This repository has been archived by the owner on Oct 24, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 522
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
11 changed files
with
787 additions
and
140 deletions.
There are no files selected for viewing
250 changes: 250 additions & 0 deletions
250
parts/k8s/addons/kubernetesmasteraddons-secrets-store-csi-driver-daemonset.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,250 @@ | ||
apiVersion: storage.k8s.io/v1beta1 | ||
kind: CSIDriver | ||
metadata: | ||
name: secrets-store.csi.k8s.io | ||
spec: | ||
podInfoOnMount: true | ||
attachRequired: false | ||
volumeLifecycleModes: | ||
- Ephemeral | ||
--- | ||
apiVersion: v1 | ||
kind: ServiceAccount | ||
metadata: | ||
name: secrets-store-csi-driver | ||
namespace: default | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRoleBinding | ||
metadata: | ||
name: secretproviderclasses-rolebinding | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: secretproviderclasses-role | ||
subjects: | ||
- kind: ServiceAccount | ||
name: secrets-store-csi-driver | ||
namespace: default | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
name: secretproviderclasses-role | ||
rules: | ||
- apiGroups: | ||
- secrets-store.csi.x-k8s.io | ||
resources: | ||
- secretproviderclasses | ||
verbs: | ||
- get | ||
- list | ||
--- | ||
apiVersion: apiextensions.k8s.io/v1beta1 | ||
kind: CustomResourceDefinition | ||
metadata: | ||
name: secretproviderclasses.secrets-store.csi.x-k8s.io | ||
spec: | ||
group: secrets-store.csi.x-k8s.io | ||
names: | ||
kind: SecretProviderClass | ||
listKind: SecretProviderClassList | ||
plural: secretproviderclasses | ||
singular: secretproviderclass | ||
scope: "" | ||
validation: | ||
openAPIV3Schema: | ||
description: SecretProviderClass is the Schema for the secretproviderclasses | ||
API | ||
properties: | ||
apiVersion: | ||
description: 'APIVersion defines the versioned schema of this representation | ||
of an object. Servers should convert recognized schemas to the latest | ||
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' | ||
type: string | ||
kind: | ||
description: 'Kind is a string value representing the REST resource this | ||
object represents. Servers may infer this from the endpoint the client | ||
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' | ||
type: string | ||
metadata: | ||
type: object | ||
spec: | ||
description: SecretProviderClassSpec defines the desired state of SecretProviderClass | ||
properties: | ||
parameters: | ||
additionalProperties: | ||
type: string | ||
description: Configuration for specific provider | ||
type: object | ||
provider: | ||
description: Configuration for provider name | ||
type: string | ||
type: object | ||
status: | ||
description: SecretProviderClassStatus defines the observed state of SecretProviderClass | ||
type: object | ||
type: object | ||
version: v1alpha1 | ||
versions: | ||
- name: v1alpha1 | ||
served: true | ||
storage: true | ||
status: | ||
acceptedNames: | ||
kind: "" | ||
plural: "" | ||
conditions: [] | ||
storedVersions: [] | ||
--- | ||
kind: DaemonSet | ||
apiVersion: apps/v1 | ||
metadata: | ||
name: csi-secrets-store | ||
spec: | ||
selector: | ||
matchLabels: | ||
app: csi-secrets-store | ||
template: | ||
metadata: | ||
labels: | ||
app: csi-secrets-store | ||
spec: | ||
serviceAccountName: secrets-store-csi-driver | ||
hostNetwork: true | ||
containers: | ||
- name: node-driver-registrar | ||
image: {{ContainerImage "csi-node-driver-registrar"}} | ||
