keyservice: use dash in container name (#1016)

Co-authored-by: Otto Bittner <cobittner@posteo.net>
This commit is contained in:
Paul Meyer 2023-01-20 18:51:06 +01:00 committed by GitHub
parent effe797d81
commit a8cbfd848f
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
67 changed files with 430 additions and 435 deletions

View file

@ -8,7 +8,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
spec:
replicas: 1
selector:
@ -21,7 +21,7 @@ spec:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
app: csi-azuredisk-controller
spec:
serviceAccountName: csi-azuredisk-controller-sa
@ -88,8 +88,8 @@ spec:
- name: ADDRESS
value: /csi/csi.sock
volumeMounts:
- mountPath: /csi
name: socket-dir
- mountPath: /csi
name: socket-dir
resources:
limits:
memory: 500Mi
@ -122,8 +122,8 @@ spec:
- "-v=2"
- "-leader-election"
- "--leader-election-namespace=testNamespace"
- '-handle-volume-inuse-error=false'
- '-feature-gates=RecoverVolumeExpansionFailure=true'
- "-handle-volume-inuse-error=false"
- "-feature-gates=RecoverVolumeExpansionFailure=true"
- "-timeout=240s"
env:
- name: ADDRESS

View file

@ -8,7 +8,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
spec:
updateStrategy:
rollingUpdate:
@ -24,7 +24,7 @@ spec:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
app: csi-azuredisk-node
spec:
serviceAccountName: csi-azuredisk-node-sa
@ -35,11 +35,11 @@ spec:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: type
operator: NotIn
values:
- virtual-kubelet
- matchExpressions:
- key: type
operator: NotIn
values:
- virtual-kubelet
priorityClassName: system-node-critical
tolerations:
- operator: Exists
@ -107,7 +107,7 @@ spec:
- "--allow-empty-cloud-config=true"
- "--support-zone=true"
- "--get-node-info-from-labels=false"
- "--kms-addr=keyservice.testNamespace:9000"
- "--kms-addr=key-service.testNamespace:9000"
ports:
- containerPort: 29603
name: healthz

View file

@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
@ -48,7 +48,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
subjects:
- kind: ServiceAccount
name: csi-azuredisk-controller-sa
@ -69,7 +69,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
@ -100,7 +100,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
subjects:
- kind: ServiceAccount
name: csi-azuredisk-controller-sa
@ -121,7 +121,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
rules:
- apiGroups: [""]
resources: ["events"]
@ -152,7 +152,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
subjects:
- kind: ServiceAccount
name: csi-azuredisk-controller-sa
@ -172,7 +172,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
@ -202,7 +202,7 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"
subjects:
- kind: ServiceAccount
name: csi-azuredisk-controller-sa

View file

@ -8,4 +8,4 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"

View file

@ -8,4 +8,4 @@ metadata:
app.kubernetes.io/managed-by: "Helm"
app.kubernetes.io/name: "azuredisk-csi-driver"
app.kubernetes.io/version: "v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.0"
helm.sh/chart: "azuredisk-csi-driver-v1.1.2"

View file

@ -38,7 +38,7 @@ spec:
image: joinServiceImage
args:
- --cloud-provider=Azure
- --keyservice-endpoint=keyservice.testNamespace:9000
- --key-service-endpoint=key-service.testNamespace:9000
volumeMounts:
- mountPath: /var/config
name: config

View file

@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-app: key-service
name: key-service
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get

View file

@ -1,12 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: keyservice
name: key-service
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: keyservice
name: key-service
subjects:
- kind: ServiceAccount
name: keyservice
namespace: testNamespace
- kind: ServiceAccount
name: key-service
namespace: testNamespace

View file

@ -0,0 +1,62 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: key-service
k8s-app: key-service
kubernetes.io/cluster-service: "true"
name: key-service
namespace: testNamespace
spec:
selector:
matchLabels:
k8s-app: key-service
template:
metadata:
labels:
k8s-app: key-service
spec:
containers:
- name: key-service
image: keyServiceImage
args:
- --port=9000
volumeMounts:
- mountPath: /var/config
name: config
readOnly: true
resources: {}
nodeSelector:
node-role.kubernetes.io/control-plane: ""
priorityClassName: system-cluster-critical
serviceAccountName: key-service
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
volumes:
- name: config
projected:
sources:
- configMap:
items:
- key: measurements
path: measurements
name: join-config
- secret:
items:
- key: mastersecret
path: mastersecret
- key: salt
path: salt
name: constellation-mastersecret
updateStrategy: {}

