS_TOKEN", @@ -177,7 +186,7 @@ func buildProxyContainer(imageAddr, proxyHost string, insecure bool) *corev1.Con VolumeMounts: []corev1.VolumeMount{ corev1.VolumeMount{ MountPath: "/etc/karavi-authorization/config", - Name: "vxflexos-config", + Name: configName, }, corev1.VolumeMount{ MountPath: "/etc/karavi-authorization/root-certificates", @@ -189,7 +198,25 @@ func buildProxyContainer(imageAddr, proxyHost string, insecure bool) *corev1.Con return &proxyContainer } -// ListChange holds a k8s list and a modified version of said list +const ( + // DefaultStartingPortRange is the starting port number + DefaultStartingPortRange = 9000 +) + +// ListChangeForMultiArray holds a k8s list and a modified version of said list +type ListChangeForMultiArray struct { + *ListChange + StartingPortRange int +} + +// ListChangeForPowerMax holds a k8s list and a modified version of said list for powermax +type ListChangeForPowerMax struct { + *ListChange + Endpoint string // only useful for powermax + StartingPortRange int +} + +//ListChange holds a k8s list and a modified version of said list type ListChange struct { Existing *corev1.List Modified *corev1.List @@ -202,9 +229,16 @@ type ListChange struct { type Resources struct { Deployment string DaemonSet string + Secret string +} + +// ListChanger is an interface for changes needed in a list +type ListChanger interface { + // Change modifies the resources for ListChangeForMultiArray or ListChangeForPowerMax + Change(existing *corev1.List, imageAddr, proxyHost, rootCertificate string, insecure bool) (*corev1.List, error) } -// NewListChange returns a new ListChange from a k8s list +// NewListChange returns a new ListChangeForMultiArray from a k8s list func NewListChange(existing *corev1.List) *ListChange { return &ListChange{ Existing: existing, @@ -217,7 +251,7 @@ func NewListChange(existing *corev1.List) *ListChange { } } -func injectUsingList(b []byte, imageAddr, proxyHost, rootCertificate string, insecure bool) (*corev1.List, error) { +func injectUsingList(b []byte, imageAddr, proxyHost, rootCertificate string, startingPortRange map[string]int, insecure bool) (*corev1.List, error) { var l corev1.List err := yaml.Unmarshal(b, &l) @@ -227,21 +261,44 @@ func injectUsingList(b []byte, imageAddr, proxyHost, rootCertificate string, ins // TODO(ian): Determine CSI driver type: vxflexos, powerscale, etc.? // The configs are assumed to contain the type, e.g. "vxflexos-config". + var change ListChanger + if strings.Contains(string(b), "powermax") { + change = &ListChangeForPowerMax{StartingPortRange: startingPortRange["powermax"]} + } else { + change = &ListChangeForMultiArray{StartingPortRange: startingPortRange["powerflex"]} + } + + return change.Change(&l, imageAddr, proxyHost, rootCertificate, insecure) + +} + +// Change modifies the resources for ListChangeForPowerMax +func (lc *ListChangeForPowerMax) Change(existing *corev1.List, imageAddr, proxyHost, rootCertificate string, insecure bool) (*corev1.List, error) { + lc.ListChange = NewListChange(existing) + lc.setInjectedResources() + lc.injectRootCertificate(rootCertificate) + lc.injectKaraviSecret(insecure) + lc.injectIntoDeployment(imageAddr, proxyHost, insecure) + lc.injectIntoDaemonset(imageAddr, proxyHost, insecure) + return lc.ListChange.Modified, lc.ListChange.Err +} - change := NewListChange(&l) +// Change modifies the resources for ListChangeForMultiArray +func (lc *ListChangeForMultiArray) Change(existing *corev1.List, imageAddr, proxyHost, rootCertificate string, insecure bool) (*corev1.List, error) { + lc.ListChange = NewListChange(existing) // Determine what we are injecting the sidecar into (e.g. powerflex csi driver, observability, etc) - change.setInjectedResources() + lc.setInjectedResources() // Inject the rootCA certificate as a Secret - change.injectRootCertificate(rootCertificate) + lc.injectRootCertificate(rootCertificate) // Inject our own secret based on the original config. - change.injectKaraviSecret() + lc.injectKaraviSecret() // Inject the sidecar proxy into the Deployment and update // the config volume to point to our own secret. - change.injectIntoDeployment(imageAddr, proxyHost, insecure) + lc.injectIntoDeployment(imageAddr, proxyHost, insecure) // Inject into the Daemonset. - change.injectIntoDaemonset(imageAddr, proxyHost, insecure) + lc.injectIntoDaemonset(imageAddr, proxyHost, insecure) - return change.Modified, change.Err + return lc.ListChange.Modified, lc.ListChange.Err } func (lc *ListChange) setInjectedResources() { @@ -257,12 +314,22 @@ func (lc *ListChange) setInjectedResources() { lc.InjectResources = &Resources{ Deployment: "vxflexos-controller", DaemonSet: "vxflexos-node", + Secret: "vxflexos-config", } lc.Namespace = deployments["vxflexos-controller"].Namespace + // injecting into powermax csi driver + case deployments["powermax-controller"] != nil: + lc.InjectResources = &Resources{ + Deployment: "powermax-controller", + DaemonSet: "powermax-node", + Secret: "powermax-creds", + } + lc.Namespace = deployments["powermax-controller"].Namespace // injecting into observability case deployments["karavi-metrics-powerflex"] != nil: lc.InjectResources = &Resources{ Deployment: "karavi-metrics-powerflex", + Secret: "vxflexos-config", } lc.Namespace = deployments["karavi-metrics-powerflex"].Namespace default: @@ -315,11 +382,64 @@ func (lc *ListChange) injectRootCertificate(rootCertificate string) { lc.Modified.Items = append(lc.Modified.Items, raw) } -func (lc *ListChange) injectKaraviSecret() { +// GetCommandEnv get environment variable for powerflex deployment +func (lc *ListChangeForPowerMax) GetCommandEnv(deploy *appsv1.Deployment, s *corev1.Secret, insecure bool) ([]SecretData, error) { + + endpoint := "" + systemIDs := "" + + foundEndpoint := false + for _, c := range deploy.Spec.Template.Spec.Containers { + if c.Name == "driver" { + for _, e := range c.Env { + if e.Name == "CSM_CSI_POWERMAX_ENDPOINT" { + endpoint = e.Value + foundEndpoint = true + break + } + } + break + } + } + + for _, c := range deploy.Spec.Template.Spec.Containers { + if c.Name == "driver" { + for _, e := range c.Env { + if e.Name == "X_CSI_POWERMAX_ENDPOINT" { + if !foundEndpoint { + endpoint = e.Value + foundEndpoint = true + } + } + if e.Name == "X_CSI_POWERMAX_ARRAYS" { + systemIDs = e.Value + } + } + break + } + } + + if endpoint == "" || systemIDs == "" { + return nil, errors.New("could not find endpoint or system ID") + } + + return []SecretData{{Endpoint: endpoint, + Username: string(s.Data["username"][:]), + Password: string(s.Data["password"][:]), + SystemID: systemIDs, + Insecure: insecure}, + }, nil +} + +func (lc *ListChangeForMultiArray) injectKaraviSecret() { if lc.Err != nil { return } + if lc.InjectResources.Secret == "" { + return + } + // Extract all of the Secret resources. secrets, err := buildMapOfSecretsFromList(lc.Existing) if err != nil { @@ -328,7 +448,7 @@ func (lc *ListChange) injectKaraviSecret() { } // Pick out the config. - configSecret, ok := secrets["vxflexos-config"] + configSecret, ok := secrets[lc.InjectResources.Secret] if !ok { lc.Err = errors.New("config secret not found") return @@ -342,7 +462,7 @@ func (lc *ListChange) injectKaraviSecret() { } // Copy the config data and convert endpoints to localhost: - configSecData = convertEndpoints(configSecData, 9000) + configSecData = convertEndpoints(configSecData, lc.StartingPortRange) configSecData = scrubLoginCredentials(configSecData) configSecDataJSON, err := json.Marshal(&configSecData) if err != nil { @@ -378,140 +498,235 @@ func (lc *ListChange) injectKaraviSecret() { lc.Modified.Items = append(lc.Modified.Items, raw) } -func buildMapOfDeploymentsFromList(list *corev1.List) (map[string]*appsv1.Deployment, error) { - ret := make(map[string]*appsv1.Deployment) +func (lc *ListChangeForPowerMax) injectKaraviSecret(insecure bool) { + if lc.Err != nil { + return + } - for _, v := range list.Items { - var meta metav1.TypeMeta - err := yaml.Unmarshal(v.Raw, &meta) - if err != nil { - return nil, err - } + if lc.InjectResources.Secret == "" { + return + } - switch meta.Kind { - case "Deployment": - var deploy appsv1.Deployment - err := yaml.Unmarshal(v.Raw, &deploy) - if err != nil { - return nil, err - } - ret[deploy.Name] = &deploy - } + // Extract all of the Secret resources. + secrets, err := buildMapOfSecretsFromList(lc.Existing) + if err != nil { + lc.Err = fmt.Errorf("building secret map: %w", err) + return } - return ret, nil -} + // Pick out the config. + configSecret, ok := secrets[lc.InjectResources.Secret] + if !ok { + lc.Err = errors.New("config secret not found") + return + } -func buildMapOfDaemonsetsFromList(list *corev1.List) (map[string]*appsv1.DaemonSet, error) { - ret := make(map[string]*appsv1.DaemonSet) + // Get the config data. + m, err := buildMapOfDeploymentsFromList(lc.Existing) + if err != nil { + lc.Err = err + return + } - for _, v := range list.Items { - var meta metav1.TypeMeta - err := yaml.Unmarshal(v.Raw, &meta) - if err != nil { - return nil, err - } + deploy, ok := m[lc.InjectResources.Deployment] + if !ok { + lc.Err = errors.New("deployment not found") + return + } - switch meta.Kind { - case "DaemonSet": - var ds appsv1.DaemonSet - err := yaml.Unmarshal(v.Raw, &ds) - if err != nil { - return nil, err - } - ret[ds.Name] = &ds - } + configSecData, err := lc.GetCommandEnv(deploy, configSecret, insecure) + if err != nil { + lc.Err = fmt.Errorf("getting command env: %w", err) + return } - return ret, nil + // Copy the config data and convert endpoints to localhost: + configSecData = convertEndpoints(configSecData, lc.StartingPortRange) + configSecData = scrubLoginCredentials(configSecData) + configSecDataJSON, err := json.Marshal(&configSecData) + if err != nil { + lc.Err = err + return + } + + lc.Endpoint = configSecData[0].Endpoint + + // Create the Karavi config Secret, containing this new data. + newSecret := corev1.Secret{ + ObjectMeta: metav1.ObjectMeta{ + Name: "karavi-authorization-config", + Namespace: configSecret.Namespace, + }, + TypeMeta: metav1.TypeMeta{ + APIVersion: configSecret.APIVersion, + Kind: "Secret", + }, + Type: "Opaque", + Data: map[string][]byte{ + "config": []byte(configSecDataJSON), + }, + } + + // Append it to the list of items. + enc, err := json.Marshal(&newSecret) + if err != nil { + lc.Err = err + return + } + raw := runtime.RawExtension{ + Raw: enc, + } + lc.Modified.Items = append(lc.Modified.Items, raw) } -func buildMapOfSecretsFromList(list *corev1.List) (map[string]*corev1.Secret, error) { - ret := make(map[string]*corev1.Secret) +func (lc *ListChangeForPowerMax) injectIntoDeployment(imageAddr, proxyHost string, insecure bool) { + if lc.Err != nil { + return + } - for _, v := range list.Items { - var meta metav1.TypeMeta - err := yaml.Unmarshal(v.Raw, &meta) - if err != nil { - return nil, err + if lc.ListChange.InjectResources.Deployment == "" { + return + } + + m, err := buildMapOfDeploymentsFromList(lc.ListChange.Existing) + if err != nil { + lc.Err = err + return + } + + deploy, ok := m[lc.ListChange.InjectResources.Deployment] + if !ok { + lc.Err = errors.New("deployment not found") + return + } + + secretName := "karavi-authorization-config" + authVolume := corev1.Volume{} + authVolume.Name = "karavi-authorization-config" + authVolume.Secret = &corev1.SecretVolumeSource{ + SecretName: secretName, + } + deploy.Spec.Template.Spec.Volumes = append(deploy.Spec.Template.Spec.Volumes, authVolume) + + rootCertificateMounted := false + volumes := deploy.Spec.Template.Spec.Volumes + for _, v := range volumes { + if v.Name == "proxy-server-root-certificate" { + rootCertificateMounted = true + break } + } - switch meta.Kind { - case "Secret": - var secret corev1.Secret - err := yaml.Unmarshal(v.Raw, &secret) - if err != nil { - return nil, err - } - ret[secret.Name] = &secret + if !rootCertificateMounted { + rootCertificateVolume := corev1.Volume{} + rootCertificateVolume.Name = "proxy-server-root-certificate" + rootCertificateVolume.Secret = &corev1.SecretVolumeSource{ + SecretName: "proxy-server-root-certificate", } + deploy.Spec.Template.Spec.Volumes = append(deploy.Spec.Template.Spec.Volumes, rootCertificateVolume) } - return ret, nil -} + containers := deploy.Spec.Template.Spec.Containers -// SecretData holds k8s secret data for a backend storage system -type SecretData struct { - Username string `json:"username"` - Password string `json:"password"` - IntendedEndpoint string `json:"intendedEndpoint"` - Endpoint string `json:"endpoint"` - SystemID string `json:"systemID"` - Insecure bool `json:"insecure"` - IsDefault bool `json:"isDefault"` -} + // Remove any existing proxy containers... + for i, c := range containers { + if c.Name == "karavi-authorization-proxy" { + containers = append(containers[:i], containers[i+1:]...) + } + } -func getSecretData(s *corev1.Secret) ([]SecretData, error) { - data, ok := s.Data["config"] - if !ok { - return nil, errors.New("missing config key") + var endpoint string + for i, c := range containers { + if c.Name == "driver" { + commandEnvFlag := false + for j, e := range c.Env { + if e.Name == "X_CSI_POWERMAX_ENDPOINT" { + endpoint = containers[i].Env[j].Value + containers[i].Env[j].Value = lc.Endpoint + commandEnvFlag = true + + } + } + if !commandEnvFlag { + lc.Err = errors.New("X_CSI_POWERMAX_ENDPOINT not found") + return + } + break + } } - var ret []SecretData - err := json.NewDecoder(bytes.NewReader(data)).Decode(&ret) - if err != nil { - return nil, fmt.Errorf("decoding secret data json: %w", err) + for i, c := range containers { + if c.Name == "driver" { + foundEndpoint := false + for _, e := range c.Env { + if e.Name == "CSM_CSI_POWERMAX_ENDPOINT" { + foundEndpoint = true + break + } + } + if !foundEndpoint { + containers[i].Env = append(containers[i].Env, corev1.EnvVar{ + Name: "CSM_CSI_POWERMAX_ENDPOINT", + Value: endpoint, + }) + } + break + } } - return ret, nil -} + // Add a new proxy container... + proxyContainer := buildProxyContainer(deploy.Namespace, secretName, imageAddr, proxyHost, insecure) + containers = append(containers, *proxyContainer) + deploy.Spec.Template.Spec.Containers = containers -func convertEndpoints(s []SecretData, startingPortRange int) []SecretData { - var ret []SecretData - for _, v := range s { - v.IntendedEndpoint = v.Endpoint - v.Endpoint = fmt.Sprintf("https://localhost:%d", startingPortRange) - startingPortRange++ - ret = append(ret, v) + deploy.Annotations["com.dell.karavi-authorization-proxy"] = "true" + + // Add the extra-create-metadata flag to provisioner if it does not exist + if deploy.Name == lc.InjectResources.Deployment { + provisionerMetaDataFlag := false + for i, c := range deploy.Spec.Template.Spec.Containers { + if c.Name == "provisioner" { + for _, a := range c.Args { + if a == "--extra-create-metadata" { + provisionerMetaDataFlag = true + break + } + } + if !provisionerMetaDataFlag { + deploy.Spec.Template.Spec.Containers[i].Args = append(deploy.Spec.Template.Spec.Containers[i].Args, "--extra-create-metadata") + } + } + } } - return ret -} -func scrubLoginCredentials(s []SecretData) []SecretData { - var ret []SecretData - for _, v := range s { - v.Username, v.Password = "-", "-" - ret = append(ret, v) + // Append it to the list of items. + enc, err := json.Marshal(&deploy) + if err != nil { + lc.Err = err + return } - return ret + raw := runtime.RawExtension{ + Raw: enc, + } + lc.Modified.Items = append(lc.Modified.Items, raw) } -func (lc *ListChange) injectIntoDeployment(imageAddr, proxyHost string, insecure bool) { +func (lc *ListChangeForMultiArray) injectIntoDeployment(imageAddr, proxyHost string, insecure bool) { if lc.Err != nil { return } - if lc.InjectResources.Deployment == "" { + if lc.ListChange.InjectResources.Deployment == "" { return } - m, err := buildMapOfDeploymentsFromList(lc.Existing) + m, err := buildMapOfDeploymentsFromList(lc.ListChange.Existing) if err != nil { lc.Err = err return } - deploy, ok := m[lc.InjectResources.Deployment] + deploy, ok := m[lc.ListChange.InjectResources.Deployment] if !ok { lc.Err = errors.New("deployment not found") return @@ -519,7 +734,7 @@ func (lc *ListChange) injectIntoDeployment(imageAddr, proxyHost string, insecure volumes := deploy.Spec.Template.Spec.Volumes for i, v := range volumes { - if v.Name != "vxflexos-config" { + if v.Name != lc.InjectResources.Secret { continue } volumes[i].Secret.SecretName = "karavi-authorization-config" @@ -552,14 +767,14 @@ func (lc *ListChange) injectIntoDeployment(imageAddr, proxyHost string, insecure } // Add a new proxy container... - proxyContainer := buildProxyContainer(imageAddr, proxyHost, insecure) + proxyContainer := buildProxyContainer(deploy.Namespace, lc.InjectResources.Secret, imageAddr, proxyHost, insecure) containers = append(containers, *proxyContainer) deploy.Spec.Template.Spec.Containers = containers deploy.Annotations["com.dell.karavi-authorization-proxy"] = "true" // Add the extra-create-metadata flag to provisioner if it does not exist - if deploy.Name == "vxflexos-controller" { + if deploy.Name == lc.InjectResources.Deployment { provisionerMetaDataFlag := false for i, c := range deploy.Spec.Template.Spec.Containers { if c.Name == "provisioner" { @@ -588,7 +803,98 @@ func (lc *ListChange) injectIntoDeployment(imageAddr, proxyHost string, insecure lc.Modified.Items = append(lc.Modified.Items, raw) } -func (lc *ListChange) injectIntoDaemonset(imageAddr, proxyHost string, insecure bool) { +func (lc *ListChangeForPowerMax) injectIntoDaemonset(imageAddr, proxyHost string, insecure bool) { + if lc.Err != nil { + return + } + + if lc.InjectResources.DaemonSet == "" { + return + } + + m, err := buildMapOfDaemonsetsFromList(lc.Existing) + if err != nil { + lc.Err = err + return + } + + ds, ok := m[lc.InjectResources.DaemonSet] + if !ok { + lc.Err = errors.New("daemonset not found") + return + } + + secretName := "karavi-authorization-config" + authVolume := corev1.Volume{} + authVolume.Name = "karavi-authorization-config" + authVolume.Secret = &corev1.SecretVolumeSource{ + SecretName: secretName, + } + ds.Spec.Template.Spec.Volumes = append(ds.Spec.Template.Spec.Volumes, authVolume) + + volumes := ds.Spec.Template.Spec.Volumes + rootCertificateMounted := false + for _, v := range volumes { + if v.Name == "proxy-server-root-certificate" { + rootCertificateMounted = true + break + } + } + + if !rootCertificateMounted { + rootCertificateVolume := corev1.Volume{} + rootCertificateVolume.Name = "proxy-server-root-certificate" + rootCertificateVolume.Secret = &corev1.SecretVolumeSource{ + SecretName: "proxy-server-root-certificate", + } + ds.Spec.Template.Spec.Volumes = append(ds.Spec.Template.Spec.Volumes, rootCertificateVolume) + } + + containers := ds.Spec.Template.Spec.Containers + + // Remove any existing proxy containers... + for i, c := range containers { + if c.Name == "karavi-authorization-proxy" { + containers = append(containers[:i], containers[i+1:]...) + } + } + + for i, c := range containers { + if c.Name == "driver" { + commandEnvFlag := false + for j, e := range c.Env { + if e.Name == "X_CSI_POWERMAX_ENDPOINT" { + containers[i].Env[j].Value = lc.Endpoint + commandEnvFlag = true + } + } + if !commandEnvFlag { + lc.Err = errors.New("X_CSI_POWERMAX_ENDPOINT not found") + return + } + break + } + } + + proxyContainer := buildProxyContainer(ds.Namespace, secretName, imageAddr, proxyHost, insecure) + containers = append(containers, *proxyContainer) + ds.Spec.Template.Spec.Containers = containers + + ds.Annotations["com.dell.karavi-authorization-proxy"] = "true" + + // Append it to the list of items. + enc, err := json.Marshal(&ds) + if err != nil { + lc.Err = err + return + } + raw := runtime.RawExtension{ + Raw: enc, + } + lc.Modified.Items = append(lc.Modified.Items, raw) +} + +func (lc *ListChangeForMultiArray) injectIntoDaemonset(imageAddr, proxyHost string, insecure bool) { if lc.Err != nil { return } @@ -611,7 +917,7 @@ func (lc *ListChange) injectIntoDaemonset(imageAddr, proxyHost string, insecure volumes := ds.Spec.Template.Spec.Volumes for i, v := range volumes { - if v.Name != "vxflexos-config" { + if v.Name != lc.InjectResources.Secret { continue } volumes[i].Secret.SecretName = "karavi-authorization-config" @@ -643,7 +949,7 @@ func (lc *ListChange) injectIntoDaemonset(imageAddr, proxyHost string, insecure } } - proxyContainer := buildProxyContainer(imageAddr, proxyHost, insecure) + proxyContainer := buildProxyContainer(ds.Namespace, lc.InjectResources.Secret, imageAddr, proxyHost, insecure) containers = append(containers, *proxyContainer) ds.Spec.Template.Spec.Containers = containers @@ -660,3 +966,181 @@ func (lc *ListChange) injectIntoDaemonset(imageAddr, proxyHost string, insecure } lc.Modified.Items = append(lc.Modified.Items, raw) } + +func buildMapOfDeploymentsFromList(list *corev1.List) (map[string]*appsv1.Deployment, error) { + ret := make(map[string]*appsv1.Deployment) + + for _, v := range list.Items { + var meta metav1.TypeMeta + err := yaml.Unmarshal(v.Raw, &meta) + if err != nil { + return nil, err + } + + switch meta.Kind { + case "Deployment": + var deploy appsv1.Deployment + err := yaml.Unmarshal(v.Raw, &deploy) + if err != nil { + return nil, err + } + ret[deploy.Name] = &deploy + } + } + + return ret, nil +} + +func buildMapOfDaemonsetsFromList(list *corev1.List) (map[string]*appsv1.DaemonSet, error) { + ret := make(map[string]*appsv1.DaemonSet) + + for _, v := range list.Items { + var meta metav1.TypeMeta + err := yaml.Unmarshal(v.Raw, &meta) + if err != nil { + return nil, err + } + + switch meta.Kind { + case "DaemonSet": + var ds appsv1.DaemonSet + err := yaml.Unmarshal(v.Raw, &ds) + if err != nil { + return nil, err + } + ret[ds.Name] = &ds + } + } + + return ret, nil +} + +func buildMapOfSecretsFromList(list *corev1.List) (map[string]*corev1.Secret, error) { + ret := make(map[string]*corev1.Secret) + + for _, v := range list.Items { + var meta metav1.TypeMeta + err := yaml.Unmarshal(v.Raw, &meta) + if err != nil { + return nil, err + } + + switch meta.Kind { + case "Secret": + var secret corev1.Secret + err := yaml.Unmarshal(v.Raw, &secret) + if err != nil { + return nil, err + } + ret[secret.Name] = &secret + } + } + + return ret, nil +} + +// SecretData holds k8s secret data for a backend storage system +type SecretData struct { + Username string `json:"username"` + Password string `json:"password"` + IntendedEndpoint string `json:"intendedEndpoint"` + Endpoint string `json:"endpoint"` + SystemID string `json:"systemID"` + Insecure