From 4c7ff2202c9b143731be24819e2c625ac09044da Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Fri, 12 Apr 2024 07:19:12 +0000 Subject: [PATCH 1/2] doc: add new charts --- charts/index.yaml | 111 +++--- charts/v1.22.6/blob-csi-driver-v1.22.6.tgz | Bin 0 -> 5869 bytes charts/v1.22.6/blob-csi-driver/Chart.yaml | 5 + .../blob-csi-driver/templates/NOTES.txt | 5 + .../blob-csi-driver/templates/_helpers.tpl | 49 +++ .../templates/csi-blob-controller.yaml | 215 ++++++++++++ .../templates/csi-blob-driver.yaml | 14 + .../templates/csi-blob-node.yaml | 323 +++++++++++++++++ .../templates/rbac-csi-blob-controller.yaml | 115 ++++++ .../templates/rbac-csi-blob-node.yaml | 29 ++ .../serviceaccount-csi-blob-controller.yaml | 17 + .../serviceaccount-csi-blob-node.yaml | 17 + charts/v1.22.6/blob-csi-driver/values.yaml | 180 ++++++++++ charts/v1.23.4/blob-csi-driver-v1.23.4.tgz | Bin 0 -> 5944 bytes charts/v1.23.4/blob-csi-driver/Chart.yaml | 5 + .../blob-csi-driver/templates/NOTES.txt | 5 + .../blob-csi-driver/templates/_helpers.tpl | 49 +++ .../templates/csi-blob-controller.yaml | 216 ++++++++++++ .../templates/csi-blob-driver.yaml | 16 + .../templates/csi-blob-node.yaml | 326 ++++++++++++++++++ .../templates/rbac-csi-blob-controller.yaml | 115 ++++++ .../templates/rbac-csi-blob-node.yaml | 29 ++ .../serviceaccount-csi-blob-controller.yaml | 17 + .../serviceaccount-csi-blob-node.yaml | 17 + charts/v1.23.4/blob-csi-driver/values.yaml | 180 ++++++++++ charts/v1.24.1/blob-csi-driver-v1.24.1.tgz | Bin 0 -> 5981 bytes charts/v1.24.1/blob-csi-driver/Chart.yaml | 5 + .../blob-csi-driver/templates/NOTES.txt | 5 + .../blob-csi-driver/templates/_helpers.tpl | 49 +++ .../templates/csi-blob-controller.yaml | 214 ++++++++++++ .../templates/csi-blob-driver.yaml | 16 + .../templates/csi-blob-node.yaml | 326 ++++++++++++++++++ .../templates/rbac-csi-blob-controller.yaml | 115 ++++++ .../templates/rbac-csi-blob-node.yaml | 29 ++ .../serviceaccount-csi-blob-controller.yaml | 17 + .../serviceaccount-csi-blob-node.yaml | 17 + charts/v1.24.1/blob-csi-driver/values.yaml | 181 ++++++++++ deploy/v1.22.6/csi-blob-controller.yaml | 143 ++++++++ deploy/v1.22.6/csi-blob-driver.yaml | 12 + deploy/v1.22.6/csi-blob-node.yaml | 203 +++++++++++ deploy/v1.22.6/kustomization.yaml | 10 + deploy/v1.22.6/rbac-csi-blob-controller.yaml | 108 ++++++ deploy/v1.22.6/rbac-csi-blob-node.yaml | 30 ++ deploy/v1.23.4/csi-blob-controller.yaml | 144 ++++++++ deploy/v1.23.4/csi-blob-driver.yaml | 12 + deploy/v1.23.4/csi-blob-node.yaml | 208 +++++++++++ deploy/v1.23.4/kustomization.yaml | 10 + deploy/v1.23.4/rbac-csi-blob-controller.yaml | 108 ++++++ deploy/v1.23.4/rbac-csi-blob-node.yaml | 30 ++ deploy/v1.24.1/csi-blob-controller.yaml | 142 ++++++++ deploy/v1.24.1/csi-blob-driver.yaml | 12 + deploy/v1.24.1/csi-blob-node.yaml | 239 +++++++++++++ deploy/v1.24.1/kustomization.yaml | 10 + deploy/v1.24.1/rbac-csi-blob-controller.yaml | 108 ++++++ deploy/v1.24.1/rbac-csi-blob-node.yaml | 30 ++ docs/install-csi-driver-v1.22.6.md | 47 +++ docs/install-csi-driver-v1.23.4.md | 47 +++ docs/install-csi-driver-v1.24.1.md | 47 +++ 58 files changed, 4687 insertions(+), 42 deletions(-) create mode 100644 charts/v1.22.6/blob-csi-driver-v1.22.6.tgz create mode 100644 charts/v1.22.6/blob-csi-driver/Chart.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/NOTES.txt create mode 100644 charts/v1.22.6/blob-csi-driver/templates/_helpers.tpl create mode 100644 charts/v1.22.6/blob-csi-driver/templates/csi-blob-controller.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/csi-blob-driver.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/csi-blob-node.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/rbac-csi-blob-controller.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/rbac-csi-blob-node.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml create mode 100644 charts/v1.22.6/blob-csi-driver/values.yaml create mode 100644 charts/v1.23.4/blob-csi-driver-v1.23.4.tgz create mode 100644 charts/v1.23.4/blob-csi-driver/Chart.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/NOTES.txt create mode 100644 charts/v1.23.4/blob-csi-driver/templates/_helpers.tpl create mode 100644 charts/v1.23.4/blob-csi-driver/templates/csi-blob-controller.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/csi-blob-driver.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/csi-blob-node.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-controller.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-node.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml create mode 100644 charts/v1.23.4/blob-csi-driver/values.yaml create mode 100644 charts/v1.24.1/blob-csi-driver-v1.24.1.tgz create mode 100644 charts/v1.24.1/blob-csi-driver/Chart.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/NOTES.txt create mode 100644 charts/v1.24.1/blob-csi-driver/templates/_helpers.tpl create mode 100644 charts/v1.24.1/blob-csi-driver/templates/csi-blob-controller.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/csi-blob-driver.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/csi-blob-node.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/rbac-csi-blob-controller.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/rbac-csi-blob-node.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml create mode 100644 charts/v1.24.1/blob-csi-driver/values.yaml create mode 100644 deploy/v1.22.6/csi-blob-controller.yaml create mode 100644 deploy/v1.22.6/csi-blob-driver.yaml create mode 100644 deploy/v1.22.6/csi-blob-node.yaml create mode 100644 deploy/v1.22.6/kustomization.yaml create mode 100644 deploy/v1.22.6/rbac-csi-blob-controller.yaml create mode 100644 deploy/v1.22.6/rbac-csi-blob-node.yaml create mode 100644 deploy/v1.23.4/csi-blob-controller.yaml create mode 100644 deploy/v1.23.4/csi-blob-driver.yaml create mode 100644 deploy/v1.23.4/csi-blob-node.yaml create mode 100644 deploy/v1.23.4/kustomization.yaml create mode 100644 deploy/v1.23.4/rbac-csi-blob-controller.yaml create mode 100644 deploy/v1.23.4/rbac-csi-blob-node.yaml create mode 100644 deploy/v1.24.1/csi-blob-controller.yaml create mode 100644 deploy/v1.24.1/csi-blob-driver.yaml create mode 100644 deploy/v1.24.1/csi-blob-node.yaml create mode 100644 deploy/v1.24.1/kustomization.yaml create mode 100644 deploy/v1.24.1/rbac-csi-blob-controller.yaml create mode 100644 deploy/v1.24.1/rbac-csi-blob-node.yaml create mode 100644 docs/install-csi-driver-v1.22.6.md create mode 100644 docs/install-csi-driver-v1.23.4.md create mode 100644 docs/install-csi-driver-v1.24.1.md diff --git a/charts/index.yaml b/charts/index.yaml index 0ec29f462..833c15ba2 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -1,27 +1,45 @@ apiVersion: v1 entries: blob-csi-driver: + - apiVersion: v1 + appVersion: v1.24.1 + created: "2024-04-12T07:18:31.462033556Z" + description: Azure Blob Storage CSI driver + digest: 82537068e57177cf6d0697c7c942aaf496de9280fbc7b96ab326776fa4db8481 + name: blob-csi-driver + urls: + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.24.1/blob-csi-driver-v1.24.1.tgz + version: v1.24.1 - apiVersion: v1 appVersion: v1.24.0 - created: "2024-02-22T13:38:43.33899957Z" + created: "2024-04-12T07:18:31.461360864Z" description: Azure Blob Storage CSI driver - digest: c9ecca2dde77d9557f3917513c8f5adcb861c2cfa9fe1e08f5bef056ab583efd + digest: 3b3b1a4fee786f0c9445da2f35bd1e251265cec8ee03c3cf99fe9f0bf9575e09 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.24.0/blob-csi-driver-v1.24.0.tgz version: v1.24.0 + - apiVersion: v1 + appVersion: v1.23.4 + created: "2024-04-12T07:18:31.460274467Z" + description: Azure Blob Storage CSI driver + digest: 20d0157476ecf0a38b2d3982587b9657b27e1603b2185709faeff73b6d671ceb + name: blob-csi-driver + urls: + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.23.4/blob-csi-driver-v1.23.4.tgz + version: v1.23.4 - apiVersion: v1 appVersion: v1.23.3 - created: "2024-02-22T13:38:43.338374858Z" + created: "2024-04-12T07:18:31.459269166Z" description: Azure Blob Storage CSI driver - digest: 4acef5e84bcbc01fa624b73f14d1331ee14b14e52b4db018f0037fd2ada015c7 + digest: 21c8355faf362c527e40ac417b17d3c28fa041941633254358387997b9bee8a6 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.23.3/blob-csi-driver-v1.23.3.tgz version: v1.23.3 - apiVersion: v1 appVersion: v1.23.2 - created: "2024-02-22T13:38:43.33777157Z" + created: "2024-04-12T07:18:31.458611981Z" description: Azure Blob Storage CSI driver digest: 057d6658c5879ee7e564d59275366521dc0a2e311c0527e570eaccd544622e60 name: blob-csi-driver @@ -30,7 +48,7 @@ entries: version: v1.23.2 - apiVersion: v1 appVersion: v1.23.1 - created: "2024-02-22T13:38:43.337162249Z" + created: "2024-04-12T07:18:31.457969298Z" description: Azure Blob Storage CSI driver digest: 66215f12a4e3acdcf09416d817b737e14546058b081a2cfd8bf9ef507229ca07 name: blob-csi-driver @@ -39,16 +57,25 @@ entries: version: v1.23.1 - apiVersion: v1 appVersion: v1.23.0 - created: "2024-02-22T13:38:43.336524751Z" + created: "2024-04-12T07:18:31.457353804Z" description: Azure Blob Storage CSI driver digest: 57151e21e33660522f25694bd8ae985e5e17c7ffe09904ad2af4025e8bf1da72 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.23.0/blob-csi-driver-v1.23.0.tgz version: v1.23.0 + - apiVersion: v1 + appVersion: v1.22.6 + created: "2024-04-12T07:18:31.456725713Z" + description: Azure Blob Storage CSI driver + digest: 82e30775aa05e093c30884f480d505b408023dfa32944cf21ebffe9d88afb1f2 + name: blob-csi-driver + urls: + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.22.6/blob-csi-driver-v1.22.6.tgz + version: v1.22.6 - apiVersion: v1 appVersion: v1.22.5 - created: "2024-02-22T13:38:43.335903602Z" + created: "2024-04-12T07:18:31.456077167Z" description: Azure Blob Storage CSI driver digest: ff3c2c2e05dd048dd0af3e5c7d002eae2928a5d17fb269a1e4d5cadd30e8ab51 name: blob-csi-driver @@ -57,7 +84,7 @@ entries: version: v1.22.5 - apiVersion: v1 appVersion: v1.22.4 - created: "2024-02-22T13:38:43.335229669Z" + created: "2024-04-12T07:18:31.45545871Z" description: Azure Blob Storage CSI driver digest: 6c38e79d2f50616daac0658cfa5b1a569e6ff8ce8f24ed40f563e87fb1d1340a name: blob-csi-driver @@ -66,7 +93,7 @@ entries: version: v1.22.4 - apiVersion: v1 appVersion: v1.22.3 - created: "2024-02-22T13:38:43.333709892Z" + created: "2024-04-12T07:18:31.454792765Z" description: Azure Blob Storage CSI driver digest: 6cdee296d22ecd330f477f2ca6da51b07320c546c04ae46c23eef48146b772c1 name: blob-csi-driver @@ -75,7 +102,7 @@ entries: version: v1.22.3 - apiVersion: v1 appVersion: v1.22.2 - created: "2024-02-22T13:38:43.333082873Z" + created: "2024-04-12T07:18:31.454147089Z" description: Azure Blob Storage CSI driver digest: 259e66dc12db7310fe1c51e49c964398e0a6b7d511133916dd7d25f748f0b791 name: blob-csi-driver @@ -84,7 +111,7 @@ entries: version: v1.22.2 - apiVersion: v1 appVersion: v1.22.1 - created: "2024-02-22T13:38:43.332470917Z" + created: "2024-04-12T07:18:31.453303054Z" description: Azure Blob Storage CSI driver digest: 8329d477d55c82f97bb09fb172c5f39a1677bedc13c7410bd93b306194516438 name: blob-csi-driver @@ -93,7 +120,7 @@ entries: version: v1.22.1 - apiVersion: v1 appVersion: v1.21.7 - created: "2024-02-22T13:38:43.331849146Z" + created: "2024-04-12T07:18:31.451715932Z" description: Azure Blob Storage CSI driver digest: 1095721182d611e2556c611dd330758d8130fe66493db4f9189586a9219896d3 name: blob-csi-driver @@ -102,7 +129,7 @@ entries: version: v1.21.7 - apiVersion: v1 appVersion: v1.21.6 - created: "2024-02-22T13:38:43.33123788Z" + created: "2024-04-12T07:18:31.451094812Z" description: Azure Blob Storage CSI driver digest: d5ba1f92795ec45970eb6e5fc54aa13a5684f9936216c064f8a3843bf722bf54 name: blob-csi-driver @@ -111,7 +138,7 @@ entries: version: v1.21.6 - apiVersion: v1 appVersion: v1.21.5 - created: "2024-02-22T13:38:43.330670488Z" + created: "2024-04-12T07:18:31.450468305Z" description: Azure Blob Storage CSI driver digest: b403e9d49abfe076ecd83d6dd50166347ee4305f33dc840019474b2876723b9b name: blob-csi-driver @@ -120,7 +147,7 @@ entries: version: v1.21.5 - apiVersion: v1 appVersion: v1.21.4 - created: "2024-02-22T13:38:43.330079576Z" + created: "2024-04-12T07:18:31.449862625Z" description: Azure Blob Storage CSI driver digest: e4fa13670caf6b0d3e9fefa55d100daa439cd7187dabd45318ab03c7d4b17710 name: blob-csi-driver @@ -129,7 +156,7 @@ entries: version: v1.21.4 - apiVersion: v1 appVersion: v1.20.3 - created: "2024-02-22T13:38:43.329453983Z" + created: "2024-04-12T07:18:31.449232951Z" description: Azure Blob Storage CSI driver digest: 8c2c20547b2e0e1b39d2f2efd04c1bd778f14af5feae2bda86d722dac3c02643 name: blob-csi-driver @@ -138,7 +165,7 @@ entries: version: v1.20.3 - apiVersion: v1 appVersion: v1.19.6 - created: "2024-02-22T13:38:43.32837523Z" + created: "2024-04-12T07:18:31.448183785Z" description: Azure Blob Storage CSI driver digest: 0007ef225b5658d3989aa6fdc3a91a4b33696a438eee46ad9a675af615cbdf21 name: blob-csi-driver @@ -147,7 +174,7 @@ entries: version: v1.19.6 - apiVersion: v1 appVersion: v1.19.5 - created: "2024-02-22T13:38:43.327646408Z" + created: "2024-04-12T07:18:31.447588419Z" description: Azure Blob Storage CSI driver digest: 183c3e5cd84b709f1455cc7c84ed5bd573e8a24149fd6442d38999835b0a1711 name: blob-csi-driver @@ -156,7 +183,7 @@ entries: version: v1.19.5 - apiVersion: v1 appVersion: v1.18.0 - created: "2024-02-22T13:38:43.32640302Z" + created: "2024-04-12T07:18:31.446939966Z" description: Azure Blob Storage CSI driver digest: 3eac15488da5be7d1e78431929f7cda35bceb1af3fe107ffbd84606e047c9204 name: blob-csi-driver @@ -165,7 +192,7 @@ entries: version: v1.18.0 - apiVersion: v1 appVersion: v1.17.0 - created: "2024-02-22T13:38:43.325246938Z" + created: "2024-04-12T07:18:31.44632176Z" description: Azure Blob Storage CSI driver digest: 22cfa17fc5e8d771ff8edd26729266a9a8ee55c0e150df85ef15698f7fe985e9 name: blob-csi-driver @@ -174,7 +201,7 @@ entries: version: v1.17.0 - apiVersion: v1 appVersion: v1.16.0 - created: "2024-02-22T13:38:43.32465342Z" + created: "2024-04-12T07:18:31.445647499Z" description: Azure Blob Storage CSI driver digest: bf6249c0e3e3d3d009d4c79ceb7fda9a56c0565b969de753628792ea3ea5ece8 name: blob-csi-driver @@ -183,7 +210,7 @@ entries: version: v1.16.0 - apiVersion: v1 appVersion: v1.15.0 - created: "2024-02-22T13:38:43.324067023Z" + created: "2024-04-12T07:18:31.443843725Z" description: Azure Blob Storage CSI driver digest: 8daa35cd4957695cb64b45da05a15b4020df5545a8ac44c4668dad4bba82c8a9 name: blob-csi-driver @@ -192,7 +219,7 @@ entries: version: v1.15.0 - apiVersion: v1 appVersion: v1.14.0 - created: "2024-02-22T13:38:43.323452746Z" + created: "2024-04-12T07:18:31.443242253Z" description: Azure Blob Storage CSI driver digest: 442bc579b231aab626b9e474e2c0ed3f101d47d61c99aa9a7f863af7ce268d9d name: blob-csi-driver @@ -201,7 +228,7 @@ entries: version: v1.14.0 - apiVersion: v1 appVersion: v1.13.0 - created: "2024-02-22T13:38:43.322864744Z" + created: "2024-04-12T07:18:31.442607498Z" description: Azure Blob Storage CSI driver digest: b577b0b771138109aa90eb09d56fc07273ca0b584a263ee8f789e35796279f31 name: blob-csi-driver @@ -210,7 +237,7 @@ entries: version: v1.13.0 - apiVersion: v1 appVersion: v1.12.0 - created: "2024-02-22T13:38:43.322285362Z" + created: "2024-04-12T07:18:31.44197167Z" description: Azure Blob Storage CSI driver digest: 124e87af2581b374b89a39940698620c23d3eae6dcee518d302461ffea93e9a8 name: blob-csi-driver @@ -219,7 +246,7 @@ entries: version: v1.12.0 - apiVersion: v1 appVersion: v1.11.0 - created: "2024-02-22T13:38:43.321685494Z" + created: "2024-04-12T07:18:31.441339836Z" description: Azure Blob Storage CSI driver digest: 07c4d76017491b3d0bdd70de90e814096938bf7916da0c149c3805294bd57560 name: blob-csi-driver @@ -228,7 +255,7 @@ entries: version: v1.11.0 - apiVersion: v1 appVersion: v1.10.0 - created: "2024-02-22T13:38:43.32108312Z" + created: "2024-04-12T07:18:31.440704203Z" description: Azure Blob Storage CSI driver digest: 79716efa958385adf57eb3570843e1b4512d8c801e8e070625e94264f3e917a9 name: blob-csi-driver @@ -237,7 +264,7 @@ entries: version: v1.10.0 - apiVersion: v1 appVersion: v1.9.0 - created: "2024-02-22T13:38:43.344668206Z" + created: "2024-04-12T07:18:31.466447348Z" description: Azure Blob Storage CSI driver digest: fca0b9215d3277346f68c643fb3ead75158971f0d1945ab01ec559196f3cf842 name: blob-csi-driver @@ -246,7 +273,7 @@ entries: version: v1.9.0 - apiVersion: v1 appVersion: v1.8.0 - created: "2024-02-22T13:38:43.344048475Z" + created: "2024-04-12T07:18:31.465869124Z" description: Azure Blob Storage CSI driver digest: 3b78e2ab4f33577c54d4f57276c824717d2ad2aa3741210e938fcaf927bc751f name: blob-csi-driver @@ -255,7 +282,7 @@ entries: version: v1.8.0 - apiVersion: v1 appVersion: v1.7.0 - created: "2024-02-22T13:38:43.343397477Z" + created: "2024-04-12T07:18:31.465292778Z" description: Azure Blob Storage CSI driver digest: 28da5b55c3d2689d6da85eb7da344385e9cb99bdb2af18c24fea93670abfe7ea name: blob-csi-driver @@ -264,7 +291,7 @@ entries: version: v1.7.0 - apiVersion: v1 appVersion: v1.6.0 - created: "2024-02-22T13:38:43.342587905Z" + created: "2024-04-12T07:18:31.464694601Z" description: Azure Blob Storage CSI driver digest: 6f24f2e6623f6f8862e47d4fbdf13b5f351ceec6bb9a4591ef7fc2fca9fc1eef name: blob-csi-driver @@ -273,7 +300,7 @@ entries: version: v1.6.0 - apiVersion: v1 appVersion: v1.5.0 - created: "2024-02-22T13:38:43.34103753Z" + created: "2024-04-12T07:18:31.464152794Z" description: Azure Blob Storage CSI driver digest: 95d14c9b70b319760d388ea47727c8c97e9287867a8852aeb67b7175b52fe8f5 name: blob-csi-driver @@ -282,7 +309,7 @@ entries: version: v1.5.0 - apiVersion: v1 appVersion: v1.4.1 - created: "2024-02-22T13:38:43.340523852Z" + created: "2024-04-12T07:18:31.46361856Z" description: Azure Blob Storage CSI driver digest: 5fcf69c449f065fa1d5722e5a7fed8a28000efa790907e9ff4b552c5fbd16d22 name: blob-csi-driver @@ -291,7 +318,7 @@ entries: version: v1.4.1 - apiVersion: v1 appVersion: v1.4.0 - created: "2024-02-22T13:38:43.340000695Z" + created: "2024-04-12T07:18:31.463097533Z" description: Azure Blob Storage CSI driver digest: b466543344a6411f6130ba87b093955d39ab8614c6b4ed8505a0a0c96073cb33 name: blob-csi-driver @@ -300,7 +327,7 @@ entries: version: v1.4.0 - apiVersion: v1 appVersion: v1.3.0 - created: "2024-02-22T13:38:43.339467398Z" + created: "2024-04-12T07:18:31.462518429Z" description: Azure Blob Storage CSI driver digest: 58d02cb70a3a966b349d62e880b7149fb06ac009474e35e580784fd3c98a5b07 name: blob-csi-driver @@ -309,7 +336,7 @@ entries: version: v1.3.0 - apiVersion: v1 appVersion: v1.2.0 - created: "2024-02-22T13:38:43.328869209Z" + created: "2024-04-12T07:18:31.448639791Z" description: Azure Blob Storage CSI driver digest: 27fb89f20b5fddc7329e6d7c2374857b22c1d61592e397a53f47121eea68c344 name: blob-csi-driver @@ -318,7 +345,7 @@ entries: version: v1.2.0 - apiVersion: v1 appVersion: v1.1.0 - created: "2024-02-22T13:38:43.320462033Z" + created: "2024-04-12T07:18:31.440082082Z" description: Azure Blob Storage CSI driver digest: a251a55243de207c69ef53f72abee45e93b72fa4fc43dc204b7f1cdfd459acdb name: blob-csi-driver @@ -327,7 +354,7 @@ entries: version: v1.1.0 - apiVersion: v1 appVersion: v1.0.0 - created: "2024-02-22T13:38:43.32000298Z" + created: "2024-04-12T07:18:31.439612191Z" description: Azure Blob Storage CSI driver digest: e83f037a165eafc83a978bd7e6bf6221b052ac34363aecb12e6a73607dc58b89 name: blob-csi-driver @@ -336,11 +363,11 @@ entries: version: v1.0.0 - apiVersion: v1 appVersion: latest - created: "2024-02-22T13:38:43.319662364Z" + created: "2024-04-12T07:18:31.439263063Z" description: Azure Blob Storage CSI driver - digest: a8a337da1fb52e80e8bf9e7cd1d6da9179de91c7577a50822547e476324efdfe + digest: c124c5652331e6b3e47e600740a65aa86b1cd31a899a586dec4002c59d51268e name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/latest/blob-csi-driver-v0.0.0.tgz version: v0.0.0 -generated: "2024-02-22T13:38:43.318844561Z" +generated: "2024-04-12T07:18:31.438375493Z" diff --git a/charts/v1.22.6/blob-csi-driver-v1.22.6.tgz b/charts/v1.22.6/blob-csi-driver-v1.22.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..a5c9a50a4a40e51f66605f38468e8ccab15ff1cf GIT binary patch literal 5869 zcmVDc zVQyr3R8em|NM&qo0PH>6a@#nv^Q^BxDYLb+dqQ1&%dD#W;8;pl6-QQCPGGL;{UDo+39!fle5<8o0Ilg`{=t?`=ot#@*QgJkA>3^P9)M@Nmbng_z=B$WE$#cvS@^wwu%G?I+tDWJQ(mp!O|K}(qz*Fed z5E^3vHxRN83S8a@h|8H^6WMTCpx*jyte_C$5Hdj|bYW+G4; zSmJ3q>(zrW^8F$6iM!~a{$#-9kb?j!YY4f53^|(<;+b$C)e$HI^6IdBEJ z0YQG-riZzykQ>ppq-w6uA}?MrhSAt3?xlKCtG#-KZeRi&s0&Ck#3&%fQNTDL0WJqA z)Z;OrNPvgF&VXt%gietbSD{dFm~_xg%20Hg8KxVAH9h8vro`flXu6C}$TZ^Mgv@hX zMkOW`cvInXG%_dTWR4{yUAk!2^z&il`y<0m2mSm@?GA$0Ja~%_urMG496+rm zfX|5w7p}`9Dpmiw9I%8Ak~{+R3jL&-qW*r3VpxO?us~ml@2fVODju3JjutFxpb<#b z9TV&eKxCpGqOX|hhmipFnHWWQZC1<`5yrV|iF_Urm&=DBDLW)_$CTJA15c3=N zc|xCY-Tkr9X3%Ld+yPOIkFi_q6or0iGicGcRGhlX*ifi3rA%V=OUnfIJpG^VBRK;U zGEdY(=3S&v9rW;6M&si#_^U8nX#i6hIS#svgk(XX9-)$<03`OX#5GrgWGW)`3Vr!e zI5-T;Hjv`!3g)0KCX9xhFizy+(#JyM2P%|dr3X_ng+#>XWDbafU=eo#i5cT^Q|WgZ zbs?1L1kkAAuVwXf1DW zFVR$Ss``_KA>%Tl>ZN3eM-(k59l`=pMmb{=jTcCOlxj+2HR(0FOM^{O7%vdq;~?|_ zb=2*$wc6;hRt9>k)iP6JDQuRhq2yAjr%T;m>8$P`tQ44|Uz)YX ztA-XKcAA2O&@oF^WEp`bqT~QWDFFD~62A4m$eB+3|^e>6-!e9^oBP9hvsoGIe%hKLzV(ljqORc498b?p0QC!HsRoCIkgsABp zt2m|oN1#+I*W=aay-kJF?U}N-G{UT1iC#@*}>#4uQTSJ`AEDQ!^;MsQ<%k z15M3XbAJjwETQ{$Sude?iQO3tv7B{KGtg!_4wWvyB>{{i4#GawAYGEtyMeN`hQI?N zgt2^DZ{EBq>)B`3e3cuV7gn}UC4zsW6Y&*GcjmF_w{6i*3fHQ4%!Im7tbf!y5+irD z31Asjha z6{Mk6RqR4A_OdeAE~cQEsVg3%fPL2-zbwy+0C(j(M+fZ z>F=6PXmqbyqtvDkvV)p)%$q(LH{&NYJ*OpS9pu57U|Opw1I}mITPjGck_k}R@5W?a zp`V$yx3T{V>QA)6d~wlLlU*5EX0xJqOWeUikSPTZ1(@QgGWue?h!|^+P+ecBJ(vWl zHiTH{N3q4O2}-r&6lw>lLHb?vmB^U}+m32XqTf~W7vs{+dT9sNp**P+{l5}|(8m%) zb8vmz8#Uy;d@_x7@t@OttU1!xb7_Ef~G zrctZiGUU#{{jvs`acxK}Bk>xAK41ZA1KFv?+SZjmavYjiuICRAsBr@tuCcUd(c`0H z$slta5wDKtb#5R_wb0{Z9XXC(zYhv4SE}d#-36LD0K*K^>Ucz}LamMV48*|GkU1jaf< zbtgpz)YE@!-fEZHscd*L+$mP$$g{GHbSz=KNI5pn-A2vMxCTjyg`7}1LG`}~=P#n3 zZ-Dtb-ZG-!wa-jxsrvuaQT?vIOJi6NFlDzH#U`qlOaP1%+F-+BSa4JroBZJcC38DB zHVtI0q<6{GH5H4>w3=n(Ft6g*&+w^U66*SqSJj#d&RiCRjOrak#=l;M3o(}tn{3_k z*z|SAi+tOYC`ZEkBpLaOWzK{h;WGU}VJlVn9sL?Hnd{ZZ$C}yzHN>o`#n9G-SUwwB zcH)_o4NREVNV0$9z+VBeB%B*rGws93_m_dW3FE0pUm*K9hiU9AGuSDI#Q>WkTnf7B zN*vQEtgMHYaXHn!6|KoP?4@sbIAXCmhy#A zuY3Md#*C!YbahVj1NmkP1m7C zsJv|W%jM#CL<#kPN_3*YMF=|HoW`*1=#%$`M6wEXV!y6*XIB|EH)hnvYI%iASw1rr zlld2u&vd-@IOaInf|pG@?#EJvx%%>tN2CCcZ&iwqSUV5nQSL}HlggF2Hhl_6arZ*b> z%>w8H_JBJOr-rSE*uWKOL82s;Me@9T)Do80a4$J_Od6b%Eb-_0wQ&ioL-#l&&aa_3 zKW(jo7)M;l^L8r-1aw~PMkBp(H|5?T6He=(W}N%k5X}8j6og?W=X2c{r}?4z;hpO+ zq7F-zhS@~6O*lNsBumUsH~gEeSwL`yv9=3mKvE{QDm+NBz6rpgX+o4{mMCTAbmzoGh(|{@1aS&E$jHDH~Ui8uBdT z=4rC8w5`J0tLT_Sf+cKup)FKo&!NB7dd(r=&f0O1IA?T%QfZZ-sXuXOg+h z@1Wbu;Vx|CW!FkM2HB9ZH9O9f2_}BT;daJB%$V<)EXB0UqzvDK>=Y>()m+g5x^1?1 zYS&M&-vu8pM&L5)i4Hn$Me;ooR%(GXnHUt0n(@pR0@}}4A4Q~4vS9kCF zS3R3i_>Qxn*jBwinvm&79Dabs4NS@a$*{y(s~kK>?eHvcI^9$W2jy)3SPp%KW}e`qr2hF^}qgYr(f1$8N3Cg*7ao# zhnq0CJ%8J#s`s{*S&{ zPg$*)ZiZ2dr`pP&-dX4)B@gBKYE|(wCQM`UX6O2a!}##KgzKQg;+mUuttHG(D~DYb zujR3CA^i`EIlPpV%tj z{Ysd1`Tr;7{GWE~kpKTI#c`Zm%8xKP`;9L@n%u>9&148&j{4?Y-|A$bypyny;JEraP0q==&udtKV=>~=|ZU0^Z&SYd|bT$>CNf!A^-1LN}T_PAz*X_ zJEZ?<>DXuDUjgAxY9rDotw)k$3DfwvxH6{+oti_~i3L?Wyk6uZ|32X;PD#lk+$D3c z)Y2Ep8MJV5$QFFDY(ZpMkZ zPPmM)@1&>fQz^+z2i@=4)LF}1&%>;r@8-cDH@{K0XHS`pw(hje>r~57A}?1YLdI9B zILUn`PN?c1GDWIAxh213;hM&zxGV@T^-50PX1=SNYJ?hMmi4?=iefD2bK=8P?WqcZ zfl3E#xA(SxF}Qnob3M524Z3zmY@ISns05B(N#>=5MuVw87~Ni6UERICx_h$_R_ecb*&rq zZtp%`{Oj&|*c<48>D}Pd$DK%)?oz6xspvh4RInMHZhv&~_NsUHY1qBE?RDSoM5}Po zQ-Rp}ID)c%oJg#SA}Ek%5hPb1q`R)Z0@*6ny^!~sqJEBq$Sq^rhosy;cT%pNSDWUW zDLnJ@qm2V=8u_mIul5_5H;^~WwP^d5y0rw#l3=T{qXd2n>f1|W8v8DR#T$y{py@z% zh~@13`yaYD{m;FdyPMwoyV3RKhr8j$?LW&H@-ns}YY^_!ZG2L!R-D1S=4S8xHYC9k zFb~e{s0!+R$GpVTP3*~?0{WQ++tOS+u8i=RC~n+z^!V5e{b)+4XjaBBY)pKUgn+bi zZbVk2$b#;w11(eWa1!7dP6C*9ZeM2r@*Bcz&E*D2r+%(PV!QwaTqU0Ez5)w61x>v3 z?|=C4>22?BaNX_Q4K6;<0;?bc*?E;hvzufvT6%x-Cl7P;wd)YJbX($ow=;FoRtM#N88)q?sQEaQIHE0 zrIk%Smoj$tE0KqzIWK-R#~uf-&bLSy&oakC*<60xuc@uYrv92$p0z{}l`&a*oyX{t zaWi0Ez~S9DLrztu*k&D!dYp5tz@mrq}${a=izwapQ}`#|KVfoI(xYUe9ig4v*WYl!uh}U zo7S7d`Jd+~g(<2Ay1hyToHer}i#xdTEP8b@-*IQdPl!n zz`X=cv7fz6RbPC&`}skxlvhW88~}$zANdm<^mD!bi^i0(|9`HB%QJqlB^v|HfsZx7 z6lDE1s{2If|MgZt{bBk^{pBgk26Vk02)aHd!Nye0*(MvU{Mk(#Cu@D=!bHg^l z9H`u(=i=79M)k0Y-1=s@f~e(quMK(Jd8q z7L&Gc`LQ#ON$q~*HyZy3Tp7<=)09!}^iC}`c(%DBe3K)IO54PthqB6hivCK(Vnx4K z4c<3Zweej%e+D(Xfr{9(mVFY1run>Gk{1F8^6o&7gOPm+O#~T&&|*0>ztfY~a?C&Z2u*_x;?1YW?pi+w1@B zcLHnm|LL28{y#cBJ$(QFS;~v)|J0y7X#RudKa@i`ltVd`XDDc zVQyr3R8em|NM&qo0PH<&b0Rm=`OL3SvAMe3Jv)H$%jT%^2d`l_)Os-m-p$>UO1Z>L z13J%06G_9GIR5WXNt$8aVZf}t$%FDC>zP(}OVet#`bA7!HnD6$EQgZ?@aE+lbJzjdl{JKHL57?yh*A~6s}WOz>&KlEG>;pnjn*cT zE?EEtA%>hypc=)fi?6yQ=(QV1t<3}}bD*mi+6ZPuNRGD{sOlUpQ;SF4Q!MKy5&hAw~f)jy%Qz39vax zp&m~F1p*xOWe!x6A#{ecxC(`W!?c6uQu?CPOfcObtm!aYG$j^yqG>ZaC9{Boy8aK9rVkuwO7bOW_$CN;m2EkfTaN$U=M0F z0enGhxUg*&P^sqE=71%1kmLcNSLkOo6!q`dD1=4W01NbmxUL$r>EfU%<7ml(1{#A@ z(=o-a07RzhA^L);ei#T)e{;mX(1xPNsN~Fbfp^rGw#;H&J+uTyuaIIEu_+pdEQI`q za~{!WTu*-}vmoS^ zF@;3H7i0m5gJ1!-0f{-|va0mk zjN0JKcme3yX{trwhomi^19;l3Yu5ZEKLh1v!fRt)UW3}itx=VviQJ5?d++)vo z0d>^h8ITToP`EF|C!s|BsMR_`kF`9|W38505-VXVSQ<($m3q3=^A)e^4#G--S^A~f zYn*au;bR**NPQ5?%wG*DSz}*%p08$i)n_ICb0*{fvg^3(6q^ zPh4=65{MZ`4g)o>5;@=lbr7TIxa^?zzs`=pg-9K(FaXtmL6%6jJo?((p5MF@^Y*%VtXE-3~g{xQrwVL#}AQSA2Oyis&!J zyr=i3(^l&v37>NKEdY^(vi(3wftTynj(Qc0x189~6N$yvQaO$G6KP~O@~<^@cseC& zIfp7vY5y@O)yjDINHQ0AsC_jS3*Eu8gX(&x;LL?aT0?nSg6bhf=BwTcTfKKrgcQ*W zm`=f#9aJB%u{{STaG_oaf4De&C5&I4iuD9CHNCaw)slMrVhTyW?NgUf_{`kEgAcI0 zux$|HXCmi)2dLEI5G`^K-+!Wbfr+cMQwJSY(=Nw3{Qy)Uc z>i;sQK+`i++@E|0OX$AM4eAoxa~NVd@1Ulqt#s@wRenP}7)$K=eX2paB%yXaWoiw9 zdqfCh__W@Lu;zggJ8^MWv^Y#KrvHSJOetQ2J^#|{+U!$KdMuYy~{cF@4jjl(^;!OuT>%_TIrSEEr{(*@Z<%?0L7mrR=BlbT-BlCutSU_vmh)s+3_GVHAMqt?g-sO)z` zGOy4tOq<)-{T216+Fri6=&Hr8Y%FtD(T62&VIjzjf`dFv@l4r#Aznm`u}7%xFVqoC z0#)ZhEcBz$VAlktI&cbgfYc!UF8V^`T!U>#H6+pRD)|d>>0!OJ|LV}5*0TOz37+p_ z38Fc;zUhq{@?Jif#-{ks@mV|L|2;iBYaRT*&(Us_5?UA2Q3_`k9z`ASUA6@6LD8Oy zP}ekSwHt=)IoNj_kQvv8#4-@Ck?#T)pbn6oTBvSq=_1Rbk>z^+@PHa4&~S~FJ&PV6 z6-x%0Wr=WmJg;*Dnd^lfAM41n^ag&=SgBUN{%_~t`oKj)`cDi6ZCL;9%%#Pq zTaP@neXYqdJ@zQd5%E5azWl{1XQCM4D*ZuW%XRq!{T48pn$^e0nmPeB#Js7+uxJRO zd^VEogexf-m@u!AWdFgQy9Q!KIQ3=CviAemT?OW*jK>~*fr`JgAIHuTA3NqS8(>p} zb3r%ViDNp0wf)d4E~loqWHjl4y|m8#mRkA#Ul1hOF)d{M{@-r3v-w}`)|)r&!