Skip to content

Commit 3f122df

Browse files
committed
create release manifests for v0.1.55
1 parent 59b7b06 commit 3f122df

File tree

4 files changed

+265
-1
lines changed

4 files changed

+265
-1
lines changed

CHANGELOG.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
## unreleased
22

3+
## v0.1.55 (beta) - July 29, 2024
4+
35
* When using the LoadBalancer `service.beta.kubernetes.io/do-loadbalancer-type=REGIONAL_NETWORK` (under closed beta), firewall rules
46
are added to open up the underlying health check port and all the defined (port, protocols) defined on the service. This is to
57
permit traffic to arrive directly on the underlying worker nodes.

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
v0.1.54
1+
v0.1.55
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
apiVersion: apps/v1
2+
kind: Deployment
3+
metadata:
4+
name: digitalocean-cloud-controller-manager-admission-server
5+
namespace: kube-system
6+
spec:
7+
replicas: 1
8+
revisionHistoryLimit: 2
9+
selector:
10+
matchLabels:
11+
app: digitalocean-cloud-controller-manager-admission-server
12+
template:
13+
metadata:
14+
labels:
15+
app: digitalocean-cloud-controller-manager-admission-server
16+
spec:
17+
containers:
18+
- image: digitalocean/digitalocean-cloud-controller-manager-admission-server:v0.1.55
19+
name: digitalocean-cloud-controller-manager-admission-server
20+
command:
21+
- "/bin/digitalocean-cloud-controller-manager-admission-server"
22+
resources:
23+
requests:
24+
cpu: 100m
25+
memory: 50Mi
26+
env:
27+
- name: DO_ACCESS_TOKEN
28+
valueFrom:
29+
secretKeyRef:
30+
name: digitalocean
31+
key: access-token
32+
ports:
33+
- containerPort: 9443
34+
name: admission
35+
protocol: TCP
36+
volumeMounts:
37+
- mountPath: /tmp/k8s-webhook-server/serving-certs
38+
name: serving-certs
39+
readOnly: true
40+
volumes:
41+
- name: serving-certs
42+
secret:
43+
defaultMode: 420
44+
secretName: digitalocean-cloud-controller-manager-admission-server-serving-certs
45+
---
46+
apiVersion: v1
47+
kind: Service
48+
metadata:
49+
name: digitalocean-cloud-controller-manager-admission-server
50+
namespace: kube-system
51+
spec:
52+
selector:
53+
app: digitalocean-cloud-controller-manager-admission-server
54+
ports:
55+
- protocol: TCP
56+
port: 443
57+
targetPort: 9443
58+
---
59+
apiVersion: cert-manager.io/v1
60+
kind: Certificate
61+
metadata:
62+
name: digitalocean-cloud-controller-manager-admission-server-serving-certs
63+
namespace: kube-system
64+
spec:
65+
dnsNames:
66+
- digitalocean-cloud-controller-manager-admission-server
67+
- digitalocean-cloud-controller-manager-admission-server.kube-system.svc
68+
- digitalocean-cloud-controller-manager-admission-server.kube-system.svc.cluster.local
69+
issuerRef:
70+
kind: Issuer
71+
name: digitalocean-cloud-controller-manager-selfsigned-issuer
72+
secretName: digitalocean-cloud-controller-manager-admission-server-serving-certs
73+
---
74+
apiVersion: cert-manager.io/v1
75+
kind: Issuer
76+
metadata:
77+
name: digitalocean-cloud-controller-manager-selfsigned-issuer
78+
namespace: kube-system
79+
spec:
80+
selfSigned: {}
81+
---
82+
apiVersion: admissionregistration.k8s.io/v1
83+
kind: ValidatingWebhookConfiguration
84+
metadata:
85+
annotations:
86+
cert-manager.io/inject-ca-from: kube-system/digitalocean-cloud-controller-manager-admission-server-serving-certs
87+
name: digitalocean-cloud-controller-manager-admission-webhook
88+
webhooks:
89+
- name: validation-webhook.cloud-controller-manager.digitalocean.com
90+
admissionReviewVersions:
91+
- v1
92+
clientConfig:
93+
service:
94+
namespace: "kube-system"
95+
name: "digitalocean-cloud-controller-manager-admission-server"
