From cbce7cebe7958b40894bc828a14f6177dd44485f Mon Sep 17 00:00:00 2001 From: Dimitri Koshkin Date: Fri, 4 Jan 2019 16:57:47 -0500 Subject: [PATCH] Removed deploy/ examples for pre v1.13 --- deploy/kubernetes/v1.12/attacher.yaml | 122 --------------- deploy/kubernetes/v1.12/node.yaml | 140 ------------------ deploy/kubernetes/v1.12/provisioner.yaml | 140 ------------------ deploy/kubernetes/v1.12/sample_app/claim.yaml | 11 -- deploy/kubernetes/v1.12/sample_app/pod.yaml | 17 --- .../v1.12/sample_app/storageclass.yaml | 7 - deploy/kubernetes/v1.12/secret.yaml | 7 - deploy/kubernetes/v1.[10,11]/attacher.yaml | 122 --------------- deploy/kubernetes/v1.[10,11]/node.yaml | 125 ---------------- deploy/kubernetes/v1.[10,11]/provisioner.yaml | 124 ---------------- .../v1.[10,11]/sample_app/claim.yaml | 11 -- .../kubernetes/v1.[10,11]/sample_app/pod.yaml | 17 --- .../v1.[10,11]/sample_app/storageclass.yaml | 7 - deploy/kubernetes/v1.[10,11]/secret.yaml | 7 - 14 files changed, 857 deletions(-) delete mode 100644 deploy/kubernetes/v1.12/attacher.yaml delete mode 100644 deploy/kubernetes/v1.12/node.yaml delete mode 100644 deploy/kubernetes/v1.12/provisioner.yaml delete mode 100644 deploy/kubernetes/v1.12/sample_app/claim.yaml delete mode 100644 deploy/kubernetes/v1.12/sample_app/pod.yaml delete mode 100644 deploy/kubernetes/v1.12/sample_app/storageclass.yaml delete mode 100644 deploy/kubernetes/v1.12/secret.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/attacher.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/node.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/provisioner.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/sample_app/claim.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/sample_app/pod.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/sample_app/storageclass.yaml delete mode 100644 deploy/kubernetes/v1.[10,11]/secret.yaml diff --git a/deploy/kubernetes/v1.12/attacher.yaml b/deploy/kubernetes/v1.12/attacher.yaml deleted file mode 100644 index f24d81fe0a..0000000000 --- a/deploy/kubernetes/v1.12/attacher.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-attacher-sa - namespace: default - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: external-attacher-runner - namespace: default -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["storage.k8s.io"] - resources: ["volumeattachments"] - verbs: ["get", "list", "watch", "update"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-attacher-role - namespace: default -subjects: - - kind: ServiceAccount - name: csi-attacher-sa - namespace: default -roleRef: - kind: ClusterRole - name: external-attacher-runner - apiGroup: rbac.authorization.k8s.io - ---- - -kind: Service -apiVersion: v1 -metadata: - name: csi-attacher - labels: - app: csi-attacher -spec: - selector: - app: csi-attacher - clusterIP: None ---- - -kind: StatefulSet -apiVersion: apps/v1beta1 -metadata: - name: csi-attacher -spec: - serviceName: "csi-attacher" - replicas: 1 - template: - metadata: - labels: - app: csi-attacher - spec: - serviceAccount: csi-attacher-sa - containers: - - name: csi-attacher - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: quay.io/k8scsi/csi-attacher:v0.4.1 - args: - - --v=5 - - --csi-address=$(ADDRESS) - env: - - name: ADDRESS - value: /var/lib/csi/sockets/pluginproxy/csi.sock - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - - name: ebs-plugin - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: amazon/aws-ebs-csi-driver:0.1.0-alpha - args : - - --endpoint=$(CSI_ENDPOINT) - - --logtostderr - - --v=5 - env: - - name: CSI_ENDPOINT - value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock - - name: AWS_ACCESS_KEY_ID - valueFrom: - secretKeyRef: - name: aws-secret - key: key_id - - name: AWS_SECRET_ACCESS_KEY - valueFrom: - secretKeyRef: - name: aws-secret - key: access_key - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - volumes: - - name: socket-dir - emptyDir: {} diff --git a/deploy/kubernetes/v1.12/node.yaml b/deploy/kubernetes/v1.12/node.yaml deleted file mode 100644 index b8c9424108..0000000000 --- a/deploy/kubernetes/v1.12/node.yaml +++ /dev/null @@ -1,140 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-node-sa - namespace: default - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-node - namespace: default -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "update"] - - apiGroups: [""] - resources: ["namespaces"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["volumeattachments"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["csi.storage.k8s.io"] - resources: ["csinodeinfos"] - verbs: ["get", "list", "watch", "update"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-node - namespace: default -subjects: - - kind: ServiceAccount - name: csi-node-sa - namespace: default -roleRef: - kind: ClusterRole - name: csi-node - apiGroup: rbac.authorization.k8s.io - ---- - -kind: DaemonSet -apiVersion: apps/v1beta2 -metadata: - name: csi-node -spec: - selector: - matchLabels: - app: csi-node - template: - metadata: - labels: - app: csi-node - spec: - serviceAccount: csi-node-sa - hostNetwork: true - containers: - - name: csi-driver-registrar - securityContext: - privileged: true - imagePullPolicy: Always - image: quay.io/k8scsi/driver-registrar:v0.4.1 - args: - - --v=5 - - --csi-address=$(ADDRESS) - - --mode=node-register - - --driver-requires-attachment=true - - --pod-info-mount-version="v1" - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: /var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - fieldPath: spec.nodeName - volumeMounts: - - name: plugin-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - - name: ebs-plugin - securityContext: - privileged: true - imagePullPolicy: Always - image: amazon/aws-ebs-csi-driver:0.1.0-alpha - args: - - --endpoint=$(CSI_ENDPOINT) - - --logtostderr - - --v=5 - env: - - name: CSI_ENDPOINT - value: unix:/csi/csi.sock - - name: AWS_ACCESS_KEY_ID - valueFrom: - secretKeyRef: - name: aws-secret - key: key_id - - name: AWS_SECRET_ACCESS_KEY - valueFrom: - secretKeyRef: - name: aws-secret - key: access_key - volumeMounts: - - name: kubelet-dir - mountPath: /var/lib/kubelet - mountPropagation: "Bidirectional" - - name: plugin-dir - mountPath: /csi - - name: device-dir - mountPath: /dev - volumes: - - name: kubelet-dir - hostPath: - path: /var/lib/kubelet - type: Directory - - name: plugin-dir - hostPath: - path: /var/lib/kubelet/plugins/ebs.csi.aws.com/ - type: DirectoryOrCreate - - name: registration-dir - hostPath: - path: /var/lib/kubelet/plugins/ - type: Directory - - name: device-dir - hostPath: - path: /dev - type: Directory diff --git a/deploy/kubernetes/v1.12/provisioner.yaml b/deploy/kubernetes/v1.12/provisioner.yaml deleted file mode 100644 index 5c7e8bc76f..0000000000 --- a/deploy/kubernetes/v1.12/provisioner.yaml +++ /dev/null @@ -1,140 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-provisioner-sa - namespace: default - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: external-provisioner-runner - namespace: default -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: [""] - resources: ["endpoints"] - verbs: ["list", "watch", "create", "update", "get"] - - apiGroups: ["snapshot.storage.k8s.io"] - resources: ["volumesnapshots"] - verbs: ["get", "list"] - - apiGroups: ["snapshot.storage.k8s.io"] - resources: ["volumesnapshotcontents"] - verbs: ["get", "list"] - - apiGroups: ["csi.storage.k8s.io"] - resources: ["csinodeinfos"] - verbs: ["get", "list", "watch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-provisioner-role - namespace: default -subjects: - - kind: ServiceAccount - name: csi-provisioner-sa - namespace: default -roleRef: - kind: ClusterRole - name: external-provisioner-runner - apiGroup: rbac.authorization.k8s.io - ---- - -kind: Service -apiVersion: v1 -metadata: - name: csi-provisioner - labels: - app: csi-provisioner -spec: - selector: - app: csi-provisioner - clusterIP: None ---- - -kind: StatefulSet -apiVersion: apps/v1beta1 -metadata: - name: csi-provisioner -spec: - serviceName: "csi-provisioner" - replicas: 1 - template: - metadata: - labels: - app: csi-provisioner - spec: - serviceAccount: csi-provisioner-sa - containers: - - name: csi-provisioner - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: quay.io/k8scsi/csi-provisioner:v0.4.1 - args: - - --provisioner=ebs.csi.aws.com - - --csi-address=$(ADDRESS) - - --v=5 - - --feature-gates=Topology=true - env: - - name: ADDRESS - value: /var/lib/csi/sockets/pluginproxy/csi.sock - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - - - name: ebs-plugin - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: amazon/aws-ebs-csi-driver:0.1.0-alpha - args : - - --endpoint=$(CSI_ENDPOINT) - - --logtostderr - - --v=5 - env: - - name: CSI_ENDPOINT - value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock - - name: AWS_ACCESS_KEY_ID - valueFrom: - secretKeyRef: - name: aws-secret - key: key_id - - name: AWS_SECRET_ACCESS_KEY - valueFrom: - secretKeyRef: - name: aws-secret - key: access_key - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - volumes: - - name: socket-dir - emptyDir: {} diff --git a/deploy/kubernetes/v1.12/sample_app/claim.yaml b/deploy/kubernetes/v1.12/sample_app/claim.yaml deleted file mode 100644 index df798abf34..0000000000 --- a/deploy/kubernetes/v1.12/sample_app/claim.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: claim1 -spec: - accessModes: - - ReadWriteOnce - storageClassName: slow - resources: - requests: - storage: 4Gi diff --git a/deploy/kubernetes/v1.12/sample_app/pod.yaml b/deploy/kubernetes/v1.12/sample_app/pod.yaml deleted file mode 100644 index 9ba86729ca..0000000000 --- a/deploy/kubernetes/v1.12/sample_app/pod.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Pod -metadata: - name: app -spec: - containers: - - name: app - image: centos - command: ["/bin/sh"] - args: ["-c", "while true; do echo $(date -u) >> /data/out.txt; sleep 5; done"] - volumeMounts: - - name: persistent-storage - mountPath: /data - volumes: - - name: persistent-storage - persistentVolumeClaim: - claimName: claim1 diff --git a/deploy/kubernetes/v1.12/sample_app/storageclass.yaml b/deploy/kubernetes/v1.12/sample_app/storageclass.yaml deleted file mode 100644 index 57196d17aa..0000000000 --- a/deploy/kubernetes/v1.12/sample_app/storageclass.yaml +++ /dev/null @@ -1,7 +0,0 @@ -kind: StorageClass -apiVersion: storage.k8s.io/v1 -metadata: - name: slow - annotations: - storageclass.kubernetes.io/is-default-class: "true" -provisioner: ebs.csi.aws.com diff --git a/deploy/kubernetes/v1.12/secret.yaml b/deploy/kubernetes/v1.12/secret.yaml deleted file mode 100644 index a77fc16c10..0000000000 --- a/deploy/kubernetes/v1.12/secret.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - name: aws-secret -stringData: - key_id: - access_key: diff --git a/deploy/kubernetes/v1.[10,11]/attacher.yaml b/deploy/kubernetes/v1.[10,11]/attacher.yaml deleted file mode 100644 index f24d81fe0a..0000000000 --- a/deploy/kubernetes/v1.[10,11]/attacher.