~Xvq z?T%2VgSy(V_khY;G9e86zGyCvYEjHHcJZjS7AcchJZQK*7^u+qTxP=8P`FzdCzg(y zZbFMte%o+Y+r=M<66yez=tO}FA9TDqj$sv}kKP*+(Js^p9lO$=UnSVA%xDp-`5i81 z`OI{T)?Y|IG4a~vnBrs$UaC&qkGU?f*3P=P8j*i1*~hs2BG5+UKx%3aeO>Zk6)G|K zL+xBbauu16Ge6Oc$-wMXp_y3FxNXxyyVlR!q~+UnE;9VrE_KmS>=*`oxm1jNO{Ot zA3kk@G0{QVty?B&Np%nhxf6o4K9(7JcvEvzF4b9L$>4bflBvLB3FUP{mz=PSeYi=` z3erRpA1n7ZY1~GiJDsAjVqJi(4ErHx>I@n`M@XGVJ7^S8Nj&J96Xe?QCE_D7;Z)FM zixJ1RZp@RFh}R~w55vzq$70AqpYWRX^s;KClO7sz_FYnGh3m9~>WRrU{i7^R^!S*2 zw+?q_6STxL^!Qje6W|J{$j|<0ruPAaFrSH}7^rElTZ{8{J@-)Cuh?-o2yy=X4;S6; zs5c(}qX5ta>;ShQOby!%QNa~ifJ8|u3*`AxyVVi}@8Mo@Y?(YbE864F)0^W8SjXC1asOkUFH9lMoXXH=*<>2{~?td&L(>%OO1R zI*yv70y`sRErx&@b`uuJQ9H?SG-**F-ZH7f6_iCPbiZF+u?BU1*`|Sa)D-)oSVd2y zHA0y{8c6*$Rx9>cMF*{i7MG3Mn>!|W*7yWy|4-C2t=kqh%7iuWI&j?V~{=imQuIqu)~2HoLx ze{fT@BZkSLtHsi4=>Iy!WD}{R#gvT~NqzDpY+futBw zjKLDx%U*yelXFtSkxs8O+0&MBep=aKB_^gY`EEPRv6WE~{Tc&A=kQtJ`Er?}SAxDU zAuxkk>A#$WuB>B|*Y_0lh*tZvf%rZ1&gV=ro4Flyb2;3FjkN3*QVu~XQZCG_Gi{2A z8*sRpa}aapIwrv}ZgVO9_aHl2N=7x8On@F+(K|wkB-rhOi-GjW{fn#Hcm1ngkx}@LGcP+?l!r=D&ZNpw#sNP@Sj=LXjudd(U zUiCiruBuYaXAG811N;{22&MB-T_>)LCAROh5-gnx!(ealxj(udeC!QwwAc?XZhk5` z4}r83B|1&bqEK`+;l_Ujqnjsav-P-&ygl2QDcd?+QLaGN%8 znN{x`uyak_Wr2QJzmgKnYTshR7b=Y{QnY zDdw07?371*ibOWsxiFZU;NYc`CjLULLjF%^TJL@(%%=SR)3dW|{?F0j{+H)zmSv?< zeuT-{Z`}Q8au<(kCPV0Q+&6`N>yv@fp1w?q&kngeSW0ZqNAO!fI5=_jqtBc^ow941 ztZd8Gvn3b{!(WXQgkjNaeOF`(_R@CYBXeL?ST|JjBBZ%HMLp>GbMSy;R~O>l0Uf0( z{49h6hk#C;#XjjYn|d3%=-w#U-n~7?bOzs$0;{n8DRbaS7ecLH|HrMa0R)8j+_ z|Fg6({||%5=oofL|I^a3&&0nB!kyGcpi8aCl4A+8uwGo*#DvaF6?S9>WsBFde5Bt; z9EB+zNh^x-iDT2d(H|0)R zpGTMgbf}1S^(Y4{I$vy)K&V*UHFYqTb7oe~?%8y4u4hDAA-l*uHP;9z1E?EtLTBLx zB81NRGs;$vd-q@m`j*br886A;4RB9n11*-(RlR$kLwJ`&K^P^x4n>;#0P-!qf?&X8 zpBBP|#rlQs6om!hGQh4Cm)XZsl2{IU-jk`b1#3MGvw6Ln2j6afqaM#*GaJ>+T&~G( z3@=KtqFYKVUoG}S4oA6DuH8Ll0_~_(O~Ki#y1yNSGRAkuHU}< zG%gGTr{`YFbn0fGM&@>&0*|mE77@Aq+#8Mi*MpsiW$p84$f)hyXMdqUjSV}-U_Z|+ppAZ zB#@VcqAoj1;MbtOy)?%0^Bh=so>_e~9SrxeoS%RHLwD5w+#B7Fdhc(?*Own|hZi?L z@ z5Iz$L4u_5&ADg}#%m@|D(hy1!6JI5%Anu&{BI{8kL3h=G1xxWzP4EoW1ZJPxR~cC*b`)0^6%fTR+CyA+V5H~Z@1 zIwjybC32eimApKF?re-=;e)N!lm1blA`TBFE?=X>W!KQibCkxcI|3FSuQ>DZ44a=^ zd`ldi{j9ZIAq%>Xwzt1tg-#lgmkMabolQEKGIsVWk%#i07ccKA4#StHdqj*UnPa|e zu6|musjbDP{xPjIYmp!-V>0(TjnO5OrpKJXh3srbk%Ng<{C>aXO&O;~VPVs@^JgU| zBKq}-gWIFr?NJt3PfcL`<+q%zL@C95sb{SEKDPHY_`I82?!%W>E)|4B*H*zKK{tj( zH(|T4rlmD>L@0)QBF6 z7Ykc?{STjD+uF+|;2Y}y&W_KHGxdK*Z(4`@zn`ULR)YHI4RbN2zPLXu{xd)GGh!~J z3WPK?4&Dvq<_m|y`^?l5!VXkMebUq){8uxvrpuD90#Jqe-B7oqdf(o4NehnuMfwFZm57{{>rytJVx`sDGMW!DfzRd&p3%9E0|EF96vf=!HbbQ>--v4uQe0(_nKS$ee{(shu zK-VFBOIyGTDgNXvkw{ra-3IH|&@Dxw*CjH;a{r=-g>)`)= zo|cP*qz%1zC&;8g7AlgpC$tSVdz0 zaTSgY+(yz#bPt<;Klh+o|2l1Z{lEQ5V59y&eUs7u?bDOP{eREWUQGYT2IWEXA2k1= a9onHC+Mzvj`@aAH0RR6FDUVzLr~m-Ri?A91 literal 0 HcmV?d00001 diff --git a/charts/v1.23.4/blob-csi-driver/Chart.yaml b/charts/v1.23.4/blob-csi-driver/Chart.yaml new file mode 100644 index 000000000..28ef49829 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +appVersion: v1.23.4 +description: Azure Blob Storage CSI driver +name: blob-csi-driver +version: v1.23.4 diff --git a/charts/v1.23.4/blob-csi-driver/templates/NOTES.txt b/charts/v1.23.4/blob-csi-driver/templates/NOTES.txt new file mode 100644 index 000000000..9ad135dd4 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/NOTES.txt @@ -0,0 +1,5 @@ +The Azure Blob Storage CSI driver is getting deployed to your cluster. + +To check Azure Blob Storage CSI driver pods status, please run: + + kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.23.4/blob-csi-driver/templates/_helpers.tpl b/charts/v1.23.4/blob-csi-driver/templates/_helpers.tpl new file mode 100644 index 000000000..d99392f32 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/_helpers.tpl @@ -0,0 +1,49 @@ +{{/* vim: set filetype=mustache: */}} + +{{/* Expand the name of the chart.*/}} +{{- define "blob.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "blob.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Common selectors. +*/}} +{{- define "blob.selectorLabels" -}} +app.kubernetes.io/name: {{ template "blob.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end -}} + +{{/* +Common labels. +*/}} +{{- define "blob.labels" -}} +{{- include "blob.selectorLabels" . }} +app.kubernetes.io/component: csi-driver +app.kubernetes.io/part-of: {{ template "blob.name" . }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +helm.sh/chart: {{ template "blob.chart" . }} +{{- if .Values.customLabels }} +{{ toYaml .Values.customLabels }} +{{- end }} +{{- end -}} + + +{{/* pull secrets for containers */}} +{{- define "blob.pullSecrets" -}} +{{- if .Values.imagePullSecrets }} +imagePullSecrets: +{{- range .Values.imagePullSecrets }} + - name: {{ . }} +{{- end }} +{{- end }} +{{- end -}} \ No newline at end of file diff --git a/charts/v1.23.4/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.23.4/blob-csi-driver/templates/csi-blob-controller.yaml new file mode 100644 index 000000000..9ece72de3 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/csi-blob-controller.yaml @@ -0,0 +1,216 @@ +kind: Deployment +apiVersion: apps/v1 +metadata: + name: {{ .Values.controller.name }} + namespace: {{ .Release.Namespace }} + labels: + app: {{ .Values.controller.name }} + {{- include "blob.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.controller.replicas }} + selector: + matchLabels: + app: {{ .Values.controller.name }} + {{- include "blob.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app: {{ .Values.controller.name }} + {{- include "blob.labels" . | nindent 8 }} + {{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + {{- end }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: +{{- with .Values.controller.affinity }} + affinity: +{{ toYaml . | indent 8 }} +{{- end }} + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + hostNetwork: {{ .Values.controller.hostNetwork }} + serviceAccountName: {{ .Values.serviceAccount.controller }} + nodeSelector: + kubernetes.io/os: linux + {{- if .Values.controller.runOnMaster}} + node-role.kubernetes.io/master: "" + {{- end}} + {{- if .Values.controller.runOnControlPlane}} + node-role.kubernetes.io/control-plane: "" + {{- end}} +{{- with .Values.controller.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} + securityContext: + seccompProfile: + type: RuntimeDefault +{{- with .Values.controller.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + containers: + - name: csi-provisioner +{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- else }} + image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- end }} + args: + - "-v=2" + - "--csi-address=$(ADDRESS)" + - "--leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - "--timeout=1200s" + - "--extra-create-metadata=true" + - "--kube-api-qps=50" + - "--kube-api-burst=100" + - "--feature-gates=HonorPVReclaimPolicy=true" + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} + - name: liveness-probe +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port={{ .Values.controller.livenessProbe.healthPort }} + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} + - name: blob +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + args: + - "--v={{ .Values.controller.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" + - "--drivername={{ .Values.driver.name }}" + - "--custom-user-agent={{ .Values.driver.customUserAgent }}" + - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" + - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" + - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" + - "--allow-empty-cloud-config={{ .Values.controller.allowEmptyCloudConfig }}" + ports: + - containerPort: {{ .Values.controller.livenessProbe.healthPort }} + name: healthz + protocol: TCP + - containerPort: {{ .Values.controller.metricsPort }} + name: metrics + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + {{- if ne .Values.driver.httpsProxy "" }} + - name: HTTPS_PROXY + value: {{ .Values.driver.httpsProxy }} + {{- end }} + {{- if ne .Values.driver.httpProxy "" }} + - name: HTTP_PROXY + value: {{ .Values.driver.httpProxy }} + {{- end }} + - name: AZURE_GO_SDK_LOG_LEVEL + value: {{ .Values.driver.azureGoSDKLogLevel }} + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: AZURE_ENVIRONMENT_FILEPATH + value: /etc/kubernetes/azurestackcloud.json + {{- end }} + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + - name: ssl-pki + mountPath: /etc/pki/ca-trust/extracted + readOnly: true + {{- end }} + resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} + - name: csi-resizer +{{- if hasPrefix "/" .Values.image.csiResizer.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" +{{- else }} + image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" +{{- end }} + args: + - "-csi-address=$(ADDRESS)" + - "-v=2" + - "-leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - '-handle-volume-inuse-error=false' + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} + volumes: + - name: socket-dir + emptyDir: {} + - name: azure-cred + hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + - name: ssl-pki + hostPath: + path: /etc/pki/ca-trust/extracted + {{- end }} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.23.4/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.23.4/blob-csi-driver/templates/csi-blob-driver.yaml new file mode 100644 index 000000000..9c5de5b91 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/csi-blob-driver.yaml @@ -0,0 +1,16 @@ +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: {{ .Values.driver.name }} + labels: + {{- include "blob.labels" . | nindent 4 }} +spec: + attachRequired: false + podInfoOnMount: true + fsGroupPolicy: {{ .Values.feature.fsGroupPolicy }} + volumeLifecycleModes: + - Persistent + - Ephemeral + tokenRequests: + - audience: api://AzureADTokenExchange diff --git a/charts/v1.23.4/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.23.4/blob-csi-driver/templates/csi-blob-node.yaml new file mode 100644 index 000000000..842f76e47 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/csi-blob-node.yaml @@ -0,0 +1,326 @@ +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: {{ .Values.node.name }} + namespace: {{ .Release.Namespace }} + labels: + app: {{ .Values.node.name }} + {{- include "blob.labels" . | nindent 4 }} +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: {{ .Values.node.maxUnavailable }} + type: RollingUpdate + selector: + matchLabels: + app: {{ .Values.node.name }} + {{- include "blob.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app: {{ .Values.node.name }} + {{- include "blob.labels" . | nindent 8 }} + {{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + {{- end }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + {{- if or .Values.node.enableBlobfuseProxy .Values.node.enableAznfsMount }} + hostPID: true + {{- end }} + hostNetwork: true + dnsPolicy: Default + serviceAccountName: {{ .Values.serviceAccount.node }} + nodeSelector: + kubernetes.io/os: linux +{{- with .Values.node.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: type + operator: NotIn + values: + - virtual-kubelet + {{- if .Values.node.affinity }} +{{- toYaml .Values.node.affinity | nindent 8 }} + {{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} + securityContext: + seccompProfile: + type: RuntimeDefault +{{- with .Values.node.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + initContainers: + - name: install-blobfuse-proxy +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + imagePullPolicy: IfNotPresent + command: + - "/blobfuse-proxy/init.sh" + securityContext: + privileged: true + env: + - name: DEBIAN_FRONTEND + value: "noninteractive" + - name: INSTALL_BLOBFUSE + value: "{{ .Values.node.blobfuseProxy.installBlobfuse }}" + - name: BLOBFUSE_VERSION + value: "{{ .Values.node.blobfuseProxy.blobfuseVersion }}" + - name: INSTALL_BLOBFUSE2 + value: "{{ .Values.node.blobfuseProxy.installBlobfuse2 }}" + - name: BLOBFUSE2_VERSION + value: "{{ .Values.node.blobfuseProxy.blobfuse2Version }}" + - name: INSTALL_BLOBFUSE_PROXY + value: "{{ .Values.node.enableBlobfuseProxy }}" + - name: SET_MAX_OPEN_FILE_NUM + value: "{{ .Values.node.blobfuseProxy.setMaxOpenFileNum }}" + - name: MAX_FILE_NUM + value: "{{ .Values.node.blobfuseProxy.maxOpenFileNum }}" + - name: DISABLE_UPDATEDB + value: "{{ .Values.node.blobfuseProxy.disableUpdateDB }}" + volumeMounts: + - name: host-usr + mountPath: /host/usr + - name: host-usr-local + mountPath: /host/usr/local + - name: host-etc + mountPath: /host/etc + containers: + - name: liveness-probe + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port={{ .Values.node.livenessProbe.healthPort }} + - --v=2 + resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} + - name: node-driver-registrar +{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- else }} + image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- end }} + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=2 + livenessProbe: + exec: + command: + - /csi-node-driver-registrar + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --mode=kubelet-registration-probe + initialDelaySeconds: 30 + timeoutSeconds: 15 + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} + - name: blob +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + args: + - "--v={{ .Values.node.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" + - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" + - "--nodeid=$(KUBE_NODE_NAME)" + - "--drivername={{ .Values.driver.name }}" + - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" + - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" + - "--custom-user-agent={{ .Values.driver.customUserAgent }}" + - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" + - "--allow-empty-cloud-config={{ .Values.node.allowEmptyCloudConfig }}" + - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" + - "--append-timestamp-cache-dir={{ .Values.node.appendTimeStampInCacheDir }}" + - "--mount-permissions={{ .Values.node.mountPermissions }}" + - "--allow-inline-volume-key-access-with-idenitity={{ .Values.node.allowInlineVolumeKeyAccessWithIdentity }}" + - "--enable-aznfs-mount={{ .Values.node.enableAznfsMount }}" + ports: + - containerPort: {{ .Values.node.livenessProbe.healthPort }} + name: healthz + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: BLOBFUSE_PROXY_ENDPOINT + value: unix:///csi/blobfuse-proxy.sock + {{- if ne .Values.driver.httpsProxy "" }} + - name: HTTPS_PROXY + value: {{ .Values.driver.httpsProxy }} + {{- end }} + {{- if ne .Values.driver.httpProxy "" }} + - name: HTTP_PROXY + value: {{ .Values.driver.httpProxy }} + {{- end }} + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: AZURE_GO_SDK_LOG_LEVEL + value: {{ .Values.driver.azureGoSDKLogLevel }} + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: AZURE_ENVIRONMENT_FILEPATH + value: /etc/kubernetes/azurestackcloud.json + {{- end }} + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + securityContext: + privileged: true + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + - mountPath: /mnt + name: blob-cache + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + - name: ssl-pki + mountPath: /etc/pki/ca-trust/extracted + readOnly: true + {{- end }} + {{- if .Values.node.enableAznfsMount }} + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: /lib/modules + name: lib-modules + readOnly: true + {{- end }} + resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} +{{- if .Values.node.enableAznfsMount }} + - name: aznfswatchdog +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + command: + - "aznfswatchdog" + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + securityContext: + privileged: true + resources: {{- toYaml .Values.node.resources.aznfswatchdog | nindent 12 }} + volumeMounts: + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir +{{- end }} + volumes: + - name: host-usr + hostPath: + path: /usr + - name: host-usr-local + hostPath: + path: /usr/local + - name: host-etc + hostPath: + path: /etc + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} + type: DirectoryOrCreate + name: socket-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/ + type: DirectoryOrCreate + name: mountpoint-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + name: azure-cred + - hostPath: + path: {{ .Values.node.blobfuseCachePath }} + name: blob-cache + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + - name: ssl-pki + hostPath: + path: /etc/pki/ca-trust/extracted + {{- end }} + {{- if .Values.node.enableAznfsMount }} + - hostPath: + path: /opt/microsoft/aznfs/data + type: DirectoryOrCreate + name: aznfs-data + - name: lib-modules + hostPath: + path: /lib/modules + type: DirectoryOrCreate + {{- end }} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-controller.yaml new file mode 100644 index 000000000..833dcc640 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-controller.yaml @@ -0,0 +1,115 @@ +{{- if .Values.rbac.create -}} +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-external-provisioner-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-provisioner-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-provisioner-role + apiGroup: rbac.authorization.k8s.io + +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-external-resizer-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims/status"] + verbs: ["update", "patch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-resizer-role + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-resizer-role + apiGroup: rbac.authorization.k8s.io + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-controller-secret-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "create"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-controller-secret-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: csi-{{ .Values.rbac.name }}-controller-secret-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-node.yaml new file mode 100644 index 000000000..c041cf8db --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/rbac-csi-blob-node.yaml @@ -0,0 +1,29 @@ +{{- if .Values.rbac.create -}} +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-node-secret-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-node-secret-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: csi-{{ .Values.rbac.name }}-node-secret-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml new file mode 100644 index 000000000..7433bccf1 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml @@ -0,0 +1,17 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "blob.labels" . | nindent 4 }} +{{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + annotations: + azure.workload.identity/client-id: {{ .Values.workloadIdentity.clientID }} +{{- if .Values.workloadIdentity.tenantID }} + azure.workload.identity/tenant-id: {{ .Values.workloadIdentity.tenantID }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml new file mode 100644 index 000000000..a25090e30 --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml @@ -0,0 +1,17 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "blob.labels" . | nindent 4 }} +{{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + annotations: + azure.workload.identity/client-id: {{ .Values.workloadIdentity.clientID }} +{{- if .Values.workloadIdentity.tenantID }} + azure.workload.identity/tenant-id: {{ .Values.workloadIdentity.tenantID }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.23.4/blob-csi-driver/values.yaml b/charts/v1.23.4/blob-csi-driver/values.yaml new file mode 100644 index 000000000..7fd3638bf --- /dev/null +++ b/charts/v1.23.4/blob-csi-driver/values.yaml @@ -0,0 +1,180 @@ +image: + baseRepo: mcr.microsoft.com + blob: + repository: /oss/kubernetes-csi/blob-csi + tag: v1.23.4 + pullPolicy: IfNotPresent + csiProvisioner: + repository: /oss/kubernetes-csi/csi-provisioner + tag: v3.5.0 + pullPolicy: IfNotPresent + livenessProbe: + repository: /oss/kubernetes-csi/livenessprobe + tag: v2.10.0 + pullPolicy: IfNotPresent + nodeDriverRegistrar: + repository: /oss/kubernetes-csi/csi-node-driver-registrar + tag: v2.8.0 + pullPolicy: IfNotPresent + csiResizer: + repository: /oss/kubernetes-csi/csi-resizer + tag: v1.8.0 + pullPolicy: IfNotPresent + +cloud: AzurePublicCloud + +## Reference to one or more secrets to be used when pulling images +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ +imagePullSecrets: [] +# - name: myRegistryKeySecretName + +serviceAccount: + create: true # When true, service accounts will be created for you. Set to false if you want to use your own. + controller: csi-blob-controller-sa # Name of Service Account to be created or used + node: csi-blob-node-sa # Name of Service Account to be created or used + +rbac: + create: true + name: blob + +## Collection of annotations to add to all the pods +podAnnotations: {} +## Collection of labels to add to all the pods +podLabels: {} +# -- Custom labels to add into metadata +customLabels: {} + # k8s-app: blob-csi-driver + +## Leverage a PriorityClass to ensure your pods survive resource shortages +## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ +priorityClassName: system-cluster-critical +## Security context give the opportunity to run container as nonroot by setting a securityContext +## by example : +## securityContext: { runAsUser: 1001 } +securityContext: {} + +controller: + name: csi-blob-controller + cloudConfigSecretName: azure-cloud-provider + cloudConfigSecretNamespace: kube-system + allowEmptyCloudConfig: true + hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting + metricsPort: 29634 + livenessProbe: + healthPort: 29632 + replicas: 2 + runOnMaster: false + runOnControlPlane: false + logLevel: 5 + resources: + csiProvisioner: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + blob: + limits: + memory: 200Mi + requests: + cpu: 10m + memory: 20Mi + csiResizer: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - key: "node-role.kubernetes.io/master" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/controlplane" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/control-plane" + operator: "Exists" + effect: "NoSchedule" + +node: + name: csi-blob-node + cloudConfigSecretName: azure-cloud-provider + cloudConfigSecretNamespace: kube-system + allowEmptyCloudConfig: true + allowInlineVolumeKeyAccessWithIdentity: false + maxUnavailable: 1 + livenessProbe: + healthPort: 29633 + logLevel: 5 + enableBlobfuseProxy: true + blobfuseProxy: + installBlobfuse: true + blobfuseVersion: "1.4.5" + installBlobfuse2: true + blobfuse2Version: "2.1.2" + setMaxOpenFileNum: true + maxOpenFileNum: "9000000" + disableUpdateDB: true + blobfuseCachePath: /mnt + appendTimeStampInCacheDir: false + mountPermissions: 0777 + resources: + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + nodeDriverRegistrar: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + blob: + limits: + memory: 2100Mi + requests: + cpu: 10m + memory: 20Mi + aznfswatchdog: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - operator: "Exists" + enableAznfsMount: true + +feature: + fsGroupPolicy: ReadWriteOnceWithFSType + enableGetVolumeStats: false + +driver: + name: blob.csi.azure.com + customUserAgent: "" + userAgentSuffix: "OSS-helm" + azureGoSDKLogLevel: "" # available values: ""(no logs), DEBUG, INFO, WARNING, ERROR + httpsProxy: "" + httpProxy: "" + +linux: + kubelet: /var/lib/kubelet + distro: debian + +workloadIdentity: + clientID: "" + # [optional] If the AAD application or user-assigned managed identity is not in the same tenant as the cluster + # then set tenantID with the application or user-assigned managed identity tenant ID + tenantID: "" diff --git a/charts/v1.24.1/blob-csi-driver-v1.24.1.tgz b/charts/v1.24.1/blob-csi-driver-v1.24.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..cbf94c473dcf302fc9f2679f815d76fcbcc3a9bd GIT binary patch literal 5981 zcmV-j7ozANiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBjbKAJ__`TMrz$n-0wf|60en_hszpyPO)x?oKl9OxyH#Z)L zTuG=&fCqqzbv}Rh-vA)RXNi&(J8i|hh(#`T7vN&C*avXpvWaC2VmX{FfHyDan9Ifz zd+rZ=yIQSQ>-6|o|KDo0vj4Z*rzbzOk55}C?~dE8&J}}G>;ptMr#vE zmn?vS5I3Anpc=)fiLaU@=ye+H&Srv?IndJ+Z3HtSB*$BHR5cE#sl}t_X%;H<*%o93 zg8aVC5OdQY^-BNVI9gAtX1gqK!WH8tn7G8gRCj8%H*e4groe&PfFwhV0%9C_i~|y2 zbC5#ao&X92IOyvfs3t?`3~6~43I&I07tN*gMYow?xYl3ZJEsSw1HVEFl`xWwWO5-vq8ZHr#a4FTd8_APbrG&0B_VZ}}0H24sjm zsMQ4U1+n4Wwpl=>8ef|Ome56#2Y}w7pH)}X-)~U}i?9I}=qqtu)o0VhK~u)jk_8Pk z2C0T)id_MSOw~>F6;pjP5TJf@#J-6lzQ_WisOq{bCvth|VxjQ^70R;GFHWO0k;8(Ipeab z^xKTu;LCUd=+SAaN#KX1EuRB;+OBKX{3Jg^{YJ!6NboG%4TJ=4*_=pXV^>ihgB>Vn zEpPB3(M)lw#*_Iz<1(P?p=5{$6s;y5!U9o7Ib#w{mPmksL&Yz0$8$)!?HmwLS7S=~igDKJYv zG>eT>4lR6aLl>zRVwv%)Ath_GqUJTEB$g9f+%PV?sPp&JqvPVWZw}a%^BAmC z)60WPY%ID+{|e|e{e+b~bd5raZeALGZd^(Lx-nR zqNa1G;*|CugHo-Ghqokifrr{xW3kXZEW4<#R|?KtXrwiirzNN!Qe?hrt+3Vm4@5{2 zJ%H&HY}rNiAsgFsZ~_+pngO^wR-#3574r4LtY= z%X8ZXA$}%uK5&3aEe_En_wd7KiWiu;N;`E?yGZ4nR8u)eIi&$qVZCtKWEu##;p}0# z;&hU_s}T|^BzD~hegzr>ulyVJcH_8lQZH)ODQMS;8+IC_v4&dj-o4A~-WSz|rMsS2R>03Cf`6w|@fAyZ?y%Xn?a@w3xKJ0F`E;&W z|D<;*M(%1;z%t-k7N+6@XMrE>>PCQ_pE;3mO>Iyr;Qjb^>B9=w2arZjj3rikB_oS9 zWA}Db27bd9q@mSU=vOc{v@+t(XP}s=D;|UB_c)kN$wL>_ug7C+4z8!3>h>SlxcBjD zr77xl^aibT5HemYb^9mEltK}Id5e1ei_ah4qQUU}^;`7w`Di#8et3)eqtW$9nPJM7 z4%LfhLfwde*IYt_2h|&;N?nj$)LdZRbjhR{-l^$1EjjBV2POp5T1^>sF2l}BX=*i1 zfXYEHB=ZLS!n6&J-CxmQs*ULL^PZaQ%J4E97`=ny78ZicC^*Q&6wj0)7~)05Sb&7; z_CoE;Bv7?U#6sT+t$0mPs$Hm1yGji*=%KGf&NbL}R6`Pjo|3;1m+sbUd$kT%)hp}& zmEid)ZagAs^(kX>5xB9JksT|L@7^$;rY0`x4i!Qa9^jI!d+7!kwrCzRQ-N z9VpsS5o(o2t#-?hJqP=K12W^;kXQ!dE%IH!0@VJoTMHGdEnQ?;G%{Sz9v@L-1RAcf zGH21#lVZsrvn&xVglBc^`xzTuVag#vPfvAZS$gIEUsqM-^Z#xRt`A%^r2ouN(1!Wn zIXXSg%>UDq)7D}Bzr^+U*!(M65U;BZf+=x9E`2!j)Ueod=%T+ipPp(p4c33~F?F<^ zKts>3HZ63@fQEZ~w2%W+LIKsay{F*n$ci7~z?GRx)QTC`ATcqY z6Dp^u{wHDmNz~IFFn@=;L-dDsnJFz*|9^EA+(i>uGn}%8KS~rBgy`SJ$DVnig4=9nrZI`uDgoMO&O0J`T`ZdXFm>|C0=&S zVK%;|2`9eZt^`#oLd>wiIvWXH6S_3M8}{Y$U^oz}b4 zo?j){tjuT; ztN9f!X8F`KjOJfRJ~8mxxtQW)3tp-Y+~0CdVy&HZW;G&DR@Q2#DgybqPA8GK+LKZ(?(}lzWkVc)z8i?B@5)QfrOJ}CpA1FyR(;*{(>ZbOu z6}+U#t(zbpIeL?{*OSSOTJbWeuA)UY+rwPzH1U#Gmx^K+OJo8hZkJA(8D^DB`f&nV zj3MOBxo7KecQ-*xJVQ@Ubu$32fQtO=k7jxuKnU}hNQ!|P_PVt=>(p~Mwf%}6hl3Dj zKmK&y>y7&3@m~r6UBC`-3&PB>%@7q_kp)PUq_RMswL7hrD0mJJl4HxH!CBE7f0kYx zSHL=Sk9}hO=8LnF);fquz=b?(w~Bzm_?|UW#{Jnp7-jtC%Lr^26VF8Yatr`nWZ!@h z{BVR*&yWeabx||S8f^$>-)Cj$CXp?=Nj&1r(zIkObg)qeFLM%N;@>7{9wi~im*HOV z1=4Z|Pdtv}lTuR>p>iCRMdFC=3yULR378^Nf&g1l!f>ByK7t(lk znF?!!U0vlfWrwMd;&$Uq(5b!