bool `json:"insecure"` + IsDefault bool `json:"isDefault"` +} + +func getSecretData(s *corev1.Secret) ([]SecretData, error) { + data, ok := s.Data["config"] + if !ok { + return nil, errors.New("missing config key") + } + + var ret []SecretData + err := json.NewDecoder(bytes.NewReader(data)).Decode(&ret) + if err != nil { + return nil, fmt.Errorf("decoding secret data json: %w", err) + } + + return ret, nil +} + +func convertEndpoints(s []SecretData, startingPortRange int) []SecretData { + var ret []SecretData + for _, v := range s { + v.IntendedEndpoint = v.Endpoint + v.Endpoint = fmt.Sprintf("https://localhost:%d", startingPortRange) + startingPortRange++ + ret = append(ret, v) + } + return ret +} + +func scrubLoginCredentials(s []SecretData) []SecretData { + var ret []SecretData + for _, v := range s { + v.Username, v.Password = "-", "-" + ret = append(ret, v) + } + return ret +} + +func getStartingPortRanges(proxyPortFlags []string) (map[string]int, error) { + if len(proxyPortFlags) == 0 { + return map[string]int{ + "powerflex": DefaultStartingPortRange, + "powermax": DefaultStartingPortRange + 200, + }, nil + } + + portRanges := make(map[string]int) + for _, v := range proxyPortFlags { + t := strings.Split(v, "=") + if len(t) < 2 { + return nil, fmt.Errorf("invalid proxy flag: %s: no port provided", proxyPortFlags) + } + port, err := strconv.Atoi(t[1]) + if err != nil { + return nil, fmt.Errorf("invalid port: %s", t[1]) + } + portRanges[t[0]] = port + } + + fillUnspecifiedPortRanges(portRanges) + + return portRanges, nil +} + +func fillUnspecifiedPortRanges(portRanges map[string]int) { + storageIndicies := map[string]int{ + "powerflex": 0, + "powermax": 1, + } + storageTypes := []string{"powerflex", "powermax"} + + var referenceStorageSystem string + var referencePort int + for k, v := range portRanges { + referenceStorageSystem = k + referencePort = v + break + } + + storageIndex := storageIndicies[referenceStorageSystem] + + for i := storageIndex + 1; i < len(storageTypes); i++ { + storage := storageTypes[i] + if _, ok := portRanges[storage]; ok { + continue + } + portRanges[storage] = referencePort + (i * 200) + } + + for i := storageIndex - 1; i >= 0; i-- { + storage := storageTypes[i] + if _, ok := portRanges[storage]; ok { + continue + } + portRanges[storage] = referencePort - ((i + 1) * 200) + } +} diff --git a/cmd/karavictl/cmd/inject_test.go b/cmd/karavictl/cmd/inject_test.go index e4738deb..88cc6675 100644 --- a/cmd/karavictl/cmd/inject_test.go +++ b/cmd/karavictl/cmd/inject_test.go @@ -17,16 +17,111 @@ package cmd import ( "io/ioutil" "net/url" + "reflect" "testing" corev1 "k8s.io/api/core/v1" "sigs.k8s.io/yaml" ) -func TestListChange(t *testing.T) { +func TestListChangePowerFlex(t *testing.T) { // This file was generated using the following command: // kubectl get secrets,deployments,daemonsets -n vxflexos -o yaml - b, err := ioutil.ReadFile("./testdata/kubectl_get_all_in_ns_without_karavi.yaml") + listChangeMultiArray(t, "./testdata/kubectl_get_all_in_vxflexos.yaml", "vxflexos-config", 5) +} + +func TestListChangeObservability(t *testing.T) { + // This file was generated using the following command: + // kubectl get secrets,deployments -n karavi -o yaml + listChangeMultiArray(t, "./testdata/kubectl_get_all_in_karavi_observability.yaml", "vxflexos-config", 11) +} + +func TestListChangePowerMaxNew(t *testing.T) { + // This file was generated BEFORE injecting sidecar by using the following command: + // kubectl get secrets,deployments,daemonsets -n powermax -o yaml + + //./testdata/kubectl_get_all_in_powermax.yaml + listChangePowerMax(t, "./testdata/kubectl_get_all_in_powermax_new.yaml", 4) + +} +func TestListChangePowerMaxUpdate(t *testing.T) { + // This file was generated AFTER injecting sidecar by using the following command: + // kubectl get secrets,deployments,daemonsets -n powermax -o yaml + listChangePowerMax(t, "./testdata/kubectl_get_all_in_powermax_update.yaml", 7) + +} +func TestGetStartingPortRanges(t *testing.T) { + t.Run("no proxyPort flag", func(t *testing.T) { + proxyPortFlags := []string{} + got, err := getStartingPortRanges(proxyPortFlags) + if err != nil { + t.Fatal(err) + } + + want := map[string]int{ + "powerflex": DefaultStartingPortRange, + "powermax": DefaultStartingPortRange + 200, + } + + if !reflect.DeepEqual(got, want) { + t.Errorf("got %+v, want %+v", got, want) + } + }) + + t.Run("custom powerflex proxy port", func(t *testing.T) { + proxyPortFlags := []string{"powerflex=10000"} + got, err := getStartingPortRanges(proxyPortFlags) + if err != nil { + t.Fatal(err) + } + + want := map[string]int{ + "powerflex": 10000, + "powermax": 10200, + } + + if !reflect.DeepEqual(got, want) { + t.Errorf("got %+v, want %+v", got, want) + } + }) + + t.Run("custom powermax proxy port", func(t *testing.T) { + proxyPortFlags := []string{"powermax=10000"} + got, err := getStartingPortRanges(proxyPortFlags) + if err != nil { + t.Fatal(err) + } + + want := map[string]int{ + "powerflex": 9800, + "powermax": 10000, + } + + if !reflect.DeepEqual(got, want) { + t.Errorf("got %+v, want %+v", got, want) + } + }) + + t.Run("custom powerflex and powermax proxy port", func(t *testing.T) { + proxyPortFlags := []string{"powerflex=10000", "powermax=20000"} + got, err := getStartingPortRanges(proxyPortFlags) + if err != nil { + t.Fatal(err) + } + + want := map[string]int{ + "powerflex": 10000, + "powermax": 20000, + } + + if !reflect.DeepEqual(got, want) { + t.Errorf("got %+v, want %+v", got, want) + } + }) +} + +func listChangeMultiArray(t *testing.T, path, wantKey string, wantLen int) { + b, err := ioutil.ReadFile(path) if err != nil { t.Fatal(err) } @@ -36,13 +131,19 @@ func TestListChange(t *testing.T) { t.Fatal(err) } - sut := NewListChange(&existing) + var sut ListChangeForMultiArray + sut.ListChange = NewListChange(&existing) t.Run("injects the proxy pieces", func(t *testing.T) { + portRanges, err := getStartingPortRanges(nil) + if err != nil { + t.Fatal(err) + } + got, err := injectUsingList(b, "http://image-addr", "http://proxy-addr", - "./testdata/fake-certificate-file.pem", false) + "./testdata/fake-certificate-file.pem", portRanges, false) if err != nil { t.Fatal(err) } @@ -57,57 +158,28 @@ func TestListChange(t *testing.T) { t.Fatal(err) } - wantLen := 9 if l := len(got); l != wantLen { t.Errorf("buildMapOfSecretsFromList: got len %d, want %d", l, wantLen) } - // The vxflexos-config Secret should exist with a non-nil value. - wantKey := "vxflexos-config" + // The Secret should exist with a non-nil value. if v, ok := got[wantKey]; !ok || v == nil { t.Errorf("buildMapOfSecretsFromList: expected key %q to exist, but got [%v,%v]", wantKey, v, ok) } }) t.Run("inject a new secret with localhost endpoints", func(t *testing.T) { + sut.InjectResources = &Resources{ + Secret: wantKey, + } sut.injectKaraviSecret() if sut.Err != nil { t.Fatal(sut.Err) } - - // Extract only the secrets from this list. - secrets, err := buildMapOfSecretsFromList(sut.Modified) - if err != nil { - t.Fatal(err) - } - secret, ok := secrets["karavi-authorization-config"] - if !ok { - t.Fatal("expected new secret to exist, but it didn't") - } - secretData, err := getSecretData(secret) - if err != nil { - t.Fatal(err) - } - for _, v := range secretData { - u, err := url.Parse(v.Endpoint) - if err != nil { - t.Fatal(err) - } - want := "localhost" - if got := u.Hostname(); got != want { - t.Errorf("got %q, want %q", got, want) - } - } - // The new secret should be called karavi-auth-config - // It should replace endpoint values with localhost - // Each localhost should have a unique port number - // The original secret should be left intact. }) } -func TestListChangeObservability(t *testing.T) { - // This file was generated using the following command: - // kubectl get secrets,deployments,daemonsets -n vxflexos -o yaml - b, err := ioutil.ReadFile("./testdata/kubectl_get_all_in_karavi_observability.yaml") +func listChangePowerMax(t *testing.T, path string, wantLen int) { + b, err := ioutil.ReadFile(path) if err != nil { t.Fatal(err) } @@ -117,13 +189,19 @@ func TestListChangeObservability(t *testing.T) { t.Fatal(err) } - sut := NewListChange(&existing) + var sut ListChangeForPowerMax + sut.ListChange = NewListChange(&existing) + wantKey := "powermax-creds" t.Run("injects the proxy pieces", func(t *testing.T) { + portRanges, err := getStartingPortRanges(nil) + if err != nil { + t.Fatal(err) + } got, err := injectUsingList(b, "http://image-addr", "http://proxy-addr", - "./testdata/fake-certificate-file.pem", false) + "./testdata/fake-certificate-file.pem", portRanges, false) if err != nil { t.Fatal(err) } @@ -137,20 +215,21 @@ func TestListChangeObservability(t *testing.T) { if err != nil { t.Fatal(err) } - - wantLen := 11 if l := len(got); l != wantLen { t.Errorf("buildMapOfSecretsFromList: got len %d, want %d", l, wantLen) } - // The vxflexos-config Secret should exist with a non-nil value. - wantKey := "vxflexos-config" + // The Secret should exist with a non-nil value. if v, ok := got[wantKey]; !ok || v == nil { t.Errorf("buildMapOfSecretsFromList: expected key %q to exist, but got [%v,%v]", wantKey, v, ok) } }) t.Run("inject a new secret with localhost endpoints", func(t *testing.T) { - sut.injectKaraviSecret() + sut.InjectResources = &Resources{ + Secret: wantKey, + Deployment: "powermax-controller", + } + sut.injectKaraviSecret(true) if sut.Err != nil { t.Fatal(sut.Err) } @@ -183,13 +262,72 @@ func TestListChangeObservability(t *testing.T) { // Each localhost should have a unique port number // The original secret should be left intact. }) -} + t.Run("inject a new deployment with localhost endpoints", func(t *testing.T) { + modified, err := sut.Change(&existing, "http://image-addr", "http://proxy-addr", "", true) + if err != nil { + t.Fatal(err) + } -func toSecret(t *testing.T, b []byte) *corev1.Secret { - var s corev1.Secret - err := yaml.Unmarshal(b, &s) - if err != nil { - t.Fatal(err) - } - return &s + m, err := buildMapOfDeploymentsFromList(modified) + if err != nil { + t.Fatal(err) + } + + deploy, ok := m[sut.InjectResources.Deployment] + if !ok { + t.Fatal("deployment not found") + } + + // check that endpoint is modified + for _, c := range deploy.Spec.Template.Spec.Containers { + if c.Name == "driver" { + commandEnvFlag := false + for _, e := range c.Env { + if e.Name == "X_CSI_POWERMAX_ENDPOINT" { + u, err := url.Parse(e.Value) + if err != nil { + t.Fatal(err) + } + want := "localhost" + if got := u.Hostname(); got != want { + t.Errorf("got %q, want %q", got, want) + } + commandEnvFlag = true + } + + } + if !commandEnvFlag { + t.Fatal("X_CSI_POWERMAX_ENDPOINT") + } + break + } + + } + + for _, c := range deploy.Spec.Template.Spec.Containers { + if c.Name == "driver" { + commandEnvFlag := false + for _, e := range c.Env { + if e.Name == "CSM_CSI_POWERMAX_ENDPOINT" { + u, err := url.Parse(e.Value) + if err != nil { + t.Fatal(err) + } + want := "localhost" + if got := u.Hostname(); got == want { + t.Errorf("got %q, want %q", got, want) + } + commandEnvFlag = true + } + + } + if !commandEnvFlag { + t.Fatal("CSM_CSI_POWERMAX_ENDPOINT") + } + break + } + + } + + }) } diff --git a/cmd/karavictl/cmd/testdata/kubectl_get_all_in_ns_without_karavi.yaml b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_ns_without_karavi.yaml deleted file mode 100644 index 3b7b5c5e..00000000 --- a/cmd/karavictl/cmd/testdata/kubectl_get_all_in_ns_without_karavi.yaml +++ /dev/null @@ -1,1324 +0,0 @@ -apiVersion: v1 -items: -- apiVersion: v1 - data: - ca.crt: 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 - namespace: dnhmbGV4b3M= - token: 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 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"ca.crt":"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","namespace":"dnhmbGV4b3M=","token":"ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNklrRm5jMU5QVEdwYWJuUnRVRnAyY3paNU16UnNlVzR3TWtOSGJVRk5kMDFJUVdSUFoxYzRZemx6UTJNaWZRLmV5SnBjM01pT2lKcmRXSmxjbTVsZEdWekwzTmxjblpwWTJWaFkyTnZkVzUwSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXVZVzFsYzNCaFkyVWlPaUoyZUdac1pYaHZjeUlzSW10MVltVnlibVYwWlhNdWFXOHZjMlZ5ZG1salpXRmpZMjkxYm5RdmMyVmpjbVYwTG01aGJXVWlPaUprWldaaGRXeDBMWFJ2YTJWdUxXaHlkekpzSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXpaWEoyYVdObExXRmpZMjkxYm5RdWJtRnRaU0k2SW1SbFptRjFiSFFpTENKcmRXSmxjbTVsZEdWekxtbHZMM05sY25acFkyVmhZMk52ZFc1MEwzTmxjblpwWTJVdFlXTmpiM1Z1ZEM1MWFXUWlPaUl5T1Rrek1ESmhOUzAxTUdSaUxUUmxaR010T1RFeU5TMHhaalF6TlRNeE5UWm1aV0VpTENKemRXSWlPaUp6ZVhOMFpXMDZjMlZ5ZG1salpXRmpZMjkxYm5RNmRuaG1iR1Y0YjNNNlpHVm1ZWFZzZENKOS5GWDQtTGk3MHhFVTlreFYtNFI3ejJza0hFZ001Z0pBb2F6azhQUXdqcTlacmVqNkxYSkFxeUliRUNndHJURXB2b2VJd256VjlFS2dFeHJjQkdiMU9NdTYyU3RSSVJPMFp4cWNVZjdZYUZsYkU5cXhLamFmVEZiMy0zN2tyeHhvOWliN1ltVm04cVlCaTJuV0Fzc0MyNGZkUGdCTjRhX0NQSVZRRGx5SnVHcE5mQl9PNk9TTDQyTl94eThrdjg2T1o1ajVRZnB6Uzg5SjduUVE3UkxZVFp5TlA4TE5fQ25GLWxzc3NtOExJTnBtakMzWnk1M001NHNRUUNLSGZaOHlyTUQyal9OUmdSR1hjcEJMbEhlSkVoeDVwY1RzTGtyU2FJVWFnMUVoV2NvUzN5LUhvV0pxTTlnNDFmeW10OFZyWU43MHZOSWxkMTNyaF9VZkd3V3lvMUE="},"kind":"Secret","metadata":{"annotations":{"kubernetes.io/service-account.name":"default","kubernetes.io/service-account.uid":"299302a5-50db-4edc-9125-1f4353156fea"},"creationTimestamp":"2021-01-12T01:01:55Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:ca.crt":{},"f:namespace":{},"f:token":{}},"f:metadata":{"f:annotations":{".":{},"f:kubernetes.io/service-account.name":{},"f:kubernetes.io/service-account.uid":{}}},"f:type":{}},"manager":"kube-controller-manager","operation":"Update","time":"2021-01-12T01:01:55Z"}],"name":"default-token-hrw2l","namespace":"vxflexos","resourceVersion":"1070","selfLink":"/api/v1/namespaces/vxflexos/secrets/default-token-hrw2l","uid":"3bd03399-654b-47b8-b8cd-315a173e7220"},"type":"kubernetes.io/service-account-token"} - kubernetes.io/service-account.name: default - kubernetes.io/service-account.uid: 299302a5-50db-4edc-9125-1f4353156fea - creationTimestamp: "2021-01-12T01:01:55Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:ca.crt: {} - f:namespace: {} - f:token: {} - f:metadata: - f:annotations: - .: {} - f:kubernetes.io/service-account.name: {} - f:kubernetes.io/service-account.uid: {} - f:type: {} - manager: kube-controller-manager - operation: Update - time: "2021-01-12T01:01:55Z" - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - f:kubectl.kubernetes.io/last-applied-configuration: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: default-token-hrw2l - namespace: vxflexos - resourceVersion: "5497937" - selfLink: /api/v1/namespaces/vxflexos/secrets/default-token-hrw2l - uid: 3bd03399-654b-47b8-b8cd-315a173e7220 - type: kubernetes.io/service-account-token -- apiVersion: v1 - data: - access: ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTVRFME5EWXdNRFVzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltbGhiaTVpYVdKaWVVQmtaV3hzTG1OdmJTSXNJbkp2YkdVaU9pSkRVMGxDY205dWVtVWlMQ0puY205MWNDSTZJa1JsZGs5d2MwZHliM1Z3TVNKOS5QbWJNNWNhaU50aXFFSDNOb0VMbTlKUzdaVDBmOVdjOVhYVVR5b2Q3MlA4 - refresh: ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTkRJNU9ERTVOelVzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltbGhiaTVpYVdKaWVVQmtaV3hzTG1OdmJTSXNJbkp2YkdVaU9pSkRVMGxDY205dWVtVWlMQ0puY205MWNDSTZJa1JsZGs5d2MwZHliM1Z3TVNKOS4wVlk0R3AzOWdEMFpEaE1kWmwtTXlRNHByLVVrTDlPYW5HV0pFYm5YWlpz - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"access":"ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTVRFME5EWXdNRFVzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltbGhiaTVpYVdKaWVVQmtaV3hzTG1OdmJTSXNJbkp2YkdVaU9pSkRVMGxDY205dWVtVWlMQ0puY205MWNDSTZJa1JsZGs5d2MwZHliM1Z3TVNKOS5QbWJNNWNhaU50aXFFSDNOb0VMbTlKUzdaVDBmOVdjOVhYVVR5b2Q3MlA4","refresh":"ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTkRJNU9ERTVOelVzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltbGhiaTVpYVdKaWVVQmtaV3hzTG1OdmJTSXNJbkp2YkdVaU9pSkRVMGxDY205dWVtVWlMQ0puY205MWNDSTZJa1JsZGs5d2MwZHliM1Z3TVNKOS4wVlk0R3AzOWdEMFpEaE1kWmwtTXlRNHByLVVrTDlPYW5HV0pFYm5YWlpz"},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":"2021-01-12T05:09:30Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:access":{},"f:refresh":{}},"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:type":{}},"manager":"kubectl","operation":"Update","time":"2021-01-23T23:53:23Z"}],"name":"proxy-authz-tokens","namespace":"vxflexos","resourceVersion":"3466060","selfLink":"/api/v1/namespaces/vxflexos/secrets/proxy-authz-tokens","uid":"793fddd5-3809-4795-99b3-98e02d154d16"},"type":"Opaque"} - creationTimestamp: "2021-01-12T05:09:30Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:access: {} - f:refresh: {} - f:metadata: - f:annotations: - .: {} - f:kubectl.kubernetes.io/last-applied-configuration: {} - f:type: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: proxy-authz-tokens - namespace: vxflexos - resourceVersion: "5497941" - selfLink: /api/v1/namespaces/vxflexos/secrets/proxy-authz-tokens - uid: 793fddd5-3809-4795-99b3-98e02d154d16 - type: Opaque -- apiVersion: v1 - data: - password: QXczd0ZBd0FxMw== - username: UU56Z2R4WGl4 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"password":"QXczd0ZBd0FxMw==","username":"UU56Z2R4WGl4"},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":"2021-01-12T01:23:57Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:password":{},"f:username":{}},"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:type":{}},"manager":"kubectl","operation":"Update","time":"2021-01-12T01:23:57Z"}],"name":"sdc-repo-creds","namespace":"vxflexos","resourceVersion":"4247","selfLink":"/api/v1/namespaces/vxflexos/secrets/sdc-repo-creds","uid":"589454a1-f598-49a3-8c7b-2dff4c5fc5dc"},"type":"Opaque"} - creationTimestamp: "2021-01-12T01:23:57Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:password: {} - f:username: {} - f:metadata: - f:annotations: - .: {} - f:kubectl.kubernetes.io/last-applied-configuration: {} - f:type: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: sdc-repo-creds - namespace: vxflexos - resourceVersion: "5497943" - selfLink: /api/v1/namespaces/vxflexos/secrets/sdc-repo-creds - uid: 589454a1-f598-49a3-8c7b-2dff4c5fc5dc - type: Opaque -- apiVersion: v1 - data: - release: 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 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"release":"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"},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":"2021-01-29T01:10:44Z","labels":{"modifiedAt":"1611882636","name":"vxflexos","owner":"helm","status":"deployed","version":"1"},"managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:release":{}},"f:metadata":{"f:labels":{".":{},"f:modifiedAt":{},"f:name":{},"f:owner":{},"f:status":{},"f:version":{}}},"f:type":{}},"manager":"helm","operation":"Update","time":"2021-01-29T01:10:44Z"}],"name":"sh.helm.release.v1.vxflexos.v1","namespace":"vxflexos","resourceVersion":"4950603","selfLink":"/api/v1/namespaces/vxflexos/secrets/sh.helm.release.v1.vxflexos.v1","uid":"530bdf2d-2bcd-4efe-b7dd-ee7310781e13"},"type":"helm.sh/release.v1"} - creationTimestamp: "2021-01-29T01:10:44Z" - labels: - modifiedAt: "1611882636" - name: vxflexos - owner: helm - status: deployed - version: "1" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:release: {} - f:metadata: - f:labels: - .: {} - f:modifiedAt: {} - f:name: {} - f:owner: {} - f:status: {} - f:version: {} - f:type: {} - manager: helm - operation: Update - time: "2021-01-29T01:10:44Z" - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - .: {} - f:kubectl.kubernetes.io/last-applied-configuration: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: sh.helm.release.v1.vxflexos.v1 - namespace: vxflexos - resourceVersion: "5497944" - selfLink: /api/v1/namespaces/vxflexos/secrets/sh.helm.release.v1.vxflexos.v1 - uid: 530bdf2d-2bcd-4efe-b7dd-ee7310781e13 - type: helm.sh/release.v1 -- apiVersion: v1 - data: - config: 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 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"config":"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"},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":"2021-01-28T07:25:16Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:config":{}},"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:type":{}},"manager":"kubectl","operation":"Update","time":"2021-01-30T21:51:39Z"}],"name":"vxflexos-config","namespace":"vxflexos","resourceVersion":"5497945","selfLink":"/api/v1/namespaces/vxflexos/secrets/vxflexos-config","uid":"880efe45-c524-47dd-b7b3-f5704b9bff3a"},"type":"Opaque"} - creationTimestamp: "2021-01-28T07:25:16Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:config: {} - f:metadata: - f:annotations: - .: {} - f:kubectl.kubernetes.io/last-applied-configuration: {} - f:type: {} - manager: kubectl - operation: Update - time: "2021-01-30T22:01:48Z" - name: vxflexos-config - namespace: vxflexos - resourceVersion: "5500016" - selfLink: /api/v1/namespaces/vxflexos/secrets/vxflexos-config - uid: 880efe45-c524-47dd-b7b3-f5704b9bff3a - type: Opaque -- apiVersion: v1 - data: - config: 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 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"config":"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"},"kind":"Secret","metadata":{"annotations":{},"name":"vxflexos-config-karavi","namespace":"vxflexos"},"type":"Opaque"} - creationTimestamp: "2021-01-30T22:01:48Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:config: {} - f:metadata: - f:annotations: - .: {} - f:kubectl.kubernetes.io/last-applied-configuration: {} - f:type: {} - manager: kubectl - operation: Update - time: "2021-01-30T22:01:48Z" - name: vxflexos-config-karavi - namespace: vxflexos - resourceVersion: "5500017" - selfLink: /api/v1/namespaces/vxflexos/secrets/vxflexos-config-karavi - uid: 5e0e1cb9-ebb3-43de-98b1-b8f44e6b66cd - type: Opaque -- apiVersion: v1 - data: - ca.