View file

@ -1,16 +1,16 @@
apiVersion: v1
kind: Service
metadata:
name: keyservice
name: key-service
namespace: testNamespace
spec:
ports:
- name: grpc
port: 9000
protocol: TCP
targetPort: 9000
- name: grpc
port: 9000
protocol: TCP
targetPort: 9000
selector:
k8s-app: keyservice
k8s-app: key-service
type: ClusterIP
status:
loadBalancer: {}

View file

@ -1,5 +1,5 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: keyservice
name: key-service
namespace: testNamespace

View file

@ -1,13 +0,0 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-app: keyservice
name: keyservice
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get

View file

@ -1,62 +0,0 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: keyservice
k8s-app: keyservice
kubernetes.io/cluster-service: "true"
name: keyservice
namespace: testNamespace
spec:
selector:
matchLabels:
k8s-app: keyservice
template:
metadata:
labels:
k8s-app: keyservice
spec:
containers:
- name: keyservice
image: keyserviceImage
args:
- --port=9000
volumeMounts:
- mountPath: /var/config
name: config
readOnly: true
resources: {}
nodeSelector:
node-role.kubernetes.io/control-plane: ""
priorityClassName: system-cluster-critical
serviceAccountName: keyservice
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
volumes:
- name: config
projected:
sources:
- configMap:
items:
- key: measurements
path: measurements
name: join-config
- secret:
items:
- key: mastersecret
path: mastersecret
- key: salt
path: salt
name: constellation-mastersecret
updateStrategy: {}

View file

@ -41,7 +41,7 @@ spec:
- "--v=5"
- "--endpoint=unix:/csi/csi.sock"
- "--run-controller-service=false"
- "--kms-addr=keyservice.testNamespace:9000"
- "--kms-addr=key-service.testNamespace:9000"
securityContext:
privileged: true
volumeMounts:
@ -109,4 +109,4 @@ spec:
# See "special case". This will tolerate everything. Node component should
# be scheduled on all nodes.
tolerations:
- operator: Exists
- operator: Exists

View file

@ -38,7 +38,7 @@ spec:
image: joinServiceImage
args:
- --cloud-provider=GCP
- --keyservice-endpoint=keyservice.testNamespace:9000
- --key-service-endpoint=key-service.testNamespace:9000
volumeMounts:
- mountPath: /var/config
name: config

View file

@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-app: key-service
name: key-service
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get

View file

@ -1,12 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: keyservice
name: key-service
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: keyservice
name: key-service
subjects:
- kind: ServiceAccount
name: keyservice
namespace: testNamespace
- kind: ServiceAccount
name: key-service
namespace: testNamespace

View file

@ -0,0 +1,62 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: key-service
k8s-app: key-service
kubernetes.io/cluster-service: "true"
name: key-service
namespace: testNamespace
spec:
selector:
matchLabels:
k8s-app: key-service
template:
metadata:
labels:
k8s-app: key-service
spec:
containers:
- name: key-service
image: keyServiceImage
args:
- --port=9000
volumeMounts:
- mountPath: /var/config
name: config
readOnly: true
resources: {}
nodeSelector:
node-role.kubernetes.io/control-plane: ""
priorityClassName: system-cluster-critical
serviceAccountName: key-service
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
volumes:
- name: config
projected:
sources:
- configMap:
items:
- key: measurements
path: measurements
name: join-config
- secret:
items:
- key: mastersecret
path: mastersecret
- key: salt
path: salt
name: constellation-mastersecret
updateStrategy: {}

View file

@ -1,16 +1,16 @@
apiVersion: v1
kind: Service
metadata:
name: keyservice
name: key-service
namespace: testNamespace
spec:
ports:
- name: grpc
port: 9000
protocol: TCP
targetPort: 9000
- name: grpc
port: 9000
protocol: TCP
targetPort: 9000
selector:
k8s-app: keyservice
k8s-app: key-service
type: ClusterIP
status:
loadBalancer: {}

View file

@ -1,5 +1,5 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: keyservice
name: key-service
namespace: testNamespace

View file

@ -1,13 +0,0 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-app: keyservice
name: keyservice
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get

View file

@ -1,62 +0,0 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: keyservice
k8s-app: keyservice
kubernetes.io/cluster-service: "true"
name: keyservice
namespace: testNamespace
spec:
selector:
matchLabels:
k8s-app: keyservice
template:
metadata:
labels:
k8s-app: keyservice
spec:
containers:
- name: keyservice
image: keyserviceImage
args:
- --port=9000
volumeMounts:
- mountPath: /var/config
name: config
readOnly: true
resources: {}
nodeSelector:
node-role.kubernetes.io/control-plane: ""
priorityClassName: system-cluster-critical
serviceAccountName: keyservice
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
volumes:
- name: config
projected:
sources:
- configMap:
items:
- key: measurements
path: measurements
name: join-config
- secret:
items:
- key: mastersecret
path: mastersecret
- key: salt
path: salt
name: constellation-mastersecret
updateStrategy: {}

View file

@ -38,7 +38,7 @@ spec:
image: joinServiceImage
args:
- --cloud-provider=QEMU
- --keyservice-endpoint=keyservice.testNamespace:9000
- --key-service-endpoint=key-service.testNamespace:9000
volumeMounts:
- mountPath: /var/config
name: config

View file

@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-app: key-service
name: key-service
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get

View file

@ -1,12 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: keyservice
name: key-service
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: keyservice
name: key-service
subjects:
- kind: ServiceAccount
name: keyservice
namespace: testNamespace
- kind: ServiceAccount
name: key-service
namespace: testNamespace

View file

@ -0,0 +1,62 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: key-service
k8s-app: key-service
kubernetes.io/cluster-service: "true"
name: key-service
namespace: testNamespace
spec:
selector:
matchLabels:
k8s-app: key-service
template:
metadata:
labels:
k8s-app: key-service
spec:
containers:
- name: key-service
image: keyServiceImage
args:
- --port=9000
volumeMounts:
- mountPath: /var/config
name: config
readOnly: true
resources: {}
nodeSelector:
node-role.kubernetes.io/control-plane: ""
priorityClassName: system-cluster-critical
serviceAccountName: key-service
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
volumes:
- name: config
projected:
sources:
- configMap:
items:
- key: measurements
path: measurements
name: join-config
- secret:
items:
- key: mastersecret
path: mastersecret
- key: salt
path: salt
name: constellation-mastersecret
updateStrategy: {}

View file

@ -1,16 +1,16 @@
apiVersion: v1
kind: Service
metadata:
name: keyservice
name: key-service
namespace: testNamespace
spec:
ports:
- name: grpc
port: 9000
protocol: TCP
targetPort: 9000
- name: grpc
port: 9000
protocol: TCP
targetPort: 9000
selector:
k8s-app: keyservice
k8s-app: key-service
type: ClusterIP
status:
loadBalancer: {}

View file

@ -1,5 +1,5 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: keyservice
name: key-service
namespace: testNamespace

View file

@ -1,13 +0,0 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-app: keyservice
name: keyservice
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get

View file

@ -1,62 +0,0 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: keyservice
k8s-app: keyservice
kubernetes.io/cluster-service: "true"
name: keyservice
namespace: testNamespace
spec:
selector:
matchLabels:
k8s-app: keyservice
template:
metadata:
labels:
k8s-app: keyservice
spec:
containers:
- name: keyservice
image: keyserviceImage
args:
- --port=9000
volumeMounts:
- mountPath: /var/config
name: config
readOnly: true
resources: {}
nodeSelector:
node-role.kubernetes.io/control-plane: ""
priorityClassName: system-cluster-critical
serviceAccountName: keyservice
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
volumes:
- name: config
projected:
sources:
- configMap:
items:
- key: measurements
path: measurements
name: join-config
- secret:
items:
- key: mastersecret
path: mastersecret
- key: salt
path: salt
name: constellation-mastersecret
updateStrategy: {}