^%s80Xmt#ewpJ6T)zJS+Bt4PhRZQ7q9HCaWTZw@w%){Fbb8K-`M8C!u z(dm2^c)nbw=#`)^%ni(7_8HIXo0X+(viYhAP2ut!f@GfgoJnRgw~KBsZxYW66WPo) z#l#Ib+|D_OIddJ8PZ(cHv3~&B%}~xF6A*(LpBr#O4XWv}Jz&~zpZ^m~wqw9bEtC)UX4JGhqkQOcw8#t`O;P(7& z!(LjbK3w08dmrzvu0Pye^}qD5s#47-`jrd={1(qRrL<68XQ7NGw(qqTD;)~MV1M{! zFuERo>JM+V*x#Jr{-b1b1JX{E+cY(cLebHL8~+xJZXTe`=HDue_F@~LY~xHv3lYV0 zdB1N(2zQOOsyGwEZQ8(PcA4OSoonhY3-rVKnUr8wI|>^nl@ryc;4qF~memAu%fHXQ z#4G{-o-}Q2NgfE<)UE|vX5Ps51GB>>K*{Vz+do-OTFqY;7P;)*S5}C(&}S7v?(QRd zCar24gsNV!LLb^oc*g#0%`tUcu#5t;2n_^Sz&Yb*I%)jRuj_n@#{PTXZO5#ZOgF=5 zfycU#KfN{3RV0u3`C6#rm0hemlQugyFC4~~-y>WHAC}kLq;0KWc3L@#Rq;k1^Ln{F z9=Xlxus3$fSAmVlHY^F70*IL?O?mjHNMy5(3nQ}$4qiJ0;(z<9kpB}}_drLfT0RTmz#*U$XR%MZ&8A+t&U?2Cw*O$yF`dD8r1L7wf65$q z)`3v#=l@ab^xeBm{{Op^E{tgVMWSm`to#&;LV_y@<6T6BTN7~R79(KlmixRNw!HKR4neAI+)8jGc#xRY`Qqt zGa{{!o#*bF0|S%+)C)MFv+(>7LT7^+Wvko$2e1QuN@r?Ym}Kx4xF@o)8O!LZ{)5jU zJT;;q@)DkgB2DFg{)!J97&1Aag)m`Re&I7kVL`YIuxrHy^|6#Brh^{$Wa@0eTu;Mn zp6}+y_nY6S`?J@~Ml~{*YqA@|BT=mAJQB-Sll_plQSO$_ITP_wSF9zqsyZ58(;cb7|EB30^DWil+;MkUA zkxNoEm)r74r=9wi zJ9Md(rlR*OQeHJWy}|hW;;Mi5`KEV%+wWcML@RS5R4K8KpD+4X{oA|pFm;lUaae~- zY6j=#h=#JqtU#=bXDEMNM{; zz;8i)dufcr_&Kmpp|4(=j>-F2&d+}QsW%#Y>5uM4{SSBJ>&uUNp~z!M%h;MkN_dDp z6VX*@!y3#R4lCbpMAS&y3O>!IJ#;G^59z_y#R~=X|6%SPjFHn_W*13JvBc!*($(HH8%3365hmygSC zrfzAyMx3)Be^N&H-SE2CzZ;%^>K9Sowf><(wSngOThtkpBVJQs@cmV6RH=C|9>NOM z4rxJ}fsFFkgv3&u6$F`!&P6R@R3GW9ElMG==UXQk8uE`8Y zX+_ibU1hS>?&45i^7{29IWJ~<8QY9Cy_y{gSSs^c0Y`))kK^&cZt+iYs3%ZRq zw7*@2P#Td(v+G~-JCe%E*{?(%%8OpTyr?*)U!FS>F`i_O`LenCPGM7|_c)EwC6lJdoWOSf>&Q_w7V!qTRR(&1Y`y71P#Vz;ZODm@e;-G7*aFU=KW1*WcWn!Xh;-Q-=gAzE_ zfj-NHLmlAj)B$d9mTi#2O6x;)am=kB)>_MKEo)`QUX>cv|DNK>^7!M3%RL%=uG z|D7J49%btP+V5J2@Bh5Wl@VU`(i`SrN_}vDSo~)`^D|;DqzZ&IG!EpPaq_!fp%Qh2 zYpaHI%g|o1;6VbX*i9a$st>;1y?&6ZY2DQy2f#kjC4ZueeyP`g)tC}C^DlLORpS?0 ze<9EU_(TKDK-S-)x=V!qUz^YB4>L~cFGsEUpxf<0P@lnBnX0L6Dx#IH-7KOULf9@A zqGCTQ_6Zh1ADNuts=p}Rh>@}8r= zBC%LA?qx6Uo2uII44(f4HCsVN>{-h`i$c?U-Y!dM$6gfc)#oYH7uQZozF%55?MJ}> z3zSl3ASx@Qz3LSu{#M$6`6i~ zJRCSwa8=#^Kj#pT4g3H0(NXUEU&lwMhyDLcTpRZPFS-!unt|_W33w&NpB#tpMdc?C zPIwVzUmy$zHNXF>T>pmxfQdz0aTSgY+(yz#bdQ_9pLXageE `blobfuse-proxy` is only available for debian based agent nodes, remove `blobfuse-proxy` parameter in installation steps if it's not applicable. +> +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +## Install with kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.22.6/deploy/install-driver.sh | bash -s v1.22.6 blobfuse-proxy -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +./deploy/install-driver.sh v1.22.6 local,blobfuse-proxy +``` + +- check pods status: +```console +kubectl -n kube-system get pod -o wide -l app=csi-blob-controller +kubectl -n kube-system get pod -o wide -l app=csi-blob-node +``` + +example output: + +```console +NAME READY STATUS RESTARTS AGE IP NODE +csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 +csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 +``` + +### clean up Blob CSI driver +- Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.22.6/deploy/uninstall-driver.sh | bash -s v1.22.6 -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +git checkout v1.22.6 +./deploy/uninstall-driver.sh v1.22.6 local +``` diff --git a/docs/install-csi-driver-v1.23.4.md b/docs/install-csi-driver-v1.23.4.md new file mode 100644 index 000000000..1f40b2b08 --- /dev/null +++ b/docs/install-csi-driver-v1.23.4.md @@ -0,0 +1,47 @@ +# Install Azure Blob Storage CSI driver v1.23.4 version on a kubernetes cluster +> `blobfuse-proxy` is supported on CoreOS(OpenShift) from v1.23.2 +> +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +## Install with kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.23.4/deploy/install-driver.sh | bash -s v1.23.4 blobfuse-proxy -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +./deploy/install-driver.sh v1.23.4 local,blobfuse-proxy +``` + +- check pods status: +```console +kubectl -n kube-system get pod -o wide -l app=csi-blob-controller +kubectl -n kube-system get pod -o wide -l app=csi-blob-node +``` + +example output: + +```console +NAME READY STATUS RESTARTS AGE IP NODE +csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 +csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 +``` + +### clean up Blob CSI driver +- Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.23.4/deploy/uninstall-driver.sh | bash -s v1.23.4 -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +git checkout v1.23.4 +./deploy/uninstall-driver.sh v1.23.4 local +``` diff --git a/docs/install-csi-driver-v1.24.1.md b/docs/install-csi-driver-v1.24.1.md new file mode 100644 index 000000000..ff499deae --- /dev/null +++ b/docs/install-csi-driver-v1.24.1.md @@ -0,0 +1,47 @@ +# Install Azure Blob Storage CSI driver v1.24.1 version on a kubernetes cluster +> `blobfuse-proxy` is supported on CoreOS(OpenShift) from v1.23.2 +> +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +## Install with kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.24.1/deploy/install-driver.sh | bash -s v1.24.1 blobfuse-proxy -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +./deploy/install-driver.sh v1.24.1 local,blobfuse-proxy +``` + +- check pods status: +```console +kubectl -n kube-system get pod -o wide -l app=csi-blob-controller +kubectl -n kube-system get pod -o wide -l app=csi-blob-node +``` + +example output: + +```console +NAME READY STATUS RESTARTS AGE IP NODE +csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 +csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 +``` + +### clean up Blob CSI driver +- Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.24.1/deploy/uninstall-driver.sh | bash -s v1.24.1 -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +git checkout v1.24.1 +./deploy/uninstall-driver.sh v1.24.1 local +``` From a0d0c0eb5b7cb1964333802b2296f152ebe27b50 Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Fri, 12 Apr 2024 07:57:50 +0000 Subject: [PATCH 2/2] cleanup: remove deprecated version in charts and kubectl install fix --- charts/index.yaml | 161 +++---------- charts/v1.0.0/blob-csi-driver-v1.0.0.tgz | Bin 3656 -> 0 bytes charts/v1.0.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 21 -- .../templates/csi-blob-controller.yaml | 164 ------------- .../templates/csi-blob-driver.yaml | 8 - .../templates/csi-blob-node.yaml | 178 -------------- .../templates/rbac-csi-blob-controller.yaml | 192 --------------- .../templates/rbac-csi-blob-node.yaml | 27 --- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.0.0/blob-csi-driver/values.yaml | 47 ---- charts/v1.1.0/blob-csi-driver-v1.1.0.tgz | Bin 4228 -> 0 bytes charts/v1.1.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/csi-blob-controller.yaml | 163 ------------- .../templates/csi-blob-driver.yaml | 8 - .../templates/csi-blob-node.yaml | 183 --------------- .../templates/rbac-csi-blob-controller.yaml | 186 --------------- .../templates/rbac-csi-blob-node.yaml | 26 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.1.0/blob-csi-driver/values.yaml | 117 --------- charts/v1.2.0/blob-csi-driver-v1.2.0.tgz | Bin 4220 -> 0 bytes charts/v1.2.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/csi-blob-controller.yaml | 180 -------------- .../templates/csi-blob-driver.yaml | 11 - .../templates/csi-blob-node.yaml | 199 ---------------- .../templates/rbac-csi-blob-controller.yaml | 107 --------- .../templates/rbac-csi-blob-node.yaml | 25 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.2.0/blob-csi-driver/values.yaml | 121 ---------- charts/v1.3.0/blob-csi-driver-v1.3.0.tgz | Bin 4251 -> 0 bytes charts/v1.3.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/csi-blob-controller.yaml | 172 -------------- .../templates/csi-blob-driver.yaml | 14 -- .../templates/csi-blob-node.yaml | 198 ---------------- .../templates/rbac-csi-blob-controller.yaml | 107 --------- .../templates/rbac-csi-blob-node.yaml | 25 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.3.0/blob-csi-driver/values.yaml | 133 ----------- charts/v1.4.0/blob-csi-driver-v1.4.0.tgz | Bin 4501 -> 0 bytes charts/v1.4.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/csi-blob-controller.yaml | 175 -------------- .../templates/csi-blob-driver.yaml | 14 -- .../templates/csi-blob-node.yaml | 198 ---------------- .../templates/rbac-csi-blob-controller.yaml | 107 --------- .../templates/rbac-csi-blob-node.yaml | 25 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.4.0/blob-csi-driver/values.yaml | 148 ------------ charts/v1.4.1/blob-csi-driver-v1.4.1.tgz | Bin 4502 -> 0 bytes charts/v1.4.1/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/csi-blob-controller.yaml | 175 -------------- .../templates/csi-blob-driver.yaml | 14 -- .../templates/csi-blob-node.yaml | 198 ---------------- .../templates/rbac-csi-blob-controller.yaml | 107 --------- .../templates/rbac-csi-blob-node.yaml | 25 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.4.1/blob-csi-driver/values.yaml | 148 ------------ charts/v1.5.0/blob-csi-driver-v1.5.0.tgz | Bin 4690 -> 0 bytes charts/v1.5.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/csi-blob-controller.yaml | 193 --------------- .../templates/csi-blob-driver.yaml | 14 -- .../templates/csi-blob-node.yaml | 216 ----------------- .../templates/rbac-csi-blob-controller.yaml | 107 --------- .../templates/rbac-csi-blob-node.yaml | 25 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.5.0/blob-csi-driver/values.yaml | 152 ------------ charts/v1.6.0/blob-csi-driver-v1.6.0.tgz | Bin 5251 -> 0 bytes charts/v1.6.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 26 -- .../templates/blobfuse-proxy.yaml | 88 ------- .../templates/csi-blob-controller.yaml | 187 --------------- .../templates/csi-blob-driver.yaml | 14 -- .../templates/csi-blob-node.yaml | 218 ----------------- .../templates/rbac-csi-blob-controller.yaml | 107 --------- .../templates/rbac-csi-blob-node.yaml | 25 -- .../serviceaccount-csi-blob-controller.yaml | 8 - .../serviceaccount-csi-blob-node.yaml | 8 - charts/v1.6.0/blob-csi-driver/values.yaml | 152 ------------ charts/v1.7.0/blob-csi-driver-v1.7.0.tgz | Bin 5580 -> 0 bytes charts/v1.7.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 49 ---- .../templates/blobfuse-proxy.yaml | 114 --------- .../templates/csi-blob-controller.yaml | 192 --------------- .../templates/csi-blob-driver.yaml | 16 -- .../templates/csi-blob-node.yaml | 220 ----------------- .../templates/rbac-csi-blob-controller.yaml | 115 --------- .../templates/rbac-csi-blob-node.yaml | 29 --- .../serviceaccount-csi-blob-controller.yaml | 9 - .../serviceaccount-csi-blob-node.yaml | 9 - charts/v1.7.0/blob-csi-driver/values.yaml | 164 ------------- charts/v1.8.0/blob-csi-driver-v1.8.0.tgz | Bin 5815 -> 0 bytes charts/v1.8.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 49 ---- .../templates/blobfuse-proxy.yaml | 126 ---------- .../templates/csi-blob-controller.yaml | 192 --------------- .../templates/csi-blob-driver.yaml | 16 -- .../templates/csi-blob-node.yaml | 222 ------------------ .../templates/rbac-csi-blob-controller.yaml | 115 --------- .../templates/rbac-csi-blob-node.yaml | 29 --- .../serviceaccount-csi-blob-controller.yaml | 9 - .../serviceaccount-csi-blob-node.yaml | 9 - charts/v1.8.0/blob-csi-driver/values.yaml | 160 ------------- charts/v1.9.0/blob-csi-driver-v1.9.0.tgz | Bin 5815 -> 0 bytes charts/v1.9.0/blob-csi-driver/Chart.yaml | 5 - .../blob-csi-driver/templates/NOTES.txt | 5 - .../blob-csi-driver/templates/_helpers.tpl | 49 ---- .../templates/blobfuse-proxy.yaml | 126 ---------- .../templates/csi-blob-controller.yaml | 192 --------------- .../templates/csi-blob-driver.yaml | 16 -- .../templates/csi-blob-node.yaml | 222 ------------------ .../templates/rbac-csi-blob-controller.yaml | 115 --------- .../templates/rbac-csi-blob-node.yaml | 29 --- .../serviceaccount-csi-blob-controller.yaml | 9 - .../serviceaccount-csi-blob-node.yaml | 9 - charts/v1.9.0/blob-csi-driver/values.yaml | 160 ------------- deploy/v1.0.0/csi-blob-controller.yaml | 140 ----------- deploy/v1.0.0/csi-blob-driver.yaml | 8 - deploy/v1.0.0/csi-blob-node.yaml | 160 ------------- deploy/v1.0.0/rbac-csi-blob-controller.yaml | 150 ------------ deploy/v1.0.0/rbac-csi-blob-node.yaml | 32 --- deploy/v1.1.0/csi-blob-controller.yaml | 143 ----------- deploy/v1.1.0/csi-blob-driver.yaml | 8 - deploy/v1.1.0/csi-blob-node.yaml | 163 ------------- deploy/v1.1.0/kustomization.yaml | 9 - deploy/v1.1.0/rbac-csi-blob-controller.yaml | 148 ------------ deploy/v1.1.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.2.0/csi-blob-controller.yaml | 144 ------------ deploy/v1.2.0/csi-blob-driver.yaml | 11 - deploy/v1.2.0/csi-blob-node.yaml | 163 ------------- deploy/v1.2.0/kustomization.yaml | 9 - deploy/v1.2.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.2.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.3.0/csi-blob-controller.yaml | 144 ------------ deploy/v1.3.0/csi-blob-driver.yaml | 11 - deploy/v1.3.0/csi-blob-node.yaml | 163 ------------- deploy/v1.3.0/kustomization.yaml | 9 - deploy/v1.3.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.3.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.4.0/csi-blob-controller.yaml | 142 ----------- deploy/v1.4.0/csi-blob-driver.yaml | 11 - deploy/v1.4.0/csi-blob-node.yaml | 160 ------------- deploy/v1.4.0/kustomization.yaml | 9 - deploy/v1.4.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.4.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.4.1/csi-blob-controller.yaml | 142 ----------- deploy/v1.4.1/csi-blob-driver.yaml | 11 - deploy/v1.4.1/csi-blob-node.yaml | 160 ------------- deploy/v1.4.1/kustomization.yaml | 9 - deploy/v1.4.1/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.4.1/rbac-csi-blob-node.yaml | 30 --- deploy/v1.5.0/csi-blob-controller.yaml | 143 ----------- deploy/v1.5.0/csi-blob-driver.yaml | 11 - deploy/v1.5.0/csi-blob-node.yaml | 166 ------------- deploy/v1.5.0/kustomization.yaml | 9 - deploy/v1.5.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.5.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.6.0/blobfuse-proxy.yaml | 87 ------- deploy/v1.6.0/csi-blob-controller.yaml | 137 ----------- deploy/v1.6.0/csi-blob-driver.yaml | 11 - deploy/v1.6.0/csi-blob-node.yaml | 169 ------------- deploy/v1.6.0/kustomization.yaml | 9 - deploy/v1.6.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.6.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.7.0/blobfuse-proxy.yaml | 103 -------- deploy/v1.7.0/csi-blob-controller.yaml | 137 ----------- deploy/v1.7.0/csi-blob-driver.yaml | 11 - deploy/v1.7.0/csi-blob-node.yaml | 165 ------------- deploy/v1.7.0/kustomization.yaml | 9 - deploy/v1.7.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.7.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.8.0/blobfuse-proxy.yaml | 115 --------- deploy/v1.8.0/csi-blob-controller.yaml | 133 ----------- deploy/v1.8.0/csi-blob-driver.yaml | 11 - deploy/v1.8.0/csi-blob-node.yaml | 162 ------------- deploy/v1.8.0/kustomization.yaml | 10 - deploy/v1.8.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.8.0/rbac-csi-blob-node.yaml | 30 --- deploy/v1.9.0/blobfuse-proxy.yaml | 115 --------- deploy/v1.9.0/csi-blob-controller.yaml | 133 ----------- deploy/v1.9.0/csi-blob-driver.yaml | 11 - deploy/v1.9.0/csi-blob-node.yaml | 162 ------------- deploy/v1.9.0/kustomization.yaml | 10 - deploy/v1.9.0/rbac-csi-blob-controller.yaml | 108 --------- deploy/v1.9.0/rbac-csi-blob-node.yaml | 30 --- docs/install-csi-driver-v1.0.0.md | 37 --- docs/install-csi-driver-v1.1.0.md | 37 --- docs/install-csi-driver-v1.2.0.md | 37 --- docs/install-csi-driver-v1.3.0.md | 37 --- docs/install-csi-driver-v1.4.0.md | 37 --- docs/install-csi-driver-v1.5.0.md | 37 --- docs/install-csi-driver-v1.6.0.md | 37 --- docs/install-csi-driver-v1.7.0.md | 38 --- docs/install-csi-driver-v1.8.0.md | 38 --- docs/install-csi-driver-v1.9.0.md | 47 ---- 216 files changed, 31 insertions(+), 14707 deletions(-) delete mode 100644 charts/v1.0.0/blob-csi-driver-v1.0.0.tgz delete mode 100755 charts/v1.0.0/blob-csi-driver/Chart.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/NOTES.txt delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/_helpers.tpl delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.0.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.1.0/blob-csi-driver-v1.1.0.tgz delete mode 100755 charts/v1.1.0/blob-csi-driver/Chart.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/NOTES.txt delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/_helpers.tpl delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.1.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.2.0/blob-csi-driver-v1.2.0.tgz delete mode 100755 charts/v1.2.0/blob-csi-driver/Chart.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/NOTES.txt delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/_helpers.tpl delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.2.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.3.0/blob-csi-driver-v1.3.0.tgz delete mode 100755 charts/v1.3.0/blob-csi-driver/Chart.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/NOTES.txt delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/_helpers.tpl delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.3.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.4.0/blob-csi-driver-v1.4.0.tgz delete mode 100755 charts/v1.4.0/blob-csi-driver/Chart.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/NOTES.txt delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/_helpers.tpl delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.4.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.4.1/blob-csi-driver-v1.4.1.tgz delete mode 100755 charts/v1.4.1/blob-csi-driver/Chart.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/NOTES.txt delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/_helpers.tpl delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.4.1/blob-csi-driver/values.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver-v1.5.0.tgz delete mode 100755 charts/v1.5.0/blob-csi-driver/Chart.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/NOTES.txt delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/_helpers.tpl delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100644 charts/v1.5.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.5.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver-v1.6.0.tgz delete mode 100755 charts/v1.6.0/blob-csi-driver/Chart.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/NOTES.txt delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/_helpers.tpl delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/blobfuse-proxy.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100644 charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100755 charts/v1.6.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver-v1.7.0.tgz delete mode 100644 charts/v1.7.0/blob-csi-driver/Chart.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/NOTES.txt delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/_helpers.tpl delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/blobfuse-proxy.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100644 charts/v1.7.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver-v1.8.0.tgz delete mode 100644 charts/v1.8.0/blob-csi-driver/Chart.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/NOTES.txt delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/_helpers.tpl delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/blobfuse-proxy.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100644 charts/v1.8.0/blob-csi-driver/values.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver-v1.9.0.tgz delete mode 100644 charts/v1.9.0/blob-csi-driver/Chart.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/NOTES.txt delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/_helpers.tpl delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/blobfuse-proxy.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/csi-blob-controller.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/csi-blob-driver.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/csi-blob-node.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml delete mode 100644 charts/v1.9.0/blob-csi-driver/values.yaml delete mode 100644 deploy/v1.0.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.0.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.0.0/csi-blob-node.yaml delete mode 100644 deploy/v1.0.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.0.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.1.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.1.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.1.0/csi-blob-node.yaml delete mode 100644 deploy/v1.1.0/kustomization.yaml delete mode 100644 deploy/v1.1.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.1.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.2.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.2.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.2.0/csi-blob-node.yaml delete mode 100644 deploy/v1.2.0/kustomization.yaml delete mode 100644 deploy/v1.2.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.2.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.3.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.3.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.3.0/csi-blob-node.yaml delete mode 100644 deploy/v1.3.0/kustomization.yaml delete mode 100644 deploy/v1.3.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.3.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.4.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.4.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.4.0/csi-blob-node.yaml delete mode 100644 deploy/v1.4.0/kustomization.yaml delete mode 100644 deploy/v1.4.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.4.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.4.1/csi-blob-controller.yaml delete mode 100644 deploy/v1.4.1/csi-blob-driver.yaml delete mode 100644 deploy/v1.4.1/csi-blob-node.yaml delete mode 100644 deploy/v1.4.1/kustomization.yaml delete mode 100644 deploy/v1.4.1/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.4.1/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.5.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.5.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.5.0/csi-blob-node.yaml delete mode 100644 deploy/v1.5.0/kustomization.yaml delete mode 100644 deploy/v1.5.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.5.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.6.0/blobfuse-proxy.yaml delete mode 100644 deploy/v1.6.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.6.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.6.0/csi-blob-node.yaml delete mode 100644 deploy/v1.6.0/kustomization.yaml delete mode 100644 deploy/v1.6.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.6.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.7.0/blobfuse-proxy.yaml delete mode 100644 deploy/v1.7.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.7.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.7.0/csi-blob-node.yaml delete mode 100644 deploy/v1.7.0/kustomization.yaml delete mode 100644 deploy/v1.7.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.7.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.8.0/blobfuse-proxy.yaml delete mode 100644 deploy/v1.8.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.8.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.8.0/csi-blob-node.yaml delete mode 100644 deploy/v1.8.0/kustomization.yaml delete mode 100644 deploy/v1.8.