96+
path: "/lb-service"
97+
failurePolicy: Ignore
98+
rules:
99+
- apiGroups:
100+
- ""
101+
apiVersions:
102+
- v1
103+
operations:
104+
- CREATE
105+
- UPDATE
106+
resources:
107+
- services
108+
scope: Namespaced
109+
sideEffects: None
Lines changed: 153 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,153 @@
1+
---
2+
apiVersion: apps/v1
3+
kind: Deployment
4+
metadata:
5+
name: digitalocean-cloud-controller-manager
6+
namespace: kube-system
7+
spec:
8+
replicas: 1
9+
revisionHistoryLimit: 2
10+
selector:
11+
matchLabels:
12+
app: digitalocean-cloud-controller-manager
13+
template:
14+
metadata:
15+
labels:
16+
app: digitalocean-cloud-controller-manager
17+
spec:
18+
dnsPolicy: Default
19+
hostNetwork: true
20+
serviceAccountName: cloud-controller-manager
21+
priorityClassName: system-cluster-critical
22+
tolerations:
23+
# this taint is set by all kubelets running `--cloud-provider=external`
24+
# so we should tolerate it to schedule the digitalocean ccm
25+
- key: "node.cloudprovider.kubernetes.io/uninitialized"
26+
value: "true"
27+
effect: "NoSchedule"
28+
- key: "CriticalAddonsOnly"
29+
operator: "Exists"
30+
# cloud controller manages should be able to run on masters
31+
# TODO: remove this when ccm is not supported on k8s <= 1.23
32+
- key: "node-role.kubernetes.io/master"
33+
effect: NoSchedule
34+
# k8s clusters 1.24+ uses control-plane name instead of master
35+
- key: "node-role.kubernetes.io/control-plane"
36+
effect: NoSchedule
37+
containers:
38+
- image: digitalocean/digitalocean-cloud-controller-manager:v0.1.55
39+
name: digitalocean-cloud-controller-manager
40+
command:
41+
- "/bin/digitalocean-cloud-controller-manager"
42+
- "--leader-elect=false"
43+
resources:
44+
requests:
45+
cpu: 100m
46+
memory: 50Mi
47+
env:
48+
- name: DO_ACCESS_TOKEN
49+
valueFrom:
50+
secretKeyRef:
51+
name: digitalocean
52+
key: access-token
53+
---
54+
apiVersion: v1
55+
kind: ServiceAccount
56+
metadata:
57+
name: cloud-controller-manager
58+
namespace: kube-system
59+
---
60+
apiVersion: rbac.authorization.k8s.io/v1
61+
kind: ClusterRole
62+
metadata:
63+
annotations:
64+
rbac.authorization.kubernetes.io/autoupdate: "true"
65+
name: system:cloud-controller-manager
66+
rules:
67+
- apiGroups:
68+
- coordination.k8s.io
69+
resources:
70+
- leases
71+
verbs:
72+
- get
73+
- watch
74+
- list
75+
- create
76+
- update
77+
- delete
78+
- apiGroups:
79+
- ""
80+
resources:
81+
- events
82+
verbs:
83+
- create
84+
- patch
85+
- update
86+
- apiGroups:
87+
- ""
88+
resources:
89+
- nodes
90+
verbs:
91+
- '*'
92+
- apiGroups:
93+
- ""
94+
resources:
95+
- nodes/status
96+
verbs:
97+
- patch
98+
- apiGroups:
99+
- ""
100+
resources:
101+
- services
102+
verbs:
103+
- list
104+
- patch
105+
- update
106+
- watch
107+
- apiGroups:
108+
- ""
109+
resources:
110+
- services/status
111+
verbs:
112+
- list
113+
- patch
114+
- update
115+
- watch
116+
- apiGroups:
117+
- ""
118+
resources:
119+
- serviceaccounts
120+
verbs:
121+
- create
122+
- apiGroups:
123+
- ""
124+
resources:
125+
- persistentvolumes
126+
verbs:
127+
- get
128+
- list
129+
- update
130+
- watch
131+
- apiGroups:
132+
- ""
133+
resources:
134+
- endpoints
135+
verbs:
136+
- create
137+
- get
138+
- list
139+
- watch
140+
- update
141+
---
142+
kind: ClusterRoleBinding
143+
apiVersion: rbac.authorization.k8s.io/v1
144+
metadata:
145+
name: system:cloud-controller-manager
146+
roleRef:
147+
apiGroup: rbac.authorization.k8s.io
148+
kind: ClusterRole
149+
name: system:cloud-controller-manager
150+
subjects:
151+
- kind: ServiceAccount
152+
name: cloud-controller-manager
153+
namespace: kube-system

0 commit comments

Comments
 (0)