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-attacher-sa - namespace: default - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: external-attacher-runner - namespace: default -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["storage.k8s.io"] - resources: ["volumeattachments"] - verbs: ["get", "list", "watch", "update"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-attacher-role - namespace: default -subjects: - - kind: ServiceAccount - name: csi-attacher-sa - namespace: default -roleRef: - kind: ClusterRole - name: external-attacher-runner - apiGroup: rbac.authorization.k8s.io - ---- - -kind: Service -apiVersion: v1 -metadata: - name: csi-attacher - labels: - app: csi-attacher -spec: - selector: - app: csi-attacher - clusterIP: None ---- - -kind: StatefulSet -apiVersion: apps/v1beta1 -metadata: - name: csi-attacher -spec: - serviceName: "csi-attacher" - replicas: 1 - template: - metadata: - labels: - app: csi-attacher - spec: - serviceAccount: csi-attacher-sa - containers: - - name: csi-attacher - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: quay.io/k8scsi/csi-attacher:v0.4.1 - args: - - --v=5 - - --csi-address=$(ADDRESS) - env: - - name: ADDRESS - value: /var/lib/csi/sockets/pluginproxy/csi.sock - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - - name: ebs-plugin - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: amazon/aws-ebs-csi-driver:0.1.0-alpha - args : - - --endpoint=$(CSI_ENDPOINT) - - --logtostderr - - --v=5 - env: - - name: CSI_ENDPOINT - value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock - - name: AWS_ACCESS_KEY_ID - valueFrom: - secretKeyRef: - name: aws-secret - key: key_id - - name: AWS_SECRET_ACCESS_KEY - valueFrom: - secretKeyRef: - name: aws-secret - key: access_key - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - volumes: - - name: socket-dir - emptyDir: {} diff --git a/deploy/kubernetes/v1.[10,11]/node.yaml b/deploy/kubernetes/v1.[10,11]/node.yaml deleted file mode 100644 index 84ed4a9d18..0000000000 --- a/deploy/kubernetes/v1.[10,11]/node.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-node-sa - namespace: default - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-node - namespace: default -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "update"] - - apiGroups: [""] - resources: ["namespaces"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["volumeattachments"] - verbs: ["get", "list", "watch", "update"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-node - namespace: default -subjects: - - kind: ServiceAccount - name: csi-node-sa - namespace: default -roleRef: - kind: ClusterRole - name: csi-node - apiGroup: rbac.authorization.k8s.io - ---- - -kind: DaemonSet -apiVersion: apps/v1beta2 -metadata: - name: csi-node -spec: - selector: - matchLabels: - app: csi-node - template: - metadata: - labels: - app: csi-node - spec: - serviceAccount: csi-node-sa - hostNetwork: true - containers: - - name: csi-driver-registrar - securityContext: - privileged: true - imagePullPolicy: Always - image: quay.io/k8scsi/driver-registrar:v0.4.1 - args: - - --v=5 - - --csi-address=$(ADDRESS) - env: - - name: ADDRESS - value: /csi/csi.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - fieldPath: spec.nodeName - volumeMounts: - - name: plugin-dir - mountPath: /csi - - name: ebs-plugin - securityContext: - privileged: true - imagePullPolicy: Always - image: amazon/aws-ebs-csi-driver:0.1.0-alpha - args: - - --endpoint=$(CSI_ENDPOINT) - - --logtostderr - - --v=5 - env: - - name: CSI_ENDPOINT - value: unix:/csi/csi.sock - - name: AWS_ACCESS_KEY_ID - valueFrom: - secretKeyRef: - name: aws-secret - key: key_id - - name: AWS_SECRET_ACCESS_KEY - valueFrom: - secretKeyRef: - name: aws-secret - key: access_key - volumeMounts: - - name: kubelet-dir - mountPath: /var/lib/kubelet - mountPropagation: "Bidirectional" - - name: plugin-dir - mountPath: /csi - - name: device-dir - mountPath: /dev - volumes: - - name: kubelet-dir - hostPath: - path: /var/lib/kubelet - type: Directory - - name: plugin-dir - hostPath: - path: /var/lib/kubelet/plugins/ebs.csi.aws.com/ - type: DirectoryOrCreate - - name: device-dir - hostPath: - path: /dev - type: Directory diff --git a/deploy/kubernetes/v1.