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.8.0/rbac-csi-blob-node.yaml delete mode 100644 deploy/v1.9.0/blobfuse-proxy.yaml delete mode 100644 deploy/v1.9.0/csi-blob-controller.yaml delete mode 100644 deploy/v1.9.0/csi-blob-driver.yaml delete mode 100644 deploy/v1.9.0/csi-blob-node.yaml delete mode 100644 deploy/v1.9.0/kustomization.yaml delete mode 100644 deploy/v1.9.0/rbac-csi-blob-controller.yaml delete mode 100644 deploy/v1.9.0/rbac-csi-blob-node.yaml delete mode 100644 docs/install-csi-driver-v1.0.0.md delete mode 100644 docs/install-csi-driver-v1.1.0.md delete mode 100644 docs/install-csi-driver-v1.2.0.md delete mode 100644 docs/install-csi-driver-v1.3.0.md delete mode 100644 docs/install-csi-driver-v1.4.0.md delete mode 100644 docs/install-csi-driver-v1.5.0.md delete mode 100644 docs/install-csi-driver-v1.6.0.md delete mode 100644 docs/install-csi-driver-v1.7.0.md delete mode 100644 docs/install-csi-driver-v1.8.0.md delete mode 100644 docs/install-csi-driver-v1.9.0.md diff --git a/charts/index.yaml b/charts/index.yaml index 833c15ba2..4a03dd7db 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -3,7 +3,7 @@ entries: blob-csi-driver: - apiVersion: v1 appVersion: v1.24.1 - created: "2024-04-12T07:18:31.462033556Z" + created: "2024-04-12T08:55:58.602497989Z" description: Azure Blob Storage CSI driver digest: 82537068e57177cf6d0697c7c942aaf496de9280fbc7b96ab326776fa4db8481 name: blob-csi-driver @@ -12,7 +12,7 @@ entries: version: v1.24.1 - apiVersion: v1 appVersion: v1.24.0 - created: "2024-04-12T07:18:31.461360864Z" + created: "2024-04-12T08:55:58.601837129Z" description: Azure Blob Storage CSI driver digest: 3b3b1a4fee786f0c9445da2f35bd1e251265cec8ee03c3cf99fe9f0bf9575e09 name: blob-csi-driver @@ -21,7 +21,7 @@ entries: version: v1.24.0 - apiVersion: v1 appVersion: v1.23.4 - created: "2024-04-12T07:18:31.460274467Z" + created: "2024-04-12T08:55:58.601188521Z" description: Azure Blob Storage CSI driver digest: 20d0157476ecf0a38b2d3982587b9657b27e1603b2185709faeff73b6d671ceb name: blob-csi-driver @@ -30,7 +30,7 @@ entries: version: v1.23.4 - apiVersion: v1 appVersion: v1.23.3 - created: "2024-04-12T07:18:31.459269166Z" + created: "2024-04-12T08:55:58.600377379Z" description: Azure Blob Storage CSI driver digest: 21c8355faf362c527e40ac417b17d3c28fa041941633254358387997b9bee8a6 name: blob-csi-driver @@ -39,7 +39,7 @@ entries: version: v1.23.3 - apiVersion: v1 appVersion: v1.23.2 - created: "2024-04-12T07:18:31.458611981Z" + created: "2024-04-12T08:55:58.598642302Z" description: Azure Blob Storage CSI driver digest: 057d6658c5879ee7e564d59275366521dc0a2e311c0527e570eaccd544622e60 name: blob-csi-driver @@ -48,7 +48,7 @@ entries: version: v1.23.2 - apiVersion: v1 appVersion: v1.23.1 - created: "2024-04-12T07:18:31.457969298Z" + created: "2024-04-12T08:55:58.598025748Z" description: Azure Blob Storage CSI driver digest: 66215f12a4e3acdcf09416d817b737e14546058b081a2cfd8bf9ef507229ca07 name: blob-csi-driver @@ -57,7 +57,7 @@ entries: version: v1.23.1 - apiVersion: v1 appVersion: v1.23.0 - created: "2024-04-12T07:18:31.457353804Z" + created: "2024-04-12T08:55:58.597382253Z" description: Azure Blob Storage CSI driver digest: 57151e21e33660522f25694bd8ae985e5e17c7ffe09904ad2af4025e8bf1da72 name: blob-csi-driver @@ -66,7 +66,7 @@ entries: version: v1.23.0 - apiVersion: v1 appVersion: v1.22.6 - created: "2024-04-12T07:18:31.456725713Z" + created: "2024-04-12T08:55:58.596756053Z" description: Azure Blob Storage CSI driver digest: 82e30775aa05e093c30884f480d505b408023dfa32944cf21ebffe9d88afb1f2 name: blob-csi-driver @@ -75,7 +75,7 @@ entries: version: v1.22.6 - apiVersion: v1 appVersion: v1.22.5 - created: "2024-04-12T07:18:31.456077167Z" + created: "2024-04-12T08:55:58.596140123Z" description: Azure Blob Storage CSI driver digest: ff3c2c2e05dd048dd0af3e5c7d002eae2928a5d17fb269a1e4d5cadd30e8ab51 name: blob-csi-driver @@ -84,7 +84,7 @@ entries: version: v1.22.5 - apiVersion: v1 appVersion: v1.22.4 - created: "2024-04-12T07:18:31.45545871Z" + created: "2024-04-12T08:55:58.59548611Z" description: Azure Blob Storage CSI driver digest: 6c38e79d2f50616daac0658cfa5b1a569e6ff8ce8f24ed40f563e87fb1d1340a name: blob-csi-driver @@ -93,7 +93,7 @@ entries: version: v1.22.4 - apiVersion: v1 appVersion: v1.22.3 - created: "2024-04-12T07:18:31.454792765Z" + created: "2024-04-12T08:55:58.594821407Z" description: Azure Blob Storage CSI driver digest: 6cdee296d22ecd330f477f2ca6da51b07320c546c04ae46c23eef48146b772c1 name: blob-csi-driver @@ -102,7 +102,7 @@ entries: version: v1.22.3 - apiVersion: v1 appVersion: v1.22.2 - created: "2024-04-12T07:18:31.454147089Z" + created: "2024-04-12T08:55:58.594152673Z" description: Azure Blob Storage CSI driver digest: 259e66dc12db7310fe1c51e49c964398e0a6b7d511133916dd7d25f748f0b791 name: blob-csi-driver @@ -111,7 +111,7 @@ entries: version: v1.22.2 - apiVersion: v1 appVersion: v1.22.1 - created: "2024-04-12T07:18:31.453303054Z" + created: "2024-04-12T08:55:58.592491498Z" description: Azure Blob Storage CSI driver digest: 8329d477d55c82f97bb09fb172c5f39a1677bedc13c7410bd93b306194516438 name: blob-csi-driver @@ -120,7 +120,7 @@ entries: version: v1.22.1 - apiVersion: v1 appVersion: v1.21.7 - created: "2024-04-12T07:18:31.451715932Z" + created: "2024-04-12T08:55:58.591863979Z" description: Azure Blob Storage CSI driver digest: 1095721182d611e2556c611dd330758d8130fe66493db4f9189586a9219896d3 name: blob-csi-driver @@ -129,7 +129,7 @@ entries: version: v1.21.7 - apiVersion: v1 appVersion: v1.21.6 - created: "2024-04-12T07:18:31.451094812Z" + created: "2024-04-12T08:55:58.591242134Z" description: Azure Blob Storage CSI driver digest: d5ba1f92795ec45970eb6e5fc54aa13a5684f9936216c064f8a3843bf722bf54 name: blob-csi-driver @@ -138,7 +138,7 @@ entries: version: v1.21.6 - apiVersion: v1 appVersion: v1.21.5 - created: "2024-04-12T07:18:31.450468305Z" + created: "2024-04-12T08:55:58.590628223Z" description: Azure Blob Storage CSI driver digest: b403e9d49abfe076ecd83d6dd50166347ee4305f33dc840019474b2876723b9b name: blob-csi-driver @@ -147,7 +147,7 @@ entries: version: v1.21.5 - apiVersion: v1 appVersion: v1.21.4 - created: "2024-04-12T07:18:31.449862625Z" + created: "2024-04-12T08:55:58.590049005Z" description: Azure Blob Storage CSI driver digest: e4fa13670caf6b0d3e9fefa55d100daa439cd7187dabd45318ab03c7d4b17710 name: blob-csi-driver @@ -156,7 +156,7 @@ entries: version: v1.21.4 - apiVersion: v1 appVersion: v1.20.3 - created: "2024-04-12T07:18:31.449232951Z" + created: "2024-04-12T08:55:58.589465013Z" description: Azure Blob Storage CSI driver digest: 8c2c20547b2e0e1b39d2f2efd04c1bd778f14af5feae2bda86d722dac3c02643 name: blob-csi-driver @@ -165,7 +165,7 @@ entries: version: v1.20.3 - apiVersion: v1 appVersion: v1.19.6 - created: "2024-04-12T07:18:31.448183785Z" + created: "2024-04-12T08:55:58.588813646Z" description: Azure Blob Storage CSI driver digest: 0007ef225b5658d3989aa6fdc3a91a4b33696a438eee46ad9a675af615cbdf21 name: blob-csi-driver @@ -174,7 +174,7 @@ entries: version: v1.19.6 - apiVersion: v1 appVersion: v1.19.5 - created: "2024-04-12T07:18:31.447588419Z" + created: "2024-04-12T08:55:58.588220429Z" description: Azure Blob Storage CSI driver digest: 183c3e5cd84b709f1455cc7c84ed5bd573e8a24149fd6442d38999835b0a1711 name: blob-csi-driver @@ -183,7 +183,7 @@ entries: version: v1.19.5 - apiVersion: v1 appVersion: v1.18.0 - created: "2024-04-12T07:18:31.446939966Z" + created: "2024-04-12T08:55:58.587601765Z" description: Azure Blob Storage CSI driver digest: 3eac15488da5be7d1e78431929f7cda35bceb1af3fe107ffbd84606e047c9204 name: blob-csi-driver @@ -192,7 +192,7 @@ entries: version: v1.18.0 - apiVersion: v1 appVersion: v1.17.0 - created: "2024-04-12T07:18:31.44632176Z" + created: "2024-04-12T08:55:58.586876831Z" description: Azure Blob Storage CSI driver digest: 22cfa17fc5e8d771ff8edd26729266a9a8ee55c0e150df85ef15698f7fe985e9 name: blob-csi-driver @@ -201,7 +201,7 @@ entries: version: v1.17.0 - apiVersion: v1 appVersion: v1.16.0 - created: "2024-04-12T07:18:31.445647499Z" + created: "2024-04-12T08:55:58.585341647Z" description: Azure Blob Storage CSI driver digest: bf6249c0e3e3d3d009d4c79ceb7fda9a56c0565b969de753628792ea3ea5ece8 name: blob-csi-driver @@ -210,7 +210,7 @@ entries: version: v1.16.0 - apiVersion: v1 appVersion: v1.15.0 - created: "2024-04-12T07:18:31.443843725Z" + created: "2024-04-12T08:55:58.58473786Z" description: Azure Blob Storage CSI driver digest: 8daa35cd4957695cb64b45da05a15b4020df5545a8ac44c4668dad4bba82c8a9 name: blob-csi-driver @@ -219,7 +219,7 @@ entries: version: v1.15.0 - apiVersion: v1 appVersion: v1.14.0 - created: "2024-04-12T07:18:31.443242253Z" + created: "2024-04-12T08:55:58.584123662Z" description: Azure Blob Storage CSI driver digest: 442bc579b231aab626b9e474e2c0ed3f101d47d61c99aa9a7f863af7ce268d9d name: blob-csi-driver @@ -228,7 +228,7 @@ entries: version: v1.14.0 - apiVersion: v1 appVersion: v1.13.0 - created: "2024-04-12T07:18:31.442607498Z" + created: "2024-04-12T08:55:58.58353028Z" description: Azure Blob Storage CSI driver digest: b577b0b771138109aa90eb09d56fc07273ca0b584a263ee8f789e35796279f31 name: blob-csi-driver @@ -237,7 +237,7 @@ entries: version: v1.13.0 - apiVersion: v1 appVersion: v1.12.0 - created: "2024-04-12T07:18:31.44197167Z" + created: "2024-04-12T08:55:58.582895435Z" description: Azure Blob Storage CSI driver digest: 124e87af2581b374b89a39940698620c23d3eae6dcee518d302461ffea93e9a8 name: blob-csi-driver @@ -246,7 +246,7 @@ entries: version: v1.12.0 - apiVersion: v1 appVersion: v1.11.0 - created: "2024-04-12T07:18:31.441339836Z" + created: "2024-04-12T08:55:58.58228131Z" description: Azure Blob Storage CSI driver digest: 07c4d76017491b3d0bdd70de90e814096938bf7916da0c149c3805294bd57560 name: blob-csi-driver @@ -255,119 +255,20 @@ entries: version: v1.11.0 - apiVersion: v1 appVersion: v1.10.0 - created: "2024-04-12T07:18:31.440704203Z" + created: "2024-04-12T08:55:58.58165317Z" description: Azure Blob Storage CSI driver digest: 79716efa958385adf57eb3570843e1b4512d8c801e8e070625e94264f3e917a9 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.10.0/blob-csi-driver-v1.10.0.tgz version: v1.10.0 - - apiVersion: v1 - appVersion: v1.9.0 - created: "2024-04-12T07:18:31.466447348Z" - description: Azure Blob Storage CSI driver - digest: fca0b9215d3277346f68c643fb3ead75158971f0d1945ab01ec559196f3cf842 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.9.0/blob-csi-driver-v1.9.0.tgz - version: v1.9.0 - - apiVersion: v1 - appVersion: v1.8.0 - created: "2024-04-12T07:18:31.465869124Z" - description: Azure Blob Storage CSI driver - digest: 3b78e2ab4f33577c54d4f57276c824717d2ad2aa3741210e938fcaf927bc751f - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.8.0/blob-csi-driver-v1.8.0.tgz - version: v1.8.0 - - apiVersion: v1 - appVersion: v1.7.0 - created: "2024-04-12T07:18:31.465292778Z" - description: Azure Blob Storage CSI driver - digest: 28da5b55c3d2689d6da85eb7da344385e9cb99bdb2af18c24fea93670abfe7ea - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.7.0/blob-csi-driver-v1.7.0.tgz - version: v1.7.0 - - apiVersion: v1 - appVersion: v1.6.0 - created: "2024-04-12T07:18:31.464694601Z" - description: Azure Blob Storage CSI driver - digest: 6f24f2e6623f6f8862e47d4fbdf13b5f351ceec6bb9a4591ef7fc2fca9fc1eef - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.6.0/blob-csi-driver-v1.6.0.tgz - version: v1.6.0 - - apiVersion: v1 - appVersion: v1.5.0 - created: "2024-04-12T07:18:31.464152794Z" - description: Azure Blob Storage CSI driver - digest: 95d14c9b70b319760d388ea47727c8c97e9287867a8852aeb67b7175b52fe8f5 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.5.0/blob-csi-driver-v1.5.0.tgz - version: v1.5.0 - - apiVersion: v1 - appVersion: v1.4.1 - created: "2024-04-12T07:18:31.46361856Z" - description: Azure Blob Storage CSI driver - digest: 5fcf69c449f065fa1d5722e5a7fed8a28000efa790907e9ff4b552c5fbd16d22 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.4.1/blob-csi-driver-v1.4.1.tgz - version: v1.4.1 - - apiVersion: v1 - appVersion: v1.4.0 - created: "2024-04-12T07:18:31.463097533Z" - description: Azure Blob Storage CSI driver - digest: b466543344a6411f6130ba87b093955d39ab8614c6b4ed8505a0a0c96073cb33 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.4.0/blob-csi-driver-v1.4.0.tgz - version: v1.4.0 - - apiVersion: v1 - appVersion: v1.3.0 - created: "2024-04-12T07:18:31.462518429Z" - description: Azure Blob Storage CSI driver - digest: 58d02cb70a3a966b349d62e880b7149fb06ac009474e35e580784fd3c98a5b07 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.3.0/blob-csi-driver-v1.3.0.tgz - version: v1.3.0 - - apiVersion: v1 - appVersion: v1.2.0 - created: "2024-04-12T07:18:31.448639791Z" - description: Azure Blob Storage CSI driver - digest: 27fb89f20b5fddc7329e6d7c2374857b22c1d61592e397a53f47121eea68c344 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.2.0/blob-csi-driver-v1.2.0.tgz - version: v1.2.0 - - apiVersion: v1 - appVersion: v1.1.0 - created: "2024-04-12T07:18:31.440082082Z" - description: Azure Blob Storage CSI driver - digest: a251a55243de207c69ef53f72abee45e93b72fa4fc43dc204b7f1cdfd459acdb - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.1.0/blob-csi-driver-v1.1.0.tgz - version: v1.1.0 - - apiVersion: v1 - appVersion: v1.0.0 - created: "2024-04-12T07:18:31.439612191Z" - description: Azure Blob Storage CSI driver - digest: e83f037a165eafc83a978bd7e6bf6221b052ac34363aecb12e6a73607dc58b89 - name: blob-csi-driver - urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.0.0/blob-csi-driver-v1.0.0.tgz - version: v1.0.0 - apiVersion: v1 appVersion: latest - created: "2024-04-12T07:18:31.439263063Z" + created: "2024-04-12T08:55:58.580991358Z" description: Azure Blob Storage CSI driver digest: c124c5652331e6b3e47e600740a65aa86b1cd31a899a586dec4002c59d51268e name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/latest/blob-csi-driver-v0.0.0.tgz version: v0.0.0 -generated: "2024-04-12T07:18:31.438375493Z" +generated: "2024-04-12T08:55:58.580173888Z" diff --git a/charts/v1.0.0/blob-csi-driver-v1.0.0.tgz b/charts/v1.0.0/blob-csi-driver-v1.0.0.tgz deleted file mode 100644 index 56880b8860e35a33ceb8fd091bc4e7a313f8bbe6..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 3656 zcmV-O4!7|iiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH+}bLzIT=WjlRhIZ!m-KoJ4lGE#%{BfGlHq#!G3AugqUZ;~0 z_5!+*C0CMZIC*^cHNB)Nm_JfP7-;wTCMh%b}bJmA2_}wP9VqxMDt>dg=$Q3 zNI&eYxvuM;bvov!>$>@$ZtLviL#yMqPCK3U$;Yz~ZmZKeYkxrQ{zxcqu~b-maCe?7 zzqohOa72CuAqi(5nzU*-ic)_z+=g2VK>C72%JhBu5(_}zQ$9d_#RVP#y69gaD?BxZ zL-0^eq-v8K!q;B%v87sG|0kHnAoptkD)hhIYP)&;@3c;i`hSQ%F*zLQN~lIC1+%n*e~3-#82M=_;0oDzTPp{rq!s~Z6l zn5rSF(XJ+d@c=H3!rj7%NG0$toY2@3{dL3~Uxp;N(b`~NZb6bSJMD?E7&80Os$xg& ztFO>43_$?%0V$3+1H=Uixd0@=7oeo>9sr6Z1nAE(FoTV-5i;^CH3|Vk4~>CZ5=AUzyHttLTCh!3B9pT|sTzWM^N0uLz>L#-wT*kA3{L%U@l%|2tPKzL|~snqgF`REsz0QJymt)?ZU z5ZP%SQZtT%p_LLAKi*(9_E2+zMU#?2GkILA`IN^&5)a(O14{f0-E(yA@2uthzk)EL zSb=QzuJ5}2hI&*x&rucspPaRG{{Qss?DXjW57F+%us*0qM4}NWrHyR>5#>_|v^Adc zSRkLq+UhiFwL6adG58M^$RZv{Bo$V%{1!zNumo+syjl$*ZCiXrk>hByDkJQ}`O_0> z+=78?^ya;2Hq#_oWR4?&g0HwZuL}#gG78ORb>ujIV&#vI7An)q_5XehGy)+TD%$ZV zP@(@V*Ug{*&rUlZkNSUz_Vm>JCz_DZLlP7k5(;V>!Fj0J;*Y^Y|7^}?wVDB=cmPzQ zAs1*2G(-X+>tBL$Q688E#lV1ZeK<${hB7h$R9 z#Uh9-<3qHJ94#|61R0{nulBH=4=>Sdwis+b6mBukC*Pc+CGEq&*N8c<9mucA-9vrxU_Biez)r zs)e9%fECu}+ZvYw;YgmD2+dlbqQI^8^n?iWX&mIeL<9XFA}j!=P+J4a2+ZMldDhi9 z6VsQH$@z0@{pP`-O=5&P;`?RcdUV54R7U<>_LH%TMQ=j#nVr6J4ut0G(rp7rU;&HV z0aE;ba7fEXFNphYi74d)Y{!^O)dTe>7Y|7S!uDr#7rnAwcO*^*FdjfZ!+qVdi5MZENXn-;(fdz{}ksw?UHNBu%O1ls_l?p;9Ilef)Ad2{y zCIb|wAh05w$>l;E^Z-*2)lITZ&)dk7Vu`3P;1S}H#=?b%>fJwLOw-Ryn%zTn&G2+T z42R(Bh^5E-{uqLoE*>w#j5JY8b|K2#ZmQ zDoa`2nVh%lE1kyK;2;nn<@wj&e7d~6?e_csRR9PK4=6YkZ~($Fl0`Tx0L(!+CW1Al zM;1UU5(1Ca`I(z}3T%>Jf#q#NVdmLl1Di?avmv?vkZ1c%D&twj(q(ou%h?I1aR{Ha z4z6%G)V)c9Zk~x>HcP#x3zQR(v`{Pp_bf(ALXw{aAwP;e)N_1 zIA)or+;dnKhA)UXVe0(rZ!Y>*_uby*&Gl99uE<6v3H^mMx()NsE1ou${?E;<L89y5GDFF`==5yRiT{<}~oo zY3BJ@spv;r7s0?fAse~AS+ zzJS0P5())yCYaLPD|p7u%O;p+;?e9v(t1(snPWyCy=JrAJSUMS{IL{0%HsglO$NKK zu>W96TJ^l_WtrLS{d#qK-TU0_-5GA)e7gIoBvt_BrwWrz!z8KaF%vibBRN~4FcYhz zjhw!C{`OfqGmfU%s8GT{CRDL z{LR`1`pI#n4BL7E^L+S2O^~UZ=%LO*&zww+B%;pcI{N*!^0tAL`|3Q8q24ZUK`JA z|8N-#!bVB;i?Gqvi19^t_YwTqTt&*nlxfQDK!huY0>{cv_c7AvzieeM4Q0|&I{Yqp zny%>exVmD6F!lmX5q3Mnga{R5>dfDyw*BQbO0xx<6)4jM$44TS+@y54zQFRr)rYM! zPJhwr&&dkJSc)k$>!a-X*WX;; zUj5p=y}#}Lc;COi`1$_k)7?+27_vJ_$q@XhPjh96NFT9zl-~e&Tsoc9w(u~-+I|04 zZw?4+%5nW$RCj#+zX*{dhNzjQx49al>-8Af&E}WtzrR?%YB{`!ZN<1!8=mY#V{thJ z&1TJr#v{UH!TO3Qc#&k+a&SgM)}u&+zE3TGBc)YyMA=(WRbwN;`Pbk4{O|9(_r2@O z?tSmm=kAvES3}$GmDiI(=eWfJdNu9rydhJCqihBc`{O+;!kaFLm&G^-Dl@LDjBOw6 zW?fmfhIlP5%q8;_OsO93M&DLcl&IleICa0g$iEF~rSbfF;px2Tfky>`VVb_LV(!yyULX=NweHl>LI00}$C32V zZ}lW=wG0Q)Z}mviDitu5xZwn70%BkQMxg57qB!pRZB-S&CoCXrw6jL$E{{2b1n<7fy7AyY;HyM&?P~g&;$v+Y zR;;;cxCv3(o+N34RSUMEIYNtFU&Ge2z1g3cOkSUz)3nzuIfxm1Q-rEez$^)eR`*}$k8;2)^4f)nH zRnKC%WH%;!PB8Ws?a7M^uw*!rW3JR2l;Kx#e{b*bu$v1kTtV`Mr8T4%aV8O!4KzL3 z z$~o{>tl>W6tF%4*d!FuAJi;?Vtvx!bs+Fx}kg;!;`scW*4ea7lLVqt=@*bpd&6=Jk zlW$Jcs&;ELS$leVjk?9A`Tt!mfmD6}vz7n;Z`Dc zVQyr3R8em|NM&qo0PH<$QzN&s``N!j<)rH5o}2L#NRF%cz=D%d*#!!d+l#hcdF zxQdhei!>aO-$6*iSr1LyH5^5mKO5~vs}_Lt1&Ne-cJe6}fZkF*L<7YI9s@cZoFgkd zHHJgzp@K-&riB5&^py84(~9~(#WV)FTLVy`|A+0vlKvmG+k5?giAF*^hF%RBt<^sf z5)g4o6c@7|3VqQCi7&Y1Bh~PE*u48uHhoE&bHOoP6do_sTmK!!lwNU4{8Qxo7t=_nZ*I_uCt$rKn!c_sJ|HY8y_ zMx@8c5zwh7fbjs%jKW>Rm`Ek?Hk{C-CHm`$`FKy|i7&}DNb+f`H4%1%r^!U^n{UuH zj6eYM0V$3+1H=Uixd0@=7oenmJOmU=2++p~Ff$rqV`Su4>LCP-dT63lBzw&aZ4JVk z0rzE7VRUGo`et@f#|kc?@97hz=s&5qhGmOXWq-9fKNf+-V%Lk z>y}{cxUhD%#9Gv_mt!~{jR+%Z)l!kffm7^HAb|+AN%tv_gJipK6%Q%#PxTXH>rb_9^ED>KM+h^fFd5qTEv5s6w1(B8iwK_&{ZS6GXV3>T71p!1*0oLxFBkFO0hHp0F!!?Gvl!^ zy^)N?luThE%ScYRQ0w{~pEDmKmAW1?jiz=#QG(iw1VCuESj}3LrRTyp7&(&)LeHnM zw(*`Xh$23w8v6kJSVJT2HQ-*Mv8Gf{oJSECD%Pv6XC-2W7VZvVi5O>sbA^U8Bta?d zOtE&iX1G&3n#M4kA-Kn3L;>~m-vy8!deCE^$ls)PKkZhljUH=dpvV2b?=`mK{!c*| zQLI2VFD`HTgNC|STjQw8|8$Q!h5g^*(P3x5|9gpcGlA7f9YiD=C-xzLi1Ha2`)bT% zVv!oP+6_nk1pK>-!K^)1SjF;t6j8tuwDsuKY6xlD=_`snPlweq!af{7JfOxk7`Vp8 z{3&{T)Fj!#JWnQ$?6@v0WT_W=e5@nS`-qi4*_)wUTdx1N6QB_Y*-+7zsh|q|Zy$79 z1^qudJZSCp|0UYPL-U_#O2VEF0?>$1P_qb*L(LX{0zLH4=Hp|nX2AOQ5oUo2F0_W~ zuuK2$o05TndwB3r03*Tx)wN_bG+Z5d=_?#lg&MZXU{tg5yUjRi$jd1RK>|RZ^;Veq z=%{OcCE*|*jmSN!d+A`n0`t42Es6g|T%ZZiFx__`H(?guj%I(?kuHv+Mm~fiOe)NL z=%KpHsyO?EnBg%5-f&jvHL&@Br5$ZLL3f#}VUCTBr5zV3c7x7x_hgaEPr7NoG~}dd z)++~^%*IQf%zJ(|sRnIx>;GLx_1n4`tIYl=rgV|3(TlJMHJ2?wl%`YCH6^2kJQQ;- z=<%_fhcTT5W@A{{4=qwPdWI+?K<;0?$Hy5>YwQNBUN0Dq!+qDoB4zR-7L|Q#^2uJeHL}*sgT!CBd z;QN$v;s*MR2n&EI)X{)40+Sp~bDet3M9VWWIe%{zeI5+j)JUi!zIO}rt{aY` zW#rFgKk2)e^g1LTS@e}SY%AEhMS5axgcScb4yoh)XT%bOKV}gYY*>EiOztG@lS#Xn z36?QtyDg^qW5HtTq3lBGhaZWWxRz+1eafJp=cBT?SEDI$&28y*bNPwl3`@Q9$V+^+ z4<=ly3s4`qxJ%OY_IWEt8w97Nj+Rj9lc$6P!X1 zg$Af7Itjm*tzeeiM2pv5HAg-xqsXPV=rj5da|P)D+05jEY!BUm4zEn@OHZs6gXvkO zc~pdWq(|YRhwA+gF{asfrs~~8b-kk5=P(+9uVbYPKJX_H#5D7|iiCuH5ycFig^*PX zmSNfx*DHan{NqgvB^Rm8GoiO^-YE z(nAx};2;nnB zSleb&ENw{c-xWD{l_`=|aVIUP=9x6*G!EgtHbf<6h5BidsGk?_(`KpHbb;~$l3m}l zj)NQyD(8+9zyi4$*VXQ137#`;UK;Y!ih548>Lq^Uib++Xl?S$xRj&}Oybvv0I16d0 zUPww;mH;MzshW5Z7wWk4ucL0~No$`cf0LzOvADV|my8XTK1Xfk%4;XN&U%~Jt74fA z%zCR^_q^$`JEoi$I18gBy?_M~CrllG``zi_{I-8_c6E7vapSTrN%?dkL#>ASujfXa zDYh0cYpE$sU}34#>TJiU(N^?672ZXHEADgJLpP^atA}2PTqouPWKGP@>acAiOlU0N zW+FgNI1Oy+Ic*cAqMvQKGKa|u^b!V`xw+oy*py&;1{BW*;Bywp9_qGoFo~)!UbpkF zBM^iK?#{~{$N&9y-M>A(?w|E9Zq85M-Trj`uJ3XqKM5Wd=W1N{h>YLk=vSCs!>9}} zUl#l+7U1~;0&hepIN(fZqq*mJ$4#XY(_93cpGa0O+-@*t%Zvj}?Vj0lr&n3b^Qjl)VbPqt7S85*~dshoe= z;#B3l3g>E4xblIUvXm4%JClhS3chr1df%SEtx^B6Z??D+Qg!~P(`gs$Kdqzv`JWeQ zp6BICKGL4qY25v23(M^xDBP~uGSTVa+@79wRD?`at6i#b1r48viwX`_3j335_z)8T zL3%bg;=wr^@k?fWWfER}X@>mG+8X-LcmP{n2&<_79vl_*zx~5u=Wwt8FVT|vFNTn_ z0X(_vhIVdJC%NZ9y%%=qGQ{~r9< zT+`0&H?joYfCyzVE$CU@>fc9tJD)GJW}!?o2 zre1ovBo&g3SQ@@(&lEUxE)P?!clN<^)vB{4-+Lleri|#CTd8>Ko?aGg-5IW`?yj!D zJ#%?#8Qx8I#zpa0&!zP;}Md^@;2{q^?h)2aM_zx_n?u5ya#H^u)jePTUxdgLBh<{&+bnOd^n8r0<+GXfKc6i-ns#@w%{^9T z!IO1pEUpux$H!(w<1t~1^$=OmO|{Y?`+t>MxtYn%s^r7u?y$C! z_p@xzx9=|B{`A|Re|vR(`M>{OIf%W6To|iFv*WU|n|uvTg5z($`}McC{o9Mnv;OVH z$@~6>MSg>O`|^I*=@xfc-ggk{uFvfY`}@MagZ?!N`}3ie=yvs}c@byIK>$X2p-`v zwqHhjO9E4`Gz#Q4nYxd0Y+v8;j6B|uDQ7R6Y{vd%$J+2(&UO^yyA`K89HsYF)#A;g z=)7mk*VQk@srm3wt+-AOh1rh2ji^|nFFWDXZTfMiO-Nh1QCLmfMu#3&XnX~>4b;D^ z-A`tB?t3tK?OAFC_J=OM)S-*z^*=GhzPFQ0pcVDMPUom_|G(2dI@;I&UZfR7T`zjW zevZyu%1-M3w%~HjDdY--1{%j|!Ug$cjA43iV95~y5AGERhH3U5k-0s!et}TL)VfYj zhvPpB9!Ii={-`IZuZ)lWqaJBmr2?iBmzw}hK@1JR7*zdxRHsCmpXM7O`WMRt{ac{T z8kl|?AoM9F;o4Z^D8O!9`GXlQ%n5`~v6O4hbIm!y6qwq8bIEMJNA+kKy6S29lIXZ< zrxV(0K%a9F5SEp97Y=F*N00wJBJ>zucIt9T;#N5v{?@90*)xabu}?IDce5@kY#%wB;-*QL&r@ zuf-bfGIGk=!>?_xRkHO@2%>iCf}B$~Hp$ZU6xXtbElZ{9&n1)Dfds9X(_D^Top@BO z!+P@Z@UXv=_&jah{QowWfU3U#+isV>|9H^p?(_dI(JJ!)JGRSJCdGNb=sE57OIYjd z9JaI5+1o3-x6mbC?``wf-(rrnyfWLR=n#QquK9~e`$vP#oE*L|LKunrT(`I|NdvEbJ*Sg`=2k;UP}Md&}Far a`?hcUwr{VY{eJ)e0RR7uZiDc zVQyr3R8em|NM&qo0PH+}Z{xO-`?o&@;TCwkca>#3KekUm{>Ub78+11b;uDwAWp!^1h{)P#$2|h zIHYg3*4piM`}pus|J!c2%m21J#|LjZhwY<-&fDXo_Tig$=dg3!d4t;9BVln%gv9(! zdt+SX$^Atdj>&Jp1!0kgCY=V3x-@WE_tGo%Jt} z5uQebL-0^Zq#BbFz^^^!eap47{!cJXKy23l)ad_F_wcZ+|A*bfz5ef_kr0o-Yap$) z>R*I7#7q#$_|!w8&s!n!ITLIsTRscj`yYhs3*ycMM-P#BG*@r+cbrgq%_#Aw9=aG_ zGI`BGKqMOo`GQm>ax`>Xoq8H5nLq?WTyr*n zHA$Gkh!u#e1jZhHoS0}uHy6;n3^t^ID|$+0G|*aPJN#xkyL#3IbaDMl01P%gAcG@eX5A! zj8d}_AxKVqam~2&Q1@TQ2Zs&4IF$HUc&MxXN}{Xi0~QjvhlZF6C6APi-opf_hmQ0B z!4mF+FpFzbLZucVkz)22LVlchsMBtT^CuyMS|ASE?GGe<%Hd-I!ZNNptUDWJQNZV* z?`()Zvvmuwc5PU@8)7YM*zOpPheHw(IrY%vQ)+$sK*5)cr;j9~z_If2jBqzpAFKEs zRb&eyJfNU_!eJudnzM&#CWeFb@fr5VaE;~ILvE-IPDv!cvPdkn$gfH+o84x0^k!I} zFB{gi8UvgG(N}~ZHbgjzm^5Um-2n%I{)bW|$ADrMh(^qU)2x@CP6Z6b1E9+w zyw@FOgO%LtV-H5xoG?!0^o(Mm0YD_w>1fIlu16!0@Cli~T-1>mGcH%%uzVKz5X)@O z($jF&z7?maotOiJ`fTPl;ygWdlXZ^ z0+bQ(8tFFSONtyvxz!@ZKAb#0qSg)Qeyz*dQ}pztNHV}2N2J@;Nt2tNl~L&Fsfirt z6PEsXZ%qnqvHstUfyTf^OU4_9f@<`?b9m4$>HqQ3QFpKZyJ(M(?my9lgr3^V(U4G( z(-=-d#TI`I9{Q*I^wenRZoP*XM}hVcl!hwrN&WV9%0Tyfd~{F%LlOaMD#>c8eof?L zuW&*oYMCs9R?XILCgP}iUQK{=5&-(5j>3_Tjt}%t684kfkUXHKlL3P$(7z3BsT((B z9F2j7+35n=2{Zi-H1k_|syL2YMNf=GLgL5=4>fI8#X2U$5gtL{45p<~eG?B@IM9R> z)R37P7TDNYIB*_f*XRs)Pv@chbeQ5xON?E;UWKmdY@F=LY~&XmYEU+}`QJ^{ylZM$ zRrbdTrSn*gT7yfGcB;({&x;Lol^d<+kX3Ypa0uQyC+fLp>yrng%HU`J|T$X zSh$l;BLs;9EU_|?MvpAQk-pO&no%^HTD8tMM zN%n6XQp@`WW0;dBC zaklw77I$?fJfwqYi{vJ+1z8RtCl^I{oKf&ls5_NKC*}8|70i>HYVoS8W(iB>6uI&i zeL)`+CLsfmk3Y`IcF;X2_e$r!)Wj-2n3`o4Ek%gM3JT*MYW6-RnC9Q>-Yc5(vboV zfIE-|g)KcK34tZ@}_tGpjAZ{QEMy zuX7pII#y=c*CIzJj3yy`P*$tL*-$-Ab2hU~f7T53iY|~&K=Q(nrFM{IH!JMjX~z<| zxqYtF%@aIh+AIU%Wa;-DW75M-fggpOMV%ZLI~y@<*2rN|;ubBO>8Yuni`9XsbTH`@ zCuUrpbpLgH(0$h07s+2|>6a|7YKtXfjioP8Tf6dVM_pyTwWC(E%(~BNtJ`#($%)+o zon=EyP-fO43SvegdGhUdXZ?%2-sSoA)y3tl%@C!z*0~I|TlzoGjy9K>En!wtQ<=cr ztY3(IrW`}~lMKH&HlnBKs!+F`aV_;bQR?QelI zBor+Dv>&9nXL-kTb`sNqyIh<|UN7w1U=ooB&vh3Y)zmSDkD2IEmISD&(-D1%{d=89 zZkA=Q$jsj5Zx=ULmmhkUx0;*Rr?)>Z*qA~3xumVDnIse*jkxuvU{Qs_f}e#}GUfAF z+0Hia^5D`$t$;ESSpsO5{QrdU2qNizFk#XQW$cNZI(?I6D(gQ799%_oY7wBh;V8{- zV`&hAF4^%EM}(lR4_rQjTB`)uh}CDlmZ^+D%^?Jg)1MbB4W#K6!i0_H(V@L8t zNLPEqzAQ-BcXJq)_*9MDVny>jmV0&Rye!NdamkHta?PT9&l=oE&p)FI0`5@ z#z;6MN(4B-IpZg~IO`u@_i!@f)ob@oGg23bmLb$~Shms!VJxTTWL8^M9AP!1VMFqpgttGjBGy5>#9N)jlfc|JrZg?(=`UXpZ9) zQhvhJY_;xxFogx3hRG0~^)F0$v?Up+&nU_d(EC@*XW=|~ho!{+_y#^EghP;(g~u$o zh=%Mc(i{BTCp3HMdol!n>Qnf@g4xFEpld~0XwZc zHP?F726~=w5{=RfFo{MNqlnEP_a4Ac^fmp$X(CVHE$~p3BfXB%t=>b-L5O0SJ>N@5 zdDWrP@;0B1v>-CpV_ah(y9NHyidB z2^(jF3(~P1M84~~8flUHze<6GFc0s({W(kIJa5TVIkCt zb6?G|uja5@``T)b8K?!iT@SUW;)@X!HFtGx4++p<0h>!-RI7H-gUu$P&fZ#~^!H-& zo&GZmTFPmulIuh!gu)1diuCQG5N4T=Vs!&Ji}47X@8-QDfzHEf<*}PfHAZi0f4_R1 zBHl2P)=?%Djs5YKHDO=O^U8~PN>1;RG9F8<#j+IoddG_5R$nZlxZ-EJ&Og^@p#@o= zwzVi&U_dtJ&|UT&v~|c@cw$;k*jkk>OUz#lwl!>F)zq!bYAx`UFJl!|W}!{om)7h{ zYqr-G=YRPC`_5J_f!BTi_2{U4|GV?HeZ0^A?xK~XS}l6ZTxHWAWk`!ZOv3GkQ79yc zb#I)=G2`U3w(z;S5qq780}m2-glYaBp}sx2dV-iI)c637I&A&KSrQ8m{oYK2nmK3V z_hvk=8cBVJw9^FmKzA5{Y<`cLlnDK={zj1cVVIzP1!_YCJ#GzzKE)(l8EX;;*p91M zm}A47_V6hdV#Rr`I477uB-h|vI-BoNGhT$QeplRmLzh5o zg=r1PaT--sd`F^yM5B#0vUI7}8KiJmFW5*1e}XSll{9qr3t9L^=Fu#<6~9UqiLw-F z;H7GtRx~tdzMe}MwutN7Gl1zWgx6^NR#4n6+rEu3xaNy;WkhSv!fx$0Gjlt)8A^Cx z)MBhBy|3I<6ejfyGqF`GVV$-vp)zzm#{#6E8=AF9`T`@e%$iE8I9RemQZl{Hum z+lqc4-u8`={P$?THbehn?fLrud{3}e|0~~r?H(N-?Dc;aZCCoAIXHXG-?x3+w|#pJ S?f(M+0RR8FFiT|sdH?{v$wd4B diff --git a/charts/v1.2.0/blob-csi-driver/Chart.yaml b/charts/v1.2.0/blob-csi-driver/Chart.yaml deleted file mode 100755 index 7b6e49f93..000000000 --- a/charts/v1.2.0/blob-csi-driver/Chart.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -appVersion: v1.2.0 -description: Azure Blob Storage CSI driver -name: blob-csi-driver -version: v1.2.0 diff --git a/charts/v1.2.0/blob-csi-driver/templates/NOTES.txt b/charts/v1.2.0/blob-csi-driver/templates/NOTES.txt deleted file mode 100755 index 9ad135dd4..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/NOTES.txt +++ /dev/null @@ -1,5 +0,0 @@ -The Azure Blob Storage CSI driver is getting deployed to your cluster. - -To check Azure Blob Storage CSI driver pods status, please run: - - kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.2.0/blob-csi-driver/templates/_helpers.tpl b/charts/v1.2.0/blob-csi-driver/templates/_helpers.tpl deleted file mode 100755 index 5231cd26f..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/_helpers.tpl +++ /dev/null @@ -1,26 +0,0 @@ -{{/* vim: set filetype=mustache: */}} - -{{/* Expand the name of the chart.*/}} -{{- define "blob.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* labels for helm resources */}} -{{- define "blob.labels" -}} -labels: - app.kubernetes.io/instance: "{{ .Release.Name }}" - app.kubernetes.io/managed-by: "{{ .Release.Service }}" - app.kubernetes.io/name: "{{ template "blob.name" . }}" - app.kubernetes.io/version: "{{ .Chart.AppVersion }}" - helm.sh/chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}" -{{- end -}} - -{{/* pull secrets for containers */}} -{{- define "blob.pullSecrets" -}} -{{- if .Values.imagePullSecrets }} -imagePullSecrets: -{{- range .Values.imagePullSecrets }} - - name: {{ . }} -{{- end }} -{{- end }} -{{- end -}} \ No newline at end of file diff --git a/charts/v1.2.0/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.2.0/blob-csi-driver/templates/csi-blob-controller.yaml deleted file mode 100755 index 25dd949aa..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/csi-blob-controller.yaml +++ /dev/null @@ -1,180 +0,0 @@ -kind: Deployment -apiVersion: apps/v1 -metadata: - name: csi-blob-controller - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - replicas: {{ .Values.controller.replicas }} - selector: - matchLabels: - app: csi-blob-controller - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: csi-blob-controller - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.controller.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: true - serviceAccountName: csi-blob-controller-sa - nodeSelector: - kubernetes.io/os: linux - {{- if .Values.controller.runOnMaster}} - kubernetes.io/role: master - {{- end}} -{{- with .Values.controller.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Equal" - value: "true" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Equal" - value: "true" - effect: "NoSchedule" -{{- with .Values.controller.tolerations }} -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: csi-provisioner - image: {{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }} - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--timeout=60s" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} - - name: liveness-probe - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port=29632 - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} - - name: blob - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - args: - - "--v={{ .Values.controller.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" - ports: - - containerPort: 29632 - name: healthz - protocol: TCP - - containerPort: {{ .Values.controller.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /var/lib/waagent/ManagedIdentity-Settings - readOnly: true - name: msi - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} - - name: csi-resizer - image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" - args: - - "-csi-address=$(ADDRESS)" - - "-v=2" - - "-leader-election" - - '-handle-volume-inuse-error=false' - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} - volumes: - - name: socket-dir - emptyDir: {} - - name: azure-cred - hostPath: - path: /etc/kubernetes/ - type: Directory - - name: msi - hostPath: - path: /var/lib/waagent/ManagedIdentity-Settings - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.2.0/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.2.0/blob-csi-driver/templates/csi-blob-driver.yaml deleted file mode 100755 index 7b216feab..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/csi-blob-driver.yaml +++ /dev/null @@ -1,11 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: blob.csi.azure.com -spec: - attachRequired: false - podInfoOnMount: true - volumeLifecycleModes: - - Persistent - - Ephemeral diff --git a/charts/v1.2.0/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.2.0/blob-csi-driver/templates/csi-blob-node.yaml deleted file mode 100755 index b20b36461..