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN5RENDQWJDZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeE1ERXhNakF3TlRreU5Wb1hEVE14TURFeE1EQXdOVGt5TlZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTE5RCjg1NHp5S1dHWUU0RW5WQzdscUkrcEI1cEtjOVBpRVNpbkR6TVMyZUczUWY4UUQ4U1FMOElQUG1GWVlyM2RBam0Kc3BFZzRxSElwNkVjVzB0S2dtWG50UmJ2RnNHSzVzU3JQY0hBejJIWjhEV1d5OXJKL1dYVHk1YmF0Q3NGWUhpRQptcnpKYnNIL2JMY3BYaFo1bys5bmIwRStSU3Q4ZTBGL1NaVEJLWTBlUGZHekZCenBSUWpWRmxPM3h5OW0xcXJhCkNkNHlmNk9TOUxjaUQyazZwOTJQMThIT1FiYmY0MWttdWNnUUFLMC8zMHAwbkVaUk42bVkzNUVJTGNidzNyMW4KTE4vd1UyQ1cxZExEWDZzUTBCRHcyazNDZkVmNTUxRDN5ZHAzU3dqUW5Qd25mVVQ1NCswMURjMG9ZOWh4MThaeQpOMWNHZVZ5VENxeFFRaS9pallNQ0F3RUFBYU1qTUNFd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFIMTVVNjEzR3BUWVpYclNvdEpQbnU5aTh6TXIKaUdkdUcyUTZsZWhneFhiNkZQamw2TVgzOEJObDVKMVRNUUIzUVhjZk1QcEpMVmF3UWRXLzdoeE9ONGtzOFhRcQp0M2dGL3JhVjk0TWk0azJweDE0U0I1TEE4enlJb0N4SXdkam1yUTIwL1FqNTB2V1pXV1QwbXhwTk4vRk1sdkl3CktmRVFVQkNkUnJFdzlES0xjc3J1aGZwdFhqb3Z5eWpyc0VJbHFmVUx2U2x5M2U5VzJ6YlIvWExLVXVsL1d3VFkKRW1SRzdPUVJnZXFUZWpEQWFrSFZXcGxlVmJ6bkdWZ1FTZzNWRHlSY21rUmE4a1QvcjZ1OS8zRkNmMjNXMU5pOQpkdXc1Rk4rbnExRmMyYUVrSVFjRWFGNE1oVURycm5Nd2ZxMzAyekxYVlJhbWFwb2VlNy9PRUU3U2gzaz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= - namespace: dnhmbGV4b3M= - token: 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 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"ca.crt":"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","namespace":"dnhmbGV4b3M=","token":"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"},"kind":"Secret","metadata":{"annotations":{"kubernetes.io/service-account.name":"vxflexos-controller","kubernetes.io/service-account.uid":"cf8a1687-bbb8-4d5e-8bfc-89068d4c00da"},"creationTimestamp":"2021-01-29T01:10:44Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:ca.crt":{},"f:namespace":{},"f:token":{}},"f:metadata":{"f:annotations":{".":{},"f:kubernetes.io/service-account.name":{},"f:kubernetes.io/service-account.uid":{}}},"f:type":{}},"manager":"kube-controller-manager","operation":"Update","time":"2021-01-29T01:10:44Z"}],"name":"vxflexos-controller-token-fl4bm","namespace":"vxflexos","resourceVersion":"4950572","selfLink":"/api/v1/namespaces/vxflexos/secrets/vxflexos-controller-token-fl4bm","uid":"dbf1bbed-750d-4f17-890a-52efd8316ead"},"type":"kubernetes.io/service-account-token"} - kubernetes.io/service-account.name: vxflexos-controller - kubernetes.io/service-account.uid: cf8a1687-bbb8-4d5e-8bfc-89068d4c00da - creationTimestamp: "2021-01-29T01:10:44Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:ca.crt: {} - f:namespace: {} - f:token: {} - f:metadata: - f:annotations: - .: {} - f:kubernetes.io/service-account.name: {} - f:kubernetes.io/service-account.uid: {} - f:type: {} - manager: kube-controller-manager - operation: Update - time: "2021-01-29T01:10:44Z" - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - f:kubectl.kubernetes.io/last-applied-configuration: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: vxflexos-controller-token-fl4bm - namespace: vxflexos - resourceVersion: "5497946" - selfLink: /api/v1/namespaces/vxflexos/secrets/vxflexos-controller-token-fl4bm - uid: dbf1bbed-750d-4f17-890a-52efd8316ead - type: kubernetes.io/service-account-token -- apiVersion: v1 - data: - password: UGFzc3dvcmQxMjM= - username: YWRtaW4= - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"password":"UGFzc3dvcmQxMjM=","username":"YWRtaW4="},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":"2021-01-12T01:01:56Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:password":{},"f:username":{}},"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:type":{}},"manager":"kubectl","operation":"Update","time":"2021-01-12T01:01:56Z"}],"name":"vxflexos-creds","namespace":"vxflexos","resourceVersion":"1074","selfLink":"/api/v1/namespaces/vxflexos/secrets/vxflexos-creds","uid":"a795f07a-93d7-4d3f-86ee-03f4aafacb2d"},"type":"Opaque"} - creationTimestamp: "2021-01-12T01:01:56Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:password: {} - f:username: {} - f:metadata: - f:annotations: - .: {} - f:kubectl.kubernetes.io/last-applied-configuration: {} - f:type: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: vxflexos-creds - namespace: vxflexos - resourceVersion: "5497947" - selfLink: /api/v1/namespaces/vxflexos/secrets/vxflexos-creds - uid: a795f07a-93d7-4d3f-86ee-03f4aafacb2d - type: Opaque -- apiVersion: v1 - data: - ca.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN5RENDQWJDZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeE1ERXhNakF3TlRreU5Wb1hEVE14TURFeE1EQXdOVGt5TlZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTE5RCjg1NHp5S1dHWUU0RW5WQzdscUkrcEI1cEtjOVBpRVNpbkR6TVMyZUczUWY4UUQ4U1FMOElQUG1GWVlyM2RBam0Kc3BFZzRxSElwNkVjVzB0S2dtWG50UmJ2RnNHSzVzU3JQY0hBejJIWjhEV1d5OXJKL1dYVHk1YmF0Q3NGWUhpRQptcnpKYnNIL2JMY3BYaFo1bys5bmIwRStSU3Q4ZTBGL1NaVEJLWTBlUGZHekZCenBSUWpWRmxPM3h5OW0xcXJhCkNkNHlmNk9TOUxjaUQyazZwOTJQMThIT1FiYmY0MWttdWNnUUFLMC8zMHAwbkVaUk42bVkzNUVJTGNidzNyMW4KTE4vd1UyQ1cxZExEWDZzUTBCRHcyazNDZkVmNTUxRDN5ZHAzU3dqUW5Qd25mVVQ1NCswMURjMG9ZOWh4MThaeQpOMWNHZVZ5VENxeFFRaS9pallNQ0F3RUFBYU1qTUNFd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFIMTVVNjEzR3BUWVpYclNvdEpQbnU5aTh6TXIKaUdkdUcyUTZsZWhneFhiNkZQamw2TVgzOEJObDVKMVRNUUIzUVhjZk1QcEpMVmF3UWRXLzdoeE9ONGtzOFhRcQp0M2dGL3JhVjk0TWk0azJweDE0U0I1TEE4enlJb0N4SXdkam1yUTIwL1FqNTB2V1pXV1QwbXhwTk4vRk1sdkl3CktmRVFVQkNkUnJFdzlES0xjc3J1aGZwdFhqb3Z5eWpyc0VJbHFmVUx2U2x5M2U5VzJ6YlIvWExLVXVsL1d3VFkKRW1SRzdPUVJnZXFUZWpEQWFrSFZXcGxlVmJ6bkdWZ1FTZzNWRHlSY21rUmE4a1QvcjZ1OS8zRkNmMjNXMU5pOQpkdXc1Rk4rbnExRmMyYUVrSVFjRWFGNE1oVURycm5Nd2ZxMzAyekxYVlJhbWFwb2VlNy9PRUU3U2gzaz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= - namespace: dnhmbGV4b3M= - token: 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 - kind: Secret - metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"v1","data":{"ca.crt":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN5RENDQWJDZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeE1ERXhNakF3TlRreU5Wb1hEVE14TURFeE1EQXdOVGt5TlZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTE5RCjg1NHp5S1dHWUU0RW5WQzdscUkrcEI1cEtjOVBpRVNpbkR6TVMyZUczUWY4UUQ4U1FMOElQUG1GWVlyM2RBam0Kc3BFZzRxSElwNkVjVzB0S2dtWG50UmJ2RnNHSzVzU3JQY0hBejJIWjhEV1d5OXJKL1dYVHk1YmF0Q3NGWUhpRQptcnpKYnNIL2JMY3BYaFo1bys5bmIwRStSU3Q4ZTBGL1NaVEJLWTBlUGZHekZCenBSUWpWRmxPM3h5OW0xcXJhCkNkNHlmNk9TOUxjaUQyazZwOTJQMThIT1FiYmY0MWttdWNnUUFLMC8zMHAwbkVaUk42bVkzNUVJTGNidzNyMW4KTE4vd1UyQ1cxZExEWDZzUTBCRHcyazNDZkVmNTUxRDN5ZHAzU3dqUW5Qd25mVVQ1NCswMURjMG9ZOWh4MThaeQpOMWNHZVZ5VENxeFFRaS9pallNQ0F3RUFBYU1qTUNFd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFIMTVVNjEzR3BUWVpYclNvdEpQbnU5aTh6TXIKaUdkdUcyUTZsZWhneFhiNkZQamw2TVgzOEJObDVKMVRNUUIzUVhjZk1QcEpMVmF3UWRXLzdoeE9ONGtzOFhRcQp0M2dGL3JhVjk0TWk0azJweDE0U0I1TEE4enlJb0N4SXdkam1yUTIwL1FqNTB2V1pXV1QwbXhwTk4vRk1sdkl3CktmRVFVQkNkUnJFdzlES0xjc3J1aGZwdFhqb3Z5eWpyc0VJbHFmVUx2U2x5M2U5VzJ6YlIvWExLVXVsL1d3VFkKRW1SRzdPUVJnZXFUZWpEQWFrSFZXcGxlVmJ6bkdWZ1FTZzNWRHlSY21rUmE4a1QvcjZ1OS8zRkNmMjNXMU5pOQpkdXc1Rk4rbnExRmMyYUVrSVFjRWFGNE1oVURycm5Nd2ZxMzAyekxYVlJhbWFwb2VlNy9PRUU3U2gzaz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=","namespace":"dnhmbGV4b3M=","token":"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"},"kind":"Secret","metadata":{"annotations":{"kubernetes.io/service-account.name":"vxflexos-node","kubernetes.io/service-account.uid":"e2529394-2f77-417e-83ce-d739c9496174"},"creationTimestamp":"2021-01-29T01:10:44Z","managedFields":[{"apiVersion":"v1","fieldsType":"FieldsV1","fieldsV1":{"f:data":{".":{},"f:ca.crt":{},"f:namespace":{},"f:token":{}},"f:metadata":{"f:annotations":{".":{},"f:kubernetes.io/service-account.name":{},"f:kubernetes.io/service-account.uid":{}}},"f:type":{}},"manager":"kube-controller-manager","operation":"Update","time":"2021-01-29T01:10:44Z"}],"name":"vxflexos-node-token-q72ct","namespace":"vxflexos","resourceVersion":"4950574","selfLink":"/api/v1/namespaces/vxflexos/secrets/vxflexos-node-token-q72ct","uid":"4ec6134b-3e62-4dfc-ba29-2212d3f6d9dc"},"type":"kubernetes.io/service-account-token"} - kubernetes.io/service-account.name: vxflexos-node - kubernetes.io/service-account.uid: e2529394-2f77-417e-83ce-d739c9496174 - creationTimestamp: "2021-01-29T01:10:44Z" - managedFields: - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:data: - .: {} - f:ca.crt: {} - f:namespace: {} - f:token: {} - f:metadata: - f:annotations: - .: {} - f:kubernetes.io/service-account.name: {} - f:kubernetes.io/service-account.uid: {} - f:type: {} - manager: kube-controller-manager - operation: Update - time: "2021-01-29T01:10:44Z" - - apiVersion: v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - f:kubectl.kubernetes.io/last-applied-configuration: {} - manager: kubectl - operation: Update - time: "2021-01-30T21:51:39Z" - name: vxflexos-node-token-q72ct - namespace: vxflexos - resourceVersion: "5497948" - selfLink: /api/v1/namespaces/vxflexos/secrets/vxflexos-node-token-q72ct - uid: 4ec6134b-3e62-4dfc-ba29-2212d3f6d9dc - type: kubernetes.io/service-account-token -- apiVersion: apps/v1 - kind: Deployment - metadata: - annotations: - deployment.kubernetes.io/revision: "1" - meta.helm.sh/release-name: vxflexos - meta.helm.sh/release-namespace: vxflexos - creationTimestamp: "2021-01-29T01:10:44Z" - generation: 1 - labels: - app.kubernetes.io/managed-by: Helm - managedFields: - - apiVersion: apps/v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - .: {} - f:meta.helm.sh/release-name: {} - f:meta.helm.sh/release-namespace: {} - f:labels: - .: {} - f:app.kubernetes.io/managed-by: {} - f:spec: - f:progressDeadlineSeconds: {} - f:replicas: {} - f:revisionHistoryLimit: {} - f:selector: - f:matchLabels: - .: {} - f:name: {} - f:strategy: - f:rollingUpdate: - .: {} - f:maxSurge: {} - f:maxUnavailable: {} - f:type: {} - f:template: - f:metadata: - f:labels: - .: {} - f:name: {} - f:spec: - f:affinity: - .: {} - f:podAntiAffinity: - .: {} - f:requiredDuringSchedulingIgnoredDuringExecution: {} - f:containers: - k:{"name":"attacher"}: - .: {} - f:args: {} - f:env: - .: {} - k:{"name":"ADDRESS"}: - .: {} - f:name: {} - f:value: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/var/run/csi"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"name":"driver"}: - .: {} - f:args: {} - f:command: {} - f:env: - .: {} - k:{"name":"CSI_ENDPOINT"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_DEBUG"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_MODE"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_ENABLELISTVOLUMESNAPSHOT"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_ENABLESNAPSHOTCGDELETE"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_ENDPOINT"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_INSECURE"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_PASSWORD"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:secretKeyRef: - .: {} - f:key: {} - f:name: {} - k:{"name":"X_CSI_VXFLEXOS_SYSTEMNAME"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_USER"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:secretKeyRef: - .: {} - f:key: {} - f:name: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/var/run/csi"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/vxflexos-config"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"name":"provisioner"}: - .: {} - f:args: {} - f:env: - .: {} - k:{"name":"ADDRESS"}: - .: {} - f:name: {} - f:value: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/var/run/csi"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"name":"resizer"}: - .: {} - f:args: {} - f:env: - .: {} - k:{"name":"ADDRESS"}: - .: {} - f:name: {} - f:value: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/var/run/csi"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"name":"snapshotter"}: - .: {} - f:args: {} - f:env: - .: {} - k:{"name":"ADDRESS"}: - .: {} - f:name: {} - f:value: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/var/run/csi"}: - .: {} - f:mountPath: {} - f:name: {} - f:dnsPolicy: {} - f:restartPolicy: {} - f:schedulerName: {} - f:securityContext: {} - f:serviceAccount: {} - f:serviceAccountName: {} - f:terminationGracePeriodSeconds: {} - f:volumes: - .: {} - k:{"name":"socket-dir"}: - .: {} - f:emptyDir: {} - f:name: {} - k:{"name":"vxflexos-config"}: - .: {} - f:name: {} - f:secret: - .: {} - f:defaultMode: {} - f:secretName: {} - manager: Go-http-client - operation: Update - time: "2021-01-29T01:10:44Z" - - apiVersion: apps/v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - f:deployment.kubernetes.io/revision: {} - f:status: - f:availableReplicas: {} - f:conditions: - .: {} - k:{"type":"Available"}: - .: {} - f:lastTransitionTime: {} - f:lastUpdateTime: {} - f:message: {} - f:reason: {} - f:status: {} - f:type: {} - k:{"type":"Progressing"}: - .: {} - f:lastTransitionTime: {} - f:lastUpdateTime: {} - f:message: {} - f:reason: {} - f:status: {} - f:type: {} - f:observedGeneration: {} - f:readyReplicas: {} - f:replicas: {} - f:updatedReplicas: {} - manager: kube-controller-manager - operation: Update - time: "2021-01-29T01:10:49Z" - name: vxflexos-controller - namespace: vxflexos - resourceVersion: "4950672" - selfLink: /apis/apps/v1/namespaces/vxflexos/deployments/vxflexos-controller - uid: d0a7a215-e76f-44bf-9a62-932ccd97f640 - spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - name: vxflexos-controller - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - creationTimestamp: null - labels: - name: vxflexos-controller - spec: - affinity: - podAntiAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - - labelSelector: - matchExpressions: - - key: name - operator: In - values: - - vxflexos-controller - topologyKey: kubernetes.io/hostname - containers: - - args: - - --csi-address=$(ADDRESS) - - --v=5 - - --leader-election=true - env: - - name: ADDRESS - value: /var/run/csi/csi.sock - image: k8s.gcr.io/sig-storage/csi-attacher:v3.0.0 - imagePullPolicy: IfNotPresent - name: attacher - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /var/run/csi - name: socket-dir - - args: - - --csi-address=$(ADDRESS) - - --feature-gates=Topology=true - - --volume-name-prefix=k8s - - --volume-name-uuid-length=10 - - --leader-election=true - - --timeout=120s - - --v=5 - - --default-fstype=ext4 - - --extra-create-metadata - env: - - name: ADDRESS - value: /var/run/csi/csi.sock - image: k8s.gcr.io/sig-storage/csi-provisioner:v2.0.2 - imagePullPolicy: IfNotPresent - name: provisioner - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /var/run/csi - name: socket-dir - - args: - - --csi-address=$(ADDRESS) - - --timeout=120s - - --v=5 - - --leader-election=true - env: - - name: ADDRESS - value: /var/run/csi/csi.sock - image: k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.2 - imagePullPolicy: Always - name: snapshotter - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /var/run/csi - name: socket-dir - - args: - - --csi-address=$(ADDRESS) - - --v=5 - - --leader-election=true - env: - - name: ADDRESS - value: /var/run/csi/csi.sock - image: quay.io/k8scsi/csi-resizer:v1.0.0 - imagePullPolicy: IfNotPresent - name: resizer - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /var/run/csi - name: socket-dir - - args: - - --leader-election - - --array-config=/vxflexos-config/config - command: - - /csi-vxflexos.sh - env: - - name: CSI_ENDPOINT - value: /var/run/csi/csi.sock - - name: X_CSI_MODE - value: controller - - name: X_CSI_DEBUG - value: "true" - - name: X_CSI_VXFLEXOS_ENDPOINT - value: https://10.0.0.1 - - name: X_CSI_VXFLEXOS_USER - valueFrom: - secretKeyRef: - key: username - name: vxflexos-creds - - name: X_CSI_VXFLEXOS_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: vxflexos-creds - - name: X_CSI_VXFLEXOS_INSECURE - value: "true" - - name: X_CSI_VXFLEXOS_SYSTEMNAME - value: 542a2d5f5122210f - - name: X_CSI_VXFLEXOS_ENABLESNAPSHOTCGDELETE - value: "false" - - name: X_CSI_VXFLEXOS_ENABLELISTVOLUMESNAPSHOT - value: "false" - image: 10.0.0.4:5000/csi-vxflexos:latest - imagePullPolicy: Always - name: driver - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /var/run/csi - name: socket-dir - - mountPath: /vxflexos-config - name: vxflexos-config - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: vxflexos-controller - serviceAccountName: vxflexos-controller - terminationGracePeriodSeconds: 30 - volumes: - - emptyDir: {} - name: socket-dir - - name: vxflexos-config - secret: - defaultMode: 420 - secretName: vxflexos-config - status: - availableReplicas: 1 - conditions: - - lastTransitionTime: "2021-01-29T01:10:49Z" - lastUpdateTime: "2021-01-29T01:10:49Z" - message: Deployment has minimum availability. - reason: MinimumReplicasAvailable - status: "True" - type: Available - - lastTransitionTime: "2021-01-29T01:10:44Z" - lastUpdateTime: "2021-01-29T01:10:49Z" - message: ReplicaSet "vxflexos-controller-7947f4fbf9" has successfully progressed. - reason: NewReplicaSetAvailable - status: "True" - type: Progressing - observedGeneration: 1 - readyReplicas: 1 - replicas: 1 - updatedReplicas: 1 -- apiVersion: apps/v1 - kind: DaemonSet - metadata: - annotations: - deprecated.daemonset.template.generation: "1" - meta.helm.sh/release-name: vxflexos - meta.helm.sh/release-namespace: vxflexos - creationTimestamp: "2021-01-29T01:10:44Z" - generation: 1 - labels: - app.kubernetes.io/managed-by: Helm - managedFields: - - apiVersion: apps/v1 - fieldsType: FieldsV1 - fieldsV1: - f:metadata: - f:annotations: - .: {} - f:deprecated.daemonset.template.generation: {} - f:meta.helm.sh/release-name: {} - f:meta.helm.sh/release-namespace: {} - f:labels: - .: {} - f:app.kubernetes.io/managed-by: {} - f:spec: - f:revisionHistoryLimit: {} - f:selector: - f:matchLabels: - .: {} - f:app: {} - f:template: - f:metadata: - f:labels: - .: {} - f:app: {} - f:spec: - f:containers: - k:{"name":"driver"}: - .: {} - f:args: {} - f:command: {} - f:env: - .: {} - k:{"name":"CSI_ENDPOINT"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_ALLOW_RWO_MULTI_POD_ACCESS"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_DEBUG"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_MODE"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_PRIVATE_MOUNT_DIR"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_ENDPOINT"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_INSECURE"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"X_CSI_VXFLEXOS_PASSWORD"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:secretKeyRef: - .: {} - f:key: {} - f:name: {} - k:{"name":"X_CSI_VXFLEXOS_USER"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:secretKeyRef: - .: {} - f:key: {} - f:name: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:securityContext: - .: {} - f:allowPrivilegeEscalation: {} - f:capabilities: - .: {} - f:add: {} - f:privileged: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/dev"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices"}: - .: {} - f:mountPath: {} - f:mountPropagation: {} - f:name: {} - k:{"mountPath":"/var/lib/kubelet/plugins/vxflexos.emc.dell.com"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/var/lib/kubelet/pods"}: - .: {} - f:mountPath: {} - f:mountPropagation: {} - f:name: {} - k:{"mountPath":"/vxflexos-config"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"name":"registrar"}: - .: {} - f:args: {} - f:env: - .: {} - k:{"name":"ADDRESS"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"KUBE_NODE_NAME"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:fieldRef: - .: {} - f:apiVersion: {} - f:fieldPath: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/csi"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/registration"}: - .: {} - f:mountPath: {} - f:name: {} - f:dnsPolicy: {} - f:hostNetwork: {} - f:initContainers: - .: {} - k:{"name":"sdc"}: - .: {} - f:env: - .: {} - k:{"name":"MDM"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"MODE"}: - .: {} - f:name: {} - f:value: {} - k:{"name":"NODENAME"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:fieldRef: - .: {} - f:apiVersion: {} - f:fieldPath: {} - k:{"name":"REPO_ADDRESS"}: - .: {} - f:name: {} - k:{"name":"REPO_PASSWORD"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:secretKeyRef: - .: {} - f:key: {} - f:name: {} - k:{"name":"REPO_USER"}: - .: {} - f:name: {} - f:valueFrom: - .: {} - f:secretKeyRef: - .: {} - f:key: {} - f:name: {} - f:image: {} - f:imagePullPolicy: {} - f:name: {} - f:resources: {} - f:securityContext: - .: {} - f:privileged: {} - f:terminationMessagePath: {} - f:terminationMessagePolicy: {} - f:volumeMounts: - .: {} - k:{"mountPath":"/config"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/dev"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/host-os-release"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/rules.d"}: - .: {} - f:mountPath: {} - f:name: {} - k:{"mountPath":"/storage"}: - .: {} - f:mountPath: {} - f:name: {} - f:restartPolicy: {} - f:schedulerName: {} - f:securityContext: {} - f:serviceAccount: {} - f:serviceAccountName: {} - f:terminationGracePeriodSeconds: {} - f:volumes: - .: {} - k:{"name":"dev"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"driver-path"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"os-release"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"pods-path"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"registration-dir"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"sdc-config"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"sdc-storage"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"udev-d"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"volumedevices-path"}: - .: {} - f:hostPath: - .: {} - f:path: {} - f:type: {} - f:name: {} - k:{"name":"vxflexos-config"}: - .: {} - f:name: {} - f:secret: - .: {} - f:defaultMode: {} - f:secretName: {} - f:updateStrategy: - f:rollingUpdate: - .: {} - f:maxUnavailable: {} - f:type: {} - manager: Go-http-client - operation: Update - time: "2021-01-29T01:10:44Z" - - apiVersion: apps/v1 - fieldsType: FieldsV1 - fieldsV1: - f:status: - f:currentNumberScheduled: {} - f:desiredNumberScheduled: {} - f:numberAvailable: {} - f:numberReady: {} - f:observedGeneration: {} - f:updatedNumberScheduled: {} - manager: kube-controller-manager - operation: Update - time: "2021-01-29T01:10:49Z" - name: vxflexos-node - namespace: vxflexos - resourceVersion: "4950674" - selfLink: /apis/apps/v1/namespaces/vxflexos/daemonsets/vxflexos-node - uid: c001955b-25c2-4026-a9bb-3255ba55d3b1 - spec: - revisionHistoryLimit: 10 - selector: - matchLabels: - app: vxflexos-node - template: - metadata: - creationTimestamp: null - labels: - app: vxflexos-node - spec: - containers: - - args: - - --array-config=/vxflexos-config/config - command: - - /csi-vxflexos.sh - env: - - name: CSI_ENDPOINT - value: unix:///var/lib/kubelet/plugins/vxflexos.emc.dell.com/csi_sock - - name: X_CSI_MODE - value: node - - name: X_CSI_DEBUG - value: "true" - - name: X_CSI_PRIVATE_MOUNT_DIR - value: /var/lib/kubelet/plugins/vxflexos.emc.dell.com/disks - - name: X_CSI_VXFLEXOS_USER - valueFrom: - secretKeyRef: - key: username - name: vxflexos-creds - - name: X_CSI_VXFLEXOS_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: vxflexos-creds - - name: X_CSI_VXFLEXOS_ENDPOINT - value: https://10.0.0.1 - - name: X_CSI_VXFLEXOS_INSECURE - value: "true" - - name: X_CSI_ALLOW_RWO_MULTI_POD_ACCESS - value: "false" - image: 10.0.0.4:5000/csi-vxflexos:latest - imagePullPolicy: Always - name: driver - resources: {} - securityContext: - allowPrivilegeEscalation: true - capabilities: - add: - - SYS_ADMIN - privileged: true - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /var/lib/kubelet/plugins/vxflexos.emc.dell.com - name: driver-path - - mountPath: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices - mountPropagation: Bidirectional - name: volumedevices-path - - mountPath: /var/lib/kubelet/pods - mountPropagation: Bidirectional - name: pods-path - - mountPath: /dev - name: dev - - mountPath: /vxflexos-config - name: vxflexos-config - - args: - - --v=5 - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=/var/lib/kubelet/plugins/vxflexos.emc.dell.com/csi_sock - env: - - name: ADDRESS - value: /csi/csi_sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.0.1 - imagePullPolicy: IfNotPresent - name: registrar - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /registration - name: registration-dir - - mountPath: /csi - name: driver-path - dnsPolicy: ClusterFirstWithHostNet - hostNetwork: true - initContainers: - - env: - - name: NODENAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: MODE - value: config - - name: MDM - value: 10.0.0.2,10.0.0.3 - - name: REPO_ADDRESS - - name: REPO_USER - valueFrom: - secretKeyRef: - key: username - name: sdc-repo-creds - - name: REPO_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: sdc-repo-creds - image: dellemc/sdc:3.5.1.1 - imagePullPolicy: Always - name: sdc - resources: {} - securityContext: - privileged: true - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - volumeMounts: - - mountPath: /dev - name: dev - - mountPath: /host-os-release - name: os-release - - mountPath: /storage - name: sdc-storage - - mountPath: /rules.d - name: udev-d - - mountPath: /config - name: sdc-config - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: vxflexos-node - serviceAccountName: vxflexos-node - terminationGracePeriodSeconds: 30 - volumes: - - hostPath: - path: /var/lib/kubelet/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir - - hostPath: - path: /var/lib/kubelet/plugins/vxflexos.emc.dell.com - type: DirectoryOrCreate - name: driver-path - - hostPath: - path: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices - type: DirectoryOrCreate - name: volumedevices-path - - hostPath: - path: /var/lib/kubelet/pods - type: Directory - name: pods-path - - hostPath: - path: /dev - type: Directory - name: dev - - hostPath: - path: /var/emc-scaleio - type: DirectoryOrCreate - name: sdc-storage - - hostPath: - path: /etc/udev/rules.d - type: Directory - name: udev-d - - hostPath: - path: /etc/os-release - type: File - name: os-release - - hostPath: - path: /var/sio-config - type: DirectoryOrCreate - name: sdc-config - - name: vxflexos-config - secret: - defaultMode: 420 - secretName: vxflexos-config - updateStrategy: - rollingUpdate: - maxUnavailable: 1 - type: RollingUpdate - status: - currentNumberScheduled: 2 - desiredNumberScheduled: 2 - numberAvailable: 2 - numberMisscheduled: 0 - numberReady: 2 - observedGeneration: 1 - updatedNumberScheduled: 2 -kind: List -metadata: - resourceVersion: "" - selfLink: "" diff --git a/cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_new.yaml b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_new.yaml new file mode 100644 index 00000000..2357d71c --- /dev/null +++ b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_new.yaml @@ -0,0 +1,1166 @@ +apiVersion: v1 +items: +- apiVersion: v1 + data: + ca.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM1ekNDQWMrZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeE1EUXlPREUxTWpBek5Gb1hEVE14TURReU5qRTFNakF6TkZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTnBnCm9yd3EzMDBJVVRKVkFZUVYzSHJieWxjdnFPTDRSUWlIVVdhaTY0UXBzR1RwTytvNHZMd1Y0MUE3enRxVFFLM28KaUcxR2pJUDBsRkdQYXJzNXFCNkU5MkRMK2hJU2kyaFM2THJtdHI3YlVua2NKb0Z4K0djbk5JUHcxUXpjNlRhUgpoK0NpQmZKVVEzU3V4YTVGaW5wTVlYcGFqVkRVY3ZZQWJBTUMvMnFDaFhaOU82d1RjRE5LUzZoT3V6emcxaWpCClc5cUhRdXBQTFpmeDdDSk1LVEhjTG9QaEoyS29jU2tQMUpvQWIzdzNlcTF2bFcwV1BVVzBaZ3gxeWx1OU11M3cKU2ZGdStOaDJnaExJMGNzMUFHZlFGL1lKaE5XSWhCZHIvR0k2Yk5XRkJ4b1ZoaVZKazhuMUZYbHQ5U0ttY0taRgpRY3BEaDVHaXVNanZ1OEhTZWRNQ0F3RUFBYU5DTUVBd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZMTWhMOWQwMXpjWUJ6SGZMWHJCMU1ndzFqUHlNQTBHQ1NxR1NJYjMKRFFFQkN3VUFBNElCQVFBZEhvQzlxZkRWSDl4OGJkdnZkVjIwekJOaGpyTDVWaVMxVkZBSkZaeVhMNEwwRmJpdApOTUxYRllIbEJsd3lmS2I5eER2Mzhhd1BkK1lLVWVib0tqY0NXYXVLNnNEc2pxOTltQ3p0Y3haV3RJL1RKQXM5Ckg1MGp5eCtCUnZyWGZZZEQyOXRJWHVBRDJVQmVmNk9kSmVPNnV2Mlh0V3l4UkZwbW1YNjFQdGtCL1c1RVB2VFIKbG4ySTVrb1hZOTZBakpqTWZnVkpKdUZYWjAyWUdnT3ZGaHQ4MitlMUgxY2pGdWIzbkVQTzVGZjA4bWdXdGU3Zwo1Vi8xNWhQRlZDM25iNkt4cmNydkxmTnJEZERJNGtaTlVHL0dRNDZqZXBUbVVUaFNuRGd5WlpWakllY1JHU0NWCldJNW91WU83WEx1NnQvZVZ5S1IrMVNZSUtEN2E1Wk15UDdmcgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg== + namespace: cG93ZXJtYXg= + token: ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNkluVkpORjl6TXpsYVQxSk9XUzFQT0U1NmFuQlVaWEJWVFV0QlZrVlhVR1pGUjI5TmJXOTNhMWswY1UwaWZRLmV5SnBjM01pT2lKcmRXSmxjbTVsZEdWekwzTmxjblpwWTJWaFkyTnZkVzUwSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXVZVzFsYzNCaFkyVWlPaUp3YjNkbGNtMWhlQ0lzSW10MVltVnlibVYwWlhNdWFXOHZjMlZ5ZG1salpXRmpZMjkxYm5RdmMyVmpjbVYwTG01aGJXVWlPaUprWldaaGRXeDBMWFJ2YTJWdUxXdzRlRFF5SWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXpaWEoyYVdObExXRmpZMjkxYm5RdWJtRnRaU0k2SW1SbFptRjFiSFFpTENKcmRXSmxjbTVsZEdWekxtbHZMM05sY25acFkyVmhZMk52ZFc1MEwzTmxjblpwWTJVdFlXTmpiM1Z1ZEM1MWFXUWlPaUkxT0RSaVlqUTBNUzAzTVRNM0xUUTJOR1V0WWpsa01pMDVaR0prWlRabU56Z3lNREFpTENKemRXSWlPaUp6ZVhOMFpXMDZjMlZ5ZG1salpXRmpZMjkxYm5RNmNHOTNaWEp0WVhnNlpHVm1ZWFZzZENKOS5RUm9OcUlnVF82cGdxZ0JTSXlFeTllOGRsYlhONUlqRnQ5bGE0U1oyZS1kRDRLMlNZVkNObnFPdGtjNlFoRDlTT0tVOEkyUHhUN1RIOU1YWW9wd09oamNnYWdGajZxTkk4a0ItVDkwY3RrbjJYeUpkSzI0Q0p2bFFYanY5Z2hFOHJfWVptN0FiM0ljb05hSk9KTGJuZFY3cDhHVnJDVkk2RUpNQnRnb2ZZLTRtTDNqSnl3SDlTOTZzeUtmVS1keWtrdTIzRldoaTk1V2laRE8tbjVvXzF5OXp2N0FjVkl5ZTBIOXhOTkJOdTVUbmFRb0NidU9GdFhYdVdpcS1XQWlfazN2NDRLU3BnT0gzYk9famxvZ0E5WFlJd1dOVDdZT05qMFRxMTVmQlJ5WUpNMzJNcmRrdEFGQ0dScUJRWlpadUJQQ1BPT2hhOHItQ2xSU09yNHNNNkE= + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: default + kubernetes.io/service-account.uid: 584bb441-7137-464e-b9d2-9dbde6f78200 + creationTimestamp: "2021-04-28T15:49:15Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:49:15Z" + name: default-token-l8x42 + namespace: powermax + resourceVersion: "3224" + uid: 59071f98-f54e-44bb-b7fb-7f509958ca31 + type: kubernetes.io/service-account-token +- apiVersion: v1 + data: + ca.crt: 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 + namespace: cG93ZXJtYXg= + token: ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNkluVkpORjl6TXpsYVQxSk9XUzFQT0U1NmFuQlVaWEJWVFV0QlZrVlhVR1pGUjI5TmJXOTNhMWswY1UwaWZRLmV5SnBjM01pT2lKcmRXSmxjbTVsZEdWekwzTmxjblpwWTJWaFkyTnZkVzUwSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXVZVzFsYzNCaFkyVWlPaUp3YjNkbGNtMWhlQ0lzSW10MVltVnlibVYwWlhNdWFXOHZjMlZ5ZG1salpXRmpZMjkxYm5RdmMyVmpjbVYwTG01aGJXVWlPaUp3YjNkbGNtMWhlQzFqYjI1MGNtOXNiR1Z5TFhSdmEyVnVMV1kwTlRWa0lpd2lhM1ZpWlhKdVpYUmxjeTVwYnk5elpYSjJhV05sWVdOamIzVnVkQzl6WlhKMmFXTmxMV0ZqWTI5MWJuUXVibUZ0WlNJNkluQnZkMlZ5YldGNExXTnZiblJ5YjJ4c1pYSWlMQ0pyZFdKbGNtNWxkR1Z6TG1sdkwzTmxjblpwWTJWaFkyTnZkVzUwTDNObGNuWnBZMlV0WVdOamIzVnVkQzUxYVdRaU9pSXhZVGMwWTJaak1pMDBOMlJpTFRSbE9UTXRPREZqTkMwNU1ETTFZbU5tTlRaaU9EVWlMQ0p6ZFdJaU9pSnplWE4wWlcwNmMyVnlkbWxqWldGalkyOTFiblE2Y0c5M1pYSnRZWGc2Y0c5M1pYSnRZWGd0WTI5dWRISnZiR3hsY2lKOS5zWDhsSFhsRlVPaHZ5Q3dfQzVydzZmMm82YWQxZ1ZveFA4Vl9Nd3cwQTdIdTVUTnlpV3lJVVNVLUo5MVdMZzU1b1oyZERHZmhfejBnVFk4YUtMTDMxekdQVUlPLXRzMlBWT3hKOUUyQTJxSFcyTGFRYndIOEF0UmRneWNPUjdndGVueWpua0FIV0JTb1Azel9PUHd2UVlrcm5BX0oyVE1vVlNETzJYWHB2X2RQOFA3Q2FxMmtPalpCUHc5X3VtUHFFSHZpcFNLUk5NN3JwQlBrclNxdE1aOVptVGVZeGhxWVlIS0RLR0Q1eUdXTU45eUQ0emRXS0p1T1N6VElaanQ2S2txam9DRDZkSmlnNFRpOUhNRG1RaS01UXh4ZU04aGVmM2ZCbGtZYjNxX2FBcW9Fa3hWZm5XS2J4bDJta1Vyc3JUVFdnWWlGV2R1RGlXR0pBdFJ2elE= + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: powermax-controller + kubernetes.io/service-account.uid: 1a74cfc2-47db-4e93-81c4-9035bcf56b85 + creationTimestamp: "2021-04-28T15:49:35Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:49:35Z" + name: powermax-controller-token-f455d + namespace: powermax + resourceVersion: "3299" + uid: d9fe0869-e178-4826-b048-796ff58700e8 + type: kubernetes.io/service-account-token +- apiVersion: v1 + data: + password: password + username: username + kind: Secret + metadata: + creationTimestamp: "2021-04-28T15:49:31Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:password: {} + f:username: {} + f:type: {} + manager: kubectl-create + operation: Update + time: "2021-04-28T15:49:31Z" + name: powermax-creds + namespace: powermax + resourceVersion: "3288" + uid: 2c206bdd-6714-46a5-8ab0-3d18141a5975 + type: Opaque +- apiVersion: v1 + data: + release: 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 + kind: Secret + metadata: + creationTimestamp: "2021-04-28T15:49:35Z" + labels: + modifiedAt: "1619639247" + name: powermax + owner: helm + status: deployed + version: "1" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:release: {} + f:metadata: + f:labels: + .: {} + f:modifiedAt: {} + f:name: {} + f:owner: {} + f:status: {} + f:version: {} + f:type: {} + manager: helm + operation: Update + time: "2021-04-28T15:49:35Z" + name: sh.helm.release.v1.powermax.v1 + namespace: powermax + resourceVersion: "3308" + uid: be2111ef-7be4-4f92-a952-1d3b65cb0559 + type: helm.sh/release.v1 +- apiVersion: apps/v1 + kind: Deployment + metadata: + annotations: + deployment.kubernetes.io/revision: "1" + meta.helm.sh/release-name: powermax + meta.helm.sh/release-namespace: powermax + creationTimestamp: "2021-04-28T15:49:35Z" + generation: 1 + labels: + app.kubernetes.io/managed-by: Helm + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:meta.helm.sh/release-name: {} + f:meta.helm.sh/release-namespace: {} + f:labels: + .: {} + f:app.kubernetes.io/managed-by: {} + f:spec: + f:progressDeadlineSeconds: {} + f:replicas: {} + f:revisionHistoryLimit: {} + f:selector: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:name: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:requiredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"attacher"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"driver"}: + .: {} + f:args: {} + f:command: {} + f:env: + .: {} + k:{"name":"CSI_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"SSL_CERT_DIR"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_GRPC_MAX_THREADS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_MODIFY_HOSTNAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_NODENAME_TEMPLATE"}: + .: {} + f:name: {} + k:{"name":"X_CSI_K8S_CLUSTER_PREFIX"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ARRAYS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DRIVER_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_INSECURE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_PASSWORD"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_PORTGROUPS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_PROXY_SERVICE_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_USER"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_VERSION"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_ReplicationContextPrefix"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_ReplicationPrefix"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_TRANSPORT_PROTOCOL"}: + .: {} + f:name: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"provisioner"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"resizer"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"snapshotter"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"certs"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:optional: {} + f:secretName: {} + k:{"name":"socket-dir"}: + .: {} + f:emptyDir: {} + f:name: {} + manager: Go-http-client + operation: Update + time: "2021-04-28T15:49:35Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:50:41Z" + name: powermax-controller + namespace: powermax + resourceVersion: "3520" + uid: c6008a28-f3d9-4eff-97e8-832ee478c428 + spec: + progressDeadlineSeconds: 600 + replicas: 2 + revisionHistoryLimit: 10 + selector: + matchLabels: + name: powermax-controller + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 25% + type: RollingUpdate + template: + metadata: + creationTimestamp: null + labels: + name: powermax-controller + spec: + affinity: + podAntiAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + - labelSelector: + matchExpressions: + - key: name + operator: In + values: + - powermax-controller + topologyKey: kubernetes.io/hostname + containers: + - args: + - --csi-address=$(ADDRESS) + - --v=5 + - --timeout=180s + - --worker-threads=6 + - --leader-election + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-attacher:v3.1.0 + imagePullPolicy: IfNotPresent + name: attacher + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --volume-name-prefix=pmax + - --volume-name-uuid-length=10 + - --timeout=180s + - --worker-threads=6 + - --v=5 + - --default-fstype=ext4 + - --leader-election + - --extra-create-metadata + - --feature-gates=Topology=true + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0 + imagePullPolicy: IfNotPresent + name: provisioner + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --v=5 + - --snapshot-name-prefix=pmsn + - --snapshot-name-uuid-length=10 + - --timeout=180s + - --leader-election + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0 + imagePullPolicy: IfNotPresent + name: snapshotter + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --timeout=180s + - --v=5 + - --leader-election + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: quay.io/k8scsi/csi-resizer:v1.1.0 + imagePullPolicy: IfNotPresent + name: resizer + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --leader-election + command: + - /csi-powermax.sh + env: + - name: X_CSI_POWERMAX_DRIVER_NAME + value: csi-powermax.dellemc.com + - name: CSI_ENDPOINT + value: /var/run/csi/csi.sock + - name: X_CSI_MODE + value: controller + - name: X_CSI_DEBUG + value: "true" + - name: X_CSI_POWERMAX_ENDPOINT + value: https://10.0.0.1 + - name: X_CSI_POWERMAX_USER + valueFrom: + secretKeyRef: + key: username + name: powermax-creds + - name: X_CSI_POWERMAX_PASSWORD + valueFrom: + secretKeyRef: + key: password + name: powermax-creds + - name: X_CSI_POWERMAX_VERSION + value: "90" + - name: X_CSI_POWERMAX_DEBUG + value: "false" + - name: X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION + value: "true" + - name: X_CSI_POWERMAX_INSECURE + value: none + - name: X_CSI_POWERMAX_PROXY_SERVICE_NAME + value: none + - name: X_CSI_POWERMAX_PORTGROUPS + value: iscsi_csm_cicd + - name: X_CSI_K8S_CLUSTER_PREFIX + value: CSM + - name: X_CSI_POWERMAX_ARRAYS + value: "1234567890" + - name: X_CSI_GRPC_MAX_THREADS + value: "4" + - name: X_CSI_TRANSPORT_PROTOCOL + - name: SSL_CERT_DIR + value: /certs + - name: X_CSI_IG_NODENAME_TEMPLATE + - name: X_CSI_IG_MODIFY_HOSTNAME + value: "false" + - name: X_CSI_ReplicationContextPrefix + value: powermax/ + - name: X_CSI_ReplicationPrefix + value: replication.storage.dell.com/ + image: dellemc/csi-powermax:v1.6.0 + imagePullPolicy: Always + name: driver + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - mountPath: /certs + name: certs + readOnly: true + dnsPolicy: ClusterFirst + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: powermax-controller + serviceAccountName: powermax-controller + terminationGracePeriodSeconds: 30 + volumes: + - emptyDir: {} + name: socket-dir + - name: certs + secret: + defaultMode: 420 + optional: true + secretName: powermax-certs + status: + availableReplicas: 2 + conditions: + - lastTransitionTime: "2021-04-28T15:50:41Z" + lastUpdateTime: "2021-04-28T15:50:41Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + - lastTransitionTime: "2021-04-28T15:49:35Z" + lastUpdateTime: "2021-04-28T15:50:41Z" + message: ReplicaSet "powermax-controller-5748dddb9b" has successfully progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + observedGeneration: 1 + readyReplicas: 2 + replicas: 2 + updatedReplicas: 2 +- apiVersion: apps/v1 + kind: DaemonSet + metadata: + annotations: + deprecated.daemonset.template.generation: "1" + meta.helm.sh/release-name: powermax + meta.helm.sh/release-namespace: powermax + creationTimestamp: "2021-04-28T15:49:35Z" + generation: 1 + labels: + app.kubernetes.io/managed-by: Helm + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deprecated.daemonset.template.generation: {} + f:meta.helm.sh/release-name: {} + f:meta.helm.sh/release-namespace: {} + f:labels: + .: {} + f:app.kubernetes.io/managed-by: {} + f:spec: + f:revisionHistoryLimit: {} + f:selector: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app: {} + f:spec: + f:containers: + k:{"name":"driver"}: + .: {} + f:command: {} + f:env: + .: {} + k:{"name":"CSI_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"SSL_CERT_DIR"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_GRPC_MAX_THREADS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_MODIFY_HOSTNAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_NODENAME_TEMPLATE"}: + .: {} + f:name: {} + k:{"name":"X_CSI_ISCSI_CHROOT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_K8S_CLUSTER_PREFIX"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ARRAYS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DRIVER_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_INSECURE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ISCSI_ENABLE_CHAP"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_NODENAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: + .: {} + f:apiVersion: {} + f:fieldPath: {} + k:{"name":"X_CSI_POWERMAX_PASSWORD"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_PORTGROUPS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_PROXY_SERVICE_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_USER"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_PRIVATE_MOUNT_DIR"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_TRANSPORT_PROTOCOL"}: + .: {} + f:name: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:privileged: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/dev"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/noderoot"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/run/dbus/system_bus_socket"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/sys"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices"}: + .: {} + f:mountPath: {} + f:mountPropagation: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/plugins/powermax.emc.dell.com"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/pods"}: + .: {} + f:mountPath: {} + f:mountPropagation: {} + f:name: {} + k:{"name":"registrar"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"KUBE_NODE_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: + .: {} + f:apiVersion: {} + f:fieldPath: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/registration"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:hostIPC: {} + f:hostNetwork: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"certs"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:optional: {} + f:secretName: {} + k:{"name":"dbus-socket"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"dev"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"driver-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"noderoot"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"pods-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"registration-dir"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"sys"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"volumedevices-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + f:updateStrategy: + f:rollingUpdate: + .: {} + f:maxUnavailable: {} + f:type: {} + manager: Go-http-client + operation: Update + time: "2021-04-28T15:49:35Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:currentNumberScheduled: {} + f:desiredNumberScheduled: {} + f:numberAvailable: {} + f:numberReady: {} + f:observedGeneration: {} + f:updatedNumberScheduled: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:58:08Z" + name: powermax-node + namespace: powermax + resourceVersion: "5022" + uid: 2f56ff2e-5e99-4557-9572-dad4126e30f3 + spec: + revisionHistoryLimit: 10 + selector: + matchLabels: + app: powermax-node + template: + metadata: + creationTimestamp: null + labels: + app: powermax-node + spec: + containers: + - command: + - /csi-powermax.sh + env: + - name: X_CSI_POWERMAX_DRIVER_NAME + value: csi-powermax.dellemc.com + - name: CSI_ENDPOINT + value: unix:///var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock + - name: X_CSI_MODE + value: node + - name: X_CSI_DEBUG + value: "true" + - name: X_CSI_PRIVATE_MOUNT_DIR + value: /var/lib/kubelet/plugins/powermax.emc.dell.com/disks + - name: X_CSI_POWERMAX_ENDPOINT + value: https://10.0.0.1 + - name: X_CSI_POWERMAX_DEBUG + value: "false" + - name: X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION + value: "true" + - name: X_CSI_POWERMAX_INSECURE + value: none + - name: X_CSI_K8S_CLUSTER_PREFIX + value: CSM + - name: X_CSI_POWERMAX_USER + valueFrom: + secretKeyRef: + key: username + name: powermax-creds + - name: X_CSI_POWERMAX_PASSWORD + valueFrom: + secretKeyRef: + key: password + name: powermax-creds + - name: X_CSI_POWERMAX_NODENAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: X_CSI_POWERMAX_ISCSI_ENABLE_CHAP + value: "false" + - name: X_CSI_POWERMAX_ARRAYS + value: "1234567890" + - name: X_CSI_POWERMAX_PROXY_SERVICE_NAME + value: none + - name: X_CSI_ISCSI_CHROOT + value: /noderoot + - name: X_CSI_GRPC_MAX_THREADS + value: "4" + - name: X_CSI_TRANSPORT_PROTOCOL + - name: SSL_CERT_DIR + value: /certs + - name: X_CSI_IG_NODENAME_TEMPLATE + - name: X_CSI_IG_MODIFY_HOSTNAME + value: "false" + - name: X_CSI_POWERMAX_PORTGROUPS + value: iscsi_csm_cicd + image: dellemc/csi-powermax:v1.6.0 + imagePullPolicy: Always + name: driver + resources: {} + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - SYS_ADMIN + privileged: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/lib/kubelet/plugins/powermax.emc.dell.com + name: driver-path + - mountPath: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices + mountPropagation: Bidirectional + name: volumedevices-path + - mountPath: /var/lib/kubelet/pods + mountPropagation: Bidirectional + name: pods-path + - mountPath: /dev + name: dev + - mountPath: /sys + name: sys + - mountPath: /noderoot + name: noderoot + - mountPath: /certs + name: certs + readOnly: true + - mountPath: /run/dbus/system_bus_socket + name: dbus-socket + - args: + - --v=5 + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=/var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock + env: + - name: ADDRESS + value: /csi/csi_sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0 + imagePullPolicy: IfNotPresent + name: registrar + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /registration + name: registration-dir + - mountPath: /csi + name: driver-path + dnsPolicy: ClusterFirstWithHostNet + hostIPC: true + hostNetwork: true + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + key: node.kubernetes.io/memory-pressure + operator: Exists + - effect: NoExecute + key: node.kubernetes.io/disk-pressure + operator: Exists + - effect: NoExecute + key: node.kubernetes.io/network-unavailable + operator: Exists + volumes: + - hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /var/lib/kubelet/plugins/powermax.emc.dell.com + type: DirectoryOrCreate + name: driver-path + - hostPath: + path: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices + type: DirectoryOrCreate + name: volumedevices-path + - hostPath: + path: /var/lib/kubelet/pods + type: Directory + name: pods-path + - hostPath: + path: /dev + type: Directory + name: dev + - hostPath: + path: /sys + type: Directory + name: sys + - hostPath: + path: / + type: Directory + name: noderoot + - hostPath: + path: /run/dbus/system_bus_socket + type: Socket + name: dbus-socket + - name: certs + secret: + defaultMode: 420 + optional: true + secretName: powermax-certs + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate + status: + currentNumberScheduled: 2 + desiredNumberScheduled: 2 + numberAvailable: 2 + numberMisscheduled: 0 + numberReady: 2 + observedGeneration: 1 + updatedNumberScheduled: 2 +kind: List +metadata: + resourceVersion: "" + selfLink: "" \ No newline at end of file diff --git a/cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_update.yaml b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_update.yaml new file mode 100644 index 00000000..20312732 --- /dev/null +++ b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_powermax_update.yaml @@ -0,0 +1,1530 @@ +apiVersion: v1 +items: +- apiVersion: v1 + data: + ca.crt: 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 + namespace: cG93ZXJtYXg= + token: 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 + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: default + kubernetes.io/service-account.uid: d6ee4bf2-ff6a-401c-9a45-f56b162b54f9 + creationTimestamp: "2021-05-06T16:05:36Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-05-06T16:05:36Z" + name: default-token-nxbrd + namespace: powermax + resourceVersion: "305431" + selfLink: /api/v1/namespaces/powermax/secrets/default-token-nxbrd + uid: 8be028a3-dcc5-452a-a76c-878bcc49727e + type: kubernetes.io/service-account-token +- apiVersion: v1 + data: + config: W3sidXNlcm5hbWUiOiItIiwicGFzc3dvcmQiOiItIiwiaW50ZW5kZWRFbmRwb2ludCI6Imh0dHBzOi8vMTAuMC4wLjE6OTAwMCIsImVuZHBvaW50IjoiaHR0cHM6Ly9sb2NhbGhvc3Q6OTIwMCIsInN5c3RlbUlEIjoiMDAwMTk3OTAxNTAzIiwiaW5zZWN1cmUiOmZhbHNlLCJpc0RlZmF1bHQiOmZhbHNlfV0= + kind: Secret + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","data":{"config":"W3sidXNlcm5hbWUiOiItIiwicGFzc3dvcmQiOiItIiwiaW50ZW5kZWRFbmRwb2ludCI6Imh0dHBzOi8vMTAuMC4wLjE6OTAwMCIsImVuZHBvaW50IjoiaHR0cHM6Ly9sb2NhbGhvc3Q6OTIwMCIsInN5c3RlbUlEIjoiMDAwMTk3OTAxNTAzIiwiaW5zZWN1cmUiOmZhbHNlLCJpc0RlZmF1bHQiOmZhbHNlfV0="},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":null,"name":"karavi-authorization-config","namespace":"powermax"},"type":"Opaque"} + creationTimestamp: "2021-05-06T17:01:21Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:config: {} + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:type: {} + manager: kubectl + operation: Update + time: "2021-05-10T19:27:11Z" + name: karavi-authorization-config + namespace: powermax + resourceVersion: "1236152" + selfLink: /api/v1/namespaces/powermax/secrets/karavi-authorization-config + uid: a979891e-c7c2-4ef7-8ce2-689f9b6c652c + type: Opaque +- apiVersion: v1 + data: + ca.crt: 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 + namespace: cG93ZXJtYXg= + token: ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNklqSTRNRFZTYTJwaGJrRnROemxyV1VORFdVOVBiVmhyT0hGbmEyRlZXVnBHYm05d2NuTjRaemRNZGxVaWZRLmV5SnBjM01pT2lKcmRXSmxjbTVsZEdWekwzTmxjblpwWTJWaFkyTnZkVzUwSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXVZVzFsYzNCaFkyVWlPaUp3YjNkbGNtMWhlQ0lzSW10MVltVnlibVYwWlhNdWFXOHZjMlZ5ZG1salpXRmpZMjkxYm5RdmMyVmpjbVYwTG01aGJXVWlPaUp3YjNkbGNtMWhlQzFqYjI1MGNtOXNiR1Z5TFhSdmEyVnVMV3R5Tkcxeklpd2lhM1ZpWlhKdVpYUmxjeTVwYnk5elpYSjJhV05sWVdOamIzVnVkQzl6WlhKMmFXTmxMV0ZqWTI5MWJuUXVibUZ0WlNJNkluQnZkMlZ5YldGNExXTnZiblJ5YjJ4c1pYSWlMQ0pyZFdKbGNtNWxkR1Z6TG1sdkwzTmxjblpwWTJWaFkyTnZkVzUwTDNObGNuWnBZMlV0WVdOamIzVnVkQzUxYVdRaU9pSTRNekptWVRSa1ppMHdOamMzTFRSa05qWXRPR013TkMwME1UQTRNREV4WWpReVl6Y2lMQ0p6ZFdJaU9pSnplWE4wWlcwNmMyVnlkbWxqWldGalkyOTFiblE2Y0c5M1pYSnRZWGc2Y0c5M1pYSnRZWGd0WTI5dWRISnZiR3hsY2lKOS5rczZNV1FaUW9Oa0pWOFhfcmFpRTBGUVlEa2RIUklvclVwd0JMT1pia085Y0pjbDFfTVhjVUJiNG5FU2lMWDZGRVJQMDJ2TVo2Q0E5Tm92QnJTUHYwOVJPOXV2WC1sM2tITGY0UWZJcVBDWWJNaEdDU2RFMGJudmJkVXBmYkFIbnBmLVU3QU14ckF5ZHprUENQSFhGcjVUdENoWGFQb0w2MmlSc3NWa0oxXzdfaVNYTENLODZTa096c1BLT2l3NTNWNUUzV3NyT01jSGJkMWlNbElXaWo0bVlEUks4LVZxNzhidktJUkJ2ell5bUNQbHBKOXZKYzVVVHhQSFkyQk9UcC0zTHFmUEFnSXc1ZlpUNEo3QTlyRzdUYVowcWYxNDlkRnplNnNBbkFTeEc4MXFKWEI5TWZjT1FaN0tqZDFpMFlfMmxxem5STm1RN2xZZzNGOU8zRHc= + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: powermax-controller + kubernetes.io/service-account.uid: 832fa4df-0677-4d66-8c04-4108011b42c7 + creationTimestamp: "2021-05-10T21:24:23Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-05-10T21:24:23Z" + name: powermax-controller-token-kr4ms + namespace: powermax + resourceVersion: "1260686" + selfLink: /api/v1/namespaces/powermax/secrets/powermax-controller-token-kr4ms + uid: f81c6944-9d30-411c-b070-6b8d104bc760 + type: kubernetes.io/service-account-token +- apiVersion: v1 + data: + password: c21j + username: c21j + kind: Secret + metadata: + creationTimestamp: "2021-05-06T16:05:39Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:password: {} + f:username: {} + f:type: {} + manager: kubectl-create + operation: Update + time: "2021-05-06T16:05:39Z" + name: powermax-creds + namespace: powermax + resourceVersion: "305440" + selfLink: /api/v1/namespaces/powermax/secrets/powermax-creds + uid: a0661380-48d3-4823-8c85-b49290f7d4a6 + type: Opaque +- apiVersion: v1 + data: + access: ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTWpBMk9ESXhNRFFzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltdGhjbUYyYVMxMFpXNWhiblFpTENKeWIyeGxjeUk2SWxSbFlTSXNJbWR5YjNWd0lqb2lRMjltWm1WbEluMC5KWk9oRDZKQ1FLUm9wdFdGaXp3eFJ5TmxBNFREZmpUbXJSeENlMGlWVWxN + refresh: ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTWpNeU56UXdORFFzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltdGhjbUYyYVMxMFpXNWhiblFpTENKeWIyeGxjeUk2SWxSbFlTSXNJbWR5YjNWd0lqb2lRMjltWm1WbEluMC5XdnI1S2ZkV181dWNaRDV4c2RsbnVocWpaZElQQXpfa21rNFdaUURRaFgw + kind: Secret + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","data":{"access":"ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTWpBMk9ESXhNRFFzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltdGhjbUYyYVMxMFpXNWhiblFpTENKeWIyeGxjeUk2SWxSbFlTSXNJbWR5YjNWd0lqb2lRMjltWm1WbEluMC5KWk9oRDZKQ1FLUm9wdFdGaXp3eFJ5TmxBNFREZmpUbXJSeENlMGlWVWxN","refresh":"ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKcllYSmhkbWtpTENKbGVIQWlPakUyTWpNeU56UXdORFFzSW1semN5STZJbU52YlM1a1pXeHNMbXRoY21GMmFTSXNJbk4xWWlJNkltdGhjbUYyYVMxMFpXNWhiblFpTENKeWIyeGxjeUk2SWxSbFlTSXNJbWR5YjNWd0lqb2lRMjltWm1WbEluMC5XdnI1S2ZkV181dWNaRDV4c2RsbnVocWpaZElQQXpfa21rNFdaUURRaFgw"},"kind":"Secret","metadata":{"annotations":{},"name":"proxy-authz-tokens","namespace":"powermax"},"type":"Opaque"} + creationTimestamp: "2021-05-06T17:00:56Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:access: {} + f:refresh: {} + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:type: {} + manager: kubectl + operation: Update + time: "2021-05-10T21:27:25Z" + name: proxy-authz-tokens + namespace: powermax + resourceVersion: "1261411" + selfLink: /api/v1/namespaces/powermax/secrets/proxy-authz-tokens + uid: 04e6eb6a-98e5-440a-a9c7-ece7183e06b7 + type: Opaque +- apiVersion: v1 + data: + rootCertificate.pem: "" + kind: Secret + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","data":{"rootCertificate.pem":""},"kind":"Secret","metadata":{"annotations":{},"creationTimestamp":null,"name":"proxy-server-root-certificate","namespace":"powermax"},"type":"Opaque"} + creationTimestamp: "2021-05-06T17:01:21Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:rootCertificate.pem: {} + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:type: {} + manager: kubectl + operation: Update + time: "2021-05-10T21:27:26Z" + name: proxy-server-root-certificate + namespace: powermax + resourceVersion: "1261413" + selfLink: /api/v1/namespaces/powermax/secrets/proxy-server-root-certificate + uid: 838f9763-f16d-4cb5-a800-be56778f7373 + type: Opaque +- apiVersion: v1 + data: + release: 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 + kind: Secret + metadata: + creationTimestamp: "2021-05-10T21:24:23Z" + labels: + modifiedAt: "1620696093" + name: powermax + owner: helm + status: deployed + version: "1" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:release: {} + f:metadata: + f:labels: + .: {} + f:modifiedAt: {} + f:name: {} + f:owner: {} + f:status: {} + f:version: {} + f:type: {} + manager: helm + operation: Update + time: "2021-05-10T21:24:23Z" + name: sh.helm.release.v1.powermax.v1 + namespace: powermax + resourceVersion: "1260706" + selfLink: /api/v1/namespaces/powermax/secrets/sh.helm.release.v1.powermax.v1 + uid: 086faf2f-ec12-4138-9b55-b2cb5c26cbe3 + type: helm.sh/release.v1 +- apiVersion: apps/v1 + kind: Deployment + metadata: + annotations: + com.dell.karavi-authorization-proxy: "true" + deployment.kubernetes.io/revision: "3" + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{"com.dell.karavi-authorization-proxy":"true","deployment.kubernetes.io/revision":"1","meta.helm.sh/release-name":"powermax","meta.helm.sh/release-namespace":"powermax"},"creationTimestamp":"2021-05-10T21:24:23Z","generation":2,"labels":{"app.kubernetes.io/managed-by":"Helm"},"managedFields":[{"apiVersion":"apps/v1","fieldsType":"FieldsV1","fieldsV1":{"f:metadata":{"f:annotations":{".":{},"f:meta.helm.sh/release-name":{},"f:meta.helm.sh/release-namespace":{}},"f:labels":{".":{},"f:app.kubernetes.io/managed-by":{}}},"f:spec":{"f:progressDeadlineSeconds":{},"f:revisionHistoryLimit":{},"f:selector":{"f:matchLabels":{".":{},"f:name":{}}},"f:strategy":{"f:rollingUpdate":{".":{},"f:maxSurge":{},"f:maxUnavailable":{}},"f:type":{}},"f:template":{"f:metadata":{"f:labels":{".":{},"f:name":{}}},"f:spec":{"f:affinity":{".":{},"f:podAntiAffinity":{".":{},"f:requiredDuringSchedulingIgnoredDuringExecution":{}}},"f:containers":{"k:{\"name\":\"attacher\"}":{".":{},"f:args":{},"f:env":{".":{},"k:{\"name\":\"ADDRESS\"}":{".":{},"f:name":{},"f:value":{}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/var/run/csi\"}":{".":{},"f:mountPath":{},"f:name":{}}}},"k:{\"name\":\"driver\"}":{".":{},"f:args":{},"f:command":{},"f:env":{".":{},"k:{\"name\":\"CSI_ENDPOINT\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"SSL_CERT_DIR\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_DEBUG\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_GRPC_MAX_THREADS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_IG_MODIFY_HOSTNAME\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_IG_NODENAME_TEMPLATE\"}":{".":{},"f:name":{}},"k:{\"name\":\"X_CSI_K8S_CLUSTER_PREFIX\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_MODE\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_ARRAYS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_DEBUG\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_DRIVER_NAME\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_ENDPOINT\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_INSECURE\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_PASSWORD\"}":{".":{},"f:name":{},"f:valueFrom":{".":{},"f:secretKeyRef":{".":{},"f:key":{},"f:name":{}}}},"k:{\"name\":\"X_CSI_POWERMAX_PORTGROUPS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_PROXY_SERVICE_NAME\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_USER\"}":{".":{},"f:name":{},"f:valueFrom":{".":{},"f:secretKeyRef":{".":{},"f:key":{},"f:name":{}}}},"k:{\"name\":\"X_CSI_POWERMAX_VERSION\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_ReplicationContextPrefix\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_ReplicationPrefix\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_TRANSPORT_PROTOCOL\"}":{".":{},"f:name":{}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/certs\"}":{".":{},"f:mountPath":{},"f:name":{},"f:readOnly":{}},"k:{\"mountPath\":\"/var/run/csi\"}":{".":{},"f:mountPath":{},"f:name":{}}}},"k:{\"name\":\"provisioner\"}":{".":{},"f:args":{},"f:env":{".":{},"k:{\"name\":\"ADDRESS\"}":{".":{},"f:name":{},"f:value":{}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/var/run/csi\"}":{".":{},"f:mountPath":{},"f:name":{}}}},"k:{\"name\":\"resizer\"}":{".":{},"f:args":{},"f:env":{".":{},"k:{\"name\":\"ADDRESS\"}":{".":{},"f:name":{},"f:value":{}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/var/run/csi\"}":{".":{},"f:mountPath":{},"f:name":{}}}},"k:{\"name\":\"snapshotter\"}":{".":{},"f:args":{},"f:env":{".":{},"k:{\"name\":\"ADDRESS\"}":{".":{},"f:name":{},"f:value":{}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/var/run/csi\"}":{".":{},"f:mountPath":{},"f:name":{}}}}},"f:dnsPolicy":{},"f:restartPolicy":{},"f:schedulerName":{},"f:securityContext":{},"f:serviceAccount":{},"f:serviceAccountName":{},"f:terminationGracePeriodSeconds":{},"f:volumes":{".":{},"k:{\"name\":\"certs\"}":{".":{},"f:name":{},"f:secret":{".":{},"f:defaultMode":{},"f:optional":{},"f:secretName":{}}},"k:{\"name\":\"socket-dir\"}":{".":{},"f:emptyDir":{},"f:name":{}}}}}}},"manager":"Go-http-client","operation":"Update","time":"2021-05-10T21:24:23Z"},{"apiVersion":"apps/v1","fieldsType":"FieldsV1","fieldsV1":{"f:metadata":{"f:annotations":{"f:deployment.kubernetes.io/revision":{}}},"f:status":{"f:availableReplicas":{},"f:conditions":{".":{},"k:{\"type\":\"Available\"}":{".":{},"f:lastTransitionTime":{},"f:lastUpdateTime":{},"f:message":{},"f:reason":{},"f:status":{},"f:type":{}},"k:{\"type\":\"Progressing\"}":{".":{},"f:lastTransitionTime":{},"f:lastUpdateTime":{},"f:message":{},"f:reason":{},"f:status":{},"f:type":{}}},"f:observedGeneration":{},"f:readyReplicas":{},"f:replicas":{},"f:updatedReplicas":{}}},"manager":"kube-controller-manager","operation":"Update","time":"2021-05-10T21:25:07Z"},{"apiVersion":"apps/v1","fieldsType":"FieldsV1","fieldsV1":{"f:spec":{"f:replicas":{}}},"manager":"kubectl","operation":"Update","time":"2021-05-10T21:25:07Z"}],"name":"powermax-controller","namespace":"powermax","resourceVersion":"1260925","selfLink":"/apis/apps/v1/namespaces/powermax/deployments/powermax-controller","uid":"ac3fab65-6416-4793-9f62-972ce7ee3d44"},"spec":{"progressDeadlineSeconds":600,"replicas":1,"revisionHistoryLimit":10,"selector":{"matchLabels":{"name":"powermax-controller"}},"strategy":{"rollingUpdate":{"maxSurge":"25%","maxUnavailable":"25%"},"type":"RollingUpdate"},"template":{"metadata":{"creationTimestamp":null,"labels":{"name":"powermax-controller"}},"spec":{"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchExpressions":[{"key":"name","operator":"In","values":["powermax-controller"]}]},"topologyKey":"kubernetes.io/hostname"}]}},"containers":[{"args":["--csi-address=$(ADDRESS)","--v=5","--timeout=180s","--worker-threads=6","--leader-election"],"env":[{"name":"ADDRESS","value":"/var/run/csi/csi.sock"}],"image":"k8s.gcr.io/sig-storage/csi-attacher:v3.1.0","imagePullPolicy":"IfNotPresent","name":"attacher","resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/var/run/csi","name":"socket-dir"}]},{"args":["--csi-address=$(ADDRESS)","--volume-name-prefix=mich","--volume-name-uuid-length=10","--timeout=180s","--worker-threads=6","--v=5","--default-fstype=ext4","--leader-election","--extra-create-metadata","--feature-gates=Topology=true"],"env":[{"name":"ADDRESS","value":"/var/run/csi/csi.sock"}],"image":"k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0","imagePullPolicy":"IfNotPresent","name":"provisioner","resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/var/run/csi","name":"socket-dir"}]},{"args":["--csi-address=$(ADDRESS)","--v=5","--snapshot-name-prefix=pmsn","--snapshot-name-uuid-length=10","--timeout=180s","--leader-election"],"env":[{"name":"ADDRESS","value":"/var/run/csi/csi.sock"}],"image":"k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.3","imagePullPolicy":"IfNotPresent","name":"snapshotter","resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/var/run/csi","name":"socket-dir"}]},{"args":["--csi-address=$(ADDRESS)","--timeout=180s","--v=5","--leader-election"],"env":[{"name":"ADDRESS","value":"/var/run/csi/csi.sock"}],"image":"quay.io/k8scsi/csi-resizer:v1.1.0","imagePullPolicy":"IfNotPresent","name":"resizer","resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/var/run/csi","name":"socket-dir"}]},{"args":["--leader-election"],"command":["/csi-powermax.sh"],"env":[{"name":"X_CSI_POWERMAX_DRIVER_NAME","value":"csi-powermax.dellemc.com"},{"name":"CSI_ENDPOINT","value":"/var/run/csi/csi.sock"},{"name":"X_CSI_MODE","value":"controller"},{"name":"X_CSI_DEBUG","value":"true"},{"name":"X_CSI_POWERMAX_ENDPOINT","value":"https://localhost:9200"},{"name":"X_CSI_POWERMAX_USER","valueFrom":{"secretKeyRef":{"key":"username","name":"powermax-creds"}}},{"name":"X_CSI_POWERMAX_PASSWORD","valueFrom":{"secretKeyRef":{"key":"password","name":"powermax-creds"}}},{"name":"X_CSI_POWERMAX_VERSION","value":"90"},{"name":"X_CSI_POWERMAX_DEBUG","value":"true"},{"name":"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION","value":"true"},{"name":"X_CSI_POWERMAX_INSECURE","value":"none"},{"name":"X_CSI_POWERMAX_PROXY_SERVICE_NAME","value":"none"},{"name":"X_CSI_POWERMAX_PORTGROUPS","value":"powermax-port-group"},{"name":"X_CSI_K8S_CLUSTER_PREFIX","value":"MIC"},{"name":"X_CSI_POWERMAX_ARRAYS","value":"1234567890"},{"name":"X_CSI_GRPC_MAX_THREADS","value":"4"},{"name":"X_CSI_TRANSPORT_PROTOCOL"},{"name":"SSL_CERT_DIR","value":"/certs"},{"name":"X_CSI_IG_NODENAME_TEMPLATE"},{"name":"X_CSI_IG_MODIFY_HOSTNAME","value":"false"},{"name":"X_CSI_ReplicationContextPrefix","value":"powermax/"},{"name":"X_CSI_ReplicationPrefix","value":"replication.storage.dell.com/"},{"name":"CSM_CSI_POWERMAX_ENDPOINT","value":"https://10.0.0.1:9000"}],"image":"dellemc/csi-powermax:v1.6.0","imagePullPolicy":"Always","name":"driver","resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/var/run/csi","name":"socket-dir"},{"mountPath":"/certs","name":"certs","readOnly":true}]},{"env":[{"name":"PROXY_HOST","value":"proxy-host"},{"name":"INSECURE","value":"true"},{"name":"PLUGIN_IDENTIFIER","value":"powermax"},{"name":"ACCESS_TOKEN","valueFrom":{"secretKeyRef":{"key":"access","name":"proxy-authz-tokens"}}},{"name":"REFRESH_TOKEN","valueFrom":{"secretKeyRef":{"key":"refresh","name":"proxy-authz-tokens"}}}],"image":"sidecar-proxy:latest","imagePullPolicy":"Always","name":"karavi-authorization-proxy","resources":{},"volumeMounts":[{"mountPath":"/etc/karavi-authorization/config","name":"karavi-authorization-config"},{"mountPath":"/etc/karavi-authorization/root-certificates","name":"proxy-server-root-certificate"}]}],"dnsPolicy":"ClusterFirst","restartPolicy":"Always","schedulerName":"default-scheduler","securityContext":{},"serviceAccount":"powermax-controller","serviceAccountName":"powermax-controller","terminationGracePeriodSeconds":30,"volumes":[{"emptyDir":{},"name":"socket-dir"},{"name":"certs","secret":{"defaultMode":420,"optional":true,"secretName":"powermax-certs"}},{"name":"karavi-authorization-config","secret":{"secretName":"karavi-authorization-config"}},{"name":"proxy-server-root-certificate","secret":{"secretName":"proxy-server-root-certificate"}}]}}},"status":{"availableReplicas":1,"conditions":[{"lastTransitionTime":"2021-05-10T21:24:26Z","lastUpdateTime":"2021-05-10T21:24:26Z","message":"Deployment has minimum availability.","reason":"MinimumReplicasAvailable","status":"True","type":"Available"},{"lastTransitionTime":"2021-05-10T21:24:23Z","lastUpdateTime":"2021-05-10T21:24:26Z","message":"ReplicaSet \"powermax-controller-78f749847\" has successfully progressed.","reason":"NewReplicaSetAvailable","status":"True","type":"Progressing"}],"observedGeneration":2,"readyReplicas":1,"replicas":1,"updatedReplicas":1}} + meta.helm.sh/release-name: powermax + meta.helm.sh/release-namespace: powermax + creationTimestamp: "2021-05-10T21:24:23Z" + generation: 4 + labels: + app.kubernetes.io/managed-by: Helm + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:meta.helm.sh/release-name: {} + f:meta.helm.sh/release-namespace: {} + f:labels: + .: {} + f:app.kubernetes.io/managed-by: {} + f:spec: + f:progressDeadlineSeconds: {} + f:revisionHistoryLimit: {} + f:selector: + f:matchLabels: + .: {} + f:name: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:name: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:requiredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"attacher"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"driver"}: + .: {} + f:args: {} + f:command: {} + f:env: + .: {} + k:{"name":"CSI_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"SSL_CERT_DIR"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_GRPC_MAX_THREADS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_MODIFY_HOSTNAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_NODENAME_TEMPLATE"}: + .: {} + f:name: {} + k:{"name":"X_CSI_K8S_CLUSTER_PREFIX"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ARRAYS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DRIVER_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ENDPOINT"}: + .: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_INSECURE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_PASSWORD"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_PORTGROUPS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_PROXY_SERVICE_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_USER"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_VERSION"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_ReplicationContextPrefix"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_ReplicationPrefix"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_TRANSPORT_PROTOCOL"}: + .: {} + f:name: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"provisioner"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"resizer"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"snapshotter"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"certs"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:optional: {} + f:secretName: {} + k:{"name":"socket-dir"}: + .: {} + f:emptyDir: {} + f:name: {} + manager: Go-http-client + operation: Update + time: "2021-05-10T21:24:23Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:com.dell.karavi-authorization-proxy: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:spec: + f:replicas: {} + f:template: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/restartedAt: {} + f:spec: + f:containers: + k:{"name":"driver"}: + f:env: + k:{"name":"CSM_CSI_POWERMAX_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ENDPOINT"}: + f:value: {} + k:{"name":"karavi-authorization-proxy"}: + .: {} + f:env: + .: {} + k:{"name":"ACCESS_TOKEN"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"INSECURE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"PLUGIN_IDENTIFIER"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"PROXY_HOST"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"REFRESH_TOKEN"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/karavi-authorization/config"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/etc/karavi-authorization/root-certificates"}: + .: {} + f:mountPath: {} + f:name: {} + f:volumes: + k:{"name":"karavi-authorization-config"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + k:{"name":"proxy-server-root-certificate"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + manager: kubectl + operation: Update + time: "2021-05-10T21:27:26Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + time: "2021-05-10T21:27:46Z" + name: powermax-controller + namespace: powermax + resourceVersion: "1261652" + selfLink: /apis/apps/v1/namespaces/powermax/deployments/powermax-controller + uid: ac3fab65-6416-4793-9f62-972ce7ee3d44 + spec: + progressDeadlineSeconds: 600 + replicas: 1 + revisionHistoryLimit: 10 + selector: + matchLabels: + name: powermax-controller + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 25% + type: RollingUpdate + template: + metadata: + annotations: + kubectl.kubernetes.io/restartedAt: "2021-05-10T17:27:26-04:00" + creationTimestamp: null + labels: + name: powermax-controller + spec: + affinity: + podAntiAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + - labelSelector: + matchExpressions: + - key: name + operator: In + values: + - powermax-controller + topologyKey: kubernetes.io/hostname + containers: + - args: + - --csi-address=$(ADDRESS) + - --v=5 + - --timeout=180s + - --worker-threads=6 + - --leader-election + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-attacher:v3.1.0 + imagePullPolicy: IfNotPresent + name: attacher + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --volume-name-prefix=mich + - --volume-name-uuid-length=10 + - --timeout=180s + - --worker-threads=6 + - --v=5 + - --default-fstype=ext4 + - --leader-election + - --extra-create-metadata + - --feature-gates=Topology=true + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0 + imagePullPolicy: IfNotPresent + name: provisioner + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --v=5 + - --snapshot-name-prefix=pmsn + - --snapshot-name-uuid-length=10 + - --timeout=180s + - --leader-election + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.3 + imagePullPolicy: IfNotPresent + name: snapshotter + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --timeout=180s + - --v=5 + - --leader-election + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: quay.io/k8scsi/csi-resizer:v1.1.0 + imagePullPolicy: IfNotPresent + name: resizer + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --leader-election + command: + - /csi-powermax.sh + env: + - name: X_CSI_POWERMAX_DRIVER_NAME + value: csi-powermax.dellemc.com + - name: CSI_ENDPOINT + value: /var/run/csi/csi.sock + - name: X_CSI_MODE + value: controller + - name: X_CSI_DEBUG + value: "true" + - name: X_CSI_POWERMAX_ENDPOINT + value: https://localhost:9200 + - name: X_CSI_POWERMAX_USER + valueFrom: + secretKeyRef: + key: username + name: powermax-creds + - name: X_CSI_POWERMAX_PASSWORD + valueFrom: + secretKeyRef: + key: password + name: powermax-creds + - name: X_CSI_POWERMAX_VERSION + value: "90" + - name: X_CSI_POWERMAX_DEBUG + value: "true" + - name: X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION + value: "true" + - name: X_CSI_POWERMAX_INSECURE + value: none + - name: X_CSI_POWERMAX_PROXY_SERVICE_NAME + value: none + - name: X_CSI_POWERMAX_PORTGROUPS + value: powermax-port-group + - name: X_CSI_K8S_CLUSTER_PREFIX + value: MIC + - name: X_CSI_POWERMAX_ARRAYS + value: "1234567890" + - name: X_CSI_GRPC_MAX_THREADS + value: "4" + - name: X_CSI_TRANSPORT_PROTOCOL + - name: SSL_CERT_DIR + value: /certs + - name: X_CSI_IG_NODENAME_TEMPLATE + - name: X_CSI_IG_MODIFY_HOSTNAME + value: "false" + - name: X_CSI_ReplicationContextPrefix + value: powermax/ + - name: X_CSI_ReplicationPrefix + value: replication.storage.dell.com/ + - name: CSM_CSI_POWERMAX_ENDPOINT + value: https://10.0.0.1:9000 + image: dellemc/csi-powermax:v1.6.0 + imagePullPolicy: Always + name: driver + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - mountPath: /certs + name: certs + readOnly: true + - env: + - name: PROXY_HOST + value: proxy-host + - name: INSECURE + value: "true" + - name: PLUGIN_IDENTIFIER + value: powermax + - name: ACCESS_TOKEN + valueFrom: + secretKeyRef: + key: access + name: proxy-authz-tokens + - name: REFRESH_TOKEN + valueFrom: + secretKeyRef: + key: refresh + name: proxy-authz-tokens + image: sidecar-proxy:latest + imagePullPolicy: Always + name: karavi-authorization-proxy + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/karavi-authorization/config + name: karavi-authorization-config + - mountPath: /etc/karavi-authorization/root-certificates + name: proxy-server-root-certificate + dnsPolicy: ClusterFirst + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: powermax-controller + serviceAccountName: powermax-controller + terminationGracePeriodSeconds: 30 + volumes: + - emptyDir: {} + name: socket-dir + - name: certs + secret: + defaultMode: 420 + optional: true + secretName: powermax-certs + - name: karavi-authorization-config + secret: + defaultMode: 420 + secretName: karavi-authorization-config + - name: proxy-server-root-certificate + secret: + defaultMode: 420 + secretName: proxy-server-root-certificate + status: + availableReplicas: 1 + conditions: + - lastTransitionTime: "2021-05-10T21:24:26Z" + lastUpdateTime: "2021-05-10T21:24:26Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + - lastTransitionTime: "2021-05-10T21:24:23Z" + lastUpdateTime: "2021-05-10T21:27:46Z" + message: ReplicaSet "powermax-controller-6b4cd67f68" has successfully progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + observedGeneration: 4 + readyReplicas: 1 + replicas: 1 + updatedReplicas: 1 +- apiVersion: apps/v1 + kind: DaemonSet + metadata: + annotations: + com.dell.karavi-authorization-proxy: "true" + deprecated.daemonset.template.generation: "3" + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"apps/v1","kind":"DaemonSet","metadata":{"annotations":{"com.dell.karavi-authorization-proxy":"true","deprecated.daemonset.template.generation":"1","meta.helm.sh/release-name":"powermax","meta.helm.sh/release-namespace":"powermax"},"creationTimestamp":"2021-05-10T21:24:23Z","generation":1,"labels":{"app.kubernetes.io/managed-by":"Helm"},"managedFields":[{"apiVersion":"apps/v1","fieldsType":"FieldsV1","fieldsV1":{"f:metadata":{"f:annotations":{".":{},"f:deprecated.daemonset.template.generation":{},"f:meta.helm.sh/release-name":{},"f:meta.helm.sh/release-namespace":{}},"f:labels":{".":{},"f:app.kubernetes.io/managed-by":{}}},"f:spec":{"f:revisionHistoryLimit":{},"f:selector":{"f:matchLabels":{".":{},"f:app":{}}},"f:template":{"f:metadata":{"f:labels":{".":{},"f:app":{}}},"f:spec":{"f:containers":{"k:{\"name\":\"driver\"}":{".":{},"f:command":{},"f:env":{".":{},"k:{\"name\":\"CSI_ENDPOINT\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"SSL_CERT_DIR\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_DEBUG\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_GRPC_MAX_THREADS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_IG_MODIFY_HOSTNAME\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_IG_NODENAME_TEMPLATE\"}":{".":{},"f:name":{}},"k:{\"name\":\"X_CSI_ISCSI_CHROOT\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_K8S_CLUSTER_PREFIX\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_MODE\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_ARRAYS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_DEBUG\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_DRIVER_NAME\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_ENDPOINT\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_INSECURE\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_ISCSI_ENABLE_CHAP\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_NODENAME\"}":{".":{},"f:name":{},"f:valueFrom":{".":{},"f:fieldRef":{".":{},"f:apiVersion":{},"f:fieldPath":{}}}},"k:{\"name\":\"X_CSI_POWERMAX_PASSWORD\"}":{".":{},"f:name":{},"f:valueFrom":{".":{},"f:secretKeyRef":{".":{},"f:key":{},"f:name":{}}}},"k:{\"name\":\"X_CSI_POWERMAX_PORTGROUPS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_PROXY_SERVICE_NAME\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_POWERMAX_USER\"}":{".":{},"f:name":{},"f:valueFrom":{".":{},"f:secretKeyRef":{".":{},"f:key":{},"f:name":{}}}},"k:{\"name\":\"X_CSI_PRIVATE_MOUNT_DIR\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"X_CSI_TRANSPORT_PROTOCOL\"}":{".":{},"f:name":{}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:securityContext":{".":{},"f:allowPrivilegeEscalation":{},"f:capabilities":{".":{},"f:add":{}},"f:privileged":{}},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/certs\"}":{".":{},"f:mountPath":{},"f:name":{},"f:readOnly":{}},"k:{\"mountPath\":\"/dev\"}":{".":{},"f:mountPath":{},"f:name":{}},"k:{\"mountPath\":\"/noderoot\"}":{".":{},"f:mountPath":{},"f:name":{}},"k:{\"mountPath\":\"/run/dbus/system_bus_socket\"}":{".":{},"f:mountPath":{},"f:name":{}},"k:{\"mountPath\":\"/sys\"}":{".":{},"f:mountPath":{},"f:name":{}},"k:{\"mountPath\":\"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices\"}":{".":{},"f:mountPath":{},"f:mountPropagation":{},"f:name":{}},"k:{\"mountPath\":\"/var/lib/kubelet/plugins/powermax.emc.dell.com\"}":{".":{},"f:mountPath":{},"f:name":{}},"k:{\"mountPath\":\"/var/lib/kubelet/pods\"}":{".":{},"f:mountPath":{},"f:mountPropagation":{},"f:name":{}}}},"k:{\"name\":\"registrar\"}":{".":{},"f:args":{},"f:env":{".":{},"k:{\"name\":\"ADDRESS\"}":{".":{},"f:name":{},"f:value":{}},"k:{\"name\":\"KUBE_NODE_NAME\"}":{".":{},"f:name":{},"f:valueFrom":{".":{},"f:fieldRef":{".":{},"f:apiVersion":{},"f:fieldPath":{}}}}},"f:image":{},"f:imagePullPolicy":{},"f:name":{},"f:resources":{},"f:terminationMessagePath":{},"f:terminationMessagePolicy":{},"f:volumeMounts":{".":{},"k:{\"mountPath\":\"/csi\"}":{".":{},"f:mountPath":{},"f:name":{}},"k:{\"mountPath\":\"/registration\"}":{".":{},"f:mountPath":{},"f:name":{}}}}},"f:dnsPolicy":{},"f:hostIPC":{},"f:hostNetwork":{},"f:restartPolicy":{},"f:schedulerName":{},"f:securityContext":{},"f:terminationGracePeriodSeconds":{},"f:tolerations":{},"f:volumes":{".":{},"k:{\"name\":\"certs\"}":{".":{},"f:name":{},"f:secret":{".":{},"f:defaultMode":{},"f:optional":{},"f:secretName":{}}},"k:{\"name\":\"dbus-socket\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"dev\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"driver-path\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"noderoot\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"pods-path\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"registration-dir\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"sys\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}},"k:{\"name\":\"volumedevices-path\"}":{".":{},"f:hostPath":{".":{},"f:path":{},"f:type":{}},"f:name":{}}}}},"f:updateStrategy":{"f:rollingUpdate":{".":{},"f:maxUnavailable":{}},"f:type":{}}}},"manager":"Go-http-client","operation":"Update","time":"2021-05-10T21:24:23Z"},{"apiVersion":"apps/v1","fieldsType":"FieldsV1","fieldsV1":{"f:status":{"f:currentNumberScheduled":{},"f:desiredNumberScheduled":{},"f:numberAvailable":{},"f:numberReady":{},"f:observedGeneration":{},"f:updatedNumberScheduled":{}}},"manager":"kube-controller-manager","operation":"Update","time":"2021-05-10T21:24:26Z"}],"name":"powermax-node","namespace":"powermax","resourceVersion":"1260780","selfLink":"/apis/apps/v1/namespaces/powermax/daemonsets/powermax-node","uid":"ff7aee88-3b86-4ebf-be70-764d88403ace"},"spec":{"revisionHistoryLimit":10,"selector":{"matchLabels":{"app":"powermax-node"}},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"powermax-node"}},"spec":{"containers":[{"command":["/csi-powermax.sh"],"env":[{"name":"X_CSI_POWERMAX_DRIVER_NAME","value":"csi-powermax.dellemc.com"},{"name":"CSI_ENDPOINT","value":"unix:///var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock"},{"name":"X_CSI_MODE","value":"node"},{"name":"X_CSI_DEBUG","value":"true"},{"name":"X_CSI_PRIVATE_MOUNT_DIR","value":"/var/lib/kubelet/plugins/powermax.emc.dell.com/disks"},{"name":"X_CSI_POWERMAX_ENDPOINT","value":"https://localhost:9200"},{"name":"X_CSI_POWERMAX_DEBUG","value":"true"},{"name":"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION","value":"true"},{"name":"X_CSI_POWERMAX_INSECURE","value":"none"},{"name":"X_CSI_K8S_CLUSTER_PREFIX","value":"MIC"},{"name":"X_CSI_POWERMAX_USER","valueFrom":{"secretKeyRef":{"key":"username","name":"powermax-creds"}}},{"name":"X_CSI_POWERMAX_PASSWORD","valueFrom":{"secretKeyRef":{"key":"password","name":"powermax-creds"}}},{"name":"X_CSI_POWERMAX_NODENAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"X_CSI_POWERMAX_ISCSI_ENABLE_CHAP","value":"false"},{"name":"X_CSI_POWERMAX_ARRAYS","value":"1234567890"},{"name":"X_CSI_POWERMAX_PROXY_SERVICE_NAME","value":"none"},{"name":"X_CSI_ISCSI_CHROOT","value":"/noderoot"},{"name":"X_CSI_GRPC_MAX_THREADS","value":"4"},{"name":"X_CSI_TRANSPORT_PROTOCOL"},{"name":"SSL_CERT_DIR","value":"/certs"},{"name":"X_CSI_IG_NODENAME_TEMPLATE"},{"name":"X_CSI_IG_MODIFY_HOSTNAME","value":"false"},{"name":"X_CSI_POWERMAX_PORTGROUPS","value":"powermax-port-group"}],"image":"dellemc/csi-powermax:v1.6.0","imagePullPolicy":"Always","name":"driver","resources":{},"securityContext":{"allowPrivilegeEscalation":true,"capabilities":{"add":["SYS_ADMIN"]},"privileged":true},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/var/lib/kubelet/plugins/powermax.emc.dell.com","name":"driver-path"},{"mountPath":"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices","mountPropagation":"Bidirectional","name":"volumedevices-path"},{"mountPath":"/var/lib/kubelet/pods","mountPropagation":"Bidirectional","name":"pods-path"},{"mountPath":"/dev","name":"dev"},{"mountPath":"/sys","name":"sys"},{"mountPath":"/noderoot","name":"noderoot"},{"mountPath":"/certs","name":"certs","readOnly":true},{"mountPath":"/run/dbus/system_bus_socket","name":"dbus-socket"}]},{"args":["--v=5","--csi-address=$(ADDRESS)","--kubelet-registration-path=/var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock"],"env":[{"name":"ADDRESS","value":"/csi/csi_sock"},{"name":"KUBE_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"image":"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0","imagePullPolicy":"IfNotPresent","name":"registrar","resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","volumeMounts":[{"mountPath":"/registration","name":"registration-dir"},{"mountPath":"/csi","name":"driver-path"}]},{"env":[{"name":"PROXY_HOST","value":"proxy-host"},{"name":"INSECURE","value":"true"},{"name":"PLUGIN_IDENTIFIER","value":"powermax"},{"name":"ACCESS_TOKEN","valueFrom":{"secretKeyRef":{"key":"access","name":"proxy-authz-tokens"}}},{"name":"REFRESH_TOKEN","valueFrom":{"secretKeyRef":{"key":"refresh","name":"proxy-authz-tokens"}}}],"image":"sidecar-proxy:latest","imagePullPolicy":"Always","name":"karavi-authorization-proxy","resources":{},"volumeMounts":[{"mountPath":"/etc/karavi-authorization/config","name":"karavi-authorization-config"},{"mountPath":"/etc/karavi-authorization/root-certificates","name":"proxy-server-root-certificate"}]}],"dnsPolicy":"ClusterFirstWithHostNet","hostIPC":true,"hostNetwork":true,"restartPolicy":"Always","schedulerName":"default-scheduler","securityContext":{},"terminationGracePeriodSeconds":30,"tolerations":[{"effect":"NoExecute","key":"node.kubernetes.io/memory-pressure","operator":"Exists"},{"effect":"NoExecute","key":"node.kubernetes.io/disk-pressure","operator":"Exists"},{"effect":"NoExecute","key":"node.kubernetes.io/network-unavailable","operator":"Exists"}],"volumes":[{"hostPath":{"path":"/var/lib/kubelet/plugins_registry/","type":"DirectoryOrCreate"},"name":"registration-dir"},{"hostPath":{"path":"/var/lib/kubelet/plugins/powermax.emc.dell.com","type":"DirectoryOrCreate"},"name":"driver-path"},{"hostPath":{"path":"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices","type":"DirectoryOrCreate"},"name":"volumedevices-path"},{"hostPath":{"path":"/var/lib/kubelet/pods","type":"Directory"},"name":"pods-path"},{"hostPath":{"path":"/dev","type":"Directory"},"name":"dev"},{"hostPath":{"path":"/sys","type":"Directory"},"name":"sys"},{"hostPath":{"path":"/","type":"Directory"},"name":"noderoot"},{"hostPath":{"path":"/run/dbus/system_bus_socket","type":"Socket"},"name":"dbus-socket"},{"name":"certs","secret":{"defaultMode":420,"optional":true,"secretName":"powermax-certs"}},{"name":"karavi-authorization-config","secret":{"secretName":"karavi-authorization-config"}},{"name":"proxy-server-root-certificate","secret":{"secretName":"proxy-server-root-certificate"}}]}},"updateStrategy":{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}},"status":{"currentNumberScheduled":2,"desiredNumberScheduled":2,"numberAvailable":2,"numberMisscheduled":0,"numberReady":2,"observedGeneration":1,"updatedNumberScheduled":2}} + meta.helm.sh/release-name: powermax + meta.helm.sh/release-namespace: powermax + creationTimestamp: "2021-05-10T21:24:23Z" + generation: 3 + labels: + app.kubernetes.io/managed-by: Helm + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deprecated.daemonset.template.generation: {} + f:meta.helm.sh/release-name: {} + f:meta.helm.sh/release-namespace: {} + f:labels: + .: {} + f:app.kubernetes.io/managed-by: {} + f:spec: + f:revisionHistoryLimit: {} + f:selector: + f:matchLabels: + .: {} + f:app: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app: {} + f:spec: + f:containers: + k:{"name":"driver"}: + .: {} + f:command: {} + f:env: + .: {} + k:{"name":"CSI_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"SSL_CERT_DIR"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_GRPC_MAX_THREADS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_MODIFY_HOSTNAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_IG_NODENAME_TEMPLATE"}: + .: {} + f:name: {} + k:{"name":"X_CSI_ISCSI_CHROOT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_K8S_CLUSTER_PREFIX"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ARRAYS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_DRIVER_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ENDPOINT"}: + .: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_INSECURE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_ISCSI_ENABLE_CHAP"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_NODENAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: + .: {} + f:apiVersion: {} + f:fieldPath: {} + k:{"name":"X_CSI_POWERMAX_PASSWORD"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_POWERMAX_PORTGROUPS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_PROXY_SERVICE_NAME"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_POWERMAX_USER"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"X_CSI_PRIVATE_MOUNT_DIR"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_TRANSPORT_PROTOCOL"}: + .: {} + f:name: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:privileged: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/dev"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/noderoot"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/run/dbus/system_bus_socket"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/sys"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices"}: + .: {} + f:mountPath: {} + f:mountPropagation: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/plugins/powermax.emc.dell.com"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/pods"}: + .: {} + f:mountPath: {} + f:mountPropagation: {} + f:name: {} + k:{"name":"registrar"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"KUBE_NODE_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: + .: {} + f:apiVersion: {} + f:fieldPath: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/registration"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:hostIPC: {} + f:hostNetwork: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"certs"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:optional: {} + f:secretName: {} + k:{"name":"dbus-socket"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"dev"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"driver-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"noderoot"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"pods-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"registration-dir"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"sys"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"volumedevices-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + f:updateStrategy: + f:rollingUpdate: + .: {} + f:maxUnavailable: {} + f:type: {} + manager: Go-http-client + operation: Update + time: "2021-05-10T21:24:23Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:com.dell.karavi-authorization-proxy: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:spec: + f:template: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/restartedAt: {} + f:spec: + f:containers: + k:{"name":"driver"}: + f:env: + k:{"name":"X_CSI_POWERMAX_ENDPOINT"}: + f:value: {} + k:{"name":"karavi-authorization-proxy"}: + .: {} + f:env: + .: {} + k:{"name":"ACCESS_TOKEN"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"INSECURE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"PLUGIN_IDENTIFIER"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"PROXY_HOST"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"REFRESH_TOKEN"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/karavi-authorization/config"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/etc/karavi-authorization/root-certificates"}: + .: {} + f:mountPath: {} + f:name: {} + f:volumes: + k:{"name":"karavi-authorization-config"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + k:{"name":"proxy-server-root-certificate"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + manager: kubectl + operation: Update + time: "2021-05-10T21:27:26Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:currentNumberScheduled: {} + f:desiredNumberScheduled: {} + f:numberAvailable: {} + f:numberReady: {} + f:observedGeneration: {} + f:updatedNumberScheduled: {} + manager: kube-controller-manager + operation: Update + time: "2021-05-10T21:27:43Z" + name: powermax-node + namespace: powermax + resourceVersion: "1261606" + selfLink: /apis/apps/v1/namespaces/powermax/daemonsets/powermax-node + uid: ff7aee88-3b86-4ebf-be70-764d88403ace + spec: + revisionHistoryLimit: 10 + selector: + matchLabels: + app: powermax-node + template: + metadata: + annotations: + kubectl.kubernetes.io/restartedAt: "2021-05-10T17:27:26-04:00" + creationTimestamp: null + labels: + app: powermax-node + spec: + containers: + - command: + - /csi-powermax.sh + env: + - name: X_CSI_POWERMAX_DRIVER_NAME + value: csi-powermax.dellemc.com + - name: CSI_ENDPOINT + value: unix:///var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock + - name: X_CSI_MODE + value: node + - name: X_CSI_DEBUG + value: "true" + - name: X_CSI_PRIVATE_MOUNT_DIR + value: /var/lib/kubelet/plugins/powermax.emc.dell.com/disks + - name: X_CSI_POWERMAX_ENDPOINT + value: https://localhost:9200 + - name: X_CSI_POWERMAX_DEBUG + value: "true" + - name: X_CSI_POWERMAX_SKIP_CERTIFICATE_VALIDATION + value: "true" + - name: X_CSI_POWERMAX_INSECURE + value: none + - name: X_CSI_K8S_CLUSTER_PREFIX + value: MIC + - name: X_CSI_POWERMAX_USER + valueFrom: + secretKeyRef: + key: username + name: powermax-creds + - name: X_CSI_POWERMAX_PASSWORD + valueFrom: + secretKeyRef: + key: password + name: powermax-creds + - name: X_CSI_POWERMAX_NODENAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: X_CSI_POWERMAX_ISCSI_ENABLE_CHAP + value: "false" + - name: X_CSI_POWERMAX_ARRAYS + value: "1234567890" + - name: X_CSI_POWERMAX_PROXY_SERVICE_NAME + value: none + - name: X_CSI_ISCSI_CHROOT + value: /noderoot + - name: X_CSI_GRPC_MAX_THREADS + value: "4" + - name: X_CSI_TRANSPORT_PROTOCOL + - name: SSL_CERT_DIR + value: /certs + - name: X_CSI_IG_NODENAME_TEMPLATE + - name: X_CSI_IG_MODIFY_HOSTNAME + value: "false" + - name: X_CSI_POWERMAX_PORTGROUPS + value: powermax-port-group + image: dellemc/csi-powermax:v1.6.0 + imagePullPolicy: Always + name: driver + resources: {} + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - SYS_ADMIN + privileged: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/lib/kubelet/plugins/powermax.emc.dell.com + name: driver-path + - mountPath: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices + mountPropagation: Bidirectional + name: volumedevices-path + - mountPath: /var/lib/kubelet/pods + mountPropagation: Bidirectional + name: pods-path + - mountPath: /dev + name: dev + - mountPath: /sys + name: sys + - mountPath: /noderoot + name: noderoot + - mountPath: /certs + name: certs + readOnly: true + - mountPath: /run/dbus/system_bus_socket + name: dbus-socket + - args: + - --v=5 + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=/var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock + env: + - name: ADDRESS + value: /csi/csi_sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0 + imagePullPolicy: IfNotPresent + name: registrar + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /registration + name: registration-dir + - mountPath: /csi + name: driver-path + - env: + - name: PROXY_HOST + value: proxy-host + - name: INSECURE + value: "true" + - name: PLUGIN_IDENTIFIER + value: powermax + - name: ACCESS_TOKEN + valueFrom: + secretKeyRef: + key: access + name: proxy-authz-tokens + - name: REFRESH_TOKEN + valueFrom: + secretKeyRef: + key: refresh + name: proxy-authz-tokens + image: sidecar-proxy:latest + imagePullPolicy: Always + name: karavi-authorization-proxy + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/karavi-authorization/config + name: karavi-authorization-config + - mountPath: /etc/karavi-authorization/root-certificates + name: proxy-server-root-certificate + dnsPolicy: ClusterFirstWithHostNet + hostIPC: true + hostNetwork: true + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + key: node.kubernetes.io/memory-pressure + operator: Exists + - effect: NoExecute + key: node.kubernetes.io/disk-pressure + operator: Exists + - effect: NoExecute + key: node.kubernetes.io/network-unavailable + operator: Exists + volumes: + - hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /var/lib/kubelet/plugins/powermax.emc.dell.com + type: DirectoryOrCreate + name: driver-path + - hostPath: + path: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices + type: DirectoryOrCreate + name: volumedevices-path + - hostPath: + path: /var/lib/kubelet/pods + type: Directory + name: pods-path + - hostPath: + path: /dev + type: Directory + name: dev + - hostPath: + path: /sys + type: Directory + name: sys + - hostPath: + path: / + type: Directory + name: noderoot + - hostPath: + path: /run/dbus/system_bus_socket + type: Socket + name: dbus-socket + - name: certs + secret: + defaultMode: 420 + optional: true + secretName: powermax-certs + - name: karavi-authorization-config + secret: + defaultMode: 420 + secretName: karavi-authorization-config + - name: proxy-server-root-certificate + secret: + defaultMode: 420 + secretName: proxy-server-root-certificate + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate + status: + currentNumberScheduled: 2 + desiredNumberScheduled: 2 + numberAvailable: 2 + numberMisscheduled: 0 + numberReady: 2 + observedGeneration: 3 + updatedNumberScheduled: 2 +kind: List +metadata: + resourceVersion: "" + selfLink: "" \ No newline at end of file diff --git a/cmd/karavictl/cmd/testdata/kubectl_get_all_in_vxflexos.yaml b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_vxflexos.yaml new file mode 100644 index 00000000..6b6763b8 --- /dev/null +++ b/cmd/karavictl/cmd/testdata/kubectl_get_all_in_vxflexos.yaml @@ -0,0 +1,1037 @@ +apiVersion: v1 +items: +- apiVersion: v1 + data: + ca.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM1ekNDQWMrZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeE1EUXlPREUxTWpBek5Gb1hEVE14TURReU5qRTFNakF6TkZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTnBnCm9yd3EzMDBJVVRKVkFZUVYzSHJieWxjdnFPTDRSUWlIVVdhaTY0UXBzR1RwTytvNHZMd1Y0MUE3enRxVFFLM28KaUcxR2pJUDBsRkdQYXJzNXFCNkU5MkRMK2hJU2kyaFM2THJtdHI3YlVua2NKb0Z4K0djbk5JUHcxUXpjNlRhUgpoK0NpQmZKVVEzU3V4YTVGaW5wTVlYcGFqVkRVY3ZZQWJBTUMvMnFDaFhaOU82d1RjRE5LUzZoT3V6emcxaWpCClc5cUhRdXBQTFpmeDdDSk1LVEhjTG9QaEoyS29jU2tQMUpvQWIzdzNlcTF2bFcwV1BVVzBaZ3gxeWx1OU11M3cKU2ZGdStOaDJnaExJMGNzMUFHZlFGL1lKaE5XSWhCZHIvR0k2Yk5XRkJ4b1ZoaVZKazhuMUZYbHQ5U0ttY0taRgpRY3BEaDVHaXVNanZ1OEhTZWRNQ0F3RUFBYU5DTUVBd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZMTWhMOWQwMXpjWUJ6SGZMWHJCMU1ndzFqUHlNQTBHQ1NxR1NJYjMKRFFFQkN3VUFBNElCQVFBZEhvQzlxZkRWSDl4OGJkdnZkVjIwekJOaGpyTDVWaVMxVkZBSkZaeVhMNEwwRmJpdApOTUxYRllIbEJsd3lmS2I5eER2Mzhhd1BkK1lLVWVib0tqY0NXYXVLNnNEc2pxOTltQ3p0Y3haV3RJL1RKQXM5Ckg1MGp5eCtCUnZyWGZZZEQyOXRJWHVBRDJVQmVmNk9kSmVPNnV2Mlh0V3l4UkZwbW1YNjFQdGtCL1c1RVB2VFIKbG4ySTVrb1hZOTZBakpqTWZnVkpKdUZYWjAyWUdnT3ZGaHQ4MitlMUgxY2pGdWIzbkVQTzVGZjA4bWdXdGU3Zwo1Vi8xNWhQRlZDM25iNkt4cmNydkxmTnJEZERJNGtaTlVHL0dRNDZqZXBUbVVUaFNuRGd5WlpWakllY1JHU0NWCldJNW91WU83WEx1NnQvZVZ5S1IrMVNZSUtEN2E1Wk15UDdmcgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg== + namespace: dnhmbGV4b3M= + token: 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 + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: default + kubernetes.io/service-account.uid: 15519839-0e3e-43b7-9e71-4b27fa9d8cf8 + creationTimestamp: "2021-04-28T15:53:27Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:53:27Z" + name: default-token-sv4kb + namespace: vxflexos + resourceVersion: "3942" + uid: 2ac0af57-490d-4247-bb69-d4e1580a9319 + type: kubernetes.io/service-account-token +- apiVersion: v1 + data: + release: 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 + kind: Secret + metadata: + creationTimestamp: "2021-04-28T15:53:34Z" + labels: + modifiedAt: "1619639486" + name: vxflexos + owner: helm + status: deployed + version: "1" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:release: {} + f:metadata: + f:labels: + .: {} + f:modifiedAt: {} + f:name: {} + f:owner: {} + f:status: {} + f:version: {} + f:type: {} + manager: helm + operation: Update + time: "2021-04-28T15:53:34Z" + name: sh.helm.release.v1.vxflexos.v1 + namespace: vxflexos + resourceVersion: "3992" + uid: 9f1aa23e-8f52-441b-9f32-b7595f5d0612 + type: helm.sh/release.v1 +- apiVersion: v1 + data: + MDM: MTAuMC4wLjEsMTAuMC4wLjE= + config: W3sidXNlcm5hbWUiOiJ1c2VybmFtZSIsInBhc3N3b3JkIjoicGFzc3dvcmQiLCJzeXN0ZW1JRCI6InN5c3RlbUlEIiwiZW5kcG9pbnQiOiJodHRwczovLzEwLjAuMC4xIiwiaW5zZWN1cmUiOnRydWUsImlzRGVmYXVsdCI6dHJ1ZSwibWRtIjoiMTAuMC4wLjEsMTAuMC4wLjEifV0= + kind: Secret + metadata: + creationTimestamp: "2021-04-28T15:53:30Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:config: {} + f:type: {} + manager: kubectl-create + operation: Update + time: "2021-04-28T15:53:30Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + f:MDM: {} + manager: kubectl-patch + operation: Update + time: "2021-04-28T15:53:32Z" + name: vxflexos-config + namespace: vxflexos + resourceVersion: "3958" + uid: eb2bba11-34ce-49d6-9409-cddc2a665cca + type: Opaque +- apiVersion: v1 + data: + ca.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM1ekNDQWMrZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeE1EUXlPREUxTWpBek5Gb1hEVE14TURReU5qRTFNakF6TkZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTnBnCm9yd3EzMDBJVVRKVkFZUVYzSHJieWxjdnFPTDRSUWlIVVdhaTY0UXBzR1RwTytvNHZMd1Y0MUE3enRxVFFLM28KaUcxR2pJUDBsRkdQYXJzNXFCNkU5MkRMK2hJU2kyaFM2THJtdHI3YlVua2NKb0Z4K0djbk5JUHcxUXpjNlRhUgpoK0NpQmZKVVEzU3V4YTVGaW5wTVlYcGFqVkRVY3ZZQWJBTUMvMnFDaFhaOU82d1RjRE5LUzZoT3V6emcxaWpCClc5cUhRdXBQTFpmeDdDSk1LVEhjTG9QaEoyS29jU2tQMUpvQWIzdzNlcTF2bFcwV1BVVzBaZ3gxeWx1OU11M3cKU2ZGdStOaDJnaExJMGNzMUFHZlFGL1lKaE5XSWhCZHIvR0k2Yk5XRkJ4b1ZoaVZKazhuMUZYbHQ5U0ttY0taRgpRY3BEaDVHaXVNanZ1OEhTZWRNQ0F3RUFBYU5DTUVBd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZMTWhMOWQwMXpjWUJ6SGZMWHJCMU1ndzFqUHlNQTBHQ1NxR1NJYjMKRFFFQkN3VUFBNElCQVFBZEhvQzlxZkRWSDl4OGJkdnZkVjIwekJOaGpyTDVWaVMxVkZBSkZaeVhMNEwwRmJpdApOTUxYRllIbEJsd3lmS2I5eER2Mzhhd1BkK1lLVWVib0tqY0NXYXVLNnNEc2pxOTltQ3p0Y3haV3RJL1RKQXM5Ckg1MGp5eCtCUnZyWGZZZEQyOXRJWHVBRDJVQmVmNk9kSmVPNnV2Mlh0V3l4UkZwbW1YNjFQdGtCL1c1RVB2VFIKbG4ySTVrb1hZOTZBakpqTWZnVkpKdUZYWjAyWUdnT3ZGaHQ4MitlMUgxY2pGdWIzbkVQTzVGZjA4bWdXdGU3Zwo1Vi8xNWhQRlZDM25iNkt4cmNydkxmTnJEZERJNGtaTlVHL0dRNDZqZXBUbVVUaFNuRGd5WlpWakllY1JHU0NWCldJNW91WU83WEx1NnQvZVZ5S1IrMVNZSUtEN2E1Wk15UDdmcgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg== + namespace: dnhmbGV4b3M= + token: ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNkluVkpORjl6TXpsYVQxSk9XUzFQT0U1NmFuQlVaWEJWVFV0QlZrVlhVR1pGUjI5TmJXOTNhMWswY1UwaWZRLmV5SnBjM01pT2lKcmRXSmxjbTVsZEdWekwzTmxjblpwWTJWaFkyTnZkVzUwSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXVZVzFsYzNCaFkyVWlPaUoyZUdac1pYaHZjeUlzSW10MVltVnlibVYwWlhNdWFXOHZjMlZ5ZG1salpXRmpZMjkxYm5RdmMyVmpjbVYwTG01aGJXVWlPaUoyZUdac1pYaHZjeTFqYjI1MGNtOXNiR1Z5TFhSdmEyVnVMV0p5TW5oaUlpd2lhM1ZpWlhKdVpYUmxjeTVwYnk5elpYSjJhV05sWVdOamIzVnVkQzl6WlhKMmFXTmxMV0ZqWTI5MWJuUXVibUZ0WlNJNkluWjRabXhsZUc5ekxXTnZiblJ5YjJ4c1pYSWlMQ0pyZFdKbGNtNWxkR1Z6TG1sdkwzTmxjblpwWTJWaFkyTnZkVzUwTDNObGNuWnBZMlV0WVdOamIzVnVkQzUxYVdRaU9pSm1Nak5tTmpneVpTMDFZV0pqTFRRM016VXRPR1k0TUMwNVlXUTBZV0ZpTUdabU5XTWlMQ0p6ZFdJaU9pSnplWE4wWlcwNmMyVnlkbWxqWldGalkyOTFiblE2ZG5obWJHVjRiM002ZG5obWJHVjRiM010WTI5dWRISnZiR3hsY2lKOS5tTmdZLTVSZVpCelF6QklXbEdkTTdRRUNaWi1nblc0eUlpVVFkYzdFWE5DVlQ3WlI0X2k4TjBRSzhtbE84NlJDMk9VZE1vdHZnUWNtRGlBSmxneUhodW9MRXZob3prbWZuM1FZTURud2dhZlo4UHVvWUJuYnMxUlI5WHZ0WGwzekJVQzIzNTdEX3E2OXBUMUxvTkM2UFBMN3JCQ1RYVFdUVzJ6WTFLZHJGRWhJeEVNSjZZdEpib05COG1ka0s1LThtRW9RNG5jcnhtSmVZUkdNNnh2WFlvMnhscEtJSHlUUjBmVjZ2a3paNi1DeWxzRk9CSEFrWS04VHkwZzFfUXI1X1hMRERUNFJmTmdFQ0hrbFdZSWRmODJMUVI5dGJ6UUU5aVNJc0VNXzJDNG9LMFhmMGNIMW1EaXd6dzJzZmEtUTM5cmdvWE15T2duN0czM2FGY285OXc= + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: vxflexos-controller + kubernetes.io/service-account.uid: f23f682e-5abc-4735-8f80-9ad4aab0ff5c + creationTimestamp: "2021-04-28T15:53:34Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:53:34Z" + name: vxflexos-controller-token-br2xb + namespace: vxflexos + resourceVersion: "3973" + uid: 34d61774-bfd7-4c93-b3a1-a79a94fae2aa + type: kubernetes.io/service-account-token +- apiVersion: v1 + data: + ca.crt: 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 + namespace: dnhmbGV4b3M= + token: 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 + kind: Secret + metadata: + annotations: + kubernetes.io/service-account.name: vxflexos-node + kubernetes.io/service-account.uid: 6b63d5f6-99a2-493f-b680-54720ccb3bf7 + creationTimestamp: "2021-04-28T15:53:34Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:namespace: {} + f:token: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/service-account.name: {} + f:kubernetes.io/service-account.uid: {} + f:type: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:53:34Z" + name: vxflexos-node-token-p8x8z + namespace: vxflexos + resourceVersion: "3977" + uid: 687f3b84-b918-415f-acb3-c8d1d1d34058 + type: kubernetes.io/service-account-token +- apiVersion: apps/v1 + kind: Deployment + metadata: + annotations: + deployment.kubernetes.io/revision: "1" + meta.helm.sh/release-name: vxflexos + meta.helm.sh/release-namespace: vxflexos + creationTimestamp: "2021-04-28T15:53:34Z" + generation: 1 + labels: + app.kubernetes.io/managed-by: Helm + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:meta.helm.sh/release-name: {} + f:meta.helm.sh/release-namespace: {} + f:labels: + .: {} + f:app.kubernetes.io/managed-by: {} + f:spec: + f:progressDeadlineSeconds: {} + f:replicas: {} + f:revisionHistoryLimit: {} + f:selector: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:name: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:requiredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"attacher"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"driver"}: + .: {} + f:args: {} + f:command: {} + f:env: + .: {} + k:{"name":"CSI_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_VXFLEXOS_ENABLELISTVOLUMESNAPSHOT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_VXFLEXOS_ENABLESNAPSHOTCGDELETE"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/vxflexos-config"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"provisioner"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"resizer"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"snapshotter"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/run/csi"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"socket-dir"}: + .: {} + f:emptyDir: {} + f:name: {} + k:{"name":"vxflexos-config"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + manager: Go-http-client + operation: Update + time: "2021-04-28T15:53:34Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:54:10Z" + name: vxflexos-controller + namespace: vxflexos + resourceVersion: "4169" + uid: a4e0e083-02b6-4084-b452-d2ac1f989fe3 + spec: + progressDeadlineSeconds: 600 + replicas: 1 + revisionHistoryLimit: 10 + selector: + matchLabels: + name: vxflexos-controller + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 25% + type: RollingUpdate + template: + metadata: + creationTimestamp: null + labels: + name: vxflexos-controller + spec: + affinity: + podAntiAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + - labelSelector: + matchExpressions: + - key: name + operator: In + values: + - vxflexos-controller + topologyKey: kubernetes.io/hostname + containers: + - args: + - --csi-address=$(ADDRESS) + - --v=5 + - --leader-election=true + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-attacher:v3.1.0 + imagePullPolicy: IfNotPresent + name: attacher + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --feature-gates=Topology=true + - --volume-name-prefix=k8s + - --volume-name-uuid-length=10 + - --leader-election=true + - --timeout=120s + - --v=5 + - --default-fstype=ext4 + - --extra-create-metadata + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0 + imagePullPolicy: IfNotPresent + name: provisioner + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --timeout=120s + - --v=5 + - --leader-election=true + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0 + imagePullPolicy: Always + name: snapshotter + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --csi-address=$(ADDRESS) + - --v=5 + - --leader-election=true + env: + - name: ADDRESS + value: /var/run/csi/csi.sock + image: quay.io/k8scsi/csi-resizer:v1.1.0 + imagePullPolicy: IfNotPresent + name: resizer + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - args: + - --leader-election + - --array-config=/vxflexos-config/config + command: + - /csi-vxflexos.sh + env: + - name: CSI_ENDPOINT + value: /var/run/csi/csi.sock + - name: X_CSI_MODE + value: controller + - name: X_CSI_DEBUG + value: "true" + - name: X_CSI_VXFLEXOS_ENABLESNAPSHOTCGDELETE + value: "false" + - name: X_CSI_VXFLEXOS_ENABLELISTVOLUMESNAPSHOT + value: "false" + image: dellemc/csi-vxflexos:v1.4.0 + imagePullPolicy: Always + name: driver + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/csi + name: socket-dir + - mountPath: /vxflexos-config + name: vxflexos-config + dnsPolicy: ClusterFirst + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: vxflexos-controller + serviceAccountName: vxflexos-controller + terminationGracePeriodSeconds: 30 + volumes: + - emptyDir: {} + name: socket-dir + - name: vxflexos-config + secret: + defaultMode: 420 + secretName: vxflexos-config + status: + availableReplicas: 1 + conditions: + - lastTransitionTime: "2021-04-28T15:54:10Z" + lastUpdateTime: "2021-04-28T15:54:10Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + - lastTransitionTime: "2021-04-28T15:53:34Z" + lastUpdateTime: "2021-04-28T15:54:10Z" + message: ReplicaSet "vxflexos-controller-66bcc75977" has successfully progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + observedGeneration: 1 + readyReplicas: 1 + replicas: 1 + updatedReplicas: 1 +- apiVersion: apps/v1 + kind: DaemonSet + metadata: + annotations: + deprecated.daemonset.template.generation: "1" + meta.helm.sh/release-name: vxflexos + meta.helm.sh/release-namespace: vxflexos + creationTimestamp: "2021-04-28T15:53:34Z" + generation: 1 + labels: + app.kubernetes.io/managed-by: Helm + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deprecated.daemonset.template.generation: {} + f:meta.helm.sh/release-name: {} + f:meta.helm.sh/release-namespace: {} + f:labels: + .: {} + f:app.kubernetes.io/managed-by: {} + f:spec: + f:revisionHistoryLimit: {} + f:selector: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app: {} + f:spec: + f:containers: + k:{"name":"driver"}: + .: {} + f:args: {} + f:command: {} + f:env: + .: {} + k:{"name":"CSI_ENDPOINT"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_ALLOW_RWO_MULTI_POD_ACCESS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_DEBUG"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"X_CSI_PRIVATE_MOUNT_DIR"}: + .: {} + f:name: {} + f:value: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:privileged: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/dev"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices"}: + .: {} + f:mountPath: {} + f:mountPropagation: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/plugins/vxflexos.emc.dell.com"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kubelet/pods"}: + .: {} + f:mountPath: {} + f:mountPropagation: {} + f:name: {} + k:{"mountPath":"/vxflexos-config"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"name":"registrar"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"ADDRESS"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"KUBE_NODE_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: + .: {} + f:apiVersion: {} + f:fieldPath: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/csi"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/registration"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:hostNetwork: {} + f:initContainers: + .: {} + k:{"name":"sdc"}: + .: {} + f:env: + .: {} + k:{"name":"HOST_DRV_CFG_PATH"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"MDM"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: + .: {} + f:key: {} + f:name: {} + k:{"name":"MODE"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"NODENAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: + .: {} + f:apiVersion: {} + f:fieldPath: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:privileged: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/dev"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/host-os-release"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/host_drv_cfg_path"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/rules.d"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/storage"}: + .: {} + f:mountPath: {} + f:name: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"dev"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"driver-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"os-release"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"pods-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"registration-dir"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"scaleio-path-opt"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"sdc-storage"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"udev-d"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"volumedevices-path"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"vxflexos-config"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + f:updateStrategy: + f:rollingUpdate: + .: {} + f:maxUnavailable: {} + f:type: {} + manager: Go-http-client + operation: Update + time: "2021-04-28T15:53:34Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:currentNumberScheduled: {} + f:desiredNumberScheduled: {} + f:numberAvailable: {} + f:numberReady: {} + f:observedGeneration: {} + f:updatedNumberScheduled: {} + manager: kube-controller-manager + operation: Update + time: "2021-04-28T15:54:09Z" + name: vxflexos-node + namespace: vxflexos + resourceVersion: "4149" + uid: 9de92539-d3a0-487f-9828-6ba290e75816 + spec: + revisionHistoryLimit: 10 + selector: + matchLabels: + app: vxflexos-node + template: + metadata: + creationTimestamp: null + labels: + app: vxflexos-node + spec: + containers: + - args: + - --array-config=/vxflexos-config/config + command: + - /csi-vxflexos.sh + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/kubelet/plugins/vxflexos.emc.dell.com/csi_sock + - name: X_CSI_MODE + value: node + - name: X_CSI_DEBUG + value: "true" + - name: X_CSI_PRIVATE_MOUNT_DIR + value: /var/lib/kubelet/plugins/vxflexos.emc.dell.com/disks + - name: X_CSI_ALLOW_RWO_MULTI_POD_ACCESS + value: "false" + image: dellemc/csi-vxflexos:v1.4.0 + imagePullPolicy: Always + name: driver + resources: {} + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - SYS_ADMIN + privileged: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/lib/kubelet/plugins/vxflexos.emc.dell.com + name: driver-path + - mountPath: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices + mountPropagation: Bidirectional + name: volumedevices-path + - mountPath: /var/lib/kubelet/pods + mountPropagation: Bidirectional + name: pods-path + - mountPath: /dev + name: dev + - mountPath: /vxflexos-config + name: vxflexos-config + - args: + - --v=5 + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=/var/lib/kubelet/plugins/vxflexos.emc.dell.com/csi_sock + env: + - name: ADDRESS + value: /csi/csi_sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0 + imagePullPolicy: IfNotPresent + name: registrar + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /registration + name: registration-dir + - mountPath: /csi + name: driver-path + dnsPolicy: ClusterFirstWithHostNet + hostNetwork: true + initContainers: + - env: + - name: NODENAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: MODE + value: config + - name: MDM + valueFrom: + secretKeyRef: + key: MDM + name: vxflexos-config + - name: HOST_DRV_CFG_PATH + value: /opt/emc/scaleio/sdc/bin + image: dellemc/sdc:3.5.1.1-1 + imagePullPolicy: Always + name: sdc + resources: {} + securityContext: + privileged: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /dev + name: dev + - mountPath: /host-os-release + name: os-release + - mountPath: /storage + name: sdc-storage + - mountPath: /rules.d + name: udev-d + - mountPath: /host_drv_cfg_path + name: scaleio-path-opt + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: vxflexos-node + serviceAccountName: vxflexos-node + terminationGracePeriodSeconds: 30 + volumes: + - hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /var/lib/kubelet/plugins/vxflexos.emc.dell.com + type: DirectoryOrCreate + name: driver-path + - hostPath: + path: /var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices + type: DirectoryOrCreate + name: volumedevices-path + - hostPath: + path: /var/lib/kubelet/pods + type: Directory + name: pods-path + - hostPath: + path: /dev + type: Directory + name: dev + - hostPath: + path: /opt/emc/scaleio/sdc/bin + type: DirectoryOrCreate + name: scaleio-path-opt + - hostPath: + path: /var/emc-scaleio + type: DirectoryOrCreate + name: sdc-storage + - hostPath: + path: /etc/udev/rules.d + type: Directory + name: udev-d + - hostPath: + path: /etc/os-release + type: File + name: os-release + - name: vxflexos-config + secret: + defaultMode: 420 + secretName: vxflexos-config + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate + status: + currentNumberScheduled: 2 + desiredNumberScheduled: 2 + numberAvailable: 2 + numberMisscheduled: 0 + numberReady: 2 + observedGeneration: 1 + updatedNumberScheduled: 2 +kind: List +metadata: + resourceVersion: "" + selfLink: "" \ No newline at end of file diff --git a/cmd/proxy-server/main.go b/cmd/proxy-server/main.go index fbd579ed..445119cf 100644 --- a/cmd/proxy-server/main.go +++ b/cmd/proxy-server/main.go @@ -249,7 +249,7 @@ func run(log *logrus.Entry) error { } dh := proxy.NewDispatchHandler(log, systemHandlers) - insecure := cfg.Certificate.CrtFile == "" && cfg.Certificate.KeyFile == "" + insecure := cfg.Certificate.CrtFile == "" && cfg.Certificate.KeyFile == "" // TODO router := &web.Router{ RolesHandler: web.Adapt(rolesHandler(), web.OtelMW(tp, "roles")), diff --git a/docs/GETTING_STARTED_GUIDE.md b/docs/GETTING_STARTED_GUIDE.md index 3cadecd7..e2c0d6e4 100644 --- a/docs/GETTING_STARTED_GUIDE.md +++ b/docs/GETTING_STARTED_GUIDE.md @@ -364,7 +364,7 @@ Given a setup where Kubernetes, a storage system, a CSI driver, and Karavi Autho echo === Applying token token === kubectl apply -f /tmp/token.yaml -n $DriverNameSpace - echo === injecting sidecar in CSI driver host === + echo === injecting sidecar in all CSI driver hosts === sudo curl -k https://${AuthorizationHostIP}/install | sh ``` diff --git a/docs/TROUBLESHOOTING.md b/docs/TROUBLESHOOTING.md index 0717f993..0c263b66 100644 --- a/docs/TROUBLESHOOTING.md +++ b/docs/TROUBLESHOOTING.md @@ -1,7 +1,9 @@ # Troubleshooting ## Table of Contents -- [`karavictl inject` leaves vxflexos-controller in `Pending` state](#karavictl-inject-leaves-vxflexos-controller-in-pending-state) +- `karavictl inject` leaves the following arrays controllers in pending states +- [vxflexos-controller in `Pending` state](#karavictl-inject-leaves-vxflexos-controller-in-pending-state) +- [powermax-controller in `Pending` state](#karavictl-inject-leaves-powermax-controller-in-pending-state) --- @@ -18,12 +20,24 @@ vxflexos-node-mjc74 3/3 Running 0 2m44s vxflexos-node-zgswp 3/3 Running 0 2m44s ``` +### `karavictl inject` leaves powermax-controller in `Pending` state +This situation may occur when the number of Powermax controller pods that are deployed is equal to the number of schedulable nodes. +``` +$ kubectl get pods -n powermax --show-labels + +powermax-controller-58d8779f5d-v7t56 0/6 Pending 0 25s name=powermax-controller,pod-template-hash=58d8779f5d +powermax-controller-78f749847-jqphx 5/5 Running 0 10m name=powermax-controller,pod-template-hash=78f749847 +powermax-controller-78f749847-w6vp5 5/5 Running 0 10m name=powermax-controller,pod-template-hash=78f749847 +powermax-node-gx5pk 3/3 Running 0 21s app=powermax-node,controller-revision-hash=5c4fdf478f,pod-template-generation=3 +powermax-node-k5gwc 3/3 Running 0 17s app=powermax-node,controller-revision-hash=5c4fdf478f,pod-template-generation=3 +``` + #### Resolution -To resolve this issue, we need to temporarily reduce the number of replicas that the Vxflexos driver deployment is using. +To resolve this issue, we need to temporarily reduce the number of replicas that the the driver deployment is using. 1. Edit the deployment ``` -$ kubectl edit -n deploy/vxflexos-controller +$ kubectl edit -n deploy/-controller ``` 2. Find `replicas` under the `spec` section of the deployment manifest. @@ -38,6 +52,16 @@ vxflexos-controller-696cc5945f-4t94d 6/6 Running 0 4m41s vxflexos-node-mjc74 3/3 Running 0 3m44s vxflexos-node-zgswp 3/3 Running 0 3m44s ``` +or +``` +$ kubectl get pods -n powermax --show-labels +NAME READY STATUS RESTARTS AGE LABELS +powermax-controller-58d8779f5d-cqx8d 6/6 Running 0 22s name=powermax-controller,pod-template-hash=58d8779f5d +powermax-controller-58d8779f5d-v7t56 6/6 Running 22 8m7s name=powermax-controller,pod-template-hash=58d8779f5d +powermax-node-gx5pk 3/3 Running 3 8m3s app=powermax-node,controller-revision-hash=5c4fdf478f,pod-template-generation=3 +powermax-node-k5gwc 3/3 Running 3 7m59s app=powermax-node,controller-revision-hash=5c4fdf478f,pod-template-generation=3 +``` + 6. Edit the deployment again 7. Find `replicas` under the `spec` section of the deployment manifest. 8. Increase the number of `replicas` by 1 @@ -52,3 +76,12 @@ vxflexos-controller-696cc5945f-6xxhb 6/6 Running 0 5m41s vxflexos-node-mjc74 3/3 Running 0 4m44s vxflexos-node-zgswp 3/3 Running 0 4m44s ``` +or +``` +$ kubectl get pods -n powermax --show-labels +NAME READY STATUS RESTARTS AGE LABELS +powermax-controller-58d8779f5d-cqx8d 6/6 Running 0 22s name=powermax-controller,pod-template-hash=58d8779f5d +powermax-controller-58d8779f5d-v7t56 6/6 Running 22 8m7s name=powermax-controller,pod-template-hash=58d8779f5d +powermax-node-gx5pk 3/3 Running 3 8m3s app=powermax-node,controller-revision-hash=5c4fdf478f,pod-template-generation=3 +powermax-node-k5gwc 3/3 Running 3 7m59s app=powermax-node,controller-revision-hash=5c4fdf478f,pod-template-generation=3 +``` \ No newline at end of file diff --git a/internal/proxy/powermax_handler.go b/internal/proxy/powermax_handler.go index ef089b31..a45ecd07 100644 --- a/internal/proxy/powermax_handler.go +++ b/internal/proxy/powermax_handler.go @@ -286,12 +286,41 @@ func (s *PowerMaxSystem) volumeCreateHandler(next http.Handler, enf *quota.Redis return } + defer r.Body.Close() + + var payloadTemp map[string]interface{} + if err := json.NewDecoder(bytes.NewReader(b)).Decode(&payloadTemp); err != nil { + s.handleErrorf(w, http.StatusInternalServerError, err, "decoding body") + return + } + + var op string + if action, ok := payloadTemp["editStorageGroupActionParam"]; ok { + v, ok := action.(map[string]interface{}) + if !ok && s.handleError(w, http.StatusInternalServerError, errors.New("invalid payload")) { + return + } + if _, ok := v["expandStorageGroupParam"]; ok { + op = "expandStorageGroupParam" + } + } + + // Other modification operations can pass through. + if op != "expandStorageGroupParam" { + next.ServeHTTP(w, r) + return + } + var payload powermaxAddVolumeRequest if err := json.NewDecoder(bytes.NewReader(b)).Decode(&payload); err != nil { s.handleErrorf(w, http.StatusInternalServerError, err, "decoding body") return } - defer r.Body.Close() + + if len(payload.Editstoragegroupactionparam.Expandstoragegroupparam.Addvolumeparam.Volumeattributes) == 0 { + next.ServeHTTP(w, r) + return + } capAsInt, err := strconv.ParseInt(payload.Editstoragegroupactionparam.Expandstoragegroupparam.Addvolumeparam.Volumeattributes[0].VolumeSize, 0, 64) if s.handleErrorf(w, http.StatusInternalServerError, err, "parsing int") { @@ -438,7 +467,7 @@ func (s *PowerMaxSystem) volumeCreateHandler(next http.Handler, enf *quota.Redis // volumeModifyHandler handles a modify volume request. // // The REST call is: -// PUT /univmax/restapi/91/sloprovisioning/symmetrix/000197900714/volume/003E4 +// PUT /univmax/restapi/91/sloprovisioning/symmetrix/1234567890/volume/003E4 // // The payload looks like: // {"editVolumeActionParam":{ diff --git a/internal/proxy/powermax_handler_test.go b/internal/proxy/powermax_handler_test.go index 129527f1..626414d1 100644 --- a/internal/proxy/powermax_handler_test.go +++ b/internal/proxy/powermax_handler_test.go @@ -81,7 +81,7 @@ func testPowerMaxServeHTTP(t *testing.T) { }), ) r := httptest.NewRequest(http.MethodGet, "/", nil) - r.Header.Set("Forwarded", "for=https://10.0.0.1;000197900714") + r.Header.Set("Forwarded", "for=https://10.0.0.1;1234567890") w := httptest.NewRecorder() go sut.ServeHTTP(w, r) @@ -128,9 +128,9 @@ func testPowerMaxServeHTTP(t *testing.T) { t.Fatal(err) } r := httptest.NewRequest(http.MethodGet, - "/univmax/restapi/91/sloprovisioning/symmetrix/000197900714/storagegroup/csi-CSM-Bronze-SRP_1-SG/", + "/univmax/restapi/91/sloprovisioning/symmetrix/1234567890/storagegroup/csi-CSM-Bronze-SRP_1-SG/", nil) - r.Header.Set("Forwarded", "for=https://10.0.0.1;000197900714") + r.Header.Set("Forwarded", "for=https://10.0.0.1;1234567890") addJWTToRequestHeader(t, r) w := httptest.NewRecorder() @@ -149,7 +149,7 @@ func testPowerMaxServeHTTP(t *testing.T) { ) fakeUni := fakeServer(t, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { t.Logf("fake unisphere received: %s %s", r.Method, r.URL) - if r.URL.Path == "/univmax/restapi/91/sloprovisioning/symmetrix/000197900714/storagegroup/csi-CSM-Bronze-SRP_1-SG" { + if r.URL.Path == "/univmax/restapi/91/sloprovisioning/symmetrix/1234567890/storagegroup/csi-CSM-Bronze-SRP_1-SG" { b, err := ioutil.ReadFile("testdata/powermax_create_volume_response.json") if err != nil { t.Fatal(err) @@ -182,9 +182,9 @@ func testPowerMaxServeHTTP(t *testing.T) { t.Fatal(err) } r := httptest.NewRequest(http.MethodPut, - "/univmax/restapi/91/sloprovisioning/symmetrix/000197900714/storagegroup/csi-CSM-Bronze-SRP_1-SG/", + "/univmax/restapi/91/sloprovisioning/symmetrix/1234567890/storagegroup/csi-CSM-Bronze-SRP_1-SG/", bytes.NewReader(payloadBytes)) - r.Header.Set("Forwarded", "for=https://10.0.0.1;000197900714") + r.Header.Set("Forwarded", "for=https://10.0.0.1;1234567890") addJWTToRequestHeader(t, r) w := httptest.NewRecorder() @@ -193,7 +193,7 @@ func testPowerMaxServeHTTP(t *testing.T) { if w.Result().StatusCode != http.StatusOK { t.Errorf("status: got %d, want 200", w.Result().StatusCode) } - wantExistsKey := "quota:powermax:000197900714:SRP_1:karavi-tenant:data" + wantExistsKey := "quota:powermax:1234567890:SRP_1:karavi-tenant:data" if gotExistsKey != wantExistsKey { t.Errorf("exists key: got %q, want %q", gotExistsKey, wantExistsKey) } @@ -209,14 +209,14 @@ func testPowerMaxServeHTTP(t *testing.T) { fakeUni := fakeServer(t, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { t.Logf("fake unisphere received: %s %s", r.Method, r.URL) switch r.URL.Path { - case "/univmax/restapi/91/sloprovisioning/symmetrix/000197900714/volume/003E4": + case "/univmax/restapi/91/sloprovisioning/symmetrix/1234567890/volume/003E4": b, err := ioutil.ReadFile("testdata/powermax_getvolumebyid_response.json") if err != nil { t.Fatal(err) } w.Write(b) return - case "/univmax/restapi/91/sloprovisioning/symmetrix/000197900714/storagegroup/csi-CSM-Bronze-SRP_1-SG": + case "/univmax/restapi/91/sloprovisioning/symmetrix/1234567890/storagegroup/csi-CSM-Bronze-SRP_1-SG": b, err := ioutil.ReadFile("testdata/powermax_getstoragegroup_response.json") if err != nil { t.Fatal(err) @@ -249,9 +249,9 @@ func testPowerMaxServeHTTP(t *testing.T) { t.Fatal(err) } r := httptest.NewRequest(http.MethodPut, - "/univmax/restapi/91/sloprovisioning/symmetrix/000197900714/volume/003E4/", + "/univmax/restapi/91/sloprovisioning/symmetrix/1234567890/volume/003E4/", bytes.NewReader(payloadBytes)) - r.Header.Set("Forwarded", "for=https://10.0.0.1;000197900714") + r.Header.Set("Forwarded", "for=https://10.0.0.1;1234567890") addJWTToRequestHeader(t, r) w := httptest.NewRecorder() @@ -260,7 +260,7 @@ func testPowerMaxServeHTTP(t *testing.T) { if w.Result().StatusCode != http.StatusOK { t.Errorf("status: got %d, want 200", w.Result().StatusCode) } - wantExistsKey := "quota:powermax:000197900714:SRP_1:karavi-tenant:data" + wantExistsKey := "quota:powermax:1234567890:SRP_1:karavi-tenant:data" if gotExistsKey != wantExistsKey { t.Errorf("exists key: got %q, want %q", gotExistsKey, wantExistsKey) } @@ -336,7 +336,7 @@ func withLogger(logger *logrus.Entry) powermaxHandlerOption { func withSystem(s *PowerMaxSystem) powermaxHandlerOption { return func(t *testing.T, pmh *PowerMaxHandler) { - pmh.systems["000197900714"] = s + pmh.systems["1234567890"] = s } } @@ -384,7 +384,7 @@ func fakeServer(t *testing.T, h http.Handler) *httptest.Server { func systemJSON(endpoint string) string { return fmt.Sprintf(`{ "powermax": { - "000197900714": { + "1234567890": { "endpoint": "%s", "user": "smc", "pass": "smc", @@ -398,7 +398,7 @@ func systemJSON(endpoint string) string { func systemObject(endpoint string) SystemConfig { return SystemConfig{ "powermax": Family{ - "000197900714": SystemEntry{ + "1234567890": SystemEntry{ Endpoint: endpoint, User: "smc", Password: "smc", diff --git a/internal/web/client_install_handler.go b/internal/web/client_install_handler.go index 28c1ae0e..52166272 100644 --- a/internal/web/client_install_handler.go +++ b/internal/web/client_install_handler.go @@ -20,18 +20,50 @@ func ClientInstallHandler(imageAddr, jwtSigningSecret, rootCA string, insecure b host := r.Host var sb strings.Builder - fmt.Fprintln(&sb, "kubectl get secrets,deployments,daemonsets -n vxflexos -o yaml \\") - fmt.Fprintln(&sb, " | karavictl inject \\") - fmt.Fprintf(&sb, " --image-addr %s \\\n", imageAddr) - fmt.Fprintf(&sb, " --proxy-host %s \\\n", host) - fmt.Fprintf(&sb, " --insecure=%v \\\n", insecure) + q := r.URL.Query() + pps := "" + + for _, pp := range q["proxy-port"] { + t := strings.Split(pp, ":") + pps += fmt.Sprintf(" --proxy-port %s=%s", t[0], t[1]) + } + + inject := fmt.Sprintf("karavictl inject --image-addr %s --proxy-host %s --insecure=%v %s", imageAddr, host, insecure, pps) if rootCA != "" { - fmt.Fprintf(&sb, " --root-certificate %s \\\n", rootCA) + inject += fmt.Sprintf(" --root-certificate %s", rootCA) } - fmt.Fprintln(&sb, " | kubectl apply -f -") - fmt.Fprintln(&sb, "kubectl rollout status -n vxflexos deploy/vxflexos-controller") - fmt.Fprintln(&sb, "kubectl rollout status -n vxflexos ds/vxflexos-node") - fmt.Fprintf(w, sb.String()) + checkDrivers := fmt.Sprintf(` +export DRIVERS="%s" +if [ "${DRIVERS}" == "" ]; then + export DRIVERS=$(kubectl get namespace) +fi +`, strings.Join(q["namespace"], ",")) + + vxflexos := fmt.Sprintf(` +if [[ $DRIVERS =~ "vxflexos" ]]; then + kubectl get secrets,deployments,daemonsets -n vxflexos -o yaml | %s | kubectl apply -f - + kubectl rollout restart -n vxflexos deploy/vxflexos-controller + kubectl rollout restart -n vxflexos ds/vxflexos-node + kubectl rollout status -n vxflexos deploy/vxflexos-controller + kubectl rollout status -n vxflexos ds/vxflexos-node +fi +`, inject) + + powermax := fmt.Sprintf(` +if [[ $DRIVERS =~ "powermax" ]]; then + kubectl get secrets,deployments,daemonsets -n powermax -o yaml | %s | kubectl apply -f - + kubectl rollout restart -n powermax deploy/powermax-controller + kubectl rollout restart -n powermax ds/powermax-node + kubectl rollout status -n powermax deploy/powermax-controller + kubectl rollout status -n powermax ds/powermax-node +fi +`, inject) + + fmt.Fprintln(&sb, checkDrivers) + fmt.Fprintln(&sb, powermax) + fmt.Fprintln(&sb, vxflexos) + + fmt.Fprintln(w, sb.String()) }) } diff --git a/internal/web/client_install_handler_test.go b/internal/web/client_install_handler_test.go index 0d1e4486..46eec542 100644 --- a/internal/web/client_install_handler_test.go +++ b/internal/web/client_install_handler_test.go @@ -14,9 +14,17 @@ func TestClientInstallHandler(t *testing.T) { w := httptest.NewRecorder() r := httptest.NewRequest(http.MethodGet, "/", nil) r.Host = "10.0.0.1" + + q := r.URL.Query() + q.Add("namespace", "powermax") + q.Add("namespace", "orange") + q.Add("proxy-port", "powermax:20001") + r.URL.RawQuery = q.Encode() + wantHost := fmt.Sprintf("--proxy-host %s", r.Host) imageAddr := "10.0.0.1/sidecar:latest" wantImageAddr := fmt.Sprintf("--image-addr %s", imageAddr) + // the tokens are based on time, so we can't easily test for them. wantInsecureTkn := fmt.Sprintf("--insecure") wantRootCATkn := fmt.Sprintf("--root-certificate") @@ -39,4 +47,10 @@ func TestClientInstallHandler(t *testing.T) { if !bytes.Contains(b, []byte(wantRootCATkn)) { t.Error("expected body to contain guest refresh token") } + if !bytes.Contains(b, []byte("powermax,orange")) { + t.Error("expected body to contain namepaces") + } + if !bytes.Contains(b, []byte("--proxy-port powermax=20001")) { + t.Error("expected body to contain proxy-ports") + } } diff --git a/policies/powermax_url.rego b/policies/powermax_url.rego index f4711bb7..976e8ab0 100644 --- a/policies/powermax_url.rego +++ b/policies/powermax_url.rego @@ -15,21 +15,32 @@ package karavi.authz.powermax.url allowlist = [ - "GET /univmax/restapi/version", - "GET /univmax/restapi/(90|91)/system/symmetrix/[a-f0-9]+", - "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/srp", - "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/storagegroup", - "POST /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/storagegroup", - "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/storagegroup/[a-f0-9]+", - "PUT /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/storagegroup/[a-f0-9]+", - "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/volume", - "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/volume/[a-f0-9]+", - "PUT /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/volume/[a-f0-9]+", - "DELETE /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/volume/[a-f0-9]+", - "DELETE /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9]+/storagegroup/[a-f0-9]+" + "GET /univmax/restapi/version", + "GET /univmax/restapi/(90|91)/system/symmetrix/[a-f0-9A-F]+", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/srp", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/storagegroup", + "POST /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/storagegroup", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/storagegroup/(.+)", + "PUT /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/storagegroup/(.+)", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/volume", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/volume/[a-f0-9A-F]+", + "PUT /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/volume/[a-f0-9A-F]+", + "DELETE /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/volume/[a-f0-9A-F]+", + "DELETE /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/storagegroup/[a-f0-9A-F]+", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/volume/[a-f0-9A-F]+/snapshot", + "GET /univmax/restapi/91/sloprovisioning/symmetrix/[a-f0-9A-F]+/portgroup/(.+)", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/initiator", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/host/(.+)", + "GET /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/maskingview/(.+)", + "GET /univmax/restapi/(90|91)/system/symmetrix", + "GET /univmax/restapi/private/(90|91)/replication/symmetrix/[a-f0-9A-F]+/volume/[a-f0-9A-F]+/snapshot", + "GET /univmax/restapi/private/(90|91)/replication/symmetrix/[a-f0-9A-F]+/volume/", + "DELETE /univmax/restapi/(90|91)/sloprovisioning/symmetrix/[a-f0-9A-F]+/maskingview/(.+)", + "GET /univmax/restapi/(90|91)/replication/capabilities/symmetrix/", ] default allow = false + allow { regex.match(allowlist[_], sprintf("%s %s", [input.method, input.url])) }