From 36b944444919683b7b323a175591f103b99c9d77 Mon Sep 17 00:00:00 2001 From: Michael Riley Date: Fri, 6 Oct 2023 11:07:10 -0400 Subject: [PATCH] Release v0.10.1 #patch --- CHANGELOG.md | 8 + docs/releases/latest.yml | 4 +- docs/releases/v0.10.1.yml | 400 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 410 insertions(+), 2 deletions(-) create mode 100644 docs/releases/v0.10.1.yml diff --git a/CHANGELOG.md b/CHANGELOG.md index 68c04b4..3e8f03e 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,12 @@ # Change Log +## [v0.10.1](https://github.com/vultr/vultr-csi/compare/v0.10.0...v0.10.1) (2023-10-06) +### Automation +* Resolve build errors from statfs type inconsistencies in darwin arm64 [PR 148](https://github.com/vultr/vultr-csi/pull/148) + +### Dependencies +* Bump golang.org/x/sys from 0.12.0 to 0.13.0 [PR 147](https://github.com/vultr/vultr-csi/pull/147) +* Bump golang.org/x/sync from 0.3.0 to 0.4.0 [PR 146](https://github.com/vultr/vultr-csi/pull/146) + ## [v0.10.0](https://github.com/vultr/vultr-csi/compare/v0.9.0...v0.10.0) (2023-10-05) ### Enhancements * Update NVMe mininum block size [PR 143](https://github.com/vultr/vultr-csi/pull/143) diff --git a/docs/releases/latest.yml b/docs/releases/latest.yml index 840221b..672377c 100644 --- a/docs/releases/latest.yml +++ b/docs/releases/latest.yml @@ -120,7 +120,7 @@ spec: - name: socket-dir mountPath: /var/lib/csi/sockets/pluginproxy/ - name: csi-vultr-plugin - image: vultr/vultr-csi:v0.10.0 + image: vultr/vultr-csi:v0.10.1 args: - "--endpoint=$(CSI_ENDPOINT)" - "--token=$(VULTR_API_KEY)" @@ -278,7 +278,7 @@ spec: - name: registration-dir mountPath: /registration/ - name: csi-vultr-plugin - image: vultr/vultr-csi:v0.10.0 + image: vultr/vultr-csi:v0.10.1 args: - "--endpoint=$(CSI_ENDPOINT)" env: diff --git a/docs/releases/v0.10.1.yml b/docs/releases/v0.10.1.yml new file mode 100644 index 0000000..672377c --- /dev/null +++ b/docs/releases/v0.10.1.yml @@ -0,0 +1,400 @@ +#################### +### Storage Classes +#################### +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: block.csi.vultr.com +spec: + attachRequired: true + podInfoOnMount: true + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +parameters: + block_type: high_perf + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage-retain + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +reclaimPolicy: Retain +parameters: + block_type: high_perf + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage-hdd + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +parameters: + block_type: storage_opt + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage-hdd-retain + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +reclaimPolicy: Retain +parameters: + block_type: storage_opt + +################### +### CSI Controller +################### +--- +kind: StatefulSet +apiVersion: apps/v1 +metadata: + name: csi-vultr-controller + namespace: kube-system +spec: + serviceName: "csi-vultr" + replicas: 1 + selector: + matchLabels: + app: csi-vultr-controller + template: + metadata: + labels: + app: csi-vultr-controller + role: csi-vultr + spec: + serviceAccountName: csi-vultr-controller-sa + containers: + - name: csi-provisioner + image: k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0 + args: + - "--volume-name-prefix=pvc" + - "--volume-name-uuid-length=16" + - "--csi-address=$(ADDRESS)" + - "--v=5" + - "--default-fstype=ext4" + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + imagePullPolicy: "Always" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-attacher + image: k8s.gcr.io/sig-storage/csi-attacher:v4.1.0 + args: + - "--v=5" + - "--csi-address=$(ADDRESS)" + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + imagePullPolicy: "Always" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-resizer + image: registry.k8s.io/sig-storage/csi-resizer:v1.7.0 + args: + - "--csi-address=$(ADDRESS)" + - "--timeout=30s" + - "--v=5" + - "--handle-volume-inuse-error=false" + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + imagePullPolicy: "IfNotPresent" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-vultr-plugin + image: vultr/vultr-csi:v0.10.1 + args: + - "--endpoint=$(CSI_ENDPOINT)" + - "--token=$(VULTR_API_KEY)" + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock + - name: VULTR_API_KEY + valueFrom: + secretKeyRef: + name: vultr-csi + key: api-key + imagePullPolicy: "Always" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + volumes: + - name: socket-dir + emptyDir: { } + +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-vultr-controller-sa + namespace: kube-system + +## Attacher Role + Binding +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-attacher-role + namespace: kube-system +rules: + - apiGroups: [ "" ] + resources: [ "persistentvolumes" ] + verbs: [ "get", "list", "watch", "update", "patch" ] + - apiGroups: [ "" ] + resources: [ "nodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "csinodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch", "update", "patch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments/status" ] + verbs: [ "patch" ] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-controller-attacher-binding + namespace: kube-system +subjects: + - kind: ServiceAccount + name: csi-vultr-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-attacher-role + apiGroup: rbac.authorization.k8s.io + +## Provisioner Role + Binding +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-provisioner-role + namespace: kube-system +rules: + - apiGroups: [ "" ] + resources: [ "secrets" ] + verbs: [ "get", "list" ] + - apiGroups: [ "" ] + resources: [ "persistentvolumes" ] + verbs: [ "get", "list", "watch", "create", "delete" ] + - apiGroups: [ "" ] + resources: [ "persistentvolumeclaims" ] + verbs: [ "get", "list", "watch", "update" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "storageclasses" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "csinodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "list", "watch", "create", "update", "patch" ] + - apiGroups: [ "" ] + resources: [ "nodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch" ] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-controller-provisioner-binding + namespace: kube-system +subjects: + - kind: ServiceAccount + name: csi-vultr-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-provisioner-role + apiGroup: rbac.authorization.k8s.io + + +############ +## CSI Node +############ +--- +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: csi-vultr-node + namespace: kube-system +spec: + selector: + matchLabels: + app: csi-vultr-node + template: + metadata: + labels: + app: csi-vultr-node + role: csi-vultr + spec: + serviceAccountName: csi-vultr-node-sa + hostNetwork: true + containers: + - name: driver-registrar + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.7.0 + args: + - "--v=5" + - "--csi-address=$(ADDRESS)" + - "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)" + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/block.csi.vultr.com/csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + volumeMounts: + - name: plugin-dir + mountPath: /csi/ + - name: registration-dir + mountPath: /registration/ + - name: csi-vultr-plugin + image: vultr/vultr-csi:v0.10.1 + args: + - "--endpoint=$(CSI_ENDPOINT)" + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + imagePullPolicy: "Always" + securityContext: + privileged: true + capabilities: + add: [ "SYS_ADMIN" ] + allowPrivilegeEscalation: true + volumeMounts: + - name: plugin-dir + mountPath: /csi + - name: pods-mount-dir + mountPath: /var/lib/kubelet + mountPropagation: "Bidirectional" + - mountPath: /dev + name: device-dir + volumes: + - name: registration-dir + hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + - name: kubelet-dir + hostPath: + path: /var/lib/kubelet + type: Directory + - name: plugin-dir + hostPath: + path: /var/lib/kubelet/plugins/block.csi.vultr.com + type: DirectoryOrCreate + - name: pods-mount-dir + hostPath: + path: /var/lib/kubelet + type: Directory + - name: device-dir + hostPath: + path: /dev + - name: udev-rules-etc + hostPath: + path: /etc/udev + type: Directory + - name: udev-rules-lib + hostPath: + path: /lib/udev + type: Directory + - name: udev-socket + hostPath: + path: /run/udev + type: Directory + - name: sys + hostPath: + path: /sys + type: Directory + +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-vultr-node-sa + namespace: kube-system + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: driver-registrar-binding + namespace: kube-system +subjects: + - kind: ServiceAccount + name: csi-vultr-node-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-node-driver-registrar-role + apiGroup: rbac.authorization.k8s.io + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-node-driver-registrar-role + namespace: kube-system +rules: + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "get", "list", "watch", "create", "update", "patch" ] +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-resizer-role +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims/status"] + verbs: ["update", "patch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-resizer-binding +subjects: + - kind: ServiceAccount + name: csi-vultr-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-resizer-role