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/csi-blob-node.yaml +++ /dev/null @@ -1,199 +0,0 @@ -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: csi-blob-node - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - selector: - matchLabels: - app: csi-blob-node - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: csi-blob-node - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: true - dnsPolicy: ClusterFirstWithHostNet - serviceAccountName: csi-blob-node-sa - nodeSelector: - kubernetes.io/os: linux -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - {{- if .Values.node.affinity }} -{{- toYaml .Values.node.affinity | nindent 8 }} - {{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} - tolerations: - - operator: "Exists" - {{- if .Values.node.tolerations }} -{{- toYaml .Values.node.tolerations | nindent 8 }} - {{- end }} - containers: - - name: liveness-probe - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.node.livenessProbe.healthPort }} - - --v=2 - resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} - - name: node-driver-registrar - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - lifecycle: - preStop: - exec: - command: ["/bin/sh", "-c", "rm -rf /registration/blob.csi.azure.com-reg.sock /csi/csi.sock"] - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.linux.kubelet }}/plugins/blob.csi.azure.com/csi.sock - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} - - name: blob - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - args: - - "--v={{ .Values.node.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" - - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" - - "--nodeid=$(KUBE_NODE_NAME)" - - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" - ports: - - containerPort: 29633 - name: healthz - protocol: TCP - - containerPort: {{ .Values.node.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: BLOBFUSE_PROXY_ENDPOINT - value: unix:///csi/blobfuse-proxy.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.linux.kubelet }}/ - mountPropagation: Bidirectional - name: mountpoint-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /var/lib/waagent/ManagedIdentity-Settings - readOnly: true - name: msi - - mountPath: /mnt - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} - volumes: - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins/blob.csi.azure.com - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir - - hostPath: - path: /etc/kubernetes/ - type: Directory - name: azure-cred - - hostPath: - path: /var/lib/waagent/ManagedIdentity-Settings - name: msi - - hostPath: - path: {{ .Values.node.blobfuseCachePath }} - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml deleted file mode 100755 index c453e1dcd..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml +++ /dev/null @@ -1,107 +0,0 @@ -{{- if .Values.rbac.create -}} -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: blob-external-provisioner-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: blob-csi-provisioner-binding -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: csi-blob-controller-sa - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: blob-external-provisioner-role - apiGroup: rbac.authorization.k8s.io - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: blob-external-resizer-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update", "patch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims/status"] - verbs: ["update", "patch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: blob-csi-resizer-role -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: csi-blob-controller-sa - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: blob-external-resizer-role - apiGroup: rbac.authorization.k8s.io - ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-blob-controller-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list", "create"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-blob-controller-secret-binding -subjects: - - kind: ServiceAccount - name: csi-blob-controller-sa - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-blob-controller-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml deleted file mode 100755 index aa24d7089..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml +++ /dev/null @@ -1,25 +0,0 @@ -{{- if .Values.rbac.create -}} ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-blob-node-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-blob-node-secret-binding -subjects: - - kind: ServiceAccount - name: csi-blob-node-sa - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-blob-node-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml deleted file mode 100755 index 33266b1c3..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-blob-controller-sa - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml deleted file mode 100755 index 4ca48c523..000000000 --- a/charts/v1.2.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-blob-node-sa - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.2.0/blob-csi-driver/values.yaml b/charts/v1.2.0/blob-csi-driver/values.yaml deleted file mode 100755 index 154d5c02a..000000000 --- a/charts/v1.2.0/blob-csi-driver/values.yaml +++ /dev/null @@ -1,121 +0,0 @@ -image: - blob: - repository: mcr.microsoft.com/k8s/csi/blob-csi - tag: v1.2.0 - pullPolicy: IfNotPresent - csiProvisioner: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-provisioner - tag: v2.1.0 - pullPolicy: IfNotPresent - livenessProbe: - repository: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe - tag: v2.3.0 - pullPolicy: IfNotPresent - nodeDriverRegistrar: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar - tag: v2.2.0 - pullPolicy: IfNotPresent - csiResizer: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer - tag: v1.1.0 - pullPolicy: IfNotPresent - -## Reference to one or more secrets to be used when pulling images -## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] -# - name: myRegistryKeySecretName - -serviceAccount: - create: true - -rbac: - create: true - -controller: - metricsPort: 29634 - replicas: 2 - runOnMaster: false - logLevel: 5 - resources: - csiProvisioner: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - csiResizer: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: [] - -node: - metricsPort: 29635 - logLevel: 5 - enableBlobfuseProxy: false - blobfuseCachePath: /mnt - resources: - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - nodeDriverRegistrar: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: "2" - memory: 2100Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: [] - livenessProbe: - healthPort: 29633 - -linux: - kubelet: /var/lib/kubelet - distro: debian - -cloud: AzurePublicCloud - -## Collection of annotations to add to all the pods -podAnnotations: {} -## Collection of labels to add to all the pods -podLabels: {} -## Leverage a PriorityClass to ensure your pods survive resource shortages -## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ -priorityClassName: system-cluster-critical -## Security context give the opportunity to run container as nonroot by setting a securityContext -## by example : -## securityContext: { runAsUser: 1001 } -securityContext: {} diff --git a/charts/v1.3.0/blob-csi-driver-v1.3.0.tgz b/charts/v1.3.0/blob-csi-driver-v1.3.0.tgz deleted file mode 100644 index 4749a12f797846d65473b8768bdf907e9c0c2ec9..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4251 zcmV;M5M=KkiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBjZ{xPIa6kK35N?6f=RB2PlWdQGe8?u=Ht22=#A)w6w#`4n^6 zn&W_ev$N9abUG(TNBXnV>6AY^-IM+|-J{M)_vEmGm8=^k~DkH0~k-I1`o#6n{J zO=oLd<-z?$3XaHczy)EUi)P&hj-uSpR=?G0_#iw^BB|@nKE)i+TgpagC>h5SKe)v(eJwe(jen&B-H;fW*?xM@_ z6_Ym{1cb7IkSE9uXEUNy0`PS(G9lUz@d$Vb5`@C32ymhdN{)tJt6NV4B{K*?h#SsE zuptR4j7Y&K5U|E1gv^HvEpWFmAwqJz%}gk0iTpY|g;yY{x7NDcf*_x^S`%&{6nLU` zJsRJBi*8{I96}F}WQc`;7)Jr)fCP9Pq)^o(K(PQHeVjt5p^qPU~Pi22Z-EdBuj_6#SSbkLpk+ zauHD+!p;yk6gI1z9an@1LOi0NjNfrA;D)ouc_we8r1~6tQ@Fu$>Y{d_HET)szB2DG z-FjY?05*HgYVYl^ZX^VG{(2-ril*Ism;$D9nlVqm(HH}kG1t!xABiE zJT(f$#t4TYlV(h655>N(KPW|V3MgW}Xhh6E%UbEVsDPn(1auXI_qsvaSqY6k9Ab3C z3FAc0&nXrf0E9xFA?GaSx;GLrpOG0XJ&d;6-J=Ax6LEk* zpJ3aKC{NFo-oM3MNC+H{#!9C-9w(A`m@4c;@M6^(Ddhu?5=|7PYTzu27?-i)C^ae` zhiG92%R^quS_s!((;%{3juZD3&1FSJ!ugVM{*Bt1!+bi3A7T8o~a6-fq|5zeL_w?i-AI2mE)Kr|+Qtg_^$sXaDO4Kq@1}&Pc-;Bpm zwY;7I=fnr}SsjH#51sV&R}u{4@t8cKrjr4K(AVD$ZHa+0W*kj{2AR=~?1Y*22AcV< zY%m-}r9%e^g~Xw!&Js4QV(k;)5Kq8&M)Ojyq45VS?P%Nys!J+{g=uUp?YMBUYjkFI z&laxyq??+TmYBBndKH=`qj9pDwC88-YEU}2`Tv`!dEeBqs?#6ElrDTVY7rK;(6R-H zGIvV0rewU}hqBKFJwI3dFuD`R;RIIpLkm}p8X?Ltko~Lk{QR}$a$jY+{#TXe>B1ki zVOU_b{_pmW-n=R5e|6I99`ye{$^!{~7hPz>E`U%r@&Q2{MWQ|HHUf~?#}X?QY2?Vl z9LY0np&3E58E%cICqzPz#(r57x6o%qLLWkjda9v_Ks!e>U#EhZNO_JY)8|IeQ)AE^ z%L8TcyyUh6(AVNHrKIZ?=jT)jN%n6XP|NerC`=Ikm`7OB zVMWln!+q8#=NHfetYXY}TMYBZlEze^%tEQkk3>#wOO(1^a_CcMOdj`YG?iJiYkE~| z`$Tz!mEJ|%xJ6{9PyERu$vpWV9F5>N7yjS%LO994$0rZYRuc}UYr zy^&+z=OD!Cci*2~T-*+Z!~bV#NCEr69Y|b!mKKr(z+!oN(h-)Y@F+QUOx(&zHRWmE z+pY?PvohsoP7}%s&lXPmb`ni&3FbYNr~4)sMXa03EaF(4(HWz003Vd3R%SL(wTb&a zjc#YfP_O6$>G&ki44Ic7Su}WIze*aG$j#~YZZA)8I%%of*~voAxrs>(`oeq^9MyGv zSZr+Auvx>0MUGpxaHgfEdcjtGQE6a&=uX7AJnjAKq~Ckd+84>+Wa(Edt}4qpV}qqH zP+Pn5Y8P2&y|r;tv&_29daK)XoY|?}=t=`)B`B$O2>pnWP@aDG{rT|nesFbhbA5Sr zXH!H;*loc>otFOR+R^5MbS2D+Ybpa+sP!x`)3ZvnVZBeKXAx(Td5pT~?)+vo=yk}o zVosW@iP;)EG-ZqljXB&+IfyBvz6n`oWh!O#6G*p=$uRVi3D9G+JyXUT!Sn(so)5ue zp)Xw2?-bf3qP}?CEk2Hb6Xx4HFW)%+=hxf8{rT6JwZHk!m{72^)3ItbdzNQR$C@xLn25!J4PAW^9z!u*%W(N)##K7Gnk^qP_LZjJOUS85UxEH^9r`2)?A6^#j1NF z4Qy9wwd1eqH;Y2qK+EoooaNfI7FdmHt#b>Oa$~Y~)ufrKIFvhE{jE6)zP9^*>#|1t z$2{5MN=RM)&r$EB6#waT-n==)fA&!v$0>w-gvr@yJ^W|_%iV^F5S@`JL z{ZOQO{@i4pz9U@7{~~hwv+1%h^Hzjn_1%&UgRqroq*jbuL`Jh9c#2v9JFC>1+YV|2 zy@)vpC&}#<5>75BAzM@r9>I(CHSL0BohR@Pcp%DNPshmC;4xB%^6d6Qxs~>Kssong zY5pe86_b~twT-!4Y=dqv%m|k;rcQS8A!CvpTk3hw=M-3EuGpqt?o7olW7V31y+x^4 z2M51!)$YPnWIi~K#{oYo>0}d={U2~-r9~E4Sdsp;_@5AHS1!zJyy3mwl15j zQRXbHG)wfwVkk382>++O}RxV^s}{B%FOKL6$Z=Irk0Dum+9)AYPh@=61K&(`2%V?p8B5$$l+tu&ePkjo}$!vG)ES_j?F*5 zm=`naZkskctlWYd_foPN==r%F(Re~aVHukZ`xkM4W}OS%u^L3a>828C;rqWzpx-F2 zU4{75o3TodKF;$!-@dfBE(8 z;Qs3RVsL+T_F=GLhJwbueQrYEx^eC@H^D-v73U!<;gFSJ*Y>qp2`Q*0vRx0gDB{Zz z6eV~4*&Y+1{*q}fy$!3{KzBBqggQ5Cfzt2#$T#}GnV3-yuarzDG9wfw;8(bB9|;|+ zY!s^*z*&SR*u3-XE%9|cQ45b6u0_fGQc%I*ZJzXHcK_g=Co}@!4d_s^$gu-@37j0tfeQW)r4)7 zp|L{!)nMB|7gkl>+Ec9=zVfo4qR1@OiH8)CLyE}jD$C=)e1tt`CzpWh-v4=g+%Mn% zebeb3;=lVSCCN~W-ZIy^^rieH`NIUK7Yds{z1%wuZo2uB^*bP9-Y(eKT~F`6@2es4yLB#*@YNE*$6k930x$mS2INr}*( z`W-RqiWAeCqW0XK4rnWY9%I}mVV>V@ICKicPA0A4I8LJ~if>8ilW?-NM3yeNI->;c z`UxBH=s)1eL?jKJ!$K6kky%A6Zbh$?MWQrC;=HNqrZp7}TCC@a30pSnyHkKkM*eG5 zerpKsj&4|(wo`L^*BOd=zo^F8jC)_XswfQV1!`iaTEaSPokC^k zdWi-|UddF$Q3)gcv1BkiV4D?VO1GO=#~O9(upWOrJ-zCK;JW9(ZIXcN-v8G*s^tG4 z^$&mlWiO@X{P*RQo5{rda%ycK$}B&I?bKL4FLn0{tTNYs3)OWfJ1EQbf09Ry4byJp z39P&S)$esn`oI6?&Cx;s@1s;a<9SV$-w8^o5mv>vrrn2kePbm5KGLr}p?|URa`}I` xC0Hx}-Ln6`cicbR|J+O2m;7f2&O!1IDc zVQyr3R8em|NM&qo0PH<~Z{s$y{ac@c@D{kfdn^BllWd=W{EO72a=NY!;-P40hrRDm_xV_;Z?RNZ zeAj(4t@7l)k%lAkD+ozA^U$p4;3&%d+1_t=odBdSNTf{P@t?5(^q%q&8Y(XE1klOw z3|ZlE7!JWhC6RJwC4{d%1Uv^B zt<^sf5)g4o6c=+3g}!Kq#1~xhv1vv z2sUIP#Sv*71qS-f3@{$RsZqEqm=LK1e#%N{Y>EE5BE?r=X>YB4xdKW4eA1o>i=iMB zjr-xed4sNC3<8)BNO8m&ATChI1t1B&03~(z2v95`K%b|;3^u|h$jGnMCG*v2+ zUMI&}oA6G+ec4f1-pY>8*_cdX0dB+t*XK-O!a#I1KGz^~BSB_ZLAsRlj$`^SV@ijX z8xQ^VyYmLQ$R2p%JlVzh&oH+j=Qsq%ksxNohhyL8F;jY7eF0d3hm?o`y+QxfQ_;V_ zMF}jz7FeRsgi<|cJ0w73F3_CEZ8QX>mt%~n1VqNV6Me?abjA|&-vaT^tgY#BrUa)H zgr|4dwOYIAbR|Y_kY*O~F&ZW;B>X08p3>*SEPo=sIdn$+HbCTv5%$ZAqR}tB2*=6s zzj#tH4~>NKI5;u8n{9!Iuy$Bn^Uzw1pdMOA*ar`3*>UAuDhM5frd+CXP@lQDU2L10 z5{V=zr6thkF%9(m0wVE5+6$snZIIo!9HQB^mZHh(3tq-Bg}w$=)eq+JQhAki?hla zYvLhMGW`o7KZ-rn>vqFMPY9v04E=8R6G?gn{1Jn!7`HrZFCA4e&Bu`MJ&}BN=+#i& ztD?I1M5<*|yS)X+<1t}G%{_GgkSOvHDENwtq)TxM0&8bKLF=Mhn0u&Yv|Mls?V@cB zjkvWEiagSzHMZ8^jz}fb2QVIkuRPQ`=RpbQYMlEBewkjwM_QemBq5dz5saV1EjiSWP|D3C)RKQuS9>wOW_wtJ3$@ zUTb;u)2MEwbCnXlmhd=Zz$zBzxfPrb!+!`KN2%{+1;?@eqE|R?+rA`iBlz0Ma~w)o ze5XOQWK&Qc>ddg{P%`QyJr2^xo)X+c0gMP{j$INa=dE1?90cYErASQyMLdvB#Dn7u%BQ0Mfx)u}t6sqf0@!AZmU> zu`~#P$yg*Flpc*_EM{Z|3td8T%7t3j<@7o8AyS#wX{OQ9o@bPhb|V20n&?W$iSqnd zGi1$)>(f}9S=Sdt5g$`ceF%Q6p^dWvcM453r+VT%invg*mO4Ev5i_*#bP?9x2oszu zG@38G7_2>QgYLv)(-cN?1a~-$C?HS&T>|mYy~cekf05eZ=ykh2^x!N5J?uh0Uu`SL ze-wlf#R_ES{Nj2rY^yu*;O_5T6u_7;KrQ1?YPc41vqw0l3bk#P(WqwoSDSIrkQXx$f&_rRASGhvqr<-W zm4w51JSKOjYi&S1ROs`8@PCI753ZThs z+^i=Z`Nc$-w9Re(cMG*{S_aqh@<%bHi&(ARgoVFZw*gTWPR;g|j2H4yj=7?Thvhh| z86+^9z{+uG5vtWQL^%Pf{?&bWcx}DhR;#!F6=Bv5(}Jt*e{a9vFXjLDy6@f{?Ck$G z+AU#$hfa-S7XnjGz90Zck?hQRP6!GISm7*Mp!FzGxSV(}Yey2OBq~l{cn zu9zo0FKbxwaSmICp%7JEY<$s4;L<}TqE{zqc~#0XNjX6(;uD;Lhiv@6ENjUI)opp6 z-NY2EyUi6bvfNTFJw;#8A2C;e8aT?uU^7~U!0aP<%$%QWFWg-Ep6}C9rGrz;0?}kCccZ4-9Np=G?An!dc-NLZ+0-L!G2J zp)I+8TVC$VTv0;PQf37V#TA`#8i(-7WbMoRg}OJ%%B00IS+m@0zCgJF$qPf4yg?Nv zzi{X!fF*Wwhe2;I&v3eEX*R*lDp+z0liUvq>ru!*G|6ER*otARK@N)&SGRE%(r~>H ztG-+Uu&EI@;zAu&+u|aNSt_Ntz0Gn`#IuQ*tPlj<>ZND{F)47{C?%#0V-49bK2U>5 z7?|}Wq2;=>x?M|hqa`e!|=aU$X#aZdK2;>r5~`1&ZfG@Hq>lhx*+DOky_|k9)<(5eUMA>cRD= z@c;dCHMlvs8k`Q!ug{J@-h4RwIH)?4KL{R{=W3j$F`0bA(a$iyg7Gpyx-Cg%hJe5w z6ABe@rlLfzUd1zRa;=yy%FUK1k~bXHK1IyPo!9BqpHPWs4S!^!r!@<;OnPLfuzzc^ z;;pjm6&G`G{_EM*#rdbf`L$Wi%j4^xYP=j!el7*wF^eQM9YeVNZ^_vbhXtnX(_{Jj3>ZU=aUWFp6Sz&sJT0|S+BDG3&6nzqw@*@S{RPf z{GKcgQqmPJfnE_QX~zel9>Hy;1XM9=E{$zl=Yd*d2)Mx8Wi^M~jc&`rQzj7Il8%pE zC1R;M=4#=qk|aESVK(rzw5~KdSmm;5+iLx+tafmXi(m@5uFtjZeXsJi*l-8@n>)oU zpx{~~;Sv^0a6t$zj!a3?-(L5om#)>AJ1mTJTD5zunc*s?m52UkYBa~!;OYUP_~YvliuE9~a41UA)w?e`DL`M+Mbzsvt^ zqq(kINcl-yv(>)+(H0i;9Gf9L8J^kd?bXS^Vz^_Gxx-3fe|iOf#6&=l6|YA;IAdde z!OXe3aK%biBdKU^SClgwy&ua$f%6A@Da6!SEjKQD#6h83)7Nypgdg@Zyx8QWg zAeur50@MEl3$lj(GakT`UI=c;{~z|cy;A+xyMz9&{%b2O$^T;rIUB+T>3<^~FP!*) zbSl5Z)QctYOLQuIp1(r+zH(x(o?*{j+yf?4^M7J%l0Oh3)jx@v{$z(N9L>k1+V%c! znq*(fHd|rYJoBAZMWm!Pvg4&*`;wAAXisB7*d%!qj`TQO0tFvDRS2tIKf7}c& zPJX_*Jih*E8AEa9X?m|Hg-rwu6_3jH3+}QLHETW(L#$n~-&&m!VI4Vby+tk8*Z&tG za>W>R^89vcFI{?CMlg%<(AMuS7GKSVSFK((t{nR|@Re)|dU)tWG@cM9>!(=7#EZmd zv%v*fS&bqOx~YCvXu-Eqs$tF8a}{Z%ueWQfdNIoE$%KEE4CP0IlWiEZ?aT&l2w&$0=@f+}L9 z{bv@nlv7hBACJrkg$V>p(zlIbm{nd>rH3MTgeTa3%kw=6OfJ?aPbCXxj5%-rdNnyk zx*=1QqilE_`_pIEgk3?;S6JAYtV*Ll>Ecs7@r(5o7vjXcKaqo}H6)v} zxDf|6cI3$mb(4LfaTB&`?{upf+o;H8g%xa|wt-1pws>nVwUPU!Z;BN~uhul~s%&;u zHoNvswfg+O7-8RimX825)c+jzdZqmTUhi=C{{MDb$#m#VZ`=1U%||(s;vbt*z2X!K z1p)>d$7;$2`O_Suxw@g1RRd;Z8nA{t1%hFke=pX23UvKS0TEN{g1P#xYs!J7hkk1% zQSY3u_ggDk6#OKvTLLr#F){!XP_4J9MTs;&&1a+ZFLqt@Z-I71z>M2~pieOg*QOdr z0j{Q1tktTboIv;#OS$Ge*PIi~fT;~uE}6|+)QalJHBZZzMEfbvI-w^a^f?y+VR;p( zqG4)bo@LP-*L9s`?R-yIK-lCZl(h8Tx;siptzXO&kNyq5O0?9nJ}i`5IGJ<#n6DqK zQ*xxONfH}dHffvNC$tcQ73*BLSubizlUGWJZy#uwoll$i+Y&Oua`WRc1d^xT`HWQKjy=H#T zAb^jXW_kpE{X(|E_N^yr_xHOvz&G92z5hSuC4i>yzxEEh<@bN~`-i*x|2A5~{ePWRB5tS-sl><-DiDqEdPP(*IwbTyFFh2AMXh^>VJQ~r2l&d n`#b+{EA7?vKXYAnn!jtiwrjig3hn;`00960fz-aN0D=Gj<>I!5 diff --git a/charts/v1.4.0/blob-csi-driver/Chart.yaml b/charts/v1.4.0/blob-csi-driver/Chart.yaml deleted file mode 100755 index 1202d4e92..000000000 --- a/charts/v1.4.0/blob-csi-driver/Chart.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -appVersion: v1.4.0 -description: Azure Blob Storage CSI driver -name: blob-csi-driver -version: v1.4.0 diff --git a/charts/v1.4.0/blob-csi-driver/templates/NOTES.txt b/charts/v1.4.0/blob-csi-driver/templates/NOTES.txt deleted file mode 100755 index 9ad135dd4..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/NOTES.txt +++ /dev/null @@ -1,5 +0,0 @@ -The Azure Blob Storage CSI driver is getting deployed to your cluster. - -To check Azure Blob Storage CSI driver pods status, please run: - - kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.4.0/blob-csi-driver/templates/_helpers.tpl b/charts/v1.4.0/blob-csi-driver/templates/_helpers.tpl deleted file mode 100755 index 5231cd26f..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/_helpers.tpl +++ /dev/null @@ -1,26 +0,0 @@ -{{/* vim: set filetype=mustache: */}} - -{{/* Expand the name of the chart.*/}} -{{- define "blob.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* labels for helm resources */}} -{{- define "blob.labels" -}} -labels: - app.kubernetes.io/instance: "{{ .Release.Name }}" - app.kubernetes.io/managed-by: "{{ .Release.Service }}" - app.kubernetes.io/name: "{{ template "blob.name" . }}" - app.kubernetes.io/version: "{{ .Chart.AppVersion }}" - helm.sh/chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}" -{{- end -}} - -{{/* pull secrets for containers */}} -{{- define "blob.pullSecrets" -}} -{{- if .Values.imagePullSecrets }} -imagePullSecrets: -{{- range .Values.imagePullSecrets }} - - name: {{ . }} -{{- end }} -{{- end }} -{{- end -}} \ No newline at end of file diff --git a/charts/v1.4.0/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.4.0/blob-csi-driver/templates/csi-blob-controller.yaml deleted file mode 100755 index f01ccf9eb..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/csi-blob-controller.yaml +++ /dev/null @@ -1,175 +0,0 @@ -kind: Deployment -apiVersion: apps/v1 -metadata: - name: {{ .Values.controller.name }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - replicas: {{ .Values.controller.replicas }} - selector: - matchLabels: - app: {{ .Values.controller.name }} - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: {{ .Values.controller.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.controller.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: {{ .Values.controller.hostNetwork }} - serviceAccountName: {{ .Values.serviceAccount.controller }} - nodeSelector: - kubernetes.io/os: linux - {{- if .Values.controller.runOnMaster}} - kubernetes.io/role: master - {{- end}} -{{- with .Values.controller.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.controller.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: csi-provisioner - image: {{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }} - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--timeout=60s" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} - - name: liveness-probe - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.controller.livenessProbe.healthPort }} - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} - - name: blob - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - args: - - "--v={{ .Values.controller.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" - ports: - - containerPort: {{ .Values.controller.livenessProbe.healthPort }} - name: healthz - protocol: TCP - - containerPort: {{ .Values.controller.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /var/lib/waagent/ManagedIdentity-Settings - readOnly: true - name: msi - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} - - name: csi-resizer - image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" - args: - - "-csi-address=$(ADDRESS)" - - "-v=2" - - "-leader-election" - - '-handle-volume-inuse-error=false' - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} - volumes: - - name: socket-dir - emptyDir: {} - - name: azure-cred - hostPath: - path: /etc/kubernetes/ - type: Directory - - name: msi - hostPath: - path: /var/lib/waagent/ManagedIdentity-Settings - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.4.0/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.4.0/blob-csi-driver/templates/csi-blob-driver.yaml deleted file mode 100755 index a742b506a..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/csi-blob-driver.yaml +++ /dev/null @@ -1,14 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: {{ .Values.driver.name }} -spec: - attachRequired: false - podInfoOnMount: true - {{- if .Values.feature.enableFSGroupPolicy}} - fsGroupPolicy: File - {{- end}} - volumeLifecycleModes: - - Persistent - - Ephemeral diff --git a/charts/v1.4.0/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.4.0/blob-csi-driver/templates/csi-blob-node.yaml deleted file mode 100755 index f95a1fcda..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/csi-blob-node.yaml +++ /dev/null @@ -1,198 +0,0 @@ -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.node.name }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - selector: - matchLabels: - app: {{ .Values.node.name }} - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: {{ .Values.node.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: true - dnsPolicy: ClusterFirstWithHostNet - serviceAccountName: {{ .Values.serviceAccount.node }} - nodeSelector: - kubernetes.io/os: linux -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - {{- if .Values.node.affinity }} -{{- toYaml .Values.node.affinity | nindent 8 }} - {{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.node.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: liveness-probe - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.node.livenessProbe.healthPort }} - - --v=2 - resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} - - name: node-driver-registrar - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - lifecycle: - preStop: - exec: - command: ["/bin/sh", "-c", "rm -rf /registration/{{ .Values.driver.name }}-reg.sock /csi/csi.sock"] - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} - - name: blob - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - args: - - "--v={{ .Values.node.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" - - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" - - "--nodeid=$(KUBE_NODE_NAME)" - - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" - ports: - - containerPort: {{ .Values.node.livenessProbe.healthPort }} - name: healthz - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: BLOBFUSE_PROXY_ENDPOINT - value: unix:///csi/blobfuse-proxy.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.linux.kubelet }}/ - mountPropagation: Bidirectional - name: mountpoint-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /var/lib/waagent/ManagedIdentity-Settings - readOnly: true - name: msi - - mountPath: /mnt - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} - volumes: - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir - - hostPath: - path: /etc/kubernetes/ - type: Directory - name: azure-cred - - hostPath: - path: /var/lib/waagent/ManagedIdentity-Settings - name: msi - - hostPath: - path: {{ .Values.node.blobfuseCachePath }} - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml deleted file mode 100755 index 575437fb8..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml +++ /dev/null @@ -1,107 +0,0 @@ -{{- if .Values.rbac.create -}} -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-provisioner-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-provisioner-binding -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-provisioner-role - apiGroup: rbac.authorization.k8s.io - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-resizer-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update", "patch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims/status"] - verbs: ["update", "patch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-resizer-role -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-resizer-role - apiGroup: rbac.authorization.k8s.io - ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list", "create"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-binding -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-controller-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml deleted file mode 100755 index b4a30373c..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml +++ /dev/null @@ -1,25 +0,0 @@ -{{- if .Values.rbac.create -}} ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-binding -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-node-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml deleted file mode 100755 index 93c5c0149..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml deleted file mode 100755 index ef4c7d754..000000000 --- a/charts/v1.4.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.4.0/blob-csi-driver/values.yaml b/charts/v1.4.0/blob-csi-driver/values.yaml deleted file mode 100755 index d34fdb367..000000000 --- a/charts/v1.4.0/blob-csi-driver/values.yaml +++ /dev/null @@ -1,148 +0,0 @@ -image: - blob: - repository: mcr.microsoft.com/k8s/csi/blob-csi - tag: v1.4.0 - pullPolicy: IfNotPresent - csiProvisioner: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-provisioner - tag: v2.1.0 - pullPolicy: IfNotPresent - livenessProbe: - repository: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe - tag: v2.3.0 - pullPolicy: IfNotPresent - nodeDriverRegistrar: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar - tag: v2.2.0 - pullPolicy: IfNotPresent - csiResizer: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer - tag: v1.1.0 - pullPolicy: IfNotPresent - -## Reference to one or more secrets to be used when pulling images -## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] -# - name: myRegistryKeySecretName - -serviceAccount: - create: true # When true, service accounts will be created for you. Set to false if you want to use your own. - controller: csi-blob-controller-sa # Name of Service Account to be created or used - node: csi-blob-node-sa # Name of Service Account to be created or used - -rbac: - create: true - name: blob - -controller: - name: csi-blob-controller - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting - metricsPort: 29634 - livenessProbe: - healthPort: 29632 - replicas: 2 - runOnMaster: false - logLevel: 5 - resources: - csiProvisioner: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - csiResizer: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Exists" - effect: "NoSchedule" - -node: - name: csi-blob-node - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - metricsPort: 29635 - livenessProbe: - healthPort: 29633 - logLevel: 5 - enableBlobfuseProxy: false - blobfuseCachePath: /mnt - resources: - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - nodeDriverRegistrar: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: "2" - memory: 2100Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - operator: "Exists" - livenessProbe: - healthPort: 29633 - -feature: - enableFSGroupPolicy: false - -driver: - name: blob.csi.azure.com - -linux: - kubelet: /var/lib/kubelet - distro: debian - -cloud: AzurePublicCloud - -## Collection of annotations to add to all the pods -podAnnotations: {} -## Collection of labels to add to all the pods -podLabels: {} -## Leverage a PriorityClass to ensure your pods survive resource shortages -## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ -priorityClassName: system-cluster-critical -## Security context give the opportunity to run container as nonroot by setting a securityContext -## by example : -## securityContext: { runAsUser: 1001 } -securityContext: {} diff --git a/charts/v1.4.1/blob-csi-driver-v1.4.1.tgz b/charts/v1.4.1/blob-csi-driver-v1.4.1.tgz deleted file mode 100644 index 4f488cd26802e4a8423edf9b71b5ce315bc7523a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4502 zcmV;H5ozupiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH>ebK5qu{h5CSM(ND;-3#^QkMwcIKRC8>^)#_PmfL&xIvo#0 zt|Xj6fCWIss^kCt4FFR75Gl&CEhjx8Gm%6tb{D|zVzIlVN0g6TUlKPEWCo&hGQ~o* z=QyO_JzMK`yWPY6ee>DvcFUjL-r?SNz5U)n|FGBZ9qfJA)j#&XL*3_Np}xgZVewt} z$+XIY`$ig$$gdzI;mkv`o`a((_p`mQPM`)SZ!d=0HNG0%7WWOg8=3OQXFvxhzk^Q0Z4)`KuLXh1SpmepwCla1{+}$WaL+B6avN`nkp4Z zuao1gO?W5ZzU(M0Z)L~lY)mGx05{@+>vN_sVIVphpKFl0ksvdyAf3v2$1&G0V@ijX z8xQ^VyYmLQ$ZmMyJXyv0&oH+j=Qsq%ksxNohhyL8F;jY8eF0d3hm?o`y+QxfL($*g zq68LU3oOxRLa83J?Gm6d7iiAoHX4G`(=oC=yNcc_WJf+Wtnf^q2bLfotZGgxTBkY$aMWbJM5ss7N ze{rW`92yDbad2W*H(LS^VePQE=BBk6K|QpLun!*6vg69RR1i7{O}SL(pgwbPyI3|g zB@#(cN=u;6V;bo31w`Tzg+Q-K#u^GZNW{280Ytz8#2NZDJWIPf2!)^o@#Q5K%0vDC zIo#W?Hc?Z+R82FmzGJkM5+6$snO`xxV4tv5dby2!XiR+a5oSO=bYMD29t$6&#aU&I zHSv%rnf^k^k75t?y4`SbC4|sehP`h06G^TL_#*~c(Qmn1KkZd9%*T-LJ&}C2>D5r} zS5fUhk!so0Zg0ZzcuW{ka}V7=B#Jx)3clhZxuiG+fwi-rpmotL%stdHS}r(+cG0$m zM%-EnMIPzi8e3~{N2HSJ4H%EXR~~Ae^PxY5Ag0h-3xA?X5ycEPqv9BQwQN50rf z|0oC}iWSJt`Nj2M*j9Jy$uyeczk7%MQvB!O@ZjAp{1InKh~kt60885d|zkn-I@QHW^=0}l11jaGTBX!TEapu^+FF1E#$hNvGS)oTU2QE`hPP88i9~)6+JN&+@Sxx{k?8U z{|^uL4|e*$jdp+E`8%4C(9@m(8WRd?9>Gzlr^TOwhyLDqcyJs8Hn@v03yg=sl1PvK z?wgdMfxEwVQ2=AY0JV%mso`44&2HhCD%7@FMx&bTUv0)gLte~42oeDLf|Q7vj}G_D zR}v26@tEA9mYX317MSmrx5Nn?bAhHn!|d>bsu{EJ7MuO9{ahSHrQ;`IQemb~cdaU` zQrRcO3{N0%NApszG%i-x(R$*#OR9#2X>8YaT%_0xIXk<@i&S3HP0vePPCI733ZTho z-0Vu)^NWcvX`9>n?-pv^v<$B0>5pPc7qMEs2n&C+ZULe!oSLmE8876a9CJkv56f{_ z(@9`9ftCHxB2=qKh;jl{{ndSVcx}DhR;#!F6=Bv5(}Jt*e{X+puay7qci+A1?(F|I z+AU#$hfa-S7XnjGz90Zck?hQRP6!GISm7*Mp!FzGxSV(}Yey2OBq~3aJqNY{DPXlB*@@dE{PkS|)rCF=q2Xw32Mam;w>RlwhG_UqTAy-tr);W-@ zUolU3Ue>VU?HslYLm{fTSooroz@>*wM6XWJ@~V_&l5&Dn#3wif583#CS=N#Ts$23r zyNM}ScbO|DS=&^2X<2R1rCTm~jFVt6)tV~)glQqk|<_nY?ki0Nt$s1H* z@(Y_@0$5@6{+nB;s=n2$pKp-B#lz*Y=f4RTnNxVnY2kcR7p zSnbIr0Gk?dBQDfYwJk2Pn59yR%iAm`MLe5`$qGTxtzL>Y5R(G8jZ$LDFxHR_;{!E_ zgn?O45?Zc1t6Q}sH(J7yS`rpSoG^9t{SPO@vzx*B>E*@Q`E`}iN)ogSdF!^#Kd+i> zE}dIV*&d+utmPTES5p_S%Ep=uvrQ1W_5|&gk>uE@%s)R4a~4@$6MgEj=V@rQT3WTm zzGoAXPtiKGFpn1E&(gg}aK(L2J#>9?xd|J^^{k|vfUHTmGQV!y7!w)`xSk4-Q%(b$ z*3a5hspub|yfP)L@ih}*##VJtyUqmDQ=oW01fR1&dT6g(fJyA;;&!iiI|4y?P~EwH z7yiFrt_C+JSA)~R`SscH$D0pl9|u)?@(01g@>q@2G$xZzIQkjpS1?`%NS7t4%n%T` zV?v<<&Qz4>*{it6O|BKwMY-AXK=Ov8+NX#ax$`=m`W-6qtl^JL^t5K7mPwBc74~mU zR=ib~z2amJ&VN0-x;XzdIKMWtd3k*OQ;nAc%Fm^sJ7$ukreg@V|1CLN;;`VfqP6zA zMeJ^Co=~}SX`q#eG7(vUC@p39jPV4R>U^?c+cUiz5;b>+HtSW^e*rkSV02y~KnufB z8sC$pK}x#9CD1b>CGGei)FZg9lz=K`&7rYv>pW0v3;`E-yR7DryU}e~c*+E#Thj5d zt3)hS#~dwuRg#3qPs|3Mme!R<2di8*ZCkCMmDLWeaS%))*Y&y9J?~YX78}lhe{-jp z1r%IsBwWH`2`&i1#gQpV`rGTC^wPQd+THhz)f&;Vj8;S*D*1yjQu9-imZBAVRGQH# zmv%5kkD=K(t9b+-Iwit{edbHlidJ(anMa%MjVy4rNoyScvVE&CC>vPWXJe<{nl>V9 zFs)5N*-~v-J_1@U8e3L}a_7oucaDSCPOW?sZH@e2a)jOdk-(<