args: | ||
- --v=5 | ||
- --csi-address=/csi/csi.sock | ||
- --kubelet-registration-path=/var/lib/kubelet/plugins/csi-secrets-store/csi.sock | ||
lifecycle: | ||
preStop: | ||
exec: | ||
command: | ||
[ | ||
"/bin/sh", | ||
"-c", | ||
"rm -rf /registration/secrets-store.csi.k8s.io-reg.sock", | ||
] | ||
env: | ||
- name: KUBE_NODE_NAME | ||
valueFrom: | ||
fieldRef: | ||
apiVersion: v1 | ||
fieldPath: spec.nodeName | ||
imagePullPolicy: Always | ||
volumeMounts: | ||
- name: plugin-dir | ||
mountPath: /csi | ||
- name: registration-dir | ||
mountPath: /registration | ||
- name: secrets-store | ||
image: {{ContainerImage "csi-secrets-store"}} | ||
args: | ||
- "--debug=true" | ||
- "--endpoint=$(CSI_ENDPOINT)" | ||
- "--nodeid=$(KUBE_NODE_NAME)" | ||
- "--provider-volume=/etc/kubernetes/secrets-store-csi-providers" | ||
env: | ||
- name: CSI_ENDPOINT | ||
value: unix:///csi/csi.sock | ||
- name: KUBE_NODE_NAME | ||
valueFrom: | ||
fieldRef: | ||
apiVersion: v1 | ||
fieldPath: spec.nodeName | ||
imagePullPolicy: Always | ||
securityContext: | ||
privileged: true | ||
ports: | ||
- containerPort: 9808 | ||
name: healthz | ||
protocol: TCP | ||
livenessProbe: | ||
failureThreshold: 5 | ||
httpGet: | ||
path: /healthz | ||
port: healthz | ||
initialDelaySeconds: 30 | ||
timeoutSeconds: 10 | ||
periodSeconds: 15 | ||
volumeMounts: | ||
- name: plugin-dir | ||
mountPath: /csi | ||
- name: mountpoint-dir | ||
mountPath: /var/lib/kubelet/pods | ||
mountPropagation: Bidirectional | ||
- name: providers-dir | ||
mountPath: /etc/kubernetes/secrets-store-csi-providers | ||
- name: liveness-probe | ||
image: {{ContainerImage "livenessprobe"}} | ||
imagePullPolicy: Always | ||
args: | ||
- --csi-address=/csi/csi.sock | ||
- --probe-timeout=3s | ||
- --health-port=9808 | ||
volumeMounts: | ||
- name: plugin-dir | ||
mountPath: /csi | ||
volumes: | ||
- name: mountpoint-dir | ||
hostPath: | ||
path: /var/lib/kubelet/pods | ||
type: DirectoryOrCreate | ||
- name: registration-dir | ||
hostPath: | ||
path: /var/lib/kubelet/plugins_registry/ | ||
type: Directory | ||
- name: plugin-dir | ||
hostPath: | ||
path: /var/lib/kubelet/plugins/csi-secrets-store/ | ||
type: DirectoryOrCreate | ||
- name: providers-dir | ||
hostPath: | ||
path: /etc/kubernetes/secrets-store-csi-providers | ||
type: DirectoryOrCreate | ||
--- | ||
apiVersion: apps/v1 | ||
kind: DaemonSet | ||
metadata: | ||
labels: | ||
app: csi-secrets-store-provider-azure | ||
name: csi-secrets-store-provider-azure | ||
spec: | ||
updateStrategy: | ||
type: RollingUpdate | ||
selector: | ||
matchLabels: | ||
app: csi-secrets-store-provider-azure | ||
template: | ||
metadata: | ||
labels: | ||
app: csi-secrets-store-provider-azure | ||
spec: | ||
tolerations: | ||
containers: | ||
- name: provider-azure-installer | ||
image: {{ContainerImage "csi-secrets-store-provider-azure"}} | ||
imagePullPolicy: Always | ||
resources: | ||
requests: | ||
cpu: 50m | ||
memory: 100Mi | ||
limits: | ||
cpu: 50m | ||
memory: 100Mi | ||
env: | ||
# set TARGET_DIR env var and mount the same directory to to the container | ||
- name: TARGET_DIR | ||
value: "/etc/kubernetes/secrets-store-csi-providers" | ||
volumeMounts: | ||
- mountPath: "/etc/kubernetes/secrets-store-csi-providers" | ||
name: providervol | ||
volumes: | ||
- name: providervol | ||
hostPath: | ||
path: "/etc/kubernetes/secrets-store-csi-providers" | ||
nodeSelector: | ||
beta.kubernetes.io/os: linux |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.