From 5e32f167d091a72f6846139b4827b260c904a55b Mon Sep 17 00:00:00 2001 From: Michael Riley Date: Mon, 12 Aug 2024 15:49:49 -0400 Subject: [PATCH] Release v0.13.2 #patch --- CHANGELOG.md | 9 + docs/releases/latest.yml | 4 +- docs/releases/nightly.yml | 4 +- docs/releases/v0.13.2.yml | 400 ++++++++++++++++++++++++++++++++++++++ 4 files changed, 413 insertions(+), 4 deletions(-) create mode 100644 docs/releases/v0.13.2.yml diff --git a/CHANGELOG.md b/CHANGELOG.md index 794eaec..4eb0287 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,13 @@ # Change Log +## [v0.13.2](https://github.com/vultr/vultr-csi/compare/v0.13.1...v0.13.2) (2024-08-12) +### Automation +* Fix releaser mattermost notification action [PR 221](https://github.com/vultr/vultr-csi/pull/221) + +### Dependencies +* Bump golang.org/x/sync from 0.6.0 to 0.8.0 [PR 231](https://github.com/vultr/vultr-csi/pull/231) +* Bump golang.org/x/oauth2 from 0.20.0 to 0.22.0 [PR 230](https://github.com/vultr/vultr-csi/pull/230) +* Bump google.golang.org/grpc from 1.64.0 to 1.65.0 [PR 228](https://github.com/vultr/vultr-csi/pull/228) + ## [v0.13.1](https://github.com/vultr/vultr-csi/compare/v0.13.0...v0.13.1) (2024-06-17) ### Automation * Update goreleaser workflow to use action v6 and go v1.22 [PR 219](https://github.com/vultr/vultr-csi/pull/219) diff --git a/docs/releases/latest.yml b/docs/releases/latest.yml index 5c8b259..ceec7f5 100644 --- a/docs/releases/latest.yml +++ b/docs/releases/latest.yml @@ -120,7 +120,7 @@ spec: - name: socket-dir mountPath: /var/lib/csi/sockets/pluginproxy/ - name: csi-vultr-plugin - image: vultr/vultr-csi:v0.13.1 + image: vultr/vultr-csi:v0.13.2 args: - "--endpoint=$(CSI_ENDPOINT)" - "--token=$(VULTR_API_KEY)" @@ -278,7 +278,7 @@ spec: - name: registration-dir mountPath: /registration/ - name: csi-vultr-plugin - image: vultr/vultr-csi:v0.13.1 + image: vultr/vultr-csi:v0.13.2 args: - "--endpoint=$(CSI_ENDPOINT)" env: diff --git a/docs/releases/nightly.yml b/docs/releases/nightly.yml index 5e759f1..ceec7f5 100644 --- a/docs/releases/nightly.yml +++ b/docs/releases/nightly.yml @@ -120,7 +120,7 @@ spec: - name: socket-dir mountPath: /var/lib/csi/sockets/pluginproxy/ - name: csi-vultr-plugin - image: vultr/vultr-csi:v0.12.4 + image: vultr/vultr-csi:v0.13.2 args: - "--endpoint=$(CSI_ENDPOINT)" - "--token=$(VULTR_API_KEY)" @@ -278,7 +278,7 @@ spec: - name: registration-dir mountPath: /registration/ - name: csi-vultr-plugin - image: vultr/vultr-csi:v0.12.4 + image: vultr/vultr-csi:v0.13.2 args: - "--endpoint=$(CSI_ENDPOINT)" env: diff --git a/docs/releases/v0.13.2.yml b/docs/releases/v0.13.2.yml new file mode 100644 index 0000000..ceec7f5 --- /dev/null +++ b/docs/releases/v0.13.2.yml @@ -0,0 +1,400 @@ +#################### +### Storage Classes +#################### +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: block.csi.vultr.com +spec: + attachRequired: true + podInfoOnMount: true + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +parameters: + block_type: high_perf + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage-retain + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +reclaimPolicy: Retain +parameters: + block_type: high_perf + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage-hdd + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +parameters: + block_type: storage_opt + +--- +kind: StorageClass +apiVersion: storage.k8s.io/v1 +metadata: + name: vultr-block-storage-hdd-retain + namespace: kube-system +provisioner: block.csi.vultr.com +allowVolumeExpansion: true +reclaimPolicy: Retain +parameters: + block_type: storage_opt + +################### +### CSI Controller +################### +--- +kind: StatefulSet +apiVersion: apps/v1 +metadata: + name: csi-vultr-controller + namespace: kube-system +spec: + serviceName: "csi-vultr" + replicas: 1 + selector: + matchLabels: + app: csi-vultr-controller + template: + metadata: + labels: + app: csi-vultr-controller + role: csi-vultr + spec: + serviceAccountName: csi-vultr-controller-sa + containers: + - name: csi-provisioner + image: k8s.gcr.io/sig-storage/csi-provisioner:v3.4.0 + args: + - "--volume-name-prefix=pvc" + - "--volume-name-uuid-length=16" + - "--csi-address=$(ADDRESS)" + - "--v=5" + - "--default-fstype=ext4" + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + imagePullPolicy: "Always" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-attacher + image: k8s.gcr.io/sig-storage/csi-attacher:v4.1.0 + args: + - "--v=5" + - "--csi-address=$(ADDRESS)" + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + imagePullPolicy: "Always" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-resizer + image: registry.k8s.io/sig-storage/csi-resizer:v1.7.0 + args: + - "--csi-address=$(ADDRESS)" + - "--timeout=30s" + - "--v=5" + - "--handle-volume-inuse-error=false" + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + imagePullPolicy: "IfNotPresent" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-vultr-plugin + image: vultr/vultr-csi:v0.13.2 + args: + - "--endpoint=$(CSI_ENDPOINT)" + - "--token=$(VULTR_API_KEY)" + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock + - name: VULTR_API_KEY + valueFrom: + secretKeyRef: + name: vultr-csi + key: api-key + imagePullPolicy: "Always" + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + volumes: + - name: socket-dir + emptyDir: { } + +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-vultr-controller-sa + namespace: kube-system + +## Attacher Role + Binding +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-attacher-role + namespace: kube-system +rules: + - apiGroups: [ "" ] + resources: [ "persistentvolumes" ] + verbs: [ "get", "list", "watch", "update", "patch" ] + - apiGroups: [ "" ] + resources: [ "nodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "csinodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch", "update", "patch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments/status" ] + verbs: [ "patch" ] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-controller-attacher-binding + namespace: kube-system +subjects: + - kind: ServiceAccount + name: csi-vultr-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-attacher-role + apiGroup: rbac.authorization.k8s.io + +## Provisioner Role + Binding +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-provisioner-role + namespace: kube-system +rules: + - apiGroups: [ "" ] + resources: [ "secrets" ] + verbs: [ "get", "list" ] + - apiGroups: [ "" ] + resources: [ "persistentvolumes" ] + verbs: [ "get", "list", "watch", "create", "delete" ] + - apiGroups: [ "" ] + resources: [ "persistentvolumeclaims" ] + verbs: [ "get", "list", "watch", "update" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "storageclasses" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "csinodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "list", "watch", "create", "update", "patch" ] + - apiGroups: [ "" ] + resources: [ "nodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch" ] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-controller-provisioner-binding + namespace: kube-system +subjects: + - kind: ServiceAccount + name: csi-vultr-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-provisioner-role + apiGroup: rbac.authorization.k8s.io + + +############ +## CSI Node +############ +--- +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: csi-vultr-node + namespace: kube-system +spec: + selector: + matchLabels: + app: csi-vultr-node + template: + metadata: + labels: + app: csi-vultr-node + role: csi-vultr + spec: + serviceAccountName: csi-vultr-node-sa + hostNetwork: true + containers: + - name: driver-registrar + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.7.0 + args: + - "--v=5" + - "--csi-address=$(ADDRESS)" + - "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)" + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/block.csi.vultr.com/csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + volumeMounts: + - name: plugin-dir + mountPath: /csi/ + - name: registration-dir + mountPath: /registration/ + - name: csi-vultr-plugin + image: vultr/vultr-csi:v0.13.2 + args: + - "--endpoint=$(CSI_ENDPOINT)" + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + imagePullPolicy: "Always" + securityContext: + privileged: true + capabilities: + add: [ "SYS_ADMIN" ] + allowPrivilegeEscalation: true + volumeMounts: + - name: plugin-dir + mountPath: /csi + - name: pods-mount-dir + mountPath: /var/lib/kubelet + mountPropagation: "Bidirectional" + - mountPath: /dev + name: device-dir + volumes: + - name: registration-dir + hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + - name: kubelet-dir + hostPath: + path: /var/lib/kubelet + type: Directory + - name: plugin-dir + hostPath: + path: /var/lib/kubelet/plugins/block.csi.vultr.com + type: DirectoryOrCreate + - name: pods-mount-dir + hostPath: + path: /var/lib/kubelet + type: Directory + - name: device-dir + hostPath: + path: /dev + - name: udev-rules-etc + hostPath: + path: /etc/udev + type: Directory + - name: udev-rules-lib + hostPath: + path: /lib/udev + type: Directory + - name: udev-socket + hostPath: + path: /run/udev + type: Directory + - name: sys + hostPath: + path: /sys + type: Directory + +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-vultr-node-sa + namespace: kube-system + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: driver-registrar-binding + namespace: kube-system +subjects: + - kind: ServiceAccount + name: csi-vultr-node-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-node-driver-registrar-role + apiGroup: rbac.authorization.k8s.io + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-node-driver-registrar-role + namespace: kube-system +rules: + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "get", "list", "watch", "create", "update", "patch" ] +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-resizer-role +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims/status"] + verbs: ["update", "patch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-vultr-resizer-binding +subjects: + - kind: ServiceAccount + name: csi-vultr-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: csi-vultr-resizer-role