    D)a{jOT?r@j? z+eUL;w~+Fawq~n+`=c!^=s7k+crrY*)!VC+fyHpgB6Ek8!v6FM{)mZyAS+&vcyPwX z{DPT%b>WJYtVUAN+^#5RHhMpng#zaf_E4B*BGNtaBN>A~_bGhh0W3-I|ZU+)h3yZW!Kv?TwJA>?cb8>Ih@bi8ol z|Iw-Z5>qdh#4pjQ^m+aY>HEroy?TZ{cW@7wOwIp^tx5hsgjD||YWkDyvT!sXlWN!N zyJ?brDcfv?W%JB;Ruz$w*2s>RuG)u`^hSFc3&JMJlW>Gh&L)g6E)VX&kIh>>3eJ9> z!D|qqEC*s;tAK;MNPv{tLrY~S6NJ@gzKXl~NBGXUI%AbE_FWWJ*e!(_5h}*i&7MWd zq$Ve)X5RBfCKXCpglSepd*L~25ex@gt3p_v{C(kU=fo6Fs&VDmw}G!@QP9IfC!+C$Fj+suDkfee zKAUwe$jWLIdC*PuvqB5Ll~N6B#-6K4BYnJGTh+UHzUTXo7w`yYP(<^AC1{Ni+QbAJ43uwjjfq5YcGC5C~Qs4J;Q{0tQ( zkJ>Fat0mc0bnGfRmQdB0oo1{>>r+plXjImp?J)rw)J${fEsx6prnB9@^oieSmwAU( z9_T-_sHL2mD*1S1Mkq`mSdzYN6vM3YqAEQU!6Q7u_FbOuNnmoZMtLe(Fn!E^``4?< zDbfv@s_bRMrVj|HTOV?z6lEprQWfu-7Z)|NFhe-Shw3X(iL47rkwt!!$4DNQ!@KO7)6U zC=>`7XdJ647vxW~jppixR#pv|o@u}u?i2`yY5uub^D5BwD+NSMtqbPrv#u!zk{?Gsvv!HRjVTdWr~rO6{DU!xga!vs9D6@3zgj(uHWnb3x#sJ5F= zGniYqK3bl)ZF@Eo=)Zu`DGdA(2IpDrjb4G;)ye%i37ZWxtUkt;ByWyukj+FSf3F$e zGYH`0hM8`GU%!xTuzc%D+Wq}54)9I4bYv(93Nhue5RGhxN=`M!r6ME1SjA679B$Z@bmo|3uW1zeo0zNO05hpL_eI_y70z z-tC_M+)i6c9Ti>DY$qs{5LKG2l_$CeZ}(Xr9Lv9;`n6~H>u!(N|HpfRjrza0U()~n o!T!$w+e&*i{m)#No#yY_uI<{cy+Zr{00030|3t6bf&hX50F#K?ApigX diff --git a/charts/v1.4.1/blob-csi-driver/Chart.yaml b/charts/v1.4.1/blob-csi-driver/Chart.yaml deleted file mode 100755 index 71b770425..000000000 --- a/charts/v1.4.1/blob-csi-driver/Chart.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -appVersion: v1.4.1 -description: Azure Blob Storage CSI driver -name: blob-csi-driver -version: v1.4.1 diff --git a/charts/v1.4.1/blob-csi-driver/templates/NOTES.txt b/charts/v1.4.1/blob-csi-driver/templates/NOTES.txt deleted file mode 100755 index 9ad135dd4..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/NOTES.txt +++ /dev/null @@ -1,5 +0,0 @@ -The Azure Blob Storage CSI driver is getting deployed to your cluster. - -To check Azure Blob Storage CSI driver pods status, please run: - - kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.4.1/blob-csi-driver/templates/_helpers.tpl b/charts/v1.4.1/blob-csi-driver/templates/_helpers.tpl deleted file mode 100755 index 5231cd26f..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/_helpers.tpl +++ /dev/null @@ -1,26 +0,0 @@ -{{/* vim: set filetype=mustache: */}} - -{{/* Expand the name of the chart.*/}} -{{- define "blob.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* labels for helm resources */}} -{{- define "blob.labels" -}} -labels: - app.kubernetes.io/instance: "{{ .Release.Name }}" - app.kubernetes.io/managed-by: "{{ .Release.Service }}" - app.kubernetes.io/name: "{{ template "blob.name" . }}" - app.kubernetes.io/version: "{{ .Chart.AppVersion }}" - helm.sh/chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}" -{{- end -}} - -{{/* pull secrets for containers */}} -{{- define "blob.pullSecrets" -}} -{{- if .Values.imagePullSecrets }} -imagePullSecrets: -{{- range .Values.imagePullSecrets }} - - name: {{ . }} -{{- end }} -{{- end }} -{{- end -}} \ No newline at end of file diff --git a/charts/v1.4.1/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.4.1/blob-csi-driver/templates/csi-blob-controller.yaml deleted file mode 100755 index f01ccf9eb..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/csi-blob-controller.yaml +++ /dev/null @@ -1,175 +0,0 @@ -kind: Deployment -apiVersion: apps/v1 -metadata: - name: {{ .Values.controller.name }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - replicas: {{ .Values.controller.replicas }} - selector: - matchLabels: - app: {{ .Values.controller.name }} - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: {{ .Values.controller.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.controller.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: {{ .Values.controller.hostNetwork }} - serviceAccountName: {{ .Values.serviceAccount.controller }} - nodeSelector: - kubernetes.io/os: linux - {{- if .Values.controller.runOnMaster}} - kubernetes.io/role: master - {{- end}} -{{- with .Values.controller.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.controller.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: csi-provisioner - image: {{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }} - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--timeout=60s" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} - - name: liveness-probe - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.controller.livenessProbe.healthPort }} - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} - - name: blob - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - args: - - "--v={{ .Values.controller.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" - ports: - - containerPort: {{ .Values.controller.livenessProbe.healthPort }} - name: healthz - protocol: TCP - - containerPort: {{ .Values.controller.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /var/lib/waagent/ManagedIdentity-Settings - readOnly: true - name: msi - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} - - name: csi-resizer - image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" - args: - - "-csi-address=$(ADDRESS)" - - "-v=2" - - "-leader-election" - - '-handle-volume-inuse-error=false' - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} - volumes: - - name: socket-dir - emptyDir: {} - - name: azure-cred - hostPath: - path: /etc/kubernetes/ - type: Directory - - name: msi - hostPath: - path: /var/lib/waagent/ManagedIdentity-Settings - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.4.1/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.4.1/blob-csi-driver/templates/csi-blob-driver.yaml deleted file mode 100755 index a742b506a..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/csi-blob-driver.yaml +++ /dev/null @@ -1,14 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: {{ .Values.driver.name }} -spec: - attachRequired: false - podInfoOnMount: true - {{- if .Values.feature.enableFSGroupPolicy}} - fsGroupPolicy: File - {{- end}} - volumeLifecycleModes: - - Persistent - - Ephemeral diff --git a/charts/v1.4.1/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.4.1/blob-csi-driver/templates/csi-blob-node.yaml deleted file mode 100755 index f95a1fcda..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/csi-blob-node.yaml +++ /dev/null @@ -1,198 +0,0 @@ -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.node.name }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - selector: - matchLabels: - app: {{ .Values.node.name }} - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: {{ .Values.node.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: true - dnsPolicy: ClusterFirstWithHostNet - serviceAccountName: {{ .Values.serviceAccount.node }} - nodeSelector: - kubernetes.io/os: linux -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - {{- if .Values.node.affinity }} -{{- toYaml .Values.node.affinity | nindent 8 }} - {{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.node.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: liveness-probe - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.node.livenessProbe.healthPort }} - - --v=2 - resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} - - name: node-driver-registrar - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - lifecycle: - preStop: - exec: - command: ["/bin/sh", "-c", "rm -rf /registration/{{ .Values.driver.name }}-reg.sock /csi/csi.sock"] - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} - - name: blob - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - args: - - "--v={{ .Values.node.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" - - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" - - "--nodeid=$(KUBE_NODE_NAME)" - - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" - ports: - - containerPort: {{ .Values.node.livenessProbe.healthPort }} - name: healthz - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: BLOBFUSE_PROXY_ENDPOINT - value: unix:///csi/blobfuse-proxy.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.linux.kubelet }}/ - mountPropagation: Bidirectional - name: mountpoint-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /var/lib/waagent/ManagedIdentity-Settings - readOnly: true - name: msi - - mountPath: /mnt - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} - volumes: - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir - - hostPath: - path: /etc/kubernetes/ - type: Directory - name: azure-cred - - hostPath: - path: /var/lib/waagent/ManagedIdentity-Settings - name: msi - - hostPath: - path: {{ .Values.node.blobfuseCachePath }} - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-controller.yaml deleted file mode 100755 index 575437fb8..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-controller.yaml +++ /dev/null @@ -1,107 +0,0 @@ -{{- if .Values.rbac.create -}} -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-provisioner-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-provisioner-binding -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-provisioner-role - apiGroup: rbac.authorization.k8s.io - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-resizer-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update", "patch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims/status"] - verbs: ["update", "patch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-resizer-role -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-resizer-role - apiGroup: rbac.authorization.k8s.io - ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list", "create"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-binding -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-controller-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-node.yaml deleted file mode 100755 index b4a30373c..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/rbac-csi-blob-node.yaml +++ /dev/null @@ -1,25 +0,0 @@ -{{- if .Values.rbac.create -}} ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-binding -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-node-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml deleted file mode 100755 index 93c5c0149..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml deleted file mode 100755 index ef4c7d754..000000000 --- a/charts/v1.4.1/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.4.1/blob-csi-driver/values.yaml b/charts/v1.4.1/blob-csi-driver/values.yaml deleted file mode 100755 index dfdd2a2c0..000000000 --- a/charts/v1.4.1/blob-csi-driver/values.yaml +++ /dev/null @@ -1,148 +0,0 @@ -image: - blob: - repository: mcr.microsoft.com/k8s/csi/blob-csi - tag: v1.4.1 - pullPolicy: IfNotPresent - csiProvisioner: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-provisioner - tag: v2.1.0 - pullPolicy: IfNotPresent - livenessProbe: - repository: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe - tag: v2.3.0 - pullPolicy: IfNotPresent - nodeDriverRegistrar: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar - tag: v2.2.0 - pullPolicy: IfNotPresent - csiResizer: - repository: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer - tag: v1.1.0 - pullPolicy: IfNotPresent - -## Reference to one or more secrets to be used when pulling images -## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] -# - name: myRegistryKeySecretName - -serviceAccount: - create: true # When true, service accounts will be created for you. Set to false if you want to use your own. - controller: csi-blob-controller-sa # Name of Service Account to be created or used - node: csi-blob-node-sa # Name of Service Account to be created or used - -rbac: - create: true - name: blob - -controller: - name: csi-blob-controller - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting - metricsPort: 29634 - livenessProbe: - healthPort: 29632 - replicas: 2 - runOnMaster: false - logLevel: 5 - resources: - csiProvisioner: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - csiResizer: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Exists" - effect: "NoSchedule" - -node: - name: csi-blob-node - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - metricsPort: 29635 - livenessProbe: - healthPort: 29633 - logLevel: 5 - enableBlobfuseProxy: false - blobfuseCachePath: /mnt - resources: - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - nodeDriverRegistrar: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: "2" - memory: 2100Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - operator: "Exists" - livenessProbe: - healthPort: 29633 - -feature: - enableFSGroupPolicy: false - -driver: - name: blob.csi.azure.com - -linux: - kubelet: /var/lib/kubelet - distro: debian - -cloud: AzurePublicCloud - -## Collection of annotations to add to all the pods -podAnnotations: {} -## Collection of labels to add to all the pods -podLabels: {} -## Leverage a PriorityClass to ensure your pods survive resource shortages -## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ -priorityClassName: system-cluster-critical -## Security context give the opportunity to run container as nonroot by setting a securityContext -## by example : -## securityContext: { runAsUser: 1001 } -securityContext: {} diff --git a/charts/v1.5.0/blob-csi-driver-v1.5.0.tgz b/charts/v1.5.0/blob-csi-driver-v1.5.0.tgz deleted file mode 100644 index a23a369b62bee65b5c1be3d16937d07a1471a93c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4690 zcmV-Y60PkYiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH<$Z{xPI{p?>sxCKt{xs@MzZLffQ$R=)2(A^}6v%UA+q6lbd zZ1aR7Rg&_?P4nLmNJ`d=e#UXOJ>~)%TN=&`hcm;`a3~KbA9#TzUMR=}MEiVvTGulcOW^x6|oV|8}}3hhKG%x(D6Eqj$##-LE>`qwew1SE#c+7Us7^DlES0 zyqH#XaDS49WAZZyNjUS-q}#x8T=?2LZgmgxWFSo=lx4$ zm8ZdQ1U{;$RAW*>_|`+-w?eDh{{+(npK8ga-ibx>1#xx*3_$=304a_*1H=W2xBw&}5TK;KJOGqP2+`*;FoTV-5i*J> zH3|VkAB~lYrQa^_)*`$e@<6r~mJhNWa5f~PM1U9b&uu)1P2!L9TEFjfMm-PHv~2@K4Kct$ zRVW($EF5Sw3jELRIL4uoP@aV6W_I%_@DbLLhi7hD^AG1k%NPgXBdt50oJs}Sg^jsX zSD-#~@i3boZ z@4k?HzCO*Ndf=jZ@ItCp&$>H-Jw@xG2blV( zX{=mu3azqljf}cAQ;Iy+y*0LG?~zC)vl}oRLZE!qyyE>}3}Hf{xf1@=l46P(Y(}MF z{8in3=*zF@I3oP`iQx$*RC@&`jZO2BWZ(PAa7Z3~)V%KZy)n?J*=SJ0 zl1GhJTL=Z^qxJ-gHYJ00dZmH%@~H&(Q3wNqS)*YrElnNVBm+uhawsF?8XAfRKo?>7U;wht+89kH1EU*3xFBkJ zPO&ryfXPIpk(lm{WFjVH0yFzVa?FKVHFOO)3m{f`^lFCD))8!+lJ;T&5SesKyAc=p zvF^;eB`=_fcGq4Yh#~=|ntC6CL_?dP1s)X|X-@UPc^q@060NCvR3c$$7BM5NqZ%eS zS7;~Pr#il6?rU)K!6jMOH{$2s`(UZn~Cbd!-gYKf|MjhyRp9A_*S~dTp zAc`qgAlp~hcfEc~J*pSeSeE}iJUOW3e~wR%-|h21yJ&Y~Se(>FM50mZ6GDh7pMvqJ z#wDg+sMToPaTJUpcvynW`cQ>cBELg11uQ{(48M`CDS@KM^H>&&ojyIG)-4#g)+|6n z&(E4Ai_G(6y5OERg@vs3LeI}lzW16j>?T&+nyqz(Vuc@|MPYLoSexRrBW~N6=$Ca zGdzOO8%!&`vUJ+Kjy71=T{1H)iLo`e<7|t~kh9V~n{DN#-Lza%NJF>GIZVN8<|J{>= zMX?4o+bW)LmaxcNl;Z!y5p~@E1F@9!_f>oa4_8KA$fo3d3W*pq)H=mtx7mQdulQ4q z%1)lX_?f7&Yxr3Xtw27@sugK3CR3A|dmYftwTe_nSnFLTUX!c6P}*X0&vgML?^oVl zysBDQ`E~(Yj-ixzoK1W=NZ`^(CV@9k(Tb*&Z$K3ksf3O=&i231{4CurW37uii+ z!K%~jNQo6hRlAG+K))qi0b0UQAx)dpD&=n1;4u$=^11K|yB5Xrg>(+aSl$RQF>bqA zR>M|#Z?Bc_-xrNM)$25_EA`JxJJ9oU?cO5X{xWEVM|nI*C9KHL_GlJ`ZXAag6+~{u z-t;D?g~We$(F8p>3ut}A3t1u~NrF#gOIxQcy(}Inbjb&oZi#o~@op72& z@X=H`IWh26qR*F7jQoCz)4P4R5a z&I(3W+JD)ujV(Z3SNAgTh8DIhimTXH*^=fdq=huIF*BD#Sp%?JUS7VFx}ChEUH!F8K&9UG{BiQA>xZ%S@f(0LQMZdKLm80-3GU^Z0j&G4_bOn8%d zDwl59r+Ji0FJNKJ2~(%ve0$!%yzgCI++1H?-MLnhv}#~xES;A5=ex-kY7E?z?IXLM z@*?B*YW7g!TKLSqua`&=9v%Txj^35MVK<^2gC|XX&Vi`1ojivlQ=DP zIVqzxJ6)y|cHIuYe6vH($5z4I9xKi>Xmw=OPq za6#16>)V~*s{ISV;WeXEhXTzUM`e63)&?o*f(T1XL`vEYK&Umib!vc%S(7+v+0rJ| z974zi-Yu&I?x5*)izI{fvRZ2`hwXYaMiZ5G+r&9I9M$ol9t_W zJs0A{>&!`HkelZ~UPx=Tpmx7rnnJ|Cy={IY z6Wf>maF??>$5Je#j%1>fKZs&Ay&zcuYPpAVRTy(=2U8A!majEx8iS86h%lMlX^mQW z5m-oO?UiVw1;y>5myW;gt{o=0!J@G>cIGb*OOY*EDVFWCRH{3Rn;O-!&$>BOJ3BY9 z3LL!kZs}jIt+4-}KFM!>BzRf<=h5MDb^pJ!-~ZoD^E|J#*b0I3 z{-r(OvA7tZoP3(?++(G1FusM~5+WeX&$q-pyktXu&CDV^3qva|CO!1fa-4WDPGTra zXCQvC55)OSWVV2QAVUbI0fmn|gxP6~8$EQX>{(fTp%;%K0)gp&g1cG4{uvM9MK1(c zQvdVrq;~%Q-SN@B{(C1at^dIgan^?o%72V@ymH}B5{FnpUkR*WG)+&jb8~L|lev`z zH`SwhRX)r2vk=2ZvA0Epo74|gB=KsMLlrvCsO+y$GvplDo0s(zG9@9C*_v}hB7dOkO;uP+GR$(rvlq5m@MJjHS*cT{2qTy3E_UbF%(d?;ME=|rB1W@U z-B#6jCZ`80XYCB~O^Y$y@9Q2_ zIeIZxbK@$o zZdafwG%hUD`teG@K*m%Da{80H(7I2V@L^u`ct%$s*8yW*J>|_qY-=lL?_Pg0QB2 zyC}a~6qGsxKEY!=!uAc??@4INC5-VnSulM}1n}3Z0xZ*wm~!^An^HI!Z`l&|C4^si z31Q{&W;xWOEib;$V&+d9k4G^YXkx&~9c>1Z!l!Hkh{nAX+*@dX%mu5UG_)3F_6lels zU;sv-n%|)&CDQyguMN~6tX%Y`P%nvK`fWfkpqNA}Q?a zm|y}-Z6LXHG~c0SJdfP+VFi-t6?3ZtdJ)2aa}g3&GyxY4Qwy~fp*1|uYt*gtJz*hX zqt`If%6m(^K}u@%VyrIz)6sS>7-#coxO^k9#ny&% zTKGh_B--8T!NKAW6uh;BzwEZY{jVPhF17!|ql*0>93SoDzn!!Dc zVQyr3R8em|NM&qo0PH<$ZyUF=`K(_-D8)(dxmi8@N{;}4aBQW=Xkr_d(|gY?3WM4m zNvwCtEy-1^CjRdiB=^as9+qV#ZN&hw#3g5j!8hbJ?2V zD15Q8(&=Q6-|8}}Z`!Bi&-Tm&Hqwbsi!xx?ILHFq31?p^$g!v^A67v_G zC*!gQ_a`YhCO-oggwYAQYyCoPjQ%l*sK9qqW^EYM{jKXKiEIq>HjtgiSQVD4TOeR zz%|6Iha#W1BI0u<*hsc~7OAHp8>&_aafq29lJQv&weNlqZC{XfCPli1#N%Ao)%Q3F z!z&gNf7V0iqYEalI0&G!fsilA6=zeT>;rHI0wzTJE*S!+AVDY;3ZEAjok}S8T6?X% zWhg^31qwo3aW;h2FlJq1)un>(VEGU!3*b!a)-{ZYkQ_f^oT_uGnI6x&S18zDiOJU> z$RCekFgG14^SKmN~W6^7uXloJH4wx_65{o<0_8A?Kal*liS>XAMN=zv5wu0wrU|!706idiB zH)}U^{Z$f%14B&@{qk$$CGwD2xuRJ*N3)+`W|~~!2pSCmd`f&c@qLz1so3aqz!G{$ z@&wRJ^gn7S>ho)qwnf-97U&ZRLp5g8B|sy_(TpW6GytjCF~Xq$L`JF-eZo{%CIZxV zj@T#KQur8^oP{Cqo|;h4Xk1?D35;GMMJ!??G)PHE=}mc_;b&a4Kb6fAI4x~!0BZ0d z_HCvp@VPtCXq4#BpE$;$fP^dwPW9{-Q_w?Lc^;mAXw*NL-&(}jhaOV0x1RjPEs5vP}LjePUD3d6F7-)bPMIQ#|S@#A) z5lBvaamBdop}l_{?H{=9%>-~LCq*-5vpB>d@v-P3{Vk!F^aB=BO}Ca01&NK{!xX|E zI@BEmOSlihz;szsg*+lsWZw|-lNf!IzAuRg#6kvGUqeupYXD zSr0X}mU9+Dt7=;#EpE*eBa2mU1+Ce?Cqjzs0gOiA%N}Z8uz^2;APJ$l68uz?;t*3< z4@*PatGfA6)z4@+B7Fam;wdJfvI;%ab*cK{YO20p(_^3ts@hSF5&>77-Omb@AEwo( z*q^`^mXjW8M|x4W)c-51-&`l>o3a7Ty=J}l)3C0khfb+qNq8C~z%t?bxe=UqgC99d z;>;g2g3~ZAW3RFXw|qfbS{YKG-cN*N(MJLNWDHa(o1!Dhz7LYoh}`#3^KvloCJ;u= zMk6FNxmRG7hJ+w{s6EBJ9g<-?t!W^&d`ixGD1afsw9(L-mWB?ll3_^vQ&pqg#Z$Gk z`ieWs-N2MGX?Uev4IBjePZ%OO0Ti=9G-4K<6sgM8Y@cGz*!tKE)ylGYE(R-DEF8V zR$dL|j7c<{<=zlh9=is2YM?0$!x@5m9K|7^p89Sz>7maG_K8qJr4_o19vbyV54#x9 zw^Ho*kAx@=u>{e+xV-5PTJl~#8OO5t@BY!A75_OrI(oB<|7@e&Oki#UWq;%3|~y>6+rp5P2TWT(RTNpHb@? zbh}pWprMBcMUnyLc_LkKkDJ`Ito1?<4^8BGpRn{NJJVAs^Y#CB0$~hXv}F9mQ1BA{ z?;h-TEd4(^Jlw^9w^BZTZvPWaNz_vdKN^t`FCTiX`HLN=O<0K685U-kq+`XJP0dWz9E#{Pra(S>rwdmoY z9=_F`IHqG**bn6qUNu5g5+L_S@8RKV>*cn}eEXlp9=w>d``J@Y1ee(V!@cfd)&B2w zx}Dwm|5l2nb(96ra)hL`hL&>$a2$*FwA;8NH0Yr-3=yLPkc|i=4zR@aFkK-_=_5z5 zO~jxN5;B+0#6cqEx4qAev?@4`=RnQ`IPF>@N5_RKP!_>KC?iI<%i=tFPsOQ|TCIs8 z5e~sw!U-Lx!AnBN=VQw9>i#|WiO#4f^{j@EZh%Lk`dFDU&5Qnh%t44ErewF$kyy2m zJD!%Kt`|(6Q)e5K2jGHkFiZ)T2@bs??4yd}#%XT(i{6>}jXA`agEu4;a{{6S-W)`m zRjF*sTY9x9&MeWxL(knt;&HmtWyNPvgq3{$@=8ozy+*G*|J7^M^kZaMxAs3<0Sr-F zMsd6OYYD=Xg-HY-^g&*g86JvMZ5ou7QEaiw3|L077ZBda=y9I;PSkf1ddv}N=#~PYAC)~j8lH7cW+B>5Z{fF zN6Zw(*uTSL5MG|9pr$dTrWGl( zj;gX^AJLdnKdd#yb!3}?w-0Sfkh*gLbt_=(7=X3eX# z)I(A$U6n8HwNLpSJ#A-%Z77*7aufC}(EmkG*peBw~-QUd%;VZo-)DM%uj>)yq z7er_PRH8lAFx!X~IZ|%)*>gj}YJ13K1DUs-T!r`}1L6_bOtJRl`GIv7qLS=CI0_xl zzaW~T{=tSk|5WUtPkz z7)_09?l>SSJ5Z%4qCLV|?<(>dUmYHSd#+1OihkAf(hFO|s*g+13JB}?7d4iZRjEio zED2H-9%mu+kVzY}Wi6ecc~f2{H#G&TPP4-+DzU2e6n#OzCrkobLQ%;@DsWZ&rbp1| z-sczLuyXo(ItLRht~ls3j&{@92vl=BtJ{W^HXCVbKYDnmJzE63z9q3*XPXnvfKb4S z^lT1ind#ba@Nq3n)AXjtd(B#4ni{q#jH~EZRg>lkq-m*VBUcwI0;3w3lt(XSTpqg@&?>b>ill=x3+2BGXC3ih zAmFOZ*N!#Bze4R&>DN~-R*?C66zZv>{^+>YBL#as_^T}w-gKVGr3u?sATBfSG>93Y z^7y;&PY36>{fo1!%kzsH*GiIRjpxeJY3YAGH`-E;xf`?Dva2aC6K-m=O@(XW(|NyM zB7l2%3{*OLTe-n*Km`O(===-^AS<1C4n;aS-{i!4CX2wchgD*XGj;!Qkc;fH6~Sk_ z)-n!drD}4N`+g>G`zb~Y<*TS^@rU&+=1el5g*|k0dbJK2RS9!qPMfTV*?A4Ylo2Lj z!r^AZK}=W}nA;CUnMfJ`2-1$?rZL7j4A5h9JyY99g2OWi@oWG-qk-t5{pv|Vx(wxy zyVb`raKZw2=lRas|9!mf-=1Fg&-xcP=O^!P-<`kjyIi+-oJIB1RU@b$aQqX@u3_Xl zex>D0EgS-GL_*gwuRa1++;co*I=vi+l@N7xAZ1hLc0ChH?tAU_`~^QWveNWYYI-_}eL3XewI`b{ue zqp-F(EO#C9{H3iq%ywsMpiV%Ah-`LNga{XSI*KwO!nO}w+E#-D4lZdpbBLXDCS1ho z07lDPF+t4{1dQYDl3D`p#dr23+6dx1()O_@c_L(6?*x5m&B)^!vxWnyWOk|FSibqa zT3jN%{kt414~v5F-Th*#bO(;x)T*dCA2M1TjJGk&Zu zguVK@afXa--})x2Aa#zWI8H_v&<9a0XJ;h42w3gmw9X5USr^&-Wk;@S8GW}ET}or! zq&n1O4a2@Ma^@TGrNEY0^JQleR+d5e0KmQ?R~K2kv-7a0M8Rt3e=D5-raQUy6M&c9 z|2o)rDY_%y7RaBk*T_2p?Dg`EBeg zHFP1f{ohKl^YPOjvZNI9+rnCAyTQ-gNbX^9xPX36+iD%0kvG6!O zjlV+9h;v|HJ*}g(Ll3CP)|@kQvoUw)9+S_Z=5yUlj#^5C5svlKD|Q!MEDY|8E;YH- zd@pA*Ih3y2X1U^-icKcGXbQHL>S7(j7hK)O>Fgt8t-B0?KX-WLjwgo+HORvsq_x{vk%o-bpr3Mi_)WTEJ64$`nc*|0?J z((S(SbUSOCu^`dzkuO$w(tfVG@~-$s28TkgPvTk>%+cp3GwQbZ4VZPvn!8n9@@kBy z}g#&$_#yYd$=^YefB5c}RnUIMcu|L>^V?b`2udDH3a z@_)8bEMuc4y=AVd>sNlJ$$#cG@7FAZN`jDXjT1Rxocy5|$5P(l!mJ_PGdqcZdkLK4 zu>4*G{R={?XA1EoG>(<0c9J?BQ1s9*&Ga~<b^FIzwPpP{eQeCxK#i54=nxPJ3QR^e_JVEP5%qmWvBVOvMal?D_^1fe*gdg|Nr^% JVJQHX003$oK(+t? diff --git a/charts/v1.6.0/blob-csi-driver/Chart.yaml b/charts/v1.6.0/blob-csi-driver/Chart.yaml deleted file mode 100755 index 4e2744440..000000000 --- a/charts/v1.6.0/blob-csi-driver/Chart.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -appVersion: v1.6.0 -description: Azure Blob Storage CSI driver -name: blob-csi-driver -version: v1.6.0 diff --git a/charts/v1.6.0/blob-csi-driver/templates/NOTES.txt b/charts/v1.6.0/blob-csi-driver/templates/NOTES.txt deleted file mode 100644 index 9ad135dd4..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/NOTES.txt +++ /dev/null @@ -1,5 +0,0 @@ -The Azure Blob Storage CSI driver is getting deployed to your cluster. - -To check Azure Blob Storage CSI driver pods status, please run: - - kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.6.0/blob-csi-driver/templates/_helpers.tpl b/charts/v1.6.0/blob-csi-driver/templates/_helpers.tpl deleted file mode 100644 index 5231cd26f..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/_helpers.tpl +++ /dev/null @@ -1,26 +0,0 @@ -{{/* vim: set filetype=mustache: */}} - -{{/* Expand the name of the chart.*/}} -{{- define "blob.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* labels for helm resources */}} -{{- define "blob.labels" -}} -labels: - app.kubernetes.io/instance: "{{ .Release.Name }}" - app.kubernetes.io/managed-by: "{{ .Release.Service }}" - app.kubernetes.io/name: "{{ template "blob.name" . }}" - app.kubernetes.io/version: "{{ .Chart.AppVersion }}" - helm.sh/chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}" -{{- end -}} - -{{/* pull secrets for containers */}} -{{- define "blob.pullSecrets" -}} -{{- if .Values.imagePullSecrets }} -imagePullSecrets: -{{- range .Values.imagePullSecrets }} - - name: {{ . }} -{{- end }} -{{- end }} -{{- end -}} \ No newline at end of file diff --git a/charts/v1.6.0/blob-csi-driver/templates/blobfuse-proxy.yaml b/charts/v1.6.0/blob-csi-driver/templates/blobfuse-proxy.yaml deleted file mode 100644 index 5008d9142..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/blobfuse-proxy.yaml +++ /dev/null @@ -1,88 +0,0 @@ -{{- if .Values.node.enableBlobfuseProxy -}} -apiVersion: apps/v1 -kind: DaemonSet -metadata: - name: csi-blobfuse-proxy - namespace: kube-system -spec: - selector: - matchLabels: - app: csi-blobfuse-proxy - template: - metadata: - labels: - app: csi-blobfuse-proxy - spec: - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - initContainers: - - name: prepare-binaries - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - command: ['sh', '-c', "cp /blobfuse-proxy/*.deb /tmp/"] - volumeMounts: - - mountPath: /tmp - name: tmp-dir - containers: - - command: - - nsenter - - '--target' - - '1' - - '--mount' - - '--uts' - - '--ipc' - - '--net' - - '--pid' - - '--' - - sh - - '-c' - - | - set -xe - dpkg -i /tmp/packages-microsoft-prod.deb && apt-get install -y blobfuse=1.4.1 - dpkg -i /tmp/blobfuse-proxy.deb - rm -f /tmp/packages-microsoft-prod.deb /tmp/blobfuse-proxy.deb - mkdir -p /var/lib/kubelet/plugins/blob.csi.azure.com - echo "Enabling blobfuse proxy systemctl service" - systemctl enable blobfuse-proxy - systemctl start blobfuse-proxy - echo "set max open file num" - sysctl -w fs.file-max=9000000 - echo "waiting for blobfuse-proxy service to start" - sleep 3s - # tail blobfuse proxy logs - journalctl -u blobfuse-proxy -f - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" - imagePullPolicy: IfNotPresent - name: sysctl-install-blobfuse-proxy - env: - - name: "DEBIAN_FRONTEND" - value: "noninteractive" - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 10m - memory: 1Mi - securityContext: - privileged: true - hostNetwork: true - hostPID: true - nodeSelector: - kubernetes.io/os: linux - priorityClassName: system-node-critical - restartPolicy: Always - tolerations: - - operator: Exists - volumes: - - hostPath: - path: /tmp - type: DirectoryOrCreate - name: tmp-dir -{{ end }} diff --git a/charts/v1.6.0/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.6.0/blob-csi-driver/templates/csi-blob-controller.yaml deleted file mode 100644 index 4845f385a..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/csi-blob-controller.yaml +++ /dev/null @@ -1,187 +0,0 @@ -kind: Deployment -apiVersion: apps/v1 -metadata: - name: {{ .Values.controller.name }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - replicas: {{ .Values.controller.replicas }} - selector: - matchLabels: - app: {{ .Values.controller.name }} - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: {{ .Values.controller.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.controller.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: {{ .Values.controller.hostNetwork }} - serviceAccountName: {{ .Values.serviceAccount.controller }} - nodeSelector: - kubernetes.io/os: linux - {{- if .Values.controller.runOnMaster}} - kubernetes.io/role: master - {{- end}} -{{- with .Values.controller.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.controller.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: csi-provisioner -{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" -{{- else }} - image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" -{{- end }} - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--timeout=60s" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} - - name: liveness-probe -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.controller.livenessProbe.healthPort }} - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} - - name: blob -{{- if hasPrefix "/" .Values.image.blob.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- else }} - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- end }} - args: - - "--v={{ .Values.controller.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--custom-user-agent={{ .Values.driver.customUserAgent }}" - - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" - - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" - ports: - - containerPort: {{ .Values.controller.livenessProbe.healthPort }} - name: healthz - protocol: TCP - - containerPort: {{ .Values.controller.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} - - name: csi-resizer -{{- if hasPrefix "/" .Values.image.csiResizer.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" -{{- else }} - image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" -{{- end }} - args: - - "-csi-address=$(ADDRESS)" - - "-v=2" - - "-leader-election" - - '-handle-volume-inuse-error=false' - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} - volumes: - - name: socket-dir - emptyDir: {} - - name: azure-cred - hostPath: - path: /etc/kubernetes/ - type: DirectoryOrCreate - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.6.0/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.6.0/blob-csi-driver/templates/csi-blob-driver.yaml deleted file mode 100644 index a742b506a..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/csi-blob-driver.yaml +++ /dev/null @@ -1,14 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: {{ .Values.driver.name }} -spec: - attachRequired: false - podInfoOnMount: true - {{- if .Values.feature.enableFSGroupPolicy}} - fsGroupPolicy: File - {{- end}} - volumeLifecycleModes: - - Persistent - - Ephemeral diff --git a/charts/v1.6.0/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.6.0/blob-csi-driver/templates/csi-blob-node.yaml deleted file mode 100644 index 5b3d37147..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/csi-blob-node.yaml +++ /dev/null @@ -1,218 +0,0 @@ -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.node.name }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: {{ .Values.node.maxUnavailable }} - type: RollingUpdate - selector: - matchLabels: - app: {{ .Values.node.name }} - template: - metadata: -{{ include "blob.labels" . | indent 6 }} - app: {{ .Values.node.name }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: true - dnsPolicy: Default - serviceAccountName: {{ .Values.serviceAccount.node }} - nodeSelector: - kubernetes.io/os: linux -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - {{- if .Values.node.affinity }} -{{- toYaml .Values.node.affinity | nindent 8 }} - {{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.node.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: liveness-probe - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.node.livenessProbe.healthPort }} - - --v=2 - resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} - - name: node-driver-registrar -{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- else }} - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- end }} - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - lifecycle: - preStop: - exec: - command: ["/bin/sh", "-c", "rm -rf /registration/{{ .Values.driver.name }}-reg.sock /csi/csi.sock"] - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} - - name: blob -{{- if hasPrefix "/" .Values.image.blob.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- else }} - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- end }} - args: - - "--v={{ .Values.node.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" - - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" - - "--nodeid=$(KUBE_NODE_NAME)" - - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" - - "--custom-user-agent={{ .Values.driver.customUserAgent }}" - - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" - ports: - - containerPort: {{ .Values.node.livenessProbe.healthPort }} - name: healthz - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: BLOBFUSE_PROXY_ENDPOINT - value: unix:///csi/blobfuse-proxy.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.linux.kubelet }}/ - mountPropagation: Bidirectional - name: mountpoint-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /mnt - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} - volumes: - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir - - hostPath: - path: /etc/kubernetes/ - type: DirectoryOrCreate - name: azure-cred - - hostPath: - path: {{ .Values.node.blobfuseCachePath }} - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml deleted file mode 100644 index 575437fb8..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml +++ /dev/null @@ -1,107 +0,0 @@ -{{- if .Values.rbac.create -}} -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-provisioner-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-provisioner-binding -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-provisioner-role - apiGroup: rbac.authorization.k8s.io - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-resizer-role -{{ include "blob.labels" . | indent 2 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update", "patch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims/status"] - verbs: ["update", "patch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-resizer-role -{{ include "blob.labels" . | indent 2 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-resizer-role - apiGroup: rbac.authorization.k8s.io - ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list", "create"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-binding -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-controller-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml deleted file mode 100644 index b4a30373c..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml +++ /dev/null @@ -1,25 +0,0 @@ -{{- if .Values.rbac.create -}} ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-role -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-binding -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-node-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml deleted file mode 100644 index 93c5c0149..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml deleted file mode 100644 index ef4c7d754..000000000 --- a/charts/v1.6.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml +++ /dev/null @@ -1,8 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -{{ include "blob.labels" . | indent 2 }} -{{- end -}} diff --git a/charts/v1.6.0/blob-csi-driver/values.yaml b/charts/v1.6.0/blob-csi-driver/values.yaml deleted file mode 100755 index c970b080c..000000000 --- a/charts/v1.6.0/blob-csi-driver/values.yaml +++ /dev/null @@ -1,152 +0,0 @@ -image: - baseRepo: mcr.microsoft.com - blob: - repository: /k8s/csi/blob-csi - tag: v1.6.0 - pullPolicy: IfNotPresent - csiProvisioner: - repository: /oss/kubernetes-csi/csi-provisioner - tag: v2.2.2 - pullPolicy: IfNotPresent - livenessProbe: - repository: /oss/kubernetes-csi/livenessprobe - tag: v2.4.0 - pullPolicy: IfNotPresent - nodeDriverRegistrar: - repository: /oss/kubernetes-csi/csi-node-driver-registrar - tag: v2.3.0 - pullPolicy: IfNotPresent - csiResizer: - repository: /oss/kubernetes-csi/csi-resizer - tag: v1.3.0 - pullPolicy: IfNotPresent - -## Reference to one or more secrets to be used when pulling images -## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] -# - name: myRegistryKeySecretName - -serviceAccount: - create: true # When true, service accounts will be created for you. Set to false if you want to use your own. - controller: csi-blob-controller-sa # Name of Service Account to be created or used - node: csi-blob-node-sa # Name of Service Account to be created or used - -rbac: - create: true - name: blob - -controller: - name: csi-blob-controller - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting - metricsPort: 29634 - livenessProbe: - healthPort: 29632 - replicas: 2 - runOnMaster: false - logLevel: 5 - resources: - csiProvisioner: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - csiResizer: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Exists" - effect: "NoSchedule" - -node: - name: csi-blob-node - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - maxUnavailable: 1 - metricsPort: 29635 - livenessProbe: - healthPort: 29633 - logLevel: 5 - enableBlobfuseProxy: false - blobfuseCachePath: /mnt - resources: - livenessProbe: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - nodeDriverRegistrar: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - cpu: "2" - memory: 2100Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - operator: "Exists" - livenessProbe: - healthPort: 29633 - -feature: - enableFSGroupPolicy: false - -driver: - name: blob.csi.azure.com - customUserAgent: "" - userAgentSuffix: "OSS-helm" - -linux: - kubelet: /var/lib/kubelet - distro: debian - -cloud: AzurePublicCloud - -## Collection of annotations to add to all the pods -podAnnotations: {} -## Collection of labels to add to all the pods -podLabels: {} -## Leverage a PriorityClass to ensure your pods survive resource shortages -## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ -priorityClassName: system-cluster-critical -## Security context give the opportunity to run container as nonroot by setting a securityContext -## by example : -## securityContext: { runAsUser: 1001 } -securityContext: {} diff --git a/charts/v1.7.0/blob-csi-driver-v1.7.0.tgz b/charts/v1.7.0/blob-csi-driver-v1.7.0.tgz deleted file mode 100644 index 75e8940cdeea4559b710450a49a2f332d1298464..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 5580 zcmV;-6*KA|iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH>QbK5ws``Ld5$L(Ev_bS_Qess?>`H&{=US?Y-6Q_N5Z)Yb% zOR&w2Bx*^@jW^Bz{)VJ}Qk3mDuG76U`=PN!0w4*1AOKP$pN<@t6USp@2CRKL#Z0v3 zIPibiSm|^+ouh*T^?#?+G5_!E9qs?Hcd&QZ-9PH=zwQ3ekw4!4fI6Eap}xdiVD>}j z$+*nU{YeUr$Y)@j(6EPQdkq{#g`cgrtxm%O?lKYy_3Y%2m;rj{(-9g9%J2lx>F^wB z=4pgDfF3efsxdPFK6jUQrBF=ypJ6`+zF7sZME>6%bq`GWKj;7KOy@^=*b z{w4K^JMW?M@qmg;1{^}sK*;6flF=EF`T>{)0p+}X8;^j6Ab?905}y<0jS48ct!}Hk z45d$I5CZ3yjE-P6jA@fdHYwpdT;9cydT^#>>k1}>3x*%jPuVz;Ooye-OB5WeG{{%L z$sdmyV5S?C=5v1;s>X{K=nBTbAanrOaQS!yDCXdyFH;B=G!jmb zVni-MFc|mHREUW8+6CHLgtk5E^0vVImbYCRj>#lu;6&7OTp9{YLSStP&r!gfh>;l< zkdEBE-B8ajW8WWYYI^9GUmGuwgY?Q3%#%5q{|s|oWq<={$SMvxjk%x!^6?0K)er1> zh=hWo00j21zztVb`Jig_(EURLp%>`(NABP#sxFKT4s1qTIB{JXheFPd%K!`LA;Drm zFVO$W5t4tuK}lVNb!Cpe5Z{+WshfCcOc|QfxP^uwBz0r#b3kM)AEGZfR1aeg@;5{D zOW2b5Xeb!p=PAt9kRnaUJDWolLvmM?%)OuPo51{-15 z925yYvoacu0{z(=OFtwKpT^#)Vw!wrdk9N|#!)Y|R`Kd<^9Z}pLy{#OKIa0YX2iZv zzx0Dh%un++8Ld;w#Q?+?%5Jks6;r|y2O%WeyEOJa*?W(0Jo3SlGnNyMJPI6zR3Hx` z2t7nY^l^BeHg6!wdyKgJk}}al-G3bIAJ~=L6tFL*c{Qmh8ALvDG4CPuD-JKhkC+R| z42pXsBs%#3Gw^%pP&ME*W-f3I)26;9@_-1Q{zAx&;vU+|eg+UI)pOYCd?d+J2EWI^ ztBpEArCB#^W$EL}xc8ojJ6{f0M%jHLN>ht(X`JzROhO{&i8hn6JOm$HL0R%hP#+kU z+k*tGgKlBoLro?3jQY?jEAc?FSTn&$BiUL)YxeI57d(9d<1x6RhnfRAbf@6OJ~UT? zpGZ&S;}F)v(oh<#s!-(PXHz8szWWs78798e6MCjA!hg7$@b6b78$tV#TD@B7h8-D=yX;ap2QSY>e~rfrM?ip_V6=*citTrsSGYZ_Ph9)tL<_PX^5cz<5^0!f?hwdfp6E2xb z3Hu&;XjCgbY}G+#`hNrjk&gxN_Tb{WKWvFR@njs!{J;B0UBmx#cy!d=`G2-iuBWir zsf!3llZ5R(hsh9toDfkgE z-V)IhUBOG_zq@~A`hSlOck!R?l>7Vk-_eW&J-N1_G4VmnBRCG^u((s`p})5u9vTf* zt$!Ec&{Jz>n0RvJ->wQ7s(SbL4)S13LO@MrR>^uz=$yHo=97pqbv z8g{}}l^j{bNGQgr`4{f|g*VF`(0?b}9rRUsRiu_`{!bG%Z<_0Lh6Vu*QL5N@9g%4T zZL(=-IEsw@u(opV?@=n-rMYP#Ya_M43tipNRHpSLYwNO(UcW%6d`UvrkG;Cy)KKQq zAflnN$qT;JYP|?E;n4A;dmi8rPr!3V^K#!)r)5g}IGy>EEM{s4n8iOOv`Uk&==Ye4 z(x^T>G~|||#iwn>hPEyw{Mjm!lSoq039VlvLH~^de?g55acO3?*hjJNXYTtkWw~|C zk$s+{+{0d&?3_Z=4KEQ_T=S|C!{G!LwnLfsUJh?fZ^|8eZk_u*mHPERb-Fkaqj&SC zM1+^cfA_nG<@LYY+3W1@*8go3Lo!3^LCfL`OqP~BR|H29Z_oA`w=nO+Z!y$-9 z8Vaj=Pjg;MURiyhdWp~upz0FgXG_CZ6q3+`P@n@T-8=#nDoWRoUgA>}?({LMbt-Ug{ysTFN0lsXW!*H^RU>ix~+gi8Gpnlk-VPv&a2A zaATE%i3wg{qj^Vb4|nev)`RB`6=Ogbo#PZJ-!2qI&i^=yeCay-Hs zDLuA%O{p}%ha5ry%y|0BaRg=)5U>mZ+|nIi78a2+KX-{$RV0fBJAGc32-ON5R$y)DMtG1UlERkGXar?hmbSR zf;Y!6?^7afKKHMN=NAK$>M?07Ky4T#9*m6IEI`h9Ihm^g3vNBakP}s$`0dD#CnVGc zQYCIsnp3r?xx!E45y-Mu*lJ6QM3|M0+Qa_!&Bv2}-Ml~l(7zdc`gr{EK7Dj?*&k%j zm#~Mm%^Ezy=Uln&zMwI0jfoFVfbWi9-WN%<%(n651!{i5M7bK}KBGJWSq6-tdW4$h z0QvwC+UFIZ0uw(2hBPprPRxqG(U^tUSN(`h`TC(vU5&)!k@t?B>S>vVSU->sCy zf1?7sfn2O@PM)e$r=Z3Q>=7p6fs%ixE`)11dz3?E8Q8UaLV1>}9eny;qgc&@w46{I zsnrNaPV$j%xP}*M6Q&)Q29@S;Z!=B@r1dVpjTke)G9-~@ecUw;P-|Rkj5$x)Y)Tq7Y-gk32 z&HXTDlZxZC>CBG1=Dw-vDB}xz9s|ygU%oy$JG<%+hkvtF^Z|Ro97vKmEj0uQfX3o@ zuiN34*Kj8ocJyf)CtX^Om78akU3Ws7ePh>7PL8!Wb#E7W29}L$e!8qYq^tU*(^H6f zNt_PUy#-NlOQX`35?L0sl8um5G{`M1b$i_+!Rer-dCiVKJh+0Cl`^3>D`X2mSNXkM zc})@96vkBqtSm}(45@3X*~sL@@EOVqI{Dm*C=#+X<2A8E? zI@VzS617XYUmeoh`Ar|WPB^nVmP?N8SR8Oty@y^zNhpqAzCInE-}DD(mlx-QYui$i zoEyr7rPEUXdUmvhQ$}{o+IJwQyhylynr=jFE1yb3a$*k5!4n9DrL}Pm!wx8i;Bb{& zX8~j!-Ke2R9p2LC4;-EHnQ_1rM{<6*5zd?MD!B~)4`m$KWhd+_09H9?o0{x&%np?A-FX3cn|G&$}UvBz-6!Z z%C93}gnIVI^=9DzeY)!3oL=?M`h)B9lMl+{Z!-$tGa6L$Kr~B!#L>?%zk;zXQ6wxL zr)1zcW8&KqQdF{v96ifBstyTZzvMkHcciE!?M7`JlDl5JU2jSxOB?*2vz`4So( zIR=k1yj@ZYz@6yUoJ12rbW7SUb_9#LXsbP@D~uU={J^YXno6EsYLON%H(AZ)k(|2U zxVys&*XnjiYp(C+cp|RV%+^&M8CEyQ66eM%XNp752S@83hlDW)2N^z$582<%R;lA{s%1s@Uh z&ciXi2-T9B8I^`IO0ElOS?&r^#Ep6B_K^2_o0*3W)8+638G}1_efUT{$nG(@lw-z4 zn&If6el&#u820}}ifIM;S9y9*xe#=*{C7Luy^eAI`|V-(U?>0EDCYUCN2mWN?$~7F zj{$HkwGl@i7BCbH3z#IQtfVbW!pSG~Dm8!1OSMco%I{N(v@Lp71h`J-P^G8Ok~3tX zVwWvcJi_=C|=0Z#p_Jpt&myUkICebEU<14PbHZ}^V9l?HMVfjb8!gr}5f9})}#o4PyJtdskad%~B zo&vsZ7KZ&6@fG;Za;4>Fxo#QtjU4j0{i2+F?W?$swEmfn>48$od}ER@ypj| zSLdJmS2tJvpKgX1r$66Zo?QR43Zcwn3u4!Bmm553u^!RZkeA#}zuAtYPy*_~u^p75 z-q(zdAAYkSLgDP9rMq@m1?JP9f&GjUI;|{_Y7DSnr+wGSjm^QiFf?+_0ON)^=}3j zXZ@SO$;bYhiFDeJ@U2qlR!CS=1bmBBwR*q{lGMJxq`y_t=JdvCg@m~>M@~Sb5o<26 z;6;#S=XCk5>ZfJlJ<1YYFaK_r1-HwBtAMJ}*vp|Bm$B3$DC^_ZM|(`b_iBdO_yAtD zf@-Yo79N4Cq)UAjs95R0GZAo|+YZo{5(pPr&sNKn(Fjkl{>^TQkvDNXY2#U5c~`u`!y?e@leiWI zHS+xAfx5{*KDQ28wR`F%cd0xjlWu`lT6s81cl%_Y?J2WIt@_%f^6gUjc4a%IKL3Y} zu zW|ZaeC3aF$X$EYhDoj8$-=L;XxcXmxMn?Xj$4UO>$yFazyEPEHJ|@A+Saoib4OcmL z(}p>z;rf{K75lkjpI`=|SYzap-n>E0s1DuoZn>ODgJYu|dJ;gFQs$AcC=xatDmQK; zgVt~yr%{#GcO>*kIQbSrYuq2>j1pAqr~JmF-@p}#)atGbOLPO;8Iz2|NoRjKuh-jd;14n^Zehz{?Ts#zm2kF|G(9RK;;vDk4wNaDgNSk zd@m}$cvNI7%HF~hJ2k(#Qm_A$iN|{4pW+E#cK*Ba{qOEUXZQWT?UYK)r)=QmD}j+G zV^tsvcW6s&$HyNWeT4EWe%183NBsLLkC*?)TY^jF|IqmUcei_Zu(SWRQl3rzb3Dc zVQyr3R8em|NM&qo0PH>QbKAJF_gQ}hMoF8rFO=k;xoSoq99y}1E|EQ!lh?kxjt3%F z5^9oQ0Z_5d@&En?0Dpp@B+H7Ny9)Ubiv)HTi`~Uyu>eOt9XT#1j>pIhSo?H}nP|;% z;Qz3((&=X zBP~3Q5C_mjhDbGL2Ega;@~#w$ssA(V$G|sh0G8AL(K z#lC+@ed5l$=zKh&;*tS}P&5#7Ik{wXMx=cJWL{#SNI{{03ebrIH;Ir>6;U-nry@z9tuG^cS3 z4M9kDjIqxFk+FP;zTi+jj5)~P4AC!POX8!UVAS`4b>&DqS{1X04#(&PlEfl9M#F@J zgx-YbDSpZn`xBupfKy_)2A~ETVb^4e1fTf{N;FO-rLJ@^BxoFlRABi_$prR1^`Gw} zF$EM+k2fOfo#eH;=>DM!#>XS@7eV--D(J?@anNbZ1r3aLBoq_{Ah3r8Zn&ySp&>#q z(Cv@h!BJH8dn8RCUg{v1e!=nB|m8tQ6}P0z7!O(I7FG!AZegw3KFQZA)=I#vA2wYrP2G+>T; zsizvRzBZ4r3tc1!#L@g~ASr9~OFxJtce6H`_)jSp0}x**yUpx`m=d1x$EC6FNrmzV z$0Hv+X#{e@kw-!DRUi){2t7nY^l^BeHg6y)v5dIg6eVXKM{vHTYoFo;qjPAolWeRH1R`_ z_LH*Yk)S@X#KbBn4!VVT7d6#%z^D(cvKb1Lm^2fNG?J|)v}XT~aKY0TFdl;|x~Msz zLw5>Z>_c-U_=yHYJ`Q0$EDbfWRgHpt{A}hRz;~ZQJj2A7y52>5HU&OfO@R+8+6keA zDp%~|n8PKbck^74N2SLKA_=*`zMnS8sLU&80fN2OVd8Id5Fhc~MFin{;=>>g3e5uJ zMe}cZg`@{6v2dRv4+}VZm$gfgonm(imsm`@s2wPG7Dv+NU6TNY0teA~sH&Wif_)04 zPjU$?Ae?Itq4W0b+p4MBs`02@2t2dBdK!|o%!pNKSCa0=7_f+$daot>{qQG7<0xH_ zq#~eS{siJP^g#q2f`rE!Ii94AaC(%$_&YF&Y<*UF|>^za}_ z(!d;tC-$b-WV&Xh6?%ARBFFiHg*$z2h5OD*z5d@!!Hr2`hR@1 z+yB{4xxa7!70pP{l|CFA6CcDpf?gom;!dH9{@Q+cXf#x{{#}GaPc8bxBn~A1cGZ@l zs&{|yAP>eQ1k_ZMs;t*UPW}qVzCbO#%cxYd^;z#Y$eI^3V2pTxzDhSRbkXsF`jZ5D zwna@R2PPN3PD)$jR7IFHEt)z>YO?i&FxP>_(LASEM|xTfJK?HIjx1s%6l2u<6LWLiN-q%<@fMaHs8`#AUaDAn!K z*tC$fky-|Xu5M@=(|VG1^sJ6vzd)yaNkZ3;y}I7iQ0CGgqM`E03ct z9^ep9z;j0Pa^KUCXG;4x9r=@N&(sbu+y9i%Dowtk|HM?3xcczWkPc;wPuofiZCyy@ zvsEM~(WGLOQolxm{u2lOf*Kj((#UGHk7D1?qV!|R^6(x<_HmB#Kzd=Ya|+F9yF^@x zz^g_KhZ9)X4rM`l$=;gYlsop^Hurlf_49wa0(T-t@8(b05neq1?{$ujj>_}@erK<< z^Z&O}49%45_m(AOluRvot_Y4I-k$9>Zb|5M(HVw-hC>jIbg!fuWXokKd6k69>RkK= zN@f!s3#iT)el|~hMIi}22n9Nn4S57=*D0M)x=9>LxYG{>h$@s+Ltm-}Nz+27R4k9!aJk^01!oWL=83`vz0F#81^GQgv$Nf8SW0jXvXjzWITmuVu z`L#5diWmL6h(Qt{Gisnb8Y|sF%iCh)bwI^=Xsx5ONo>$Hh8bZZ#=etBN016Z5^ z7@@WZqIUCN1qd@0K>Mh+tji`Ouy_fgqqpl-Z3=c*_GDfdoqh_`GLlgCSs43et(O>>zG!s*( zYPA>LPLM;ioJ82Y#S`F8mM$b^$y0*#=RYGH2^6cqe)7wifJiqOkTcJM{Jod=DM>e< z`&YyBi-FmPF=;Fy#PC%-7#X#LTaPg0M3sPSJM!ZR3AMXZi2;`eMeXLe!cSt$$YShm zwWWU{%*saXVgLH(cAo{rw`l2)SEY=dyy`h_=YxilO%jaFyp!;^O(`Zu30&rYuU zXYYD1@6AU`xL{T{7$9Zw^=l-63*?N^%lj&w4=eHs+$lxP5sWEQL4|Na!igPX*X$=k zE*AE>)$ssNiuxma~~i= z2fPAQVB+T;*1&u^F)RL?#w^6XQl8jE?u>ViO1-0!t?g^F7}FA_nM$tkon$Vt`Q3@M zg|muNp#Yrq-<_WfZr)#A46gfwGh-Z;->NbZLLxm7>vrZ>#VXWi_)Z#2oF>9d;R>NaX5^Lcyk{1kQMzTR#%#CN8`i=A4B6aNdIr{=ekVt|Y^1D$1%ywVGrQccw*xr{0E#lEnS zE8;FXBTV&ne!=wKL&Zj=3!nS@)Y?6Fu*XvBJ{u_K|I1_duW~bo{FI@1G`ojFi&W;gHPXU6srXdmlJ9uwYtNV zlYFcjt`T@#g_czr_hY3=9vjYb=F{yIV^=AEzW`ogH>M1_kkFsEDVzo9TK2JwW?xYe ztKns8X^;=U5HYoJERD_<&}Wg^0`A3VDqOSgS)roGTiEe3dst~*Mqc5oW#+bvN1;mI zu6&whU}}2#bpcuqVI4o9!m^@n=IQ4JK`O&z)Q2w8$;YOwB?DA9x3y?lLgc6QYt4*z1Q=mYkEIglK3veXbH02+(l-hPK$ zUc;SW*wJUPoOEjGskqoGOXh?$`%0;uoE&U%>fSC|)-U60e!8&C(p9%1(o?8;Ng@W+ zy#-O&i9n?#8nR4iB_AQFXpmc&>h|`F1gA_(vzi@!cyt9VE9F6NR>>BCuF8A4@|r5P zDU7QqSXq_o1X9;jqmk*05%7~0bn3YiQ6_r!8MI7oo~phithJ=q>xlmX0hgs-JJt~Y z617XEUmfw>1w9`*PdKwWkxNeYSfX0eyoX*yNho?RU!M-oZ~B9?%Zu~DwQVX%ju&Oh z(rKxGT|3&sVI(_d9XpUiUL;&UO&21znNOvmIWY(3;0c7n(%LwMVF#2$aJb5?v;Z;= zZq!hu&Uonqw2n@BbIfiP7-KyF_BhCSn){02)8(@ThdO5FKoE&}311C(>!~yYvb28{ z3C-L}eKO}M<`HG{v##-*@h)OiP?!2$bbWfc4jE_`E>-0 zP|x1D-VOY}Pgnh$)2seje{g+%@XbY7OHt}_M~X($?$pL1x$Cyu^{zxRwZVUK(UYo#n(7qHP+<2~ z=~mN}y)rZVgU{zz7lV)e!L{P%<;nHmYus!QZsG8MTQP}CJPL8^-<*aO3YYJ-*{80p zy5eSIqoYqyv$Rk4wlJ|>8oWAG@$ z+amr-KY}a)yqi?sOOKGf{REwIdVc0iDPQ3wN z3T%lrU$)(0BpMX=7R;M^sv>JPw(cVpD0uG8(?392VgEl_K(BuQXxaJyqy6LE`JZPh zj^mWJ{JB1}-@5%#pIuB(_?!;U_2ngtlL5*xpQj(;!9rkndX=1p$*=c_sCOQY=|!lf z)Xb?gj8Sq~NXv3lh$3#xOLvF7*UQX&>oA=TKaerFbJvHD)Pw96lS|1nF4FWw2lb;V z1i-NWJ2Ffw=)X#Qd&-5di}ioMb9iLl|MB+d;CQG1+bHJwy+^12DCyW_;*SAvEwiCB z$A^Mp0h8olo%DrCIMK# zp{Ec)@j{+XUT6Aljm+DAOeT*Mfpv3uD#?i+~G-!^;EuwyyWWyo9##nC7>Sk?4S(uzUJ=u(Kp*f zC>%Vqbk`26AbdJ7Z6R$bQyT2yhDkG6$;G(FF4 zDif`Ia<|wrJL-CQb@7jXE(D_Edj_lu&9-ZetmMnu#Ou9${qv`H{hPtXS^s8m^0B{W zBAt#Se5(|?6%y7I0pB83tsd}#B(?7^>2H;^IlXXNAz`j8krNQ zUIkRmoU$CMalue6g7S>9I=9CJe6NPh#wQx96;xyGS@8&5rCsXtRK-gFovDiJ+f2>nmH`E&i(2x=dXG^~K%14wU7F^1 zo~CK6*cK#cKJreECoPT3Gw+I*c~}&BeG=EAphlmc%&43ED~RimRlDk6a;wTya{U%q zrIp!Hy3Qy2%1~K6YR%U!*>IO^_{S*q`9ExgU1uYg04>S?J3e@OVBY`pw)1wE|Fex^ zXp|iEmcAiCUHP3P|LM>CTu~oN2|}tij>VKR@|&6g3VDMIvxZd5WIlG_P5=wBU%Zb( zegAL${6QA`+M96X@=0a+@hF$q@2s&kucxXQVkHq1#4*THLMqpGd%Na&Gp@-39sxIe}jC8*X< z`He^a23I6ntGhBR25JG=G&Hp-Iq|5hggl~4FRP65wk_>27bUQB-RsK{1~y+tT?W`1*}-u@>8kM+Pm zB@(>s{CDO1@B4?H&e6{PZ=+OpRLTxsJ`)&OC{_cqaD}$Scl@Sbge-p5_PII!eU-=S z|KmNurTTwleE)ra|LADv|81o_oBrpH#7^^fWmk4(SDvB#e*gdg|Nq&NmXZLV000(U BX3zit diff --git a/charts/v1.8.0/blob-csi-driver/Chart.yaml b/charts/v1.8.0/blob-csi-driver/Chart.yaml deleted file mode 100644 index ac625798a..000000000 --- a/charts/v1.8.0/blob-csi-driver/Chart.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -appVersion: v1.8.0 -description: Azure Blob Storage CSI driver -name: blob-csi-driver -version: v1.8.0 diff --git a/charts/v1.8.0/blob-csi-driver/templates/NOTES.txt b/charts/v1.8.0/blob-csi-driver/templates/NOTES.txt deleted file mode 100644 index 9ad135dd4..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/NOTES.txt +++ /dev/null @@ -1,5 +0,0 @@ -The Azure Blob Storage CSI driver is getting deployed to your cluster. - -To check Azure Blob Storage CSI driver pods status, please run: - - kubectl --namespace={{ .Release.Namespace }} get pods --selector="release={{ .Release.Name }}" --watch diff --git a/charts/v1.8.0/blob-csi-driver/templates/_helpers.tpl b/charts/v1.8.0/blob-csi-driver/templates/_helpers.tpl deleted file mode 100644 index d99392f32..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/_helpers.tpl +++ /dev/null @@ -1,49 +0,0 @@ -{{/* vim: set filetype=mustache: */}} - -{{/* Expand the name of the chart.*/}} -{{- define "blob.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* -Create chart name and version as used by the chart label. -*/}} -{{- define "blob.chart" -}} -{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* -Common selectors. -*/}} -{{- define "blob.selectorLabels" -}} -app.kubernetes.io/name: {{ template "blob.name" . }} -app.kubernetes.io/instance: {{ .Release.Name }} -{{- end -}} - -{{/* -Common labels. -*/}} -{{- define "blob.labels" -}} -{{- include "blob.selectorLabels" . }} -app.kubernetes.io/component: csi-driver -app.kubernetes.io/part-of: {{ template "blob.name" . }} -app.kubernetes.io/managed-by: {{ .Release.Service }} -{{- if .Chart.AppVersion }} -app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} -{{- end }} -helm.sh/chart: {{ template "blob.chart" . }} -{{- if .Values.customLabels }} -{{ toYaml .Values.customLabels }} -{{- end }} -{{- end -}} - - -{{/* pull secrets for containers */}} -{{- define "blob.pullSecrets" -}} -{{- if .Values.imagePullSecrets }} -imagePullSecrets: -{{- range .Values.imagePullSecrets }} - - name: {{ . }} -{{- end }} -{{- end }} -{{- end -}} \ No newline at end of file diff --git a/charts/v1.8.0/blob-csi-driver/templates/blobfuse-proxy.yaml b/charts/v1.8.0/blob-csi-driver/templates/blobfuse-proxy.yaml deleted file mode 100644 index c131d8316..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/blobfuse-proxy.yaml +++ /dev/null @@ -1,126 +0,0 @@ -{{- if .Values.node.enableBlobfuseProxy -}} -apiVersion: apps/v1 -kind: DaemonSet -metadata: - name: csi-blobfuse-proxy - namespace: {{ .Release.Namespace }} - labels: - {{- include "blob.labels" . | nindent 4 }} -spec: - selector: - matchLabels: - app: csi-blobfuse-proxy - template: - metadata: - labels: - app: csi-blobfuse-proxy - spec: - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - initContainers: - - name: prepare-binaries -{{- if hasPrefix "/" .Values.image.blob.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- else }} - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- end }} - command: ['sh', '-c', "cp /blobfuse-proxy/*.deb /tmp/"] - volumeMounts: - - mountPath: /tmp - name: tmp-dir - containers: - - command: - - nsenter - - '--target' - - '1' - - '--mount' - - '--uts' - - '--ipc' - - '--net' - - '--pid' - - '--' - - sh - - '-c' - - | - set -xe - INSTALL_BLOBFUSE=${INSTALL_BLOBFUSE:-true} - if (( "${INSTALL_BLOBFUSE}" == "true" )) - then - dpkg -i /tmp/packages-microsoft-prod.deb && apt update && apt-get install -y blobfuse=${BLOBFUSE_VERSION} - fi - dpkg -i /tmp/blobfuse-proxy.deb - mkdir -p /var/lib/kubelet/plugins/blob.csi.azure.com - systemctl enable blobfuse-proxy - systemctl start blobfuse-proxy - - SET_MAX_FILE_NUM=${SET_MAX_OPEN_FILE_NUM:-true} - if (( "${SET_MAX_OPEN_FILE_NUM}" == "true" )) - then - sysctl -w fs.file-max=${MAX_FILE_NUM} - fi - - updateDBConfigPath="/etc/updatedb.conf" - DISABLE_UPDATEDB=${DISABLE_UPDATEDB:-true} - if (( "${DISABLE_UPDATEDB}" == "true" )) && (( test -f ${updateDBConfigPath} )) - then - echo "before changing ${updateDBConfigPath}:" - cat ${updateDBConfigPath} - sed -i 's/PRUNEPATHS="\/tmp/PRUNEPATHS="\/mnt \/var\/lib\/kubelet \/tmp/g' ${updateDBConfigPath} - sed -i 's/PRUNEFS="NFS/PRUNEFS="fuse blobfuse NFS/g' ${updateDBConfigPath} - echo "after change:" - cat ${updateDBConfigPath} - fi - - # "waiting for blobfuse-proxy service to start" - sleep 3s - # tail blobfuse proxy logs - journalctl -u blobfuse-proxy -f -{{- if hasPrefix "/" .Values.image.blob.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- else }} - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- end }} - imagePullPolicy: IfNotPresent - name: sysctl-install-blobfuse-proxy - env: - - name: DEBIAN_FRONTEND - value: "noninteractive" - - name: INSTALL_BLOBFUSE - value: "{{ .Values.node.blobfuseProxy.installBlobfuse }}" - - name: BLOBFUSE_VERSION - value: "{{ .Values.node.blobfuseProxy.blobfuseVersion }}" - - name: SET_MAX_OPEN_FILE_NUM - value: "{{ .Values.node.blobfuseProxy.setMaxOpenFileNum }}" - - name: MAX_FILE_NUM - value: "{{ .Values.node.blobfuseProxy.maxOpenFileNum }}" - - name: DISABLE_UPDATEDB - value: "{{ .Values.node.blobfuseProxy.disableUpdateDB }}" - resources: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 1Mi - securityContext: - privileged: true - hostNetwork: true - hostPID: true - nodeSelector: - kubernetes.io/os: linux - priorityClassName: system-node-critical - restartPolicy: Always - tolerations: - - operator: Exists - volumes: - - hostPath: - path: /tmp - type: DirectoryOrCreate - name: tmp-dir -{{ end }} diff --git a/charts/v1.8.0/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.8.0/blob-csi-driver/templates/csi-blob-controller.yaml deleted file mode 100644 index 406ae9834..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/csi-blob-controller.yaml +++ /dev/null @@ -1,192 +0,0 @@ -kind: Deployment -apiVersion: apps/v1 -metadata: - name: {{ .Values.controller.name }} - namespace: {{ .Release.Namespace }} - labels: - app: {{ .Values.controller.name }} - {{- include "blob.labels" . | nindent 4 }} -spec: - replicas: {{ .Values.controller.replicas }} - selector: - matchLabels: - app: {{ .Values.controller.name }} - {{- include "blob.selectorLabels" . | nindent 6 }} - template: - metadata: - labels: - app: {{ .Values.controller.name }} - {{- include "blob.labels" . | nindent 8 }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: -{{- with .Values.controller.affinity }} - affinity: -{{ toYaml . | indent 8 }} -{{- end }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: {{ .Values.controller.hostNetwork }} - serviceAccountName: {{ .Values.serviceAccount.controller }} - nodeSelector: - kubernetes.io/os: linux - {{- if .Values.controller.runOnMaster}} - kubernetes.io/role: master - {{- end}} -{{- with .Values.controller.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.controller.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: csi-provisioner -{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" -{{- else }} - image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" -{{- end }} - args: - - "-v=2" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--timeout=120s" - - "--extra-create-metadata=true" - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} - - name: liveness-probe -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.controller.livenessProbe.healthPort }} - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} - - name: blob -{{- if hasPrefix "/" .Values.image.blob.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- else }} - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- end }} - args: - - "--v={{ .Values.controller.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--custom-user-agent={{ .Values.driver.customUserAgent }}" - - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" - - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" - - "--allow-empty-cloud-config={{ .Values.controller.allowEmptyCloudConfig }}" - ports: - - containerPort: {{ .Values.controller.livenessProbe.healthPort }} - name: healthz - protocol: TCP - - containerPort: {{ .Values.controller.metricsPort }} - name: metrics - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} - - name: csi-resizer -{{- if hasPrefix "/" .Values.image.csiResizer.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" -{{- else }} - image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" -{{- end }} - args: - - "-csi-address=$(ADDRESS)" - - "-v=2" - - "-leader-election" - - '-handle-volume-inuse-error=false' - env: - - name: ADDRESS - value: /csi/csi.sock - imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} - volumeMounts: - - name: socket-dir - mountPath: /csi - resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} - volumes: - - name: socket-dir - emptyDir: {} - - name: azure-cred - hostPath: - path: /etc/kubernetes/ - type: DirectoryOrCreate - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.8.0/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.8.0/blob-csi-driver/templates/csi-blob-driver.yaml deleted file mode 100644 index 891826a62..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/csi-blob-driver.yaml +++ /dev/null @@ -1,16 +0,0 @@ ---- -apiVersion: storage.k8s.io/v1 -kind: CSIDriver -metadata: - name: {{ .Values.driver.name }} - labels: - {{- include "blob.labels" . | nindent 4 }} -spec: - attachRequired: false - podInfoOnMount: true - {{- if .Values.feature.enableFSGroupPolicy}} - fsGroupPolicy: File - {{- end}} - volumeLifecycleModes: - - Persistent - - Ephemeral diff --git a/charts/v1.8.0/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.8.0/blob-csi-driver/templates/csi-blob-node.yaml deleted file mode 100644 index d265db038..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/csi-blob-node.yaml +++ /dev/null @@ -1,222 +0,0 @@ -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: {{ .Values.node.name }} - namespace: {{ .Release.Namespace }} - labels: - app: {{ .Values.node.name }} - {{- include "blob.labels" . | nindent 4 }} -spec: - updateStrategy: - rollingUpdate: - maxUnavailable: {{ .Values.node.maxUnavailable }} - type: RollingUpdate - selector: - matchLabels: - app: {{ .Values.node.name }} - {{- include "blob.selectorLabels" . | nindent 6 }} - template: - metadata: - labels: - app: {{ .Values.node.name }} - {{- include "blob.labels" . | nindent 8 }} - {{- if .Values.podLabels }} -{{- toYaml .Values.podLabels | nindent 8 }} - {{- end }} -{{- if .Values.podAnnotations }} - annotations: -{{ toYaml .Values.podAnnotations | indent 8 }} -{{- end }} - spec: - {{- if .Values.imagePullSecrets }} - imagePullSecrets: -{{ toYaml .Values.imagePullSecrets | indent 8 }} - {{- end }} - hostNetwork: true - dnsPolicy: Default - serviceAccountName: {{ .Values.serviceAccount.node }} - nodeSelector: - kubernetes.io/os: linux -{{- with .Values.node.nodeSelector }} -{{ toYaml . | indent 8 }} -{{- end }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet - {{- if .Values.node.affinity }} -{{- toYaml .Values.node.affinity | nindent 8 }} - {{- end }} - priorityClassName: {{ .Values.priorityClassName | quote }} -{{- with .Values.node.tolerations }} - tolerations: -{{ toYaml . | indent 8 }} -{{- end }} - containers: - - name: liveness-probe - imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} - volumeMounts: - - mountPath: /csi - name: socket-dir -{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- else }} - image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" -{{- end }} - args: - - --csi-address=/csi/csi.sock - - --probe-timeout=3s - - --health-port={{ .Values.node.livenessProbe.healthPort }} - - --v=2 - resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} - - name: node-driver-registrar -{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- else }} - image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" -{{- end }} - args: - - --csi-address=$(ADDRESS) - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --v=2 - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} - - name: blob -{{- if hasPrefix "/" .Values.image.blob.repository }} - image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- else }} - image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" -{{- end }} - args: - - "--v={{ .Values.node.logLevel }}" - - "--endpoint=$(CSI_ENDPOINT)" - - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" - - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" - - "--nodeid=$(KUBE_NODE_NAME)" - - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" - - "--drivername={{ .Values.driver.name }}" - - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" - - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" - - "--custom-user-agent={{ .Values.driver.customUserAgent }}" - - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" - - "--allow-empty-cloud-config={{ .Values.node.allowEmptyCloudConfig }}" - - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" - - "--append-timestamp-cache-dir={{ .Values.node.appendTimeStampInCacheDir }}" - - "--mount-permissions={{ .Values.node.mountPermissions }}" - ports: - - containerPort: {{ .Values.node.livenessProbe.healthPort }} - name: healthz - protocol: TCP - livenessProbe: - failureThreshold: 5 - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 30 - timeoutSeconds: 10 - periodSeconds: 30 - env: - - name: AZURE_CREDENTIAL_FILE - valueFrom: - configMapKeyRef: - name: azure-cred-file - key: path - optional: true - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: BLOBFUSE_PROXY_ENDPOINT - value: unix:///csi/blobfuse-proxy.sock - - name: KUBE_NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: AZURE_ENVIRONMENT_FILEPATH - value: /etc/kubernetes/azurestackcloud.json - {{- end }} - imagePullPolicy: {{ .Values.image.blob.pullPolicy }} - securityContext: - privileged: true - volumeMounts: - - mountPath: /csi - name: socket-dir - - mountPath: {{ .Values.linux.kubelet }}/ - mountPropagation: Bidirectional - name: mountpoint-dir - - mountPath: /etc/kubernetes/ - name: azure-cred - - mountPath: /mnt - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - - name: ssl-pki - mountPath: /etc/pki/ca-trust/extracted - readOnly: true - {{- end }} - resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} - volumes: - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} - type: DirectoryOrCreate - name: socket-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/ - type: DirectoryOrCreate - name: mountpoint-dir - - hostPath: - path: {{ .Values.linux.kubelet }}/plugins_registry/ - type: DirectoryOrCreate - name: registration-dir - - hostPath: - path: /etc/kubernetes/ - type: DirectoryOrCreate - name: azure-cred - - hostPath: - path: {{ .Values.node.blobfuseCachePath }} - name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - {{- end }} - {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - - name: ssl-pki - hostPath: - path: /etc/pki/ca-trust/extracted - {{- end }} - {{- if .Values.securityContext }} - securityContext: {{- toYaml .Values.securityContext | nindent 8 }} - {{- end }} diff --git a/charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml deleted file mode 100644 index 39619c932..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-controller.yaml +++ /dev/null @@ -1,115 +0,0 @@ -{{- if .Values.rbac.create -}} -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-provisioner-role - labels: - {{- include "blob.labels" . | nindent 4 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-provisioner-binding - labels: - {{- include "blob.labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-provisioner-role - apiGroup: rbac.authorization.k8s.io - ---- - -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-external-resizer-role - labels: - {{- include "blob.labels" . | nindent 4 }} -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "update", "patch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims/status"] - verbs: ["update", "patch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "list", "watch", "create", "update", "patch"] ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ .Values.rbac.name }}-csi-resizer-role - labels: - {{- include "blob.labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: {{ .Values.rbac.name }}-external-resizer-role - apiGroup: rbac.authorization.k8s.io - ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-role - labels: - {{- include "blob.labels" . | nindent 4 }} -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list", "create"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-controller-secret-binding - labels: - {{- include "blob.labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-controller-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml deleted file mode 100644 index d269aea3d..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/rbac-csi-blob-node.yaml +++ /dev/null @@ -1,29 +0,0 @@ -{{- if .Values.rbac.create -}} ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-role - labels: - {{- include "blob.labels" . | nindent 4 }} -rules: - - apiGroups: [""] - resources: ["secrets"] - verbs: ["get", "list"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-{{ .Values.rbac.name }}-node-secret-binding - labels: - {{- include "blob.labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: csi-{{ .Values.rbac.name }}-node-secret-role - apiGroup: rbac.authorization.k8s.io -{{ end }} diff --git a/charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml deleted file mode 100644 index 9c9fb477b..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml +++ /dev/null @@ -1,9 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.controller }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "blob.labels" . | nindent 4 }} -{{- end -}} diff --git a/charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml deleted file mode 100644 index e1dc20bd2..000000000 --- a/charts/v1.8.0/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml +++ /dev/null @@ -1,9 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ .Values.serviceAccount.node }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "blob.labels" . | nindent 4 }} -{{- end -}} diff --git a/charts/v1.8.0/blob-csi-driver/values.yaml b/charts/v1.8.0/blob-csi-driver/values.yaml deleted file mode 100644 index 35ca88248..000000000 --- a/charts/v1.8.0/blob-csi-driver/values.yaml +++ /dev/null @@ -1,160 +0,0 @@ -image: - baseRepo: mcr.microsoft.com - blob: - repository: /k8s/csi/blob-csi - tag: v1.8.0 - pullPolicy: IfNotPresent - csiProvisioner: - repository: /oss/kubernetes-csi/csi-provisioner - tag: v2.2.2 - pullPolicy: IfNotPresent - livenessProbe: - repository: /oss/kubernetes-csi/livenessprobe - tag: v2.5.0 - pullPolicy: IfNotPresent - nodeDriverRegistrar: - repository: /oss/kubernetes-csi/csi-node-driver-registrar - tag: v2.4.0 - pullPolicy: IfNotPresent - csiResizer: - repository: /oss/kubernetes-csi/csi-resizer - tag: v1.3.0 - pullPolicy: IfNotPresent - -cloud: AzurePublicCloud - -## Reference to one or more secrets to be used when pulling images -## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] -# - name: myRegistryKeySecretName - -serviceAccount: - create: true # When true, service accounts will be created for you. Set to false if you want to use your own. - controller: csi-blob-controller-sa # Name of Service Account to be created or used - node: csi-blob-node-sa # Name of Service Account to be created or used - -rbac: - create: true - name: blob - -## Collection of annotations to add to all the pods -podAnnotations: {} -## Collection of labels to add to all the pods -podLabels: {} -# -- Custom labels to add into metadata -customLabels: {} - # k8s-app: blob-csi-driver - -## Leverage a PriorityClass to ensure your pods survive resource shortages -## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ -priorityClassName: system-cluster-critical -## Security context give the opportunity to run container as nonroot by setting a securityContext -## by example : -## securityContext: { runAsUser: 1001 } -securityContext: {} - -controller: - name: csi-blob-controller - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - allowEmptyCloudConfig: true - hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting - metricsPort: 29634 - livenessProbe: - healthPort: 29632 - replicas: 2 - runOnMaster: false - logLevel: 5 - resources: - csiProvisioner: - limits: - memory: 500Mi - requests: - cpu: 10m - memory: 20Mi - livenessProbe: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - memory: 200Mi - requests: - cpu: 10m - memory: 20Mi - csiResizer: - limits: - memory: 500Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - key: "node-role.kubernetes.io/master" - operator: "Exists" - effect: "NoSchedule" - - key: "node-role.kubernetes.io/controlplane" - operator: "Exists" - effect: "NoSchedule" - -node: - name: csi-blob-node - cloudConfigSecretName: azure-cloud-provider - cloudConfigSecretNamespace: kube-system - allowEmptyCloudConfig: true - maxUnavailable: 1 - metricsPort: 29635 - livenessProbe: - healthPort: 29633 - logLevel: 5 - enableBlobfuseProxy: false - blobfuseProxy: - installBlobfuse: true - blobfuseVersion: 1.4.2 - setMaxOpenFileNum: true - maxOpenFileNum: "9000000" - disableUpdateDB: true - blobfuseCachePath: /mnt - appendTimeStampInCacheDir: false - mountPermissions: 0777 - resources: - livenessProbe: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - nodeDriverRegistrar: - limits: - memory: 100Mi - requests: - cpu: 10m - memory: 20Mi - blob: - limits: - memory: 2100Mi - requests: - cpu: 10m - memory: 20Mi - affinity: {} - nodeSelector: {} - tolerations: - - operator: "Exists" - livenessProbe: - healthPort: 29633 - -feature: - enableFSGroupPolicy: false - enableGetVolumeStats: false - -driver: - name: blob.csi.azure.com - customUserAgent: "" - userAgentSuffix: "OSS-helm" - -linux: - kubelet: /var/lib/kubelet - distro: debian diff --git a/charts/v1.9.0/blob-csi-driver-v1.9.0.tgz b/charts/v1.9.0/blob-csi-driver-v1.9.0.tgz deleted file mode 100644 index 780358ce3a034ca59b01695ded728ae9e4ffb85e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 5815 zcmV;o7D(wIiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH>QbKAJF_gQ}hMoF8r? z4*c)7Ryv(d=jh--{omO%kNBiIH9d!4)N1dZ?cmKQ2-of5s_dC?t9trg&<^r?t zI#0%BcJ6mla72Cv#t993Xuj9LQB?TZ`dh2h@PNCFL_$3~`7LIE-uZNlMuIXt1#~(( zM_PCqAr7F243TQg4S+A*4o{ z)hK;3hY&cwWONMcVN9DuvPl77w{^H0Ur0STQ@V8pQ^EzqkLagtoM@)Q(&i-!4%TAw z6>##~V;IbIgVK1eMAdM88hgnkaT$+&;-1PUjmE22=n5vlAanrO zaQS!)DCXdy&oc-W8WK*Cl29%|FqrhvOo)j0+6AIpgtk5E^0vVImbYCRPRKN7;6&7O zTp9{YLSStP&r!gfh>dOIXhIoU(71(0 zAS62`*yn)AL_S2Hai|`~9OQ3?=;yE{@zGE)>ifWYa-8mE#{S2`FHG!8>5u>7TD0(+kN&-am- z0g9-{8xi$R@>)G~|4;?v<1zTlAbe02bYtW==rrbn21Yv)3W@>{*uw%hTvese5TRG- z_6P3ZD60BBlBN$Z2jwMUbjb*1L@Z8y%oThHxpbz~U`nD8kJ+5e0Wsh-W-cH;qfD$T z{Vok%h(xXciaTwo1W|(8i5NhjT)B25D$+AlBf=M4K;XE3%mpyVWke7c`x5&I+*sCD z@&F0(m(o0)Dt_f!-9uO!Fh{-A zQ;k<&n@8A%9+Cs%X#O>jlr{Q!5JZx@S({A!XOxQ}h|iSWW_Ci%2+#QA(%AQ;LV1Ma zu@9a!0y*KxqagVzkOvWj9-<-oI66<8H;|NAMqGYLndqVJ-;VYV>@(jCurFqLwQfUA z4?b}*?;-Uo4llxwSjt0B8zc#dPNiV`J#?rVXmRBlrfp7_$O9sH`b$z6s0rw>)A>k} zrwslR125KcqgW1gP-)gpTUk0)k8JOW$Z{{J9!K|yILz7lYq1VbCPeCNV#lP3AAz)= zlqHV@^?@ZORzY#lEi8Jdsip%)eQ1@_q|Lh~0gMC=qVrHyIU@!86iA=s z5?DYu*B(OW`1rVLs-D$&)Gh>G*j_yi$wp?xs%46_(8ML@JSfoNw8A=eGom=o@3Vb$+(?7X()*ojP{TRV}iq%j)s}>9|1w+V*$K9 zytp2WTH;PT8ON&l@BUHOi2ocO9UkuDKhIIFXRth|iwH;4#4q(A^63K9a!M^*l9fWM z(YU6_oq>D10+?Rs2rOd$J&Jt59HficYa~kJ3LiO6m`%}Oiu@X$n#^BD_w_R)NH;Ka(b2y8lLUIU zMNKCMCKtX=N?YSpMVK@#nmS2pvh{>8*MY_HBBxkKdRh%T;i^iGEMg=S6V&_@cmBki z2s7c($)kH7 z;1Ey2bHdPx z|Ibnk&6Ml+mL+7AOf7k?2#zA&p6@koN$B;^8HRv{BM^;rucR7e%VjBfm4wRbT>J(~ zW)mF?sLmIDHcxy(AqhPQ1v-!oc?4?LDV38zT_lZ4arX-KojgFA3zm6ua!S&qS60}FWh zwKSND7lXTqK@uP{YM?wCE8RiM+hXK(NX2<*t)sI^Y|u4^IbkBkzLQ5skP1N(ahlCB zdF#~BM+_p&z!{SeGXgxFUS^nIGElBnyIGzzT1sN_oo_8)Y0*g#s3}FU+$u?mKo1Yq zcNK^|dmVwNasjGmAfLm!xHp2YC%YWHOM?JQ75(K6pS}4Wy>Z+(-=n4*A;ZA8|Jw3k zjM^fI+Rc9zAk0+&?W5YVE{~*>1X^`;Rs@kT&U&;&5IG)Ujg%hSxTaJZ;6o0f0A@UW z<2VAdDTp`bi@nMd$5A9&p2vb)o|4G5JPj?l948{4<*E6I&nk5)D83kslS?t@&Q!be z;pqD0!-t!9A1>a#|1=u(U*DULdX8W*JQxkh1igKWn$_wLP1NtBrfkzhfBB2iOw6FF z)n0TvMGnz&5@GiiPk}pGx{#D5PYKeW|BP@XP^<#`$uDOLBHds>&LRu)_g~+qB;EWx zxEh^b49z}FNMi{hhOgqm*r*-cdW0b-ssv=)ksnVX87r2|Mh+P=;CrP%$~0pUu&BU2AMCo3dDUz6W*E- zADjT+^c5*#9 zd)I$`Z$4VV1+%)r04a-a-y#8AAZLPJ-&g5;Sd&lS&M0b*VM3V-Duh!KPVEqTWf zv9Q;zjt6*B)Zg&-<<+O*;PT}9@1uV6S0(!8CqXFCuTsW;l|ue&D&kFgYlGH2!xI5avkacVnyS#fLe0;ZsA#oZs+QF*OTiLUtEGvV`v4Kz z=M|s=6F={;2IkYLS@GXAW+C>K^28=`XR>ot>K&DAZC{hcn3gcjRC0yyBy)+)?@pvG zoL8I*1>kJ(?)+qU^Zx2$cs&@N8RMw@R+Whm66t|pSCBb0t&q$~wFXpyC2EmX+Invp zyY7ljHe}{Bxe+pBBfl1zbvoGyV{!7diWBTTl3Hi_@47}_eZ8-)S$gjPHF^u0#0UeItgp*B*hJ6t)* zN4nt#fyZ@dS(kA?RGQ?m;Vfr9-A*xfmGbvX;1zab%AgAg{dt?hS%98pAIoU=1r@Ox zUZ$1?`S3FlGaJX!=xhOf7MU&JUXG^1HT#|wDtf$y9WS$omDXkC6~0<#Zo7CCs^sm; zr&)%krk7tApyd!Y@dGL>E9z#ReqIoyGCW3o=pmhaY|2_PKy^c2B-hv~T{X-W@1?-1 z%3E`vw~nHME0g0Y`8SWC(H?Bgw`GdQ=+;=8mNWaeyGUIIySkh-YHzr3-5ySJF^k!> z5-V>y^M2P{j5HnPd|}UHzlO)4nU-cXJNoeG8d_G$gWj%^EdgDX_j2V8Rcu=r z*HN&tD%A<3uBk>N(-$M)CoAaGb0?xq^zAcfnc6&6eMMMnMXxsz|0M!0OTBh%ApRw4 zS4zJ+;<*cYK60LL=5->Mob0hgwWN6uy@--f^k2U{9i86{hG&--=fi8;RFWJo%9N$k zQvZ5(w1vY+cFa00L~JvkN<(vE4$Q$*2!*A!aSFo@D2L#1m0M{6WE|Y6 zp-7$a(g$cAo$}_G-6}A~dIIcmkn=S6HNmILXA2H>%*=rx5{nYP8t~RrX$E9z|0)ui zxt024&Qr`I%I0TX<2U17#HgSy^?T_0^l}q2%Cc+4oK#s8v-QlFE)z`rn8Edo0iRLd z(+BYKG7}>D5ri4YO~Q;d3{ZWuy^||bg8eh_@nQrn4L#mN`<-&AQcrN%>%H>p2pFNB zy>Y!8_EFbc+Q0Q zwj3mtpCq|wc}LYLckGv<)a8y8jilYFjYD$RYq#rNiDYVn|Ky@4RS7lKDVUMK?yb_T zrYU=6W)6lwpI==JKMsc1ikp`w*MF~Zvq89p!~bo?BrfqN#I1jG8dfM=z1L=+x}Mb) zHyaxrwF1gTWV@rnxxd7Rl9X}ow_RYuv>FVscM<8M9OVTEfA zJES!?4|6;b*LrU2x`7O97-U6o%UL{Rj^h0=u)T2&ykOu${ZK76DeWVe`HN}h3%rYAaR5X~R} zhW+1>VOm4~RpQ%IE`(jK|J}~Pp?Uwu@nQFPr~l7U%=3GXPXAHTvCYIE1K>txLuZbU z1j7QR$-z453zKlFlQmQK$Gm&Xq@(;krAYgtS4DuEWDZq&`XV_)7AkhxLd8>?-&#UX zA%NnAJe|DG^xYbnxBZw*9w`Ew=I~UKS+qQDo>;RxBx_)>ACj%erQ&-rhs~mN@dc51yg^kO68t87B#jY}i497M6|rZ&)`io1NYXUIp>^W3&F z(aI-xi!HOGu9sIA|M=%pAUeKhz^c$}yVl4`zN}5W{_D3teR?;z8D5+XZiXix2OB2R z={UmIN}*dLVNDV6HB!~;0WV2X`}UIl)=8Vw3#T;_=E@Q|1(EJpbAbgff-DE8%Qscm z5UOrISFR}+IEWk*HP)ULkHA&hr9Mwptn}ZRs<_F$2k4nn z9GCg`R^OS?2v4#85a&DMsZsM8k_631-pTQ#rEz)YUGp*zi$ZTs;zktI=<|~qb(4PuaTBs?SN$t)Re4IT-x8~| zHakk!`D9-iDvL+0`PwBL?vf4v7^Ob{hmEo8Y~>Q575RTh`^U!j-@ALqoz5=*=Q)a@ zQF72*`i1~?<#&?&r$6&^MSUnG2&vjQ7BkAoZ)yf8&KSl7D$}P6gF&1B9-RNw79no!ex?RnFbCVNPneKIVMQey-Ukm_sNw;9Sz1?@=?V zL$|tHE+=w2-)e`R1kk0Fc_b{VgbjzvjoS*-8jj;Ms@nRFgdPc}Uqfk)`(vDOf@<@W z-+26Qa7CiEx+|kno>C+C$sThn(K;!K(%K~9m#WEoiv3E(VhP{t2Jfqy+T;w}@4?Kj zVIsC{WuJthtv_#PBHFMQcDwpCgZk{&Ny_(g+otUZ_#eP18H`xlAZ^ti$q}g?t&BP8 zZsYSArR1|#D}+3e?SIuUW($)1IR5+>%(WW{%sR6DP2a}*{AJzs|5FYDtyur>?H_c_ z^M42Xd%N}jbCeb9|7V>DR6gOiI0d|r;V<&zTQT{?qax2@>@7mEGxOUk_4Yp*c&rEh zDUsk+=f5l8fA8)eA0O@P|8tbej!N0V%Vz>33&mN!oi;%^y+P*Z$zpe6k z{eQeCxKjTQjqksAyN3rm|L `blobfuse-proxy` parameter is only available for debian based agent nodes, remove it if it's not applicable for your cluster. -> -If you have already installed Helm, you can also use it to install Azure Blob Storage CSI driver. Please see [Installation with Helm](../charts/README.md). - -## Install with kubectl - - remote install -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.7.0/deploy/install-driver.sh | bash -s v1.7.0 blobfuse-proxy -- -``` - - - local install -```console -git clone https://github.com/kubernetes-sigs/blob-csi-driver.git -cd blob-csi-driver -./deploy/install-driver.sh v1.7.0 local,blobfuse-proxy -``` - -- check pods status: -```console -kubectl -n kube-system get pod -o wide -l app=csi-blob-controller -kubectl -n kube-system get pod -o wide -l app=csi-blob-node -``` - -example output: - -```console -NAME READY STATUS RESTARTS AGE IP NODE -csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 -csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 -csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 -csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 -``` - -- clean up Azure Blob Storage CSI driver -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.7.0/deploy/uninstall-driver.sh | bash -s v1.7.0 blobfuse-proxy -- -``` diff --git a/docs/install-csi-driver-v1.8.0.md b/docs/install-csi-driver-v1.8.0.md deleted file mode 100644 index e1f354da3..000000000 --- a/docs/install-csi-driver-v1.8.0.md +++ /dev/null @@ -1,38 +0,0 @@ -# Install Azure Blob Storage CSI driver v1.8.0 version on a kubernetes cluster -> `blobfuse-proxy` parameter is only available for debian based agent nodes, remove it if it's not applicable for your cluster. -> -If you have already installed Helm, you can also use it to install Azure Blob Storage CSI driver. Please see [Installation with Helm](../charts/README.md). - -## Install with kubectl - - remote install -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.8.0/deploy/install-driver.sh | bash -s v1.8.0 blobfuse-proxy -- -``` - - - local install -```console -git clone https://github.com/kubernetes-sigs/blob-csi-driver.git -cd blob-csi-driver -./deploy/install-driver.sh v1.8.0 local,blobfuse-proxy -``` - -- check pods status: -```console -kubectl -n kube-system get pod -o wide -l app=csi-blob-controller -kubectl -n kube-system get pod -o wide -l app=csi-blob-node -``` - -example output: - -```console -NAME READY STATUS RESTARTS AGE IP NODE -csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 -csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 -csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 -csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 -``` - -- clean up Azure Blob Storage CSI driver -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.8.0/deploy/uninstall-driver.sh | bash -s v1.8.0 blobfuse-proxy -- -``` diff --git a/docs/install-csi-driver-v1.9.0.md b/docs/install-csi-driver-v1.9.0.md deleted file mode 100644 index 806095972..000000000 --- a/docs/install-csi-driver-v1.9.0.md +++ /dev/null @@ -1,47 +0,0 @@ -# Install Azure Blob Storage CSI driver v1.9.0 version on a kubernetes cluster -> `blobfuse-proxy` is only available for debian based agent nodes, remove `blobfuse-proxy` parameter in installation steps if it's not applicable. -> -If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). - -## Install with kubectl - - Option#1. remote install -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.9.0/deploy/install-driver.sh | bash -s v1.9.0 blobfuse-proxy -- -``` - - - Option#2. local install -```console -git clone https://github.com/kubernetes-sigs/blob-csi-driver.git -cd blob-csi-driver -./deploy/install-driver.sh v1.9.0 local,blobfuse-proxy -``` - -- check pods status: -```console -kubectl -n kube-system get pod -o wide -l app=csi-blob-controller -kubectl -n kube-system get pod -o wide -l app=csi-blob-node -``` - -example output: - -```console -NAME READY STATUS RESTARTS AGE IP NODE -csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 -csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 -csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 -csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 -``` - -### clean up Blob CSI driver -- Option#1. remote uninstall -```console -curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.9.0/deploy/uninstall-driver.sh | bash -s v1.9.0 blobfuse-proxy -- -``` - - - Option#2. local uninstall -```console -git clone https://github.com/kubernetes-sigs/blob-csi-driver.git -cd blob-csi-driver -git checkout v1.9.0 -./deploy/install-driver.sh v1.9.0 local -```