[10,11]/provisioner.yaml b/deploy/kubernetes/v1.[10,11]/provisioner.yaml deleted file mode 100644 index d48c614cb0..0000000000 --- a/deploy/kubernetes/v1.[10,11]/provisioner.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-provisioner-sa - namespace: default - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: external-provisioner-runner - namespace: default -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-provisioner-role - namespace: default -subjects: - - kind: ServiceAccount - name: csi-provisioner-sa - namespace: default -roleRef: - kind: ClusterRole - name: external-provisioner-runner - apiGroup: rbac.authorization.k8s.io - ---- - -kind: Service -apiVersion: v1 -metadata: - name: csi-provisioner - labels: - app: csi-provisioner -spec: - selector: - app: csi-provisioner - clusterIP: None ---- - -kind: StatefulSet -apiVersion: apps/v1beta1 -metadata: - name: csi-provisioner -spec: - serviceName: "csi-provisioner" - replicas: 1 - template: - metadata: - labels: - app: csi-provisioner - spec: - serviceAccount: csi-provisioner-sa - containers: - - name: csi-provisioner - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: quay.io/k8scsi/csi-provisioner:v0.4.1 - args: - - --provisioner=ebs.csi.aws.com - - --csi-address=$(ADDRESS) - - --v=5 - env: - - name: ADDRESS - value: /var/lib/csi/sockets/pluginproxy/csi.sock - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - - - name: ebs-plugin - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - image: amazon/aws-ebs-csi-driver:0.1.0-alpha - args : - - --endpoint=$(CSI_ENDPOINT) - - --logtostderr - - --v=5 - env: - - name: CSI_ENDPOINT - value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock - - name: AWS_ACCESS_KEY_ID - valueFrom: - secretKeyRef: - name: aws-secret - key: key_id - - name: AWS_SECRET_ACCESS_KEY - valueFrom: - secretKeyRef: - name: aws-secret - key: access_key - imagePullPolicy: Always - volumeMounts: - - name: socket-dir - mountPath: /var/lib/csi/sockets/pluginproxy/ - volumes: - - name: socket-dir - emptyDir: {} diff --git a/deploy/kubernetes/v1.[10,11]/sample_app/claim.yaml b/deploy/kubernetes/v1.[10,11]/sample_app/claim.yaml deleted file mode 100644 index df798abf34..0000000000 --- a/deploy/kubernetes/v1.[10,11]/sample_app/claim.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: claim1 -spec: - accessModes: - - ReadWriteOnce - storageClassName: slow - resources: - requests: - storage: 4Gi diff --git a/deploy/kubernetes/v1.[10,11]/sample_app/pod.yaml b/deploy/kubernetes/v1.[10,11]/sample_app/pod.yaml deleted file mode 100644 index 9ba86729ca..0000000000 --- a/deploy/kubernetes/v1.[10,11]/sample_app/pod.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Pod -metadata: - name: app -spec: - containers: - - name: app - image: centos - command: ["/bin/sh"] - args: ["-c", "while true; do echo $(date -u) >> /data/out.txt; sleep 5; done"] - volumeMounts: - - name: persistent-storage - mountPath: /data - volumes: - - name: persistent-storage - persistentVolumeClaim: - claimName: claim1 diff --git a/deploy/kubernetes/v1.[10,11]/sample_app/storageclass.yaml b/deploy/kubernetes/v1.[10,11]/sample_app/storageclass.yaml deleted file mode 100644 index 57196d17aa..0000000000 --- a/deploy/kubernetes/v1.[10,11]/sample_app/storageclass.yaml +++ /dev/null @@ -1,7 +0,0 @@ -kind: StorageClass -apiVersion: storage.k8s.io/v1 -metadata: - name: slow - annotations: - storageclass.kubernetes.io/is-default-class: "true" -provisioner: ebs.csi.aws.com diff --git a/deploy/kubernetes/v1.[10,11]/secret.yaml b/deploy/kubernetes/v1.[10,11]/secret.yaml deleted file mode 100644 index 2a771a0272..0000000000 --- a/deploy/kubernetes/v1.[10,11]/secret.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - name: aws-secret -stringData: - key_id: - access_key: