From 413959b5c26891a4187868b352693d21dcadf527 Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Mon, 6 Jan 2025 11:51:36 +0000 Subject: [PATCH] doc: cut v1.24.6 release --- Makefile | 2 +- README.md | 2 +- charts/index.yaml | 109 +++--- charts/latest/blob-csi-driver-v1.24.5.tgz | Bin 6251 -> 0 bytes charts/latest/blob-csi-driver-v1.24.6.tgz | Bin 0 -> 6248 bytes charts/latest/blob-csi-driver/Chart.yaml | 4 +- charts/latest/blob-csi-driver/values.yaml | 2 +- charts/v1.24.6/blob-csi-driver-v1.24.6.tgz | Bin 0 -> 6248 bytes charts/v1.24.6/blob-csi-driver/Chart.yaml | 5 + .../blob-csi-driver/templates/NOTES.txt | 5 + .../blob-csi-driver/templates/_helpers.tpl | 49 +++ .../templates/csi-blob-controller.yaml | 255 +++++++++++++ .../templates/csi-blob-driver.yaml | 16 + .../templates/csi-blob-node.yaml | 339 ++++++++++++++++++ .../templates/rbac-csi-blob-controller.yaml | 115 ++++++ .../templates/rbac-csi-blob-node.yaml | 29 ++ .../serviceaccount-csi-blob-controller.yaml | 17 + .../serviceaccount-csi-blob-node.yaml | 17 + charts/v1.24.6/blob-csi-driver/values.yaml | 186 ++++++++++ deploy/csi-blob-controller.yaml | 2 +- deploy/csi-blob-node.yaml | 6 +- deploy/v1.24.6/csi-blob-controller.yaml | 162 +++++++++ deploy/v1.24.6/csi-blob-driver.yaml | 12 + deploy/v1.24.6/csi-blob-node.yaml | 248 +++++++++++++ deploy/v1.24.6/kustomization.yaml | 10 + deploy/v1.24.6/rbac-csi-blob-controller.yaml | 108 ++++++ deploy/v1.24.6/rbac-csi-blob-node.yaml | 30 ++ docs/install-blob-csi-driver.md | 2 +- docs/install-csi-driver-v1.24.6.md | 47 +++ 29 files changed, 1719 insertions(+), 60 deletions(-) delete mode 100644 charts/latest/blob-csi-driver-v1.24.5.tgz create mode 100644 charts/latest/blob-csi-driver-v1.24.6.tgz create mode 100644 charts/v1.24.6/blob-csi-driver-v1.24.6.tgz create mode 100644 charts/v1.24.6/blob-csi-driver/Chart.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/NOTES.txt create mode 100644 charts/v1.24.6/blob-csi-driver/templates/_helpers.tpl create mode 100644 charts/v1.24.6/blob-csi-driver/templates/csi-blob-controller.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/csi-blob-driver.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/csi-blob-node.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-controller.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-node.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml create mode 100644 charts/v1.24.6/blob-csi-driver/values.yaml create mode 100644 deploy/v1.24.6/csi-blob-controller.yaml create mode 100644 deploy/v1.24.6/csi-blob-driver.yaml create mode 100644 deploy/v1.24.6/csi-blob-node.yaml create mode 100644 deploy/v1.24.6/kustomization.yaml create mode 100644 deploy/v1.24.6/rbac-csi-blob-controller.yaml create mode 100644 deploy/v1.24.6/rbac-csi-blob-node.yaml create mode 100644 docs/install-csi-driver-v1.24.6.md diff --git a/Makefile b/Makefile index b559b7888..45b40685f 100644 --- a/Makefile +++ b/Makefile @@ -17,7 +17,7 @@ GIT_COMMIT ?= $(shell git rev-parse HEAD) REGISTRY ?= andyzhangx REGISTRY_NAME ?= $(shell echo $(REGISTRY) | sed "s/.azurecr.io//g") IMAGE_NAME ?= blob-csi -IMAGE_VERSION ?= v1.24.5 +IMAGE_VERSION ?= v1.24.6 CLOUD ?= AzurePublicCloud # Use a custom version for E2E tests if we are in Prow ifdef CI diff --git a/README.md b/README.md index aab761780..3c155b1de 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ Disclaimer: Deploying this driver manually is not an officially supported Micros |driver version |Image | supported k8s version | |----------------|------------------------------------------------------|-----------------------| |master branch |mcr.microsoft.com/k8s/csi/blob-csi:latest | 1.21+ | -|v1.24.5 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.5 | 1.21+ | +|v1.24.6 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 | 1.21+ | |v1.23.3 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.23.3 | 1.21+ | |v1.22.5 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.22.5 | 1.21+ | diff --git a/charts/index.yaml b/charts/index.yaml index b325dcec4..8fd5981c5 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -2,26 +2,35 @@ apiVersion: v1 entries: blob-csi-driver: - apiVersion: v1 - appVersion: v1.24.5 - created: "2024-10-10T01:56:48.239751364Z" + appVersion: v1.24.6 + created: "2025-01-06T11:51:06.679795424Z" description: Azure Blob Storage CSI driver - digest: 5a8564ab3ebd24afaab8f540c76313534761701ed18b8dc30da210997cb18b6d + digest: 5325f237fabfc4a2bfaa8271fb6ffc638b4afc97ad12992c5cd7ccb055a9fa27 name: blob-csi-driver urls: - - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/latest/blob-csi-driver-v1.24.5.tgz - version: v1.24.5 + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/latest/blob-csi-driver-v1.24.6.tgz + version: v1.24.6 + - apiVersion: v1 + appVersion: v1.24.6 + created: "2025-01-06T11:51:06.704934902Z" + description: Azure Blob Storage CSI driver + digest: 5325f237fabfc4a2bfaa8271fb6ffc638b4afc97ad12992c5cd7ccb055a9fa27 + name: blob-csi-driver + urls: + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.24.6/blob-csi-driver-v1.24.6.tgz + version: v1.24.6 - apiVersion: v1 appVersion: v1.24.5 - created: "2024-10-10T01:56:48.263815147Z" + created: "2025-01-06T11:51:06.704262379Z" description: Azure Blob Storage CSI driver - digest: 2949d445742ac2fdc41d5bfae0b087773ae5fca1b66d88d32b8352323430d902 + digest: e5fc6c2e835e71ef3de5ea38bea44a8fc5feaedfee985789d67d248119e42ecd name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.24.5/blob-csi-driver-v1.24.5.tgz version: v1.24.5 - apiVersion: v1 appVersion: v1.24.4 - created: "2024-10-10T01:56:48.263164922Z" + created: "2025-01-06T11:51:06.703533169Z" description: Azure Blob Storage CSI driver digest: 503a371f77dd2ea61d911f6b3b37200b1206c9cc115e1b9815541b405792e103 name: blob-csi-driver @@ -30,7 +39,7 @@ entries: version: v1.24.4 - apiVersion: v1 appVersion: v1.24.3 - created: "2024-10-10T01:56:48.262484872Z" + created: "2025-01-06T11:51:06.702000204Z" description: Azure Blob Storage CSI driver digest: ab0f4f576f7e06001167d305e9faaa603b819a937ec11a98c6e06f012ead88a8 name: blob-csi-driver @@ -39,7 +48,7 @@ entries: version: v1.24.3 - apiVersion: v1 appVersion: v1.24.2 - created: "2024-10-10T01:56:48.261801203Z" + created: "2025-01-06T11:51:06.701338817Z" description: Azure Blob Storage CSI driver digest: b5864539d99703fd378d7b9024d3cffd246c0fe352737494aa00ef71b51710ae name: blob-csi-driver @@ -48,7 +57,7 @@ entries: version: v1.24.2 - apiVersion: v1 appVersion: v1.24.1 - created: "2024-10-10T01:56:48.261155772Z" + created: "2025-01-06T11:51:06.700675918Z" description: Azure Blob Storage CSI driver digest: d5ab97621903b1bd49dffff374c1d68663fccb4daa494fdaf31bf88f0722fae5 name: blob-csi-driver @@ -57,7 +66,7 @@ entries: version: v1.24.1 - apiVersion: v1 appVersion: v1.24.0 - created: "2024-10-10T01:56:48.260494471Z" + created: "2025-01-06T11:51:06.700039263Z" description: Azure Blob Storage CSI driver digest: c9ecca2dde77d9557f3917513c8f5adcb861c2cfa9fe1e08f5bef056ab583efd name: blob-csi-driver @@ -66,7 +75,7 @@ entries: version: v1.24.0 - apiVersion: v1 appVersion: v1.23.3 - created: "2024-10-10T01:56:48.259850662Z" + created: "2025-01-06T11:51:06.699403465Z" description: Azure Blob Storage CSI driver digest: 4acef5e84bcbc01fa624b73f14d1331ee14b14e52b4db018f0037fd2ada015c7 name: blob-csi-driver @@ -75,7 +84,7 @@ entries: version: v1.23.3 - apiVersion: v1 appVersion: v1.23.2 - created: "2024-10-10T01:56:48.259133446Z" + created: "2025-01-06T11:51:06.698754002Z" description: Azure Blob Storage CSI driver digest: 057d6658c5879ee7e564d59275366521dc0a2e311c0527e570eaccd544622e60 name: blob-csi-driver @@ -84,7 +93,7 @@ entries: version: v1.23.2 - apiVersion: v1 appVersion: v1.23.1 - created: "2024-10-10T01:56:48.257647685Z" + created: "2025-01-06T11:51:06.698122908Z" description: Azure Blob Storage CSI driver digest: 66215f12a4e3acdcf09416d817b737e14546058b081a2cfd8bf9ef507229ca07 name: blob-csi-driver @@ -93,7 +102,7 @@ entries: version: v1.23.1 - apiVersion: v1 appVersion: v1.23.0 - created: "2024-10-10T01:56:48.256983957Z" + created: "2025-01-06T11:51:06.697414916Z" description: Azure Blob Storage CSI driver digest: 57151e21e33660522f25694bd8ae985e5e17c7ffe09904ad2af4025e8bf1da72 name: blob-csi-driver @@ -102,7 +111,7 @@ entries: version: v1.23.0 - apiVersion: v1 appVersion: v1.22.5 - created: "2024-10-10T01:56:48.256340601Z" + created: "2025-01-06T11:51:06.695888765Z" description: Azure Blob Storage CSI driver digest: ff3c2c2e05dd048dd0af3e5c7d002eae2928a5d17fb269a1e4d5cadd30e8ab51 name: blob-csi-driver @@ -111,7 +120,7 @@ entries: version: v1.22.5 - apiVersion: v1 appVersion: v1.22.4 - created: "2024-10-10T01:56:48.255711427Z" + created: "2025-01-06T11:51:06.69526354Z" description: Azure Blob Storage CSI driver digest: 6c38e79d2f50616daac0658cfa5b1a569e6ff8ce8f24ed40f563e87fb1d1340a name: blob-csi-driver @@ -120,7 +129,7 @@ entries: version: v1.22.4 - apiVersion: v1 appVersion: v1.22.3 - created: "2024-10-10T01:56:48.255049314Z" + created: "2025-01-06T11:51:06.694618386Z" description: Azure Blob Storage CSI driver digest: 6cdee296d22ecd330f477f2ca6da51b07320c546c04ae46c23eef48146b772c1 name: blob-csi-driver @@ -129,7 +138,7 @@ entries: version: v1.22.3 - apiVersion: v1 appVersion: v1.22.2 - created: "2024-10-10T01:56:48.254405701Z" + created: "2025-01-06T11:51:06.69399279Z" description: Azure Blob Storage CSI driver digest: 259e66dc12db7310fe1c51e49c964398e0a6b7d511133916dd7d25f748f0b791 name: blob-csi-driver @@ -138,7 +147,7 @@ entries: version: v1.22.2 - apiVersion: v1 appVersion: v1.22.1 - created: "2024-10-10T01:56:48.253773944Z" + created: "2025-01-06T11:51:06.6933466Z" description: Azure Blob Storage CSI driver digest: 8329d477d55c82f97bb09fb172c5f39a1677bedc13c7410bd93b306194516438 name: blob-csi-driver @@ -147,7 +156,7 @@ entries: version: v1.22.1 - apiVersion: v1 appVersion: v1.21.7 - created: "2024-10-10T01:56:48.253045012Z" + created: "2025-01-06T11:51:06.692691287Z" description: Azure Blob Storage CSI driver digest: 1095721182d611e2556c611dd330758d8130fe66493db4f9189586a9219896d3 name: blob-csi-driver @@ -156,7 +165,7 @@ entries: version: v1.21.7 - apiVersion: v1 appVersion: v1.21.6 - created: "2024-10-10T01:56:48.252174397Z" + created: "2025-01-06T11:51:06.692092622Z" description: Azure Blob Storage CSI driver digest: d5ba1f92795ec45970eb6e5fc54aa13a5684f9936216c064f8a3843bf722bf54 name: blob-csi-driver @@ -165,7 +174,7 @@ entries: version: v1.21.6 - apiVersion: v1 appVersion: v1.21.5 - created: "2024-10-10T01:56:48.250899938Z" + created: "2025-01-06T11:51:06.691427152Z" description: Azure Blob Storage CSI driver digest: b403e9d49abfe076ecd83d6dd50166347ee4305f33dc840019474b2876723b9b name: blob-csi-driver @@ -174,7 +183,7 @@ entries: version: v1.21.5 - apiVersion: v1 appVersion: v1.21.4 - created: "2024-10-10T01:56:48.250286689Z" + created: "2025-01-06T11:51:06.689883627Z" description: Azure Blob Storage CSI driver digest: e4fa13670caf6b0d3e9fefa55d100daa439cd7187dabd45318ab03c7d4b17710 name: blob-csi-driver @@ -183,7 +192,7 @@ entries: version: v1.21.4 - apiVersion: v1 appVersion: v1.20.3 - created: "2024-10-10T01:56:48.249688143Z" + created: "2025-01-06T11:51:06.689283723Z" description: Azure Blob Storage CSI driver digest: 8c2c20547b2e0e1b39d2f2efd04c1bd778f14af5feae2bda86d722dac3c02643 name: blob-csi-driver @@ -192,7 +201,7 @@ entries: version: v1.20.3 - apiVersion: v1 appVersion: v1.19.6 - created: "2024-10-10T01:56:48.248584582Z" + created: "2025-01-06T11:51:06.688227363Z" description: Azure Blob Storage CSI driver digest: 0007ef225b5658d3989aa6fdc3a91a4b33696a438eee46ad9a675af615cbdf21 name: blob-csi-driver @@ -201,7 +210,7 @@ entries: version: v1.19.6 - apiVersion: v1 appVersion: v1.19.5 - created: "2024-10-10T01:56:48.247955952Z" + created: "2025-01-06T11:51:06.687623432Z" description: Azure Blob Storage CSI driver digest: 183c3e5cd84b709f1455cc7c84ed5bd573e8a24149fd6442d38999835b0a1711 name: blob-csi-driver @@ -210,7 +219,7 @@ entries: version: v1.19.5 - apiVersion: v1 appVersion: v1.18.0 - created: "2024-10-10T01:56:48.247370007Z" + created: "2025-01-06T11:51:06.687036804Z" description: Azure Blob Storage CSI driver digest: 3eac15488da5be7d1e78431929f7cda35bceb1af3fe107ffbd84606e047c9204 name: blob-csi-driver @@ -219,7 +228,7 @@ entries: version: v1.18.0 - apiVersion: v1 appVersion: v1.17.0 - created: "2024-10-10T01:56:48.24670369Z" + created: "2025-01-06T11:51:06.68644079Z" description: Azure Blob Storage CSI driver digest: 22cfa17fc5e8d771ff8edd26729266a9a8ee55c0e150df85ef15698f7fe985e9 name: blob-csi-driver @@ -228,7 +237,7 @@ entries: version: v1.17.0 - apiVersion: v1 appVersion: v1.16.0 - created: "2024-10-10T01:56:48.245912275Z" + created: "2025-01-06T11:51:06.685842852Z" description: Azure Blob Storage CSI driver digest: bf6249c0e3e3d3d009d4c79ceb7fda9a56c0565b969de753628792ea3ea5ece8 name: blob-csi-driver @@ -237,7 +246,7 @@ entries: version: v1.16.0 - apiVersion: v1 appVersion: v1.15.0 - created: "2024-10-10T01:56:48.245108616Z" + created: "2025-01-06T11:51:06.685210602Z" description: Azure Blob Storage CSI driver digest: 8daa35cd4957695cb64b45da05a15b4020df5545a8ac44c4668dad4bba82c8a9 name: blob-csi-driver @@ -246,7 +255,7 @@ entries: version: v1.15.0 - apiVersion: v1 appVersion: v1.14.0 - created: "2024-10-10T01:56:48.243591709Z" + created: "2025-01-06T11:51:06.683811838Z" description: Azure Blob Storage CSI driver digest: 442bc579b231aab626b9e474e2c0ed3f101d47d61c99aa9a7f863af7ce268d9d name: blob-csi-driver @@ -255,7 +264,7 @@ entries: version: v1.14.0 - apiVersion: v1 appVersion: v1.13.0 - created: "2024-10-10T01:56:48.243013668Z" + created: "2025-01-06T11:51:06.683061835Z" description: Azure Blob Storage CSI driver digest: b577b0b771138109aa90eb09d56fc07273ca0b584a263ee8f789e35796279f31 name: blob-csi-driver @@ -264,7 +273,7 @@ entries: version: v1.13.0 - apiVersion: v1 appVersion: v1.12.0 - created: "2024-10-10T01:56:48.242400297Z" + created: "2025-01-06T11:51:06.682453778Z" description: Azure Blob Storage CSI driver digest: 124e87af2581b374b89a39940698620c23d3eae6dcee518d302461ffea93e9a8 name: blob-csi-driver @@ -273,7 +282,7 @@ entries: version: v1.12.0 - apiVersion: v1 appVersion: v1.11.0 - created: "2024-10-10T01:56:48.241783544Z" + created: "2025-01-06T11:51:06.681839357Z" description: Azure Blob Storage CSI driver digest: 07c4d76017491b3d0bdd70de90e814096938bf7916da0c149c3805294bd57560 name: blob-csi-driver @@ -282,7 +291,7 @@ entries: version: v1.11.0 - apiVersion: v1 appVersion: v1.10.0 - created: "2024-10-10T01:56:48.241154526Z" + created: "2025-01-06T11:51:06.681217255Z" description: Azure Blob Storage CSI driver digest: 79716efa958385adf57eb3570843e1b4512d8c801e8e070625e94264f3e917a9 name: blob-csi-driver @@ -291,7 +300,7 @@ entries: version: v1.10.0 - apiVersion: v1 appVersion: v1.9.0 - created: "2024-10-10T01:56:48.269197589Z" + created: "2025-01-06T11:51:06.710698439Z" description: Azure Blob Storage CSI driver digest: fca0b9215d3277346f68c643fb3ead75158971f0d1945ab01ec559196f3cf842 name: blob-csi-driver @@ -300,7 +309,7 @@ entries: version: v1.9.0 - apiVersion: v1 appVersion: v1.8.0 - created: "2024-10-10T01:56:48.268595367Z" + created: "2025-01-06T11:51:06.710023808Z" description: Azure Blob Storage CSI driver digest: 3b78e2ab4f33577c54d4f57276c824717d2ad2aa3741210e938fcaf927bc751f name: blob-csi-driver @@ -309,7 +318,7 @@ entries: version: v1.8.0 - apiVersion: v1 appVersion: v1.7.0 - created: "2024-10-10T01:56:48.268018578Z" + created: "2025-01-06T11:51:06.708166609Z" description: Azure Blob Storage CSI driver digest: 28da5b55c3d2689d6da85eb7da344385e9cb99bdb2af18c24fea93670abfe7ea name: blob-csi-driver @@ -318,7 +327,7 @@ entries: version: v1.7.0 - apiVersion: v1 appVersion: v1.6.0 - created: "2024-10-10T01:56:48.267432914Z" + created: "2025-01-06T11:51:06.70756931Z" description: Azure Blob Storage CSI driver digest: 6f24f2e6623f6f8862e47d4fbdf13b5f351ceec6bb9a4591ef7fc2fca9fc1eef name: blob-csi-driver @@ -327,7 +336,7 @@ entries: version: v1.6.0 - apiVersion: v1 appVersion: v1.5.0 - created: "2024-10-10T01:56:48.26686492Z" + created: "2025-01-06T11:51:06.707011329Z" description: Azure Blob Storage CSI driver digest: 95d14c9b70b319760d388ea47727c8c97e9287867a8852aeb67b7175b52fe8f5 name: blob-csi-driver @@ -336,7 +345,7 @@ entries: version: v1.5.0 - apiVersion: v1 appVersion: v1.4.1 - created: "2024-10-10T01:56:48.266291446Z" + created: "2025-01-06T11:51:06.706476625Z" description: Azure Blob Storage CSI driver digest: 5fcf69c449f065fa1d5722e5a7fed8a28000efa790907e9ff4b552c5fbd16d22 name: blob-csi-driver @@ -345,7 +354,7 @@ entries: version: v1.4.1 - apiVersion: v1 appVersion: v1.4.0 - created: "2024-10-10T01:56:48.265715952Z" + created: "2025-01-06T11:51:06.705966575Z" description: Azure Blob Storage CSI driver digest: b466543344a6411f6130ba87b093955d39ab8614c6b4ed8505a0a0c96073cb33 name: blob-csi-driver @@ -354,7 +363,7 @@ entries: version: v1.4.0 - apiVersion: v1 appVersion: v1.3.0 - created: "2024-10-10T01:56:48.264612216Z" + created: "2025-01-06T11:51:06.705452889Z" description: Azure Blob Storage CSI driver digest: 58d02cb70a3a966b349d62e880b7149fb06ac009474e35e580784fd3c98a5b07 name: blob-csi-driver @@ -363,7 +372,7 @@ entries: version: v1.3.0 - apiVersion: v1 appVersion: v1.2.0 - created: "2024-10-10T01:56:48.24903529Z" + created: "2025-01-06T11:51:06.688674549Z" description: Azure Blob Storage CSI driver digest: 27fb89f20b5fddc7329e6d7c2374857b22c1d61592e397a53f47121eea68c344 name: blob-csi-driver @@ -372,7 +381,7 @@ entries: version: v1.2.0 - apiVersion: v1 appVersion: v1.1.0 - created: "2024-10-10T01:56:48.24052924Z" + created: "2025-01-06T11:51:06.680565025Z" description: Azure Blob Storage CSI driver digest: a251a55243de207c69ef53f72abee45e93b72fa4fc43dc204b7f1cdfd459acdb name: blob-csi-driver @@ -381,7 +390,7 @@ entries: version: v1.1.0 - apiVersion: v1 appVersion: v1.0.0 - created: "2024-10-10T01:56:48.24005956Z" + created: "2025-01-06T11:51:06.68009663Z" description: Azure Blob Storage CSI driver digest: e83f037a165eafc83a978bd7e6bf6221b052ac34363aecb12e6a73607dc58b89 name: blob-csi-driver @@ -390,11 +399,11 @@ entries: version: v1.0.0 - apiVersion: v1 appVersion: latest - created: "2024-10-10T01:56:48.239069601Z" + created: "2025-01-06T11:51:06.67907025Z" description: Azure Blob Storage CSI driver digest: 2bd22695556c9625b6f11056cdd0058af1e02d6e85917944efde0bfae1bba3d1 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/latest/blob-csi-driver-v0.0.0.tgz version: v0.0.0 -generated: "2024-10-10T01:56:48.238220217Z" +generated: "2025-01-06T11:51:06.678182223Z" diff --git a/charts/latest/blob-csi-driver-v1.24.5.tgz b/charts/latest/blob-csi-driver-v1.24.5.tgz deleted file mode 100644 index cda650df56e3bb6e46911f647ce991fec0534592..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 6251 zcmV-x7?kH9iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH<`bK5rZ{ac>`qx9y|`-OV=m7Zq&hhizICXVcpob>KG9S=mV zB%Dcr1wh4W>hJy=0HpYqC|R-7p4gejB7xlnxGyYr!HLTzmMw_oaIyg2yqIGy8%ylD z-|g*cwOXySlN0@KtJTW>+iIVke%C&EeSCCuc6@wt_Fb!e(th3g4z>12LirU4iTQV} zN8`#4?oV=IpL_x?2%{aeXxFgsCw?}LP8z2*2ZYUuFZIpt?*Rw&#$^*UmW<;Wpo{SU z8Sbf3>_G=*c&fI@LVWH)AFkDvmH!2H0}%UF0PE$y-9A2PXXXFo=;R>(PjL|s&!AI7 zXo3Zdz-Jxg*}UNqn=`?tvSBk%J$2bcwL*x4&jgW-FFUBoglOIc6W|mi2*pRuh@o_2 ziD$9Ys~djcy4TDl_OgQp(;<`B90X8VL&z57nzIE_ssea5WQuY9xKje>X`|g}Z9?gi z1yB&;nzIR1!x(k(RhI<5qelB=GeXK7=xIS4!HfvW@fHJBokKCTc+@>j!qH|DY(YjK z$nV=sF*hAjuXHo6n(eZ{2~EazFmZ`}q3+abFJ7P#Oo0Qn0ZE1!1;jY=7zZT4<{*W- zJpmL5aM0&DP>qJr8PW_Z6bKH}4w_5pi%v5^b%U^`!)(!%Slo%G&FGZO0uGkX9Lr`@ zVnTs86+BA=vwTh#SVAnqZp)me4_x2Y_CnpVd&*->*>E7Gcv^pwGm0)tF5e2Td7AOBOWH7^Iqx zDRu=QGF3OxXH50YK!Ezq5&KLV3Lm4AGuH*)QLoxE;<&nL35;GKMJ!@dG!97!=?&*R z!q2##{*Y}G;4~xd0I0?%*v?Lh0>APaG;3TaN^RwCDA1TvCb9aZc>+6*{>OEZoCETi zBWgZ#x^b%x`tpzmmXd}2BtHzEOZeF$-GQILM1~UNbF#VYqoBZ=!nn@boZmM zu7Yhv^s8Ftzewm6WBm%x53qTwM3%CtP%o&$ex!-2g z24BVkpl7G4guo9`TRsQyv}4z-`AK?)`i+RCklgW@ERg^yl}KYH^cviSfu=A_mI&^#=evM9 z>UX9|2YpenyW*oztln<5+UTK{Z}d>BB}8JyYz3mB_)@8-3q4=4RCf?o3e3_EjkR&g zTMHlC&_U{jSZ4leNbwr`-1mGnyQ@Ac_MbB$haf*Qez(#Sa!$l*ery)FjuI$`2t0AY zQA!{t961csyh`MN57a@7q7UOi)V+oj$8uteYsO^<9sTp{_@vnQ%>lb|9ydFxY5U+3 z8;cIozXEziKVZcV9ixzP*~<0<#RXoj+fmf3V7%qX+K)sQ`%C3Getaa3tR??iQ-`NhqQp5= zaZ3A-L8(^8!&{QMz(eh;p;+h+mK{{rmVz@E8fgvXX%4D~7@4nnD`@rpJrPnw4`4b4 zTXs-=$j0^@oWO;8CHSFm_=*|7Iu>hBXf8ti+I1X8#T9jzyTPn!bDdXp>h`lKIsJ4% zT|(g#a{~|F!?J7JAjHo^&Ib-qsaY&i93H;^Nbv#_S82QsY8R=o(`st$IH!n!DyVN< zHkk$jt~tA3t|*w_Zg}>g~o!u1)c_=uCOL+gIFw4An34~!Bd{#HE@pzVf?bz>({UI zR^UnXa_Iu>c}>C5W0BzB=~R5i(w;kP_H{?JlQ}5VU`7hNiu4b9y=3^VHU%sLu6bc9 z-fCc=F#qoB0v-DvF>m5j=UB(itRh!|(n(@Fpsij847Nnt-UKrvq z-n?=ryE9P4)D?|E^m`mkr{una>R02jH3!#IPj&xyY}|W)xzaE7I(mUtnhTkLn!5dx zGNp#Z53f+K|K{VnS7A!pDTh#b^`TPIM5r6_@0v?!aIZ$A z6tD}jgPIG>n=Y9&!#g#t2qb46ZU(#$b0!{ z9GmukPFmUc@9Eju@ge^E6xWTC@pXGTN}gxoLev4@WlPZU6CI}rMY&O{-7sX&!M@u7 z%mg+hmVtPMd>60)wS4TxXjrznz2Y0~ZbHKXNN*gZv*IpPgjn|LpYa>>&S7aeevH z{0CYPucNK-l(-<5KAd}MTI@M=&_9|F54D} z0;+2#OSP*bD}ICnSE7c=GSITv_+)k*Rm-ada84XRe<)9o+UV?9|4BUKeWAJ)0|V;l zzcp>O3msB6v>56Xso~DE@;vlT!ekj!Y(l$@S~20eNsP?rgvu$Z|4mqb6ZP}}%-`WU z4*j7cW=c!d|F4efxAk2H!#s~EzsM*yQAT9cz=WU;v|=6DL0`V0NVZe&rhy7O>7^^R zO~6LhMFgxYT4l#Ql@GMjlmquN7HMA!4}e9WcArdy9ZbSS3UTVq8nO2S*IjMPO&O2l`2rQcXFuLKOT6ru!tC~%LY&)j)15e`Gg#XX zt#;+q^p=b!J+SB2x!=-NZvP9mNOnvMS#ST3j@xHvY5RZFZnX~f|4FVpLY)rkX~*6J zDr?DvFzoxHxoFp-9nUy|qGT;nCNX=^&^(w{VU)Pcg|DH|T9_D--ZR|<7NNY^a98Hy z4@3!dfJ$_tnhPKFZgaeYRSZ6QZcs#4s1pWTr9Hn)kXf0~B2x1fE++ZRbd2OLM4y;= z9nnisvIQ+wC+^2wmso3OBS?)Xe3a~CB5G07MiifE>aclT@?f=5V&I3`xdi2EUp~^{ z8ABF7Uo(V+0Z4;RBn`xU68Q$50@Io4_6JI0%?v1Fz=DAlTQYSO*}*Ikx!!3qN@h2; z&s@wji6(KsbW+POEC1=o31~5dRE&7_Zqi;76CI=joBH{S{HF4`-Wq2-xd$EIqwW$( zdq|i~()r$yy7=d0&-$nJ}=~%&dc&MYs4`wGY8psWBPt?=%t%H~A z0Yz*UMbTHiS1-BB+tfe9bRfnHwOV%mN*kG}ETzo6zHaWW**hQ{oL;~QorN2agw6&t z%2v1g_h1J)cR0~A%@TSh(~p%`r*&`t-scc*AZ1$QglgUB6FMQrp!Z!X?e69}CpTry zjz%GMK%D~28|cowkjfOBUG>M4no*i%Or3m%nRUi`y@*gjvQa_;b5E0tBm*Fu=(8G; z09!2(uQ{6%7m_R^mp*jRD4>#f&@+*Uwc|@{W5tM5ds|zKI9@ZwG+Buq`eYVs$R2Yn zt~uyPL9?FL{f%_$Oe0R>L@Bm0*}WP&ZgE9&y=>TtrS!>diIAi z?N1C|HLTc*PljUyO?-po3@Mq4w5e|LM8A8b}bLzpC7lpWJ92f?5i>o626Lz-qKsE z9n=idlpBKCcUfk;PGl!<;-ff|In6=~y``+TsB^4jvK&lmM3nU&Uxs=`7f8z?JY_ti zEC^KK*rt{zVZ#i$375BhlqR@TJF3gZKAsSlNCG*N>Tu@g4RQDKGN-emtPRT~!dFmP zsXUMUYOFP&^U5RLct?G;FN{^RRa!5Val2`$-^NOB9E<41z;Bz}eeFqSd=3S1E~Re) zb$mvsJa?ImUDd5q>@lZ@8Yg0{Y+`PTLoB+bznafsEy`Fs%pEFr0#>s3{mYB-;I=>P zU0)4`H$`qqm>{{*6|IK;uS8Z8>6FEoO-OjPg&smMccb`Hkr$>Qw~4#tYP`vle*1T&D1q zfG^C$%|KRqHpii>C5p+Mt->^g?oQYw^UUW=GMl*_baQbXDUaf)#AdTpiPUu#qlj+P z;`fbo=fu4*gVkJ9Ox%FO&76anGuJWc$ML1C>pPHHwd)(35mEFgBW?nJ9keptSzJ3# zVVOCPASQ{=O&LOj5=pSz0~asHU^D874mxh7+Jt`0>Tx^$*auFSQ{1_HDe<3=qyFv1 zsNd@kZwB4V+qZ+ue$m3>EoWXn^Q~*l1qq@$v z8%u28X=PtJ6^6k6@Y7&)HT=*Y-e|VJ?%w=VvZe-UC#njYnna=SXvB^G3Pv|i&}J8W zl`imP>+Wpl%s>kP#j;%VRxowY%gwLm2lO(*#(JxxVUn~_eF_faxc)=g>l4CVv$Rk{ z5W;QRz;m%(4%oS(?y^9UtQWb&fC_1SQc@GZE&ne2wzCNQJJPhVC3zrZQ^&|`nR#{F zPs|Q0HpSe}yHHCO?^lZ|hZTi;k0=+yEsX3&Eq9M3KN459)m+tBabcwSDdNX}x8|5S zE?7p5T7(7yEa05+b6pqn_vekgMsxqI$6aDlpF@_-EEH@S6%Jl65_J{cmxo-BLMx^g z1bU{@p7mziXtvXOgzNpkxT`i_*Ekkin~j6Xo1XF+NtwSB3n~aFw$AkzkwZzfN=cpRIQL^pOAg6qjXL zsgzG)YPK48KbqY2cFkmnUW^B(ZhCz(XgWBYN%7nvcN0sA?fEE7G>VJMedY}4lwHwe z;c%{8I6+vrZQV$N@8;prcd) zwS{ot5YUAa*e9K4Q(L-j??$!l-`jIcXYdW_zY6kCnFEhH5OBTxAGc3i+4`^7rzeN{ z&nLOU{BH~%qhr`1{abU#J`=w)0C!Rwfj<6XEIF1i3v(8gV^8SJoQx59QQ2cgvUH@M zM-+vrWJ!R#WRB-X`Ybu)1ymfe#ShuyAqk1(V$CQ8C+8G3h!6Eh=bv8>dZ~ch`Xu#4 zLx+mUsz~uxqu6gOXTu~!AyJx}vi88HMxyRBRx01i&9OEIA16tT7JPW1p znZmFjTn5;+;!{jwE=h=kp7&%*eSxf}+iaG1bK~31OV;DrYeuq~nTs`9$>HHuR&)rI z zu4RN#zuUX*{-pjt9{guFWsyDkFoSUO7L;;Vtw5~XfKpAG*(TZkmd?(q0Hv94n1Th; z-UKCXvaTp8li(l2dy2g3Eweig)d$~b^+C2lNt(Zw%&O^{3eMvED789Tx2davf0JqS z#UFI2z{~}wnC_RQHzLThSy7iA+52l?-=5Xuq>fy(&=js-n$FPhv7DcO|FSn4eCm&G zNBwuV*%t|)qJWlSSZl0((|3azp`uy3%~M3gSIORpJEvxTJ&0t} zU6n=wdmSopzU8HOl?ohVb@o+zlU}PzF|x=4wl(x}|sSh;#n^OXct1 z4zGIs+hO-ZzX@uC|En;`W$vMoD#83?TqYJ!)GR>w0dv<^9jcHj(YH$#QrgN_XV)nK*D2xC%=cmQ4RmMY zY6~B1E#LZMctsQ*>ZHC#oz(Mf3Oz-I*1Dx>;j)i2AJ4G)T=5&?=nQqOCksi?eYC6o z^$Nw(fIOPDpvliBD?h1-r~jH&W`EXEeFFt)#c2`c={FJKN#d93)il6VdATJZZDJ;d?cK)p7L_{B3Iz(a0qcCNO z4yg&O{}l}3R?L_h{+c*qRqMKUDSld$n`52Qnzw@8*0p6($)+23TsJ|=?7Xhob=_2| zm4LCX>7!!u=_T@pTD>*y*zP3mL_vu+_UMVajlb=^3t6Sx4eJSeQ~~80pR)3Fq*5MM zUvW&cN2&9<(_-pSn3)5%ZDHp2j@tYjamvt!PFSZjT|wWO7~i&d(N57n%DxXSCl z_ypV5UOob{q5kvi`0P0Q{g2n}L;cs2Tp77hFTG(76xJW^35!3?XZ}Xag;arLuoJQeECpk^zmh&^lBM`381&)a4Z?Kp~Jz4|zX`sCV4 z@%K~fru{JZUqC5kCZe)J+N(ZNZ>02XttKbR_If&{6n@sSgvmpm{;K0b0<&TL-#$J*%AWspa&mH5|3AgGVg3K4hCtWDd`l+a znG}C=9=;WopFB9@NtAs7GaS_X{;zWVA2I+o4Dgsp@FxA=Iy=qi|C81s{`)jnZr>#B z=*5;GlL%Ui^T%8U25BdV2W&|C3zLrvGDy@}T(-n*VSeuETY> V4%ZW3{~rJV|Nj}eeSQG2007(MXZ-*G diff --git a/charts/latest/blob-csi-driver-v1.24.6.tgz b/charts/latest/blob-csi-driver-v1.24.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..6b2a3d225ae5545e7be18c1adcf2d3a64caeb273 GIT binary patch literal 6248 zcmV-u7?Dc zVQyr3R8em|NM&qo0PH<`bK5rZ{ac>`qx9y|`-OV=m7Zq&hhizICXVcpob>KG9S=mV zB%Dcr1wh4W>hJy=0HpYqC|R-7p4gejB7xlnxGyYr!HLTzmMw_oaIyg2yqIGy8%ylD z-|g*cwOXySlN0@KtJTW>+iIVke%C&EeSG%%q^;YvPuj1~zC*43kx+gGLSp`1>(RKf zgZqiL^;!AzA`+L9vy>ZzDjV0rF2IyiuK!$s2 z6noG?8J?;wvJjtp(1&YvW#xZ?-2lXX6~KD=Z?}(6+FAKOIX*hb|5IGV!!zjA5Sm~C zBk)-Vc{Xo&#O6$}schKHQ%_wsQLPZ-;4?ua_atnW_pbxj9UE#o=$Bt>FOY?df%BH(>s!8urD-z69@J_A_=4Eb zwQUwqsV3OwfF*R0Qj3AVG7qQI}b2F)55ic(v-8wxb0lu4|9X`aB2qyKSTBuw`@)%v9YVLkHHR9Yt3(PFVRd< zs^*jVKI1Z=>Y-$a2NbP@4q<^Pqnt5`CQBqhN+r@*3B3k)VW24tlO=+C?D;OBj{2Qx z(m`Jo?5_AI6sxyetu}h7)Q$Lt|~6^47w~ zHgu4BA(olH8dAK*KKDIe&F-qtiv8zI$RWtjjNh&Fgq#zxnjf15uA>CXAp%caaFh~= z2}ceCHLnsm-~)9Kqv*qU5OuF1#j%{&;+k>UK}Y{QJ3c8kesjRCoX5?MYT7=y#Kxk7 z^sj(k(GOVhL&qqj=;no?=i0>-;zurvk0NDj07$vi2j9#r{$`jvpV1BWuaO*3{wYlqhiyRh-iP zV^FG<@$i;pF7QzMYA6=EgJlQRwWZ+9g+^LKd76XjAx7q_-U?d1e@}!I(F2%H!Im9V zAF{DM2Pbf$UI~6E9KK@4ua3pq6Pk-qzjhsmQE^4xRyW#}eNED9kc19)kcm0_=3>fSob< z9dc7~f$ce5V>$1jrl(gC*jJY3hIlZR*z*TeH|ddtRq&K2cn#bmLKwfS_4@VeycKv- zymF7Ywpr&rWq)e$H z@xv?B>%aN>nUVW&PG!g1X{JZ878r-YVCuCNR;pGjcLG!ndLfz@=oh9}1K9l)4W`RcoKrJ6TwNRVc(nXd-wQw{%_~t`oKj)`j6ZS+93Z&$7d%Q`9C{-eR7chr?|d+Y5oH( zh}Y3pcuHK5OCQcXH7)iWI_MwGhlg5CH|yW~m^#`x(=hO>?YT}F(Cxl_v5*5(LIKsa zlcn0#krh9}fh$qNWEp5#Ytp6mQ@xD;qih%)j^xvAc z+Jz1&8(Iu?iqvrDS$Q6MCti<_q_1pR`gJGV>lwV{Nn)dbYD!2ayTO>QCg{-&#N5}26v$Xv`YPZ@4`~M`@9idJK^|WK}0hP66 zLKyaa(Ok4^(T-;vK~b_6DU+BzXlNcxt1wDj=EB!dXe~^PNbi|$0*g@IY`80P@du)W zIzS~lQO$)9dbc^=!72tHJvS&KE7S>ttX(NiyG!ALMleQdN*k=iHQ!6PYJW}YW=;}p;K8!#wrSGD8@pP6 z{d=$jojaW9nPv$+lj+CGtJAu-fA4b$H;^(dazeFk^a-61W6=Aqm3DV?os*lgW=Ert zI-pJg<_&abUPxt%&93_6NzEwDGNw+x!pu5jy@VkxL&sXcSOMJm{H7#M<#Cwy|QwslBZ&MjWr1Vw$YP4t+9;6VMb*2#~aiSF4nC#w^dNci_Y+v;7kbAZcc4t#-iDyb%)>aCt8a?~Nnf50T z!hDv|92Tlui}Ry;?xtP`VaHJl=luJZ-Cl3hACG@1Xy^iVfLjnI7;bJ+A*5XZL~$w$ z`WH}O%N$(&}Ph2B!uThuvLGFc8LH6qG-k1s>Lq6?(u5S}ugQ5FO$ zaBNe{ldxfi+=R>9K1vf@svXs3V;@h5OC*7uNp(2$^M<&4d70B$QPzfK65%VTtW=)I zel^w_(0S#NZoH$u+84$u+A6J=%DCOM)Nf;@H;zU0V&Jz;?!NY55iE|5qZbiFC?h%qAqf+CmQ@n7dJYsmP1cy9<^{*qH&91-&!LR>go~ z2$s-WW(9yU`B^0t>8w^$2w|C>3@baV#KaWlylw|McJ(TPU*iSp)L9EWUoKPlO28N9 z;btH!J)7gu)e^;I&Q@WXLU$)@l6mHHCYjCL4!XIxj+94nRARGPszmBKi%~?kY4Q6; zx^v=Qn89kUDJE{f;bzW3%$e($^yBza*7Y68tlIUB&4?&^lo2<9zYbcN?kuhyr?AYN zM-Y?5=cWuHLWv~U?SYGzW3U-@LT zhc|=nfrH`n9a>(SM}{#}eeudNes zGeAqYWG#hN2;82&ZOBVA)w`?Paqs=@<<+~}%l@bSWmT;CEaH-BNGbrO+fiL-+l?i* z@3gWnoeD!>fB0!Ix*C4y4{tQvUw3bQDp^y5v=dc@O--Uucr@b1e+8qPCup+^zDgH( zvUPX1b7r80fMQuLdMlVZ=;h{D^8Y`?I&i3 z6`Nx2=Uu2Ji}$NVmBWg{y+@P_;TA@Aqn5izk{^ky+G?(9thg}J{1oxyzgu%m9TzO4 zMlC`E0Tyu1__?l&`TO%mUZc7H*5fWQsm~$HW)=!IjS2^^7m2zG@5@83N1+u{3j#e; zY0rAIZ8Y0yJ;L?=-|~u^4BS4)o-~e-0jS?CLt_JD{Uf0kws2 z;1JM-6WAx6W>Z_bZtq65?cdvTOlR;7>Awo{PniRcIuLNZ{2#YZTiN=r*Qck4`p+l1 z!u)Rx9;0K}A^lr($37FkGXQr|8-YIlVk|k9Fbi`Qm19rn%$$r7c~RM8MzVCIpGOph zsboojyJU{%M*1u{;{{Y4vc(VC;vor%#) z$f`%Vo6+)Qo9uK&;;wn=xm-~rIlE`U{)sZJSGmX19Ji9c;vC~4lLK1VCOiwJ@R`D} zAY2C6wc=AuVlGLDgP!+fN_~N>r`v3ncXQ+0%}dtf*=t6!nwg6=S;^tyRaSHel;ta7 zKcxMX2a0oH&&<)g(PcBw!_>*el$+_PZmKub5c7J~IHS+Wg19hK3#Htq#^W{=)NKYIxHh_KG9Lb;_vD{Kd8;i(GcFfixJ7Z@QP4w{I@5-n{)dF5Hz*zdbD# zsRP>@nKRc40^5Ik4R=D8IsL5^S$1Sc`xx5M#<3mkWpGE^j&9wadk$xj zLs5ok+`qZ~(EZo#)pdWUH?VJqA3y9gw%h@Gr8pJ7N1^hn;pq*=-8Yy0+mF}1?oGe< zW+z;k)Bj45z5n>8f7!peEl&VQA~NCc&?uKr)ZpEyd(*#t|Ks>})W5#kZL(5_6s~22 zQNP=}?f#_xKOX#NH)WAM`7ncU^A?nHSFJ#-+kjF{n%O4V{+7#ZMgT74%G+WX!Sw1K}njwmdvW@nhMV1{3x|LTDPgIfq#=}^u-@^ zsKCqxr9ohS9VBenA&U!$g`9PpZIns2W`61y3}lr4CnT2QykJMX z=;Z7YLiM5V+P@PLd%k63dk#wd=1DC(AHEo}*4LIF9~Pejm_1E?-Bc3&nSp5Fcd)du z{?dT;naH_C9H2xJnU||--zZo+;rbkQGn^8!P3?^AR>Nl|q_lc(|K&&<3W(ChN|}e* z>Y}ZD{X>z^^A`!_0;Xv*wi#;LnjNZ;D$%z~6;j&DS7+BL0oN(v)6Dl_^9^)o<7x{Z zY%SmVV|Yar9_pmNMxE62Z3;a_h1R;IY2mVuGat{e`CRcE;^+)@ttSgf(0#P4{`CsQ z(ttdgwV=t*CM!Rwh^POWRc3$IQGEjiX~k&~<>@yO;Ys3{FPp1R{Wi7p+SH%6Op_Kd zxAJXskJAucGHH6u30%m|X0)v^v5KGXw;(SQz$q-n+jjn}&Ais+EAT zuIZy<^64e=hFZNf?%3`m?nFU}H}>d>x{bf>y$e~T+YRdpdsG4C8lSTAbfi)qR$p;U zvq!1(xzl3mP?(tmwryeN_Kw{KF05o9sEXuUNFQSDyx9ZdcUwhX1#3}u|E-m1l3$Tr^}sZx@vv`x4J zl2>_;(O(f;teN++m-kgwZFnlwpFz!5P!W69vX8>hG@rN4BHD2j#d`H|3iZjglj85E z)=m3i@V|gk%1lIMg|t_Fq~1vB+geRdlE!h2u>OCFYs32gNezLnhxwLFz%wcS zE}Gzjbz+(f=o{L;Uw?uH3#!+R=+G zK_(HjP?4-%p>6OXw?8;+3njSi*;LierAi(Cw62>0ZxJUoA#17FM6m>lt59s(ZA6^} z_hr-f^AD=^uXAm$|F>TWY}Eg!uQU4p==ALH{r@Mqo=yM94&_1fA2k2rI$VeAa2>8E SzWzS|0RR8)NY$YLumAv+OJ!sL literal 0 HcmV?d00001 diff --git a/charts/latest/blob-csi-driver/Chart.yaml b/charts/latest/blob-csi-driver/Chart.yaml index 86af7a5b6..983329c72 100644 --- a/charts/latest/blob-csi-driver/Chart.yaml +++ b/charts/latest/blob-csi-driver/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v1 -appVersion: v1.24.5 +appVersion: v1.24.6 description: Azure Blob Storage CSI driver name: blob-csi-driver -version: v1.24.5 +version: v1.24.6 diff --git a/charts/latest/blob-csi-driver/values.yaml b/charts/latest/blob-csi-driver/values.yaml index 5aa1a5f7c..07c940e53 100644 --- a/charts/latest/blob-csi-driver/values.yaml +++ b/charts/latest/blob-csi-driver/values.yaml @@ -2,7 +2,7 @@ image: baseRepo: mcr.microsoft.com blob: repository: /oss/kubernetes-csi/blob-csi - tag: v1.24.5 + tag: v1.24.6 pullPolicy: IfNotPresent csiProvisioner: repository: /oss/kubernetes-csi/csi-provisioner diff --git a/charts/v1.24.6/blob-csi-driver-v1.24.6.tgz b/charts/v1.24.6/blob-csi-driver-v1.24.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..6b2a3d225ae5545e7be18c1adcf2d3a64caeb273 GIT binary patch literal 6248 zcmV-u7?Dc zVQyr3R8em|NM&qo0PH<`bK5rZ{ac>`qx9y|`-OV=m7Zq&hhizICXVcpob>KG9S=mV zB%Dcr1wh4W>hJy=0HpYqC|R-7p4gejB7xlnxGyYr!HLTzmMw_oaIyg2yqIGy8%ylD z-|g*cwOXySlN0@KtJTW>+iIVke%C&EeSG%%q^;YvPuj1~zC*43kx+gGLSp`1>(RKf zgZqiL^;!AzA`+L9vy>ZzDjV0rF2IyiuK!$s2 z6noG?8J?;wvJjtp(1&YvW#xZ?-2lXX6~KD=Z?}(6+FAKOIX*hb|5IGV!!zjA5Sm~C zBk)-Vc{Xo&#O6$}schKHQ%_wsQLPZ-;4?ua_atnW_pbxj9UE#o=$Bt>FOY?df%BH(>s!8urD-z69@J_A_=4Eb zwQUwqsV3OwfF*R0Qj3AVG7qQI}b2F)55ic(v-8wxb0lu4|9X`aB2qyKSTBuw`@)%v9YVLkHHR9Yt3(PFVRd< zs^*jVKI1Z=>Y-$a2NbP@4q<^Pqnt5`CQBqhN+r@*3B3k)VW24tlO=+C?D;OBj{2Qx z(m`Jo?5_AI6sxyetu}h7)Q$Lt|~6^47w~ zHgu4BA(olH8dAK*KKDIe&F-qtiv8zI$RWtjjNh&Fgq#zxnjf15uA>CXAp%caaFh~= z2}ceCHLnsm-~)9Kqv*qU5OuF1#j%{&;+k>UK}Y{QJ3c8kesjRCoX5?MYT7=y#Kxk7 z^sj(k(GOVhL&qqj=;no?=i0>-;zurvk0NDj07$vi2j9#r{$`jvpV1BWuaO*3{wYlqhiyRh-iP zV^FG<@$i;pF7QzMYA6=EgJlQRwWZ+9g+^LKd76XjAx7q_-U?d1e@}!I(F2%H!Im9V zAF{DM2Pbf$UI~6E9KK@4ua3pq6Pk-qzjhsmQE^4xRyW#}eNED9kc19)kcm0_=3>fSob< z9dc7~f$ce5V>$1jrl(gC*jJY3hIlZR*z*TeH|ddtRq&K2cn#bmLKwfS_4@VeycKv- zymF7Ywpr&rWq)e$H z@xv?B>%aN>nUVW&PG!g1X{JZ878r-YVCuCNR;pGjcLG!ndLfz@=oh9}1K9l)4W`RcoKrJ6TwNRVc(nXd-wQw{%_~t`oKj)`j6ZS+93Z&$7d%Q`9C{-eR7chr?|d+Y5oH( zh}Y3pcuHK5OCQcXH7)iWI_MwGhlg5CH|yW~m^#`x(=hO>?YT}F(Cxl_v5*5(LIKsa zlcn0#krh9}fh$qNWEp5#Ytp6mQ@xD;qih%)j^xvAc z+Jz1&8(Iu?iqvrDS$Q6MCti<_q_1pR`gJGV>lwV{Nn)dbYD!2ayTO>QCg{-&#N5}26v$Xv`YPZ@4`~M`@9idJK^|WK}0hP66 zLKyaa(Ok4^(T-;vK~b_6DU+BzXlNcxt1wDj=EB!dXe~^PNbi|$0*g@IY`80P@du)W zIzS~lQO$)9dbc^=!72tHJvS&KE7S>ttX(NiyG!ALMleQdN*k=iHQ!6PYJW}YW=;}p;K8!#wrSGD8@pP6 z{d=$jojaW9nPv$+lj+CGtJAu-fA4b$H;^(dazeFk^a-61W6=Aqm3DV?os*lgW=Ert zI-pJg<_&abUPxt%&93_6NzEwDGNw+x!pu5jy@VkxL&sXcSOMJm{H7#M<#Cwy|QwslBZ&MjWr1Vw$YP4t+9;6VMb*2#~aiSF4nC#w^dNci_Y+v;7kbAZcc4t#-iDyb%)>aCt8a?~Nnf50T z!hDv|92Tlui}Ry;?xtP`VaHJl=luJZ-Cl3hACG@1Xy^iVfLjnI7;bJ+A*5XZL~$w$ z`WH}O%N$(&}Ph2B!uThuvLGFc8LH6qG-k1s>Lq6?(u5S}ugQ5FO$ zaBNe{ldxfi+=R>9K1vf@svXs3V;@h5OC*7uNp(2$^M<&4d70B$QPzfK65%VTtW=)I zel^w_(0S#NZoH$u+84$u+A6J=%DCOM)Nf;@H;zU0V&Jz;?!NY55iE|5qZbiFC?h%qAqf+CmQ@n7dJYsmP1cy9<^{*qH&91-&!LR>go~ z2$s-WW(9yU`B^0t>8w^$2w|C>3@baV#KaWlylw|McJ(TPU*iSp)L9EWUoKPlO28N9 z;btH!J)7gu)e^;I&Q@WXLU$)@l6mHHCYjCL4!XIxj+94nRARGPszmBKi%~?kY4Q6; zx^v=Qn89kUDJE{f;bzW3%$e($^yBza*7Y68tlIUB&4?&^lo2<9zYbcN?kuhyr?AYN zM-Y?5=cWuHLWv~U?SYGzW3U-@LT zhc|=nfrH`n9a>(SM}{#}eeudNes zGeAqYWG#hN2;82&ZOBVA)w`?Paqs=@<<+~}%l@bSWmT;CEaH-BNGbrO+fiL-+l?i* z@3gWnoeD!>fB0!Ix*C4y4{tQvUw3bQDp^y5v=dc@O--Uucr@b1e+8qPCup+^zDgH( zvUPX1b7r80fMQuLdMlVZ=;h{D^8Y`?I&i3 z6`Nx2=Uu2Ji}$NVmBWg{y+@P_;TA@Aqn5izk{^ky+G?(9thg}J{1oxyzgu%m9TzO4 zMlC`E0Tyu1__?l&`TO%mUZc7H*5fWQsm~$HW)=!IjS2^^7m2zG@5@83N1+u{3j#e; zY0rAIZ8Y0yJ;L?=-|~u^4BS4)o-~e-0jS?CLt_JD{Uf0kws2 z;1JM-6WAx6W>Z_bZtq65?cdvTOlR;7>Awo{PniRcIuLNZ{2#YZTiN=r*Qck4`p+l1 z!u)Rx9;0K}A^lr($37FkGXQr|8-YIlVk|k9Fbi`Qm19rn%$$r7c~RM8MzVCIpGOph zsboojyJU{%M*1u{;{{Y4vc(VC;vor%#) z$f`%Vo6+)Qo9uK&;;wn=xm-~rIlE`U{)sZJSGmX19Ji9c;vC~4lLK1VCOiwJ@R`D} zAY2C6wc=AuVlGLDgP!+fN_~N>r`v3ncXQ+0%}dtf*=t6!nwg6=S;^tyRaSHel;ta7 zKcxMX2a0oH&&<)g(PcBw!_>*el$+_PZmKub5c7J~IHS+Wg19hK3#Htq#^W{=)NKYIxHh_KG9Lb;_vD{Kd8;i(GcFfixJ7Z@QP4w{I@5-n{)dF5Hz*zdbD# zsRP>@nKRc40^5Ik4R=D8IsL5^S$1Sc`xx5M#<3mkWpGE^j&9wadk$xj zLs5ok+`qZ~(EZo#)pdWUH?VJqA3y9gw%h@Gr8pJ7N1^hn;pq*=-8Yy0+mF}1?oGe< zW+z;k)Bj45z5n>8f7!peEl&VQA~NCc&?uKr)ZpEyd(*#t|Ks>})W5#kZL(5_6s~22 zQNP=}?f#_xKOX#NH)WAM`7ncU^A?nHSFJ#-+kjF{n%O4V{+7#ZMgT74%G+WX!Sw1K}njwmdvW@nhMV1{3x|LTDPgIfq#=}^u-@^ zsKCqxr9ohS9VBenA&U!$g`9PpZIns2W`61y3}lr4CnT2QykJMX z=;Z7YLiM5V+P@PLd%k63dk#wd=1DC(AHEo}*4LIF9~Pejm_1E?-Bc3&nSp5Fcd)du z{?dT;naH_C9H2xJnU||--zZo+;rbkQGn^8!P3?^AR>Nl|q_lc(|K&&<3W(ChN|}e* z>Y}ZD{X>z^^A`!_0;Xv*wi#;LnjNZ;D$%z~6;j&DS7+BL0oN(v)6Dl_^9^)o<7x{Z zY%SmVV|Yar9_pmNMxE62Z3;a_h1R;IY2mVuGat{e`CRcE;^+)@ttSgf(0#P4{`CsQ z(ttdgwV=t*CM!Rwh^POWRc3$IQGEjiX~k&~<>@yO;Ys3{FPp1R{Wi7p+SH%6Op_Kd zxAJXskJAucGHH6u30%m|X0)v^v5KGXw;(SQz$q-n+jjn}&Ais+EAT zuIZy<^64e=hFZNf?%3`m?nFU}H}>d>x{bf>y$e~T+YRdpdsG4C8lSTAbfi)qR$p;U zvq!1(xzl3mP?(tmwryeN_Kw{KF05o9sEXuUNFQSDyx9ZdcUwhX1#3}u|E-m1l3$Tr^}sZx@vv`x4J zl2>_;(O(f;teN++m-kgwZFnlwpFz!5P!W69vX8>hG@rN4BHD2j#d`H|3iZjglj85E z)=m3i@V|gk%1lIMg|t_Fq~1vB+geRdlE!h2u>OCFYs32gNezLnhxwLFz%wcS zE}Gzjbz+(f=o{L;Uw?uH3#!+R=+G zK_(HjP?4-%p>6OXw?8;+3njSi*;LierAi(Cw62>0ZxJUoA#17FM6m>lt59s(ZA6^} z_hr-f^AD=^uXAm$|F>TWY}Eg!uQU4p==ALH{r@Mqo=yM94&_1fA2k2rI$VeAa2>8E SzWzS|0RR8)NY$YLumAv+OJ!sL literal 0 HcmV?d00001 diff --git a/charts/v1.24.6/blob-csi-driver/Chart.yaml b/charts/v1.24.6/blob-csi-driver/Chart.yaml new file mode 100644 index 000000000..983329c72 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +appVersion: v1.24.6 +description: Azure Blob Storage CSI driver +name: blob-csi-driver +version: v1.24.6 diff --git a/charts/v1.24.6/blob-csi-driver/templates/NOTES.txt b/charts/v1.24.6/blob-csi-driver/templates/NOTES.txt new file mode 100644 index 000000000..c75dafbb5 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/NOTES.txt @@ -0,0 +1,5 @@ +The Azure Blob Storage CSI driver is getting deployed to your cluster. + +To check Azure Blob Storage CSI driver pods status, please run: + + kubectl --namespace={{ .Release.Namespace }} get pods --selector="app.kubernetes.io/name={{ .Release.Name }}" --watch diff --git a/charts/v1.24.6/blob-csi-driver/templates/_helpers.tpl b/charts/v1.24.6/blob-csi-driver/templates/_helpers.tpl new file mode 100644 index 000000000..d99392f32 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/_helpers.tpl @@ -0,0 +1,49 @@ +{{/* vim: set filetype=mustache: */}} + +{{/* Expand the name of the chart.*/}} +{{- define "blob.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "blob.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Common selectors. +*/}} +{{- define "blob.selectorLabels" -}} +app.kubernetes.io/name: {{ template "blob.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end -}} + +{{/* +Common labels. +*/}} +{{- define "blob.labels" -}} +{{- include "blob.selectorLabels" . }} +app.kubernetes.io/component: csi-driver +app.kubernetes.io/part-of: {{ template "blob.name" . }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +helm.sh/chart: {{ template "blob.chart" . }} +{{- if .Values.customLabels }} +{{ toYaml .Values.customLabels }} +{{- end }} +{{- end -}} + + +{{/* pull secrets for containers */}} +{{- define "blob.pullSecrets" -}} +{{- if .Values.imagePullSecrets }} +imagePullSecrets: +{{- range .Values.imagePullSecrets }} + - name: {{ . }} +{{- end }} +{{- end }} +{{- end -}} \ No newline at end of file diff --git a/charts/v1.24.6/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.24.6/blob-csi-driver/templates/csi-blob-controller.yaml new file mode 100644 index 000000000..ecbc8589a --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/csi-blob-controller.yaml @@ -0,0 +1,255 @@ +kind: Deployment +apiVersion: apps/v1 +metadata: + name: {{ .Values.controller.name }} + namespace: {{ .Release.Namespace }} + labels: + app: {{ .Values.controller.name }} + {{- include "blob.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.controller.replicas }} + selector: + matchLabels: + app: {{ .Values.controller.name }} + {{- include "blob.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app: {{ .Values.controller.name }} + {{- include "blob.labels" . | nindent 8 }} + {{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + {{- end }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + hostNetwork: {{ .Values.controller.hostNetwork }} + serviceAccountName: {{ .Values.serviceAccount.controller }} + nodeSelector: + kubernetes.io/os: linux + # runOnControlPlane=true or runOnMaster=true only takes effect if affinity is not set + {{- if contains (tpl "{{ .Values.controller.affinity }}" .) "nodeSelectorTerms" }} + {{- with .Values.controller.affinity }} + affinity: + {{ toYaml . | indent 8 }} + {{- end }} + {{- else if or .Values.controller.runOnControlPlane .Values.controller.runOnMaster}} + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + {{- if .Values.controller.runOnControlPlane}} + - key: node-role.kubernetes.io/control-plane + operator: Exists + {{- end}} + {{- if .Values.controller.runOnMaster}} + - key: node-role.kubernetes.io/master + operator: Exists + {{- end}} + {{- end }} +{{- with .Values.controller.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} + securityContext: + seccompProfile: + type: RuntimeDefault +{{- with .Values.controller.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + containers: + - name: csi-provisioner +{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- else }} + image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- end }} + args: + - "-v=2" + - "--csi-address=$(ADDRESS)" + - "--leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - "--timeout=1200s" + - "--extra-create-metadata=true" + - "--kube-api-qps=50" + - "--kube-api-burst=100" + - "--feature-gates=HonorPVReclaimPolicy=true" + - "--retry-interval-max=30m" + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: liveness-probe +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s +{{- if eq .Values.controller.hostNetwork true }} + - --http-endpoint=localhost:{{ .Values.controller.livenessProbe.healthPort }} +{{- else }} + - --health-port={{ .Values.controller.livenessProbe.healthPort }} +{{- end }} + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: blob +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + args: + - "--v={{ .Values.controller.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" + - "--drivername={{ .Values.driver.name }}" + - "--custom-user-agent={{ .Values.driver.customUserAgent }}" + - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" + - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" + - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" + - "--allow-empty-cloud-config={{ .Values.controller.allowEmptyCloudConfig }}" + ports: + - containerPort: {{ .Values.controller.metricsPort }} + name: metrics + protocol: TCP +{{- if ne .Values.controller.hostNetwork true }} + - containerPort: {{ .Values.controller.livenessProbe.healthPort }} + name: healthz + protocol: TCP +{{- end }} + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz +{{- if eq .Values.controller.hostNetwork true }} + host: localhost + port: {{ .Values.controller.livenessProbe.healthPort }} +{{- else }} + port: healthz +{{- end }} + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + {{- if ne .Values.driver.httpsProxy "" }} + - name: HTTPS_PROXY + value: {{ .Values.driver.httpsProxy }} + {{- end }} + {{- if ne .Values.driver.httpProxy "" }} + - name: HTTP_PROXY + value: {{ .Values.driver.httpProxy }} + {{- end }} + - name: AZURE_GO_SDK_LOG_LEVEL + value: {{ .Values.driver.azureGoSDKLogLevel }} + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: AZURE_ENVIRONMENT_FILEPATH + value: /etc/kubernetes/azurestackcloud.json + {{- end }} + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + - name: ssl-pki + mountPath: /etc/pki/ca-trust/extracted + readOnly: true + {{- end }} + resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: csi-resizer +{{- if hasPrefix "/" .Values.image.csiResizer.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" +{{- else }} + image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" +{{- end }} + args: + - "-csi-address=$(ADDRESS)" + - "-v=2" + - "-leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - '-handle-volume-inuse-error=false' + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + volumes: + - name: socket-dir + emptyDir: {} + - name: azure-cred + hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + hostPath: + path: /etc/ssl/certs + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + - name: ssl-pki + hostPath: + path: /etc/pki/ca-trust/extracted + {{- end }} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.24.6/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.24.6/blob-csi-driver/templates/csi-blob-driver.yaml new file mode 100644 index 000000000..9c5de5b91 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/csi-blob-driver.yaml @@ -0,0 +1,16 @@ +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: {{ .Values.driver.name }} + labels: + {{- include "blob.labels" . | nindent 4 }} +spec: + attachRequired: false + podInfoOnMount: true + fsGroupPolicy: {{ .Values.feature.fsGroupPolicy }} + volumeLifecycleModes: + - Persistent + - Ephemeral + tokenRequests: + - audience: api://AzureADTokenExchange diff --git a/charts/v1.24.6/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.24.6/blob-csi-driver/templates/csi-blob-node.yaml new file mode 100644 index 000000000..5b3ab945d --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/csi-blob-node.yaml @@ -0,0 +1,339 @@ +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: {{ .Values.node.name }} + namespace: {{ .Release.Namespace }} + labels: + app: {{ .Values.node.name }} + {{- include "blob.labels" . | nindent 4 }} +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: {{ .Values.node.maxUnavailable }} + type: RollingUpdate + selector: + matchLabels: + app: {{ .Values.node.name }} + {{- include "blob.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app: {{ .Values.node.name }} + {{- include "blob.labels" . | nindent 8 }} + {{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + {{- end }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + {{- if or .Values.node.enableBlobfuseProxy .Values.node.enableAznfsMount }} + hostPID: true + {{- end }} + hostNetwork: true + dnsPolicy: Default + serviceAccountName: {{ .Values.serviceAccount.node }} + nodeSelector: + kubernetes.io/os: linux +{{- with .Values.node.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: type + operator: NotIn + values: + - virtual-kubelet + {{- if .Values.node.affinity }} +{{- toYaml .Values.node.affinity | nindent 8 }} + {{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} + securityContext: + seccompProfile: + type: RuntimeDefault +{{- with .Values.node.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + initContainers: + - name: install-blobfuse-proxy +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + imagePullPolicy: IfNotPresent + command: + - "/blobfuse-proxy/init.sh" + securityContext: + privileged: true + capabilities: + drop: + - ALL + env: + - name: DEBIAN_FRONTEND + value: "noninteractive" + - name: INSTALL_BLOBFUSE + value: "{{ .Values.node.blobfuseProxy.installBlobfuse }}" + - name: BLOBFUSE_VERSION + value: "{{ .Values.node.blobfuseProxy.blobfuseVersion }}" + - name: INSTALL_BLOBFUSE2 + value: "{{ .Values.node.blobfuseProxy.installBlobfuse2 }}" + - name: BLOBFUSE2_VERSION + value: "{{ .Values.node.blobfuseProxy.blobfuse2Version }}" + - name: INSTALL_BLOBFUSE_PROXY + value: "{{ .Values.node.enableBlobfuseProxy }}" + - name: SET_MAX_OPEN_FILE_NUM + value: "{{ .Values.node.blobfuseProxy.setMaxOpenFileNum }}" + - name: MAX_FILE_NUM + value: "{{ .Values.node.blobfuseProxy.maxOpenFileNum }}" + - name: DISABLE_UPDATEDB + value: "{{ .Values.node.blobfuseProxy.disableUpdateDB }}" + - name: KUBELET_PATH + value: "{{ .Values.linux.kubelet }}" + - name: MIGRATE_K8S_REPO + value: "{{ .Values.node.blobfuseProxy.migrateK8sRepo }}" + - name: SET_READ_AHEAD_SIZE + value: "{{ .Values.node.blobfuseProxy.setReadAheadSize }}" + volumeMounts: + - name: host-usr + mountPath: /host/usr + - name: host-usr-local + mountPath: /host/usr/local + - name: host-etc + mountPath: /host/etc + containers: + - name: liveness-probe + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port={{ .Values.node.livenessProbe.healthPort }} + - --v=2 + resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: node-driver-registrar +{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- else }} + image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- end }} + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=2 + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: blob +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + args: + - "--v={{ .Values.node.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" + - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" + - "--nodeid=$(KUBE_NODE_NAME)" + - "--drivername={{ .Values.driver.name }}" + - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" + - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" + - "--custom-user-agent={{ .Values.driver.customUserAgent }}" + - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" + - "--allow-empty-cloud-config={{ .Values.node.allowEmptyCloudConfig }}" + - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" + - "--append-timestamp-cache-dir={{ .Values.node.appendTimeStampInCacheDir }}" + - "--mount-permissions={{ .Values.node.mountPermissions }}" + - "--allow-inline-volume-key-access-with-idenitity={{ .Values.node.allowInlineVolumeKeyAccessWithIdentity }}" + - "--enable-aznfs-mount={{ .Values.node.enableAznfsMount }}" + - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" + livenessProbe: + failureThreshold: 5 + httpGet: + host: localhost + path: /healthz + port: {{ .Values.node.livenessProbe.healthPort }} + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: BLOBFUSE_PROXY_ENDPOINT + value: unix:///csi/blobfuse-proxy.sock + {{- if ne .Values.driver.httpsProxy "" }} + - name: HTTPS_PROXY + value: {{ .Values.driver.httpsProxy }} + {{- end }} + {{- if ne .Values.driver.httpProxy "" }} + - name: HTTP_PROXY + value: {{ .Values.driver.httpProxy }} + {{- end }} + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: AZURE_GO_SDK_LOG_LEVEL + value: {{ .Values.driver.azureGoSDKLogLevel }} + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: AZURE_ENVIRONMENT_FILEPATH + value: /etc/kubernetes/azurestackcloud.json + {{- end }} + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + securityContext: + privileged: true + capabilities: + drop: + - ALL + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + - mountPath: /mnt + name: blob-cache + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + {{- end }} + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + - name: ssl-pki + mountPath: /etc/pki/ca-trust/extracted + readOnly: true + {{- end }} + {{- if .Values.node.enableAznfsMount }} + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: /lib/modules + name: lib-modules + readOnly: true + {{- end }} + resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} +{{- if .Values.node.enableAznfsMount }} + - name: aznfswatchdog +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + command: + - "aznfswatchdog" + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + securityContext: + privileged: true + capabilities: + drop: + - ALL + resources: {{- toYaml .Values.node.resources.aznfswatchdog | nindent 12 }} + volumeMounts: + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir +{{- end }} + volumes: + - name: host-usr + hostPath: + path: /usr + - name: host-usr-local + hostPath: + path: /usr/local + - name: host-etc + hostPath: + path: /etc + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} + type: DirectoryOrCreate + name: socket-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/ + type: DirectoryOrCreate + name: mountpoint-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + name: azure-cred + - hostPath: + path: {{ .Values.node.blobfuseCachePath }} + name: blob-cache + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + - name: ssl-pki + hostPath: + path: /etc/pki/ca-trust/extracted + {{- end }} + {{- if .Values.node.enableAznfsMount }} + - hostPath: + path: /opt/microsoft/aznfs/data + type: DirectoryOrCreate + name: aznfs-data + - name: lib-modules + hostPath: + path: /lib/modules + type: DirectoryOrCreate + {{- end }} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-controller.yaml new file mode 100644 index 000000000..833dcc640 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-controller.yaml @@ -0,0 +1,115 @@ +{{- if .Values.rbac.create -}} +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-external-provisioner-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-provisioner-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-provisioner-role + apiGroup: rbac.authorization.k8s.io + +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-external-resizer-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims/status"] + verbs: ["update", "patch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-resizer-role + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-resizer-role + apiGroup: rbac.authorization.k8s.io + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-controller-secret-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "create"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-controller-secret-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: csi-{{ .Values.rbac.name }}-controller-secret-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-node.yaml new file mode 100644 index 000000000..c041cf8db --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/rbac-csi-blob-node.yaml @@ -0,0 +1,29 @@ +{{- if .Values.rbac.create -}} +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-node-secret-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-node-secret-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: csi-{{ .Values.rbac.name }}-node-secret-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml new file mode 100644 index 000000000..7433bccf1 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml @@ -0,0 +1,17 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "blob.labels" . | nindent 4 }} +{{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + annotations: + azure.workload.identity/client-id: {{ .Values.workloadIdentity.clientID }} +{{- if .Values.workloadIdentity.tenantID }} + azure.workload.identity/tenant-id: {{ .Values.workloadIdentity.tenantID }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml new file mode 100644 index 000000000..a25090e30 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml @@ -0,0 +1,17 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "blob.labels" . | nindent 4 }} +{{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + annotations: + azure.workload.identity/client-id: {{ .Values.workloadIdentity.clientID }} +{{- if .Values.workloadIdentity.tenantID }} + azure.workload.identity/tenant-id: {{ .Values.workloadIdentity.tenantID }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.24.6/blob-csi-driver/values.yaml b/charts/v1.24.6/blob-csi-driver/values.yaml new file mode 100644 index 000000000..07c940e53 --- /dev/null +++ b/charts/v1.24.6/blob-csi-driver/values.yaml @@ -0,0 +1,186 @@ +image: + baseRepo: mcr.microsoft.com + blob: + repository: /oss/kubernetes-csi/blob-csi + tag: v1.24.6 + pullPolicy: IfNotPresent + csiProvisioner: + repository: /oss/kubernetes-csi/csi-provisioner + tag: v5.1.0 + pullPolicy: IfNotPresent + livenessProbe: + repository: /oss/kubernetes-csi/livenessprobe + tag: v2.14.0 + pullPolicy: IfNotPresent + nodeDriverRegistrar: + repository: /oss/kubernetes-csi/csi-node-driver-registrar + tag: v2.12.0 + pullPolicy: IfNotPresent + csiResizer: + repository: /oss/kubernetes-csi/csi-resizer + tag: v1.12.0 + pullPolicy: IfNotPresent + +cloud: AzurePublicCloud + +## Reference to one or more secrets to be used when pulling images +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ +imagePullSecrets: [] +# - name: myRegistryKeySecretName + +serviceAccount: + create: true # When true, service accounts will be created for you. Set to false if you want to use your own. + controller: csi-blob-controller-sa # Name of Service Account to be created or used + node: csi-blob-node-sa # Name of Service Account to be created or used + +rbac: + create: true + name: blob + +## Collection of annotations to add to all the pods +podAnnotations: {} +## Collection of labels to add to all the pods +podLabels: {} +# -- Custom labels to add into metadata +customLabels: {} + # k8s-app: blob-csi-driver + +## Leverage a PriorityClass to ensure your pods survive resource shortages +## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ +priorityClassName: system-cluster-critical +## Security context give the opportunity to run container as nonroot by setting a securityContext +## by example : +## securityContext: { runAsUser: 1001 } +securityContext: {} + +controller: + name: csi-blob-controller + cloudConfigSecretName: azure-cloud-provider + cloudConfigSecretNamespace: kube-system + allowEmptyCloudConfig: true + hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting + metricsPort: 29634 + livenessProbe: + healthPort: 29632 + replicas: 2 + runOnMaster: false + runOnControlPlane: false + logLevel: 5 + resources: + csiProvisioner: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + blob: + limits: + memory: 800Mi + requests: + cpu: 10m + memory: 20Mi + csiResizer: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - key: "node-role.kubernetes.io/master" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/controlplane" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/control-plane" + operator: "Exists" + effect: "NoSchedule" + - key: "CriticalAddonsOnly" + operator: "Exists" + effect: "NoSchedule" + +node: + name: csi-blob-node + cloudConfigSecretName: azure-cloud-provider + cloudConfigSecretNamespace: kube-system + allowEmptyCloudConfig: true + allowInlineVolumeKeyAccessWithIdentity: false + maxUnavailable: 1 + metricsPort: 29635 + livenessProbe: + healthPort: 29633 + logLevel: 5 + enableBlobfuseProxy: true + blobfuseProxy: + installBlobfuse: false + blobfuseVersion: "1.4.5" + installBlobfuse2: true + blobfuse2Version: "2.4.0" + setMaxOpenFileNum: true + maxOpenFileNum: "9000000" + disableUpdateDB: true + migrateK8sRepo: false + setReadAheadSize: true + blobfuseCachePath: /mnt + appendTimeStampInCacheDir: false + mountPermissions: 0777 + resources: + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + nodeDriverRegistrar: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + blob: + limits: + memory: 2100Mi + requests: + cpu: 10m + memory: 20Mi + aznfswatchdog: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - operator: "Exists" + enableAznfsMount: true + +feature: + fsGroupPolicy: ReadWriteOnceWithFSType + enableGetVolumeStats: false + +driver: + name: blob.csi.azure.com + customUserAgent: "" + userAgentSuffix: "OSS-helm" + azureGoSDKLogLevel: "" # available values: ""(no logs), DEBUG, INFO, WARNING, ERROR + httpsProxy: "" + httpProxy: "" + +linux: + kubelet: /var/lib/kubelet + distro: debian + +workloadIdentity: + clientID: "" + # [optional] If the AAD application or user-assigned managed identity is not in the same tenant as the cluster + # then set tenantID with the application or user-assigned managed identity tenant ID + tenantID: "" diff --git a/deploy/csi-blob-controller.yaml b/deploy/csi-blob-controller.yaml index 33e757742..5e7006770 100644 --- a/deploy/csi-blob-controller.yaml +++ b/deploy/csi-blob-controller.yaml @@ -85,7 +85,7 @@ spec: drop: - ALL - name: blob - image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.5 + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 imagePullPolicy: IfNotPresent args: - "--v=5" diff --git a/deploy/csi-blob-node.yaml b/deploy/csi-blob-node.yaml index b4e980c9e..765aed0ae 100644 --- a/deploy/csi-blob-node.yaml +++ b/deploy/csi-blob-node.yaml @@ -40,7 +40,7 @@ spec: - operator: "Exists" initContainers: - name: install-blobfuse-proxy - image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.5 + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 imagePullPolicy: IfNotPresent command: - "/blobfuse-proxy/init.sh" @@ -123,7 +123,7 @@ spec: drop: - ALL - name: blob - image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.5 + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 imagePullPolicy: IfNotPresent args: - "--v=5" @@ -186,7 +186,7 @@ spec: cpu: 10m memory: 20Mi - name: aznfswatchdog - image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.5 + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 command: - "aznfswatchdog" imagePullPolicy: IfNotPresent diff --git a/deploy/v1.24.6/csi-blob-controller.yaml b/deploy/v1.24.6/csi-blob-controller.yaml new file mode 100644 index 000000000..5e7006770 --- /dev/null +++ b/deploy/v1.24.6/csi-blob-controller.yaml @@ -0,0 +1,162 @@ +--- +kind: Deployment +apiVersion: apps/v1 +metadata: + name: csi-blob-controller + namespace: kube-system +spec: + replicas: 2 + selector: + matchLabels: + app: csi-blob-controller + template: + metadata: + labels: + app: csi-blob-controller + spec: + hostNetwork: true + serviceAccountName: csi-blob-controller-sa + nodeSelector: + kubernetes.io/os: linux # add "kubernetes.io/role: master" to run controller on master node + priorityClassName: system-cluster-critical + securityContext: + seccompProfile: + type: RuntimeDefault + tolerations: + - key: "node-role.kubernetes.io/master" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/controlplane" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/control-plane" + operator: "Exists" + effect: "NoSchedule" + - key: "CriticalAddonsOnly" + operator: "Exists" + effect: "NoSchedule" + containers: + - name: csi-provisioner + image: mcr.microsoft.com/oss/kubernetes-csi/csi-provisioner:v5.1.0 + args: + - "-v=2" + - "--csi-address=$(ADDRESS)" + - "--leader-election" + - "--leader-election-namespace=kube-system" + - "--timeout=1200s" + - "--extra-create-metadata=true" + - "--kube-api-qps=50" + - "--kube-api-burst=100" + - "--feature-gates=HonorPVReclaimPolicy=true" + - "--retry-interval-max=30m" + env: + - name: ADDRESS + value: /csi/csi.sock + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + securityContext: + capabilities: + drop: + - ALL + - name: liveness-probe + image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.14.0 + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --http-endpoint=localhost:29632 + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + securityContext: + capabilities: + drop: + - ALL + - name: blob + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 + imagePullPolicy: IfNotPresent + args: + - "--v=5" + - "--endpoint=$(CSI_ENDPOINT)" + - "--metrics-address=0.0.0.0:29634" + - "--user-agent-suffix=OSS-kubectl" + ports: + - containerPort: 29634 + name: metrics + protocol: TCP + livenessProbe: + failureThreshold: 5 + httpGet: + host: localhost + path: /healthz + port: 29632 + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + resources: + limits: + memory: 800Mi + requests: + cpu: 10m + memory: 20Mi + securityContext: + capabilities: + drop: + - ALL + - name: csi-resizer + image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.12.0 + args: + - "-csi-address=$(ADDRESS)" + - "-v=2" + - "-leader-election" + - "--leader-election-namespace=kube-system" + - '-handle-volume-inuse-error=false' + env: + - name: ADDRESS + value: /csi/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + securityContext: + capabilities: + drop: + - ALL + volumes: + - name: socket-dir + emptyDir: {} + - name: azure-cred + hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate diff --git a/deploy/v1.24.6/csi-blob-driver.yaml b/deploy/v1.24.6/csi-blob-driver.yaml new file mode 100644 index 000000000..d2de725d8 --- /dev/null +++ b/deploy/v1.24.6/csi-blob-driver.yaml @@ -0,0 +1,12 @@ +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: blob.csi.azure.com +spec: + attachRequired: false + podInfoOnMount: true + fsGroupPolicy: ReadWriteOnceWithFSType + volumeLifecycleModes: + - Persistent + - Ephemeral diff --git a/deploy/v1.24.6/csi-blob-node.yaml b/deploy/v1.24.6/csi-blob-node.yaml new file mode 100644 index 000000000..765aed0ae --- /dev/null +++ b/deploy/v1.24.6/csi-blob-node.yaml @@ -0,0 +1,248 @@ +--- +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: csi-blob-node + namespace: kube-system +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate + selector: + matchLabels: + app: csi-blob-node + template: + metadata: + labels: + app: csi-blob-node + spec: + hostNetwork: true + hostPID: true + dnsPolicy: Default + serviceAccountName: csi-blob-node-sa + nodeSelector: + kubernetes.io/os: linux + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: type + operator: NotIn + values: + - virtual-kubelet + priorityClassName: system-node-critical + securityContext: + seccompProfile: + type: RuntimeDefault + tolerations: + - operator: "Exists" + initContainers: + - name: install-blobfuse-proxy + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 + imagePullPolicy: IfNotPresent + command: + - "/blobfuse-proxy/init.sh" + securityContext: + privileged: true + capabilities: + drop: + - ALL + env: + - name: DEBIAN_FRONTEND + value: "noninteractive" + - name: INSTALL_BLOBFUSE_PROXY + value: "true" + - name: INSTALL_BLOBFUSE + value: "false" + - name: BLOBFUSE_VERSION + value: "1.4.5" + - name: INSTALL_BLOBFUSE2 + value: "true" + - name: BLOBFUSE2_VERSION + value: "2.4.0" + - name: SET_MAX_OPEN_FILE_NUM + value: "true" + - name: MAX_FILE_NUM + value: "9000000" + - name: DISABLE_UPDATEDB + value: "true" + volumeMounts: + - name: host-usr + mountPath: /host/usr + - name: host-usr-local + mountPath: /host/usr/local + - name: host-etc + mountPath: /host/etc + containers: + - name: liveness-probe + volumeMounts: + - mountPath: /csi + name: socket-dir + image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.14.0 + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port=29633 + - --v=2 + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + securityContext: + capabilities: + drop: + - ALL + - name: node-driver-registrar + image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.12.0 + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=2 + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/blob.csi.azure.com/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + securityContext: + capabilities: + drop: + - ALL + - name: blob + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 + imagePullPolicy: IfNotPresent + args: + - "--v=5" + - "--endpoint=$(CSI_ENDPOINT)" + - "--enable-blobfuse-proxy=true" + - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" + - "--nodeid=$(KUBE_NODE_NAME)" + - "--user-agent-suffix=OSS-kubectl" + - "--metrics-address=0.0.0.0:29635" + - "--enable-aznfs-mount=true" + livenessProbe: + failureThreshold: 5 + httpGet: + host: localhost + path: /healthz + port: 29633 + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: BLOBFUSE_PROXY_ENDPOINT + value: unix:///csi/blobfuse-proxy.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + securityContext: + privileged: true + capabilities: + drop: + - ALL + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: /var/lib/kubelet/ + mountPropagation: Bidirectional + name: mountpoint-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + - mountPath: /mnt + name: blob-cache + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: /lib/modules + name: lib-modules + readOnly: true + resources: + limits: + memory: 2100Mi + requests: + cpu: 10m + memory: 20Mi + - name: aznfswatchdog + image: mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 + command: + - "aznfswatchdog" + imagePullPolicy: IfNotPresent + securityContext: + privileged: true + capabilities: + drop: + - ALL + resources: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + volumeMounts: + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: /var/lib/kubelet/ + mountPropagation: Bidirectional + name: mountpoint-dir + volumes: + - name: host-usr + hostPath: + path: /usr + - name: host-usr-local + hostPath: + path: /usr/local + - name: host-etc + hostPath: + path: /etc + - hostPath: + path: /var/lib/kubelet/plugins/blob.csi.azure.com + type: DirectoryOrCreate + name: socket-dir + - hostPath: + path: /var/lib/kubelet/ + type: DirectoryOrCreate + name: mountpoint-dir + - hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + name: azure-cred + - hostPath: + path: /mnt + type: DirectoryOrCreate + name: blob-cache + - hostPath: + path: /opt/microsoft/aznfs/data + type: DirectoryOrCreate + name: aznfs-data + - name: lib-modules + hostPath: + path: /lib/modules + type: DirectoryOrCreate +--- diff --git a/deploy/v1.24.6/kustomization.yaml b/deploy/v1.24.6/kustomization.yaml new file mode 100644 index 000000000..8b7f5fcac --- /dev/null +++ b/deploy/v1.24.6/kustomization.yaml @@ -0,0 +1,10 @@ +--- +apiVersion: kustomize.config.k8s.io/v1beta1 +kind: Kustomization +resources: + - csi-blob-controller.yaml + - csi-blob-driver.yaml + - csi-blob-node.yaml + - rbac-csi-blob-controller.yaml + - rbac-csi-blob-node.yaml + - blobfuse-proxy.yaml diff --git a/deploy/v1.24.6/rbac-csi-blob-controller.yaml b/deploy/v1.24.6/rbac-csi-blob-controller.yaml new file mode 100644 index 000000000..89c2f1f38 --- /dev/null +++ b/deploy/v1.24.6/rbac-csi-blob-controller.yaml @@ -0,0 +1,108 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-blob-controller-sa + namespace: kube-system +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: blob-external-provisioner-role +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: blob-csi-provisioner-binding +subjects: + - kind: ServiceAccount + name: csi-blob-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: blob-external-provisioner-role + apiGroup: rbac.authorization.k8s.io +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: blob-external-resizer-role +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims/status"] + verbs: ["update", "patch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: blob-csi-resizer-role +subjects: + - kind: ServiceAccount + name: csi-blob-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: blob-external-resizer-role + apiGroup: rbac.authorization.k8s.io +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-blob-controller-secret-role +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "create"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-blob-controller-secret-binding +subjects: + - kind: ServiceAccount + name: csi-blob-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-blob-controller-secret-role + apiGroup: rbac.authorization.k8s.io diff --git a/deploy/v1.24.6/rbac-csi-blob-node.yaml b/deploy/v1.24.6/rbac-csi-blob-node.yaml new file mode 100644 index 000000000..ce06d862c --- /dev/null +++ b/deploy/v1.24.6/rbac-csi-blob-node.yaml @@ -0,0 +1,30 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-blob-node-sa + namespace: kube-system + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-blob-node-secret-role +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-blob-node-secret-binding +subjects: + - kind: ServiceAccount + name: csi-blob-node-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-blob-node-secret-role + apiGroup: rbac.authorization.k8s.io diff --git a/docs/install-blob-csi-driver.md b/docs/install-blob-csi-driver.md index 9880e8899..04f74390e 100644 --- a/docs/install-blob-csi-driver.md +++ b/docs/install-blob-csi-driver.md @@ -4,6 +4,6 @@ > - please use helm install method for more customization, e.g. Azure Stack, RedHat OpenShift support. > - [install CSI driver master version](./install-csi-driver-master.md) (only for testing purpose) - - [install v1.24.5 CSI driver](./install-csi-driver-v1.24.5.md) + - [install v1.24.6 CSI driver](./install-csi-driver-v1.24.6.md) - [install v1.23.3 CSI driver](./install-csi-driver-v1.23.3.md) - [install v1.22.5 CSI driver](./install-csi-driver-v1.22.5.md) diff --git a/docs/install-csi-driver-v1.24.6.md b/docs/install-csi-driver-v1.24.6.md new file mode 100644 index 000000000..6d7254a37 --- /dev/null +++ b/docs/install-csi-driver-v1.24.6.md @@ -0,0 +1,47 @@ +# Install Azure Blob Storage CSI driver v1.24.6 version on a kubernetes cluster +> `blobfuse-proxy` is supported on CoreOS(OpenShift) from v1.23.2 +> +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +## Install with kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.24.6/deploy/install-driver.sh | bash -s v1.24.6 blobfuse-proxy -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +./deploy/install-driver.sh v1.24.6 local,blobfuse-proxy +``` + +- check pods status: +```console +kubectl -n kube-system get pod -o wide -l app=csi-blob-controller +kubectl -n kube-system get pod -o wide -l app=csi-blob-node +``` + +example output: + +```console +NAME READY STATUS RESTARTS AGE IP NODE +csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 +csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 +``` + +### clean up Blob CSI driver +- Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.24.6/deploy/uninstall-driver.sh | bash -s v1.24.6 -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +git checkout v1.24.6 +./deploy/uninstall-driver.sh v1.24.6 local +```