Skip to content

Commit a480c4e

Browse files
authored
Merge pull request #433 from andyzhangx/cleanup-yaml
chore: cleanup yaml config
2 parents 5c53b1b + 351c2fc commit a480c4e

File tree

7 files changed

+14
-133
lines changed

7 files changed

+14
-133
lines changed

charts/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ The following table lists the configurable parameters of the latest Azure Blob S
5151
| `image.csiProvisioner.tag` | csi-provisioner docker image tag | v2.1.0 |
5252
| `image.csiProvisioner.pullPolicy` | csi-provisioner image pull policy | IfNotPresent |
5353
| `image.livenessProbe.repository` | liveness-probe docker image | mcr.microsoft.com/oss/kubernetes-csi/livenessprobe |
54-
| `image.livenessProbe.tag` | liveness-probe docker image tag | v2.2.0 |
54+
| `image.livenessProbe.tag` | liveness-probe docker image tag | v2.3.0 |
5555
| `image.livenessProbe.pullPolicy` | liveness-probe image pull policy | IfNotPresent |
5656
| `image.nodeDriverRegistrar.repository` | csi-node-driver-registrar docker image | mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar |
57-
| `image.nodeDriverRegistrar.tag` | csi-node-driver-registrar docker image tag | v2.0.1 |
57+
| `image.nodeDriverRegistrar.tag` | csi-node-driver-registrar docker image tag | v2.2.0 |
5858
| `image.nodeDriverRegistrar.pullPolicy` | csi-node-driver-registrar image pull policy | IfNotPresent |
5959
| `image.csiResizer.repository` | csi-resizer docker image | mcr.microsoft.com/oss/kubernetes-csi/csi-resizer |
6060
| `image.csiResizer.tag` | csi-resizer docker image tag | v1.1.0 |
-143 Bytes
Binary file not shown.

charts/latest/blob-csi-driver/templates/rbac-csi-blob-controller.yaml

Lines changed: 0 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -81,85 +81,6 @@ roleRef:
8181
name: blob-external-resizer-role
8282
apiGroup: rbac.authorization.k8s.io
8383

84-
---
85-
86-
kind: ClusterRole
87-
apiVersion: rbac.authorization.k8s.io/v1
88-
metadata:
89-
name: blob-external-attacher-role
90-
{{ include "blob.labels" . | indent 2 }}
91-
rules:
92-
- apiGroups: [""]
93-
resources: ["persistentvolumes"]
94-
verbs: ["get", "list", "watch", "update"]
95-
- apiGroups: [""]
96-
resources: ["nodes"]
97-
verbs: ["get", "list", "watch"]
98-
- apiGroups: ["csi.storage.k8s.io"]
99-
resources: ["csinodeinfos"]
100-
verbs: ["get", "list", "watch"]
101-
- apiGroups: ["storage.k8s.io"]
102-
resources: ["volumeattachments"]
103-
verbs: ["get", "list", "watch", "update", "patch"]
104-
- apiGroups: ["coordination.k8s.io"]
105-
resources: ["leases"]
106-
verbs: ["get", "list", "watch", "create", "update", "patch"]
107-
108-
---
109-
110-
kind: ClusterRole
111-
apiVersion: rbac.authorization.k8s.io/v1
112-
metadata:
113-
name: blob-external-snapshotter-role
114-
{{ include "blob.labels" . | indent 2 }}
115-
rules:
116-
- apiGroups: [""]
117-
resources: ["persistentvolumes"]
118-
verbs: ["get", "list", "watch"]
119-
- apiGroups: [""]
120-
resources: ["persistentvolumeclaims"]
121-
verbs: ["get", "list", "watch"]
122-
- apiGroups: ["storage.k8s.io"]
123-
resources: ["storageclasses"]
124-
verbs: ["get", "list", "watch"]
125-
- apiGroups: [""]
126-
resources: ["events"]
127-
verbs: ["list", "watch", "create", "update", "patch"]
128-
- apiGroups: [""]
129-
resources: ["secrets"]
130-
verbs: ["get", "list"]
131-
- apiGroups: ["snapshot.storage.k8s.io"]
132-
resources: ["volumesnapshotclasses"]
133-
verbs: ["get", "list", "watch"]
134-
- apiGroups: ["snapshot.storage.k8s.io"]
135-
resources: ["volumesnapshotcontents"]
136-
verbs: ["create", "get", "list", "watch", "update", "delete"]
137-
- apiGroups: ["snapshot.storage.k8s.io"]
138-
resources: ["volumesnapshots"]
139-
verbs: ["get", "list", "watch", "update"]
140-
- apiGroups: ["apiextensions.k8s.io"]
141-
resources: ["customresourcedefinitions"]
142-
verbs: ["create", "list", "watch", "delete"]
143-
- apiGroups: ["coordination.k8s.io"]
144-
resources: ["leases"]
145-
verbs: ["get", "list", "watch", "create", "update", "patch"]
146-
147-
---
148-
149-
kind: ClusterRoleBinding
150-
apiVersion: rbac.authorization.k8s.io/v1
151-
metadata:
152-
name: blob-csi-snapshotter-binding
153-
{{ include "blob.labels" . | indent 2 }}
154-
subjects:
155-
- kind: ServiceAccount
156-
name: csi-blob-controller-sa
157-
namespace: {{ .Release.Namespace }}
158-
roleRef:
159-
kind: ClusterRole
160-
name: blob-external-snapshotter-role
161-
apiGroup: rbac.authorization.k8s.io
162-
16384
---
16485
kind: ClusterRole
16586
apiVersion: rbac.authorization.k8s.io/v1

charts/latest/blob-csi-driver/values.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ image:
99
pullPolicy: IfNotPresent
1010
livenessProbe:
1111
repository: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe
12-
tag: v2.2.0
12+
tag: v2.3.0
1313
pullPolicy: IfNotPresent
1414
nodeDriverRegistrar:
1515
repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar
16-
tag: v2.1.0
16+
tag: v2.2.0
1717
pullPolicy: IfNotPresent
1818
csiResizer:
1919
repository: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer

deploy/csi-blob-controller.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ spec:
5050
cpu: 10m
5151
memory: 20Mi
5252
- name: liveness-probe
53-
image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.2.0
53+
image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.3.0
5454
args:
5555
- --csi-address=/csi/csi.sock
5656
- --probe-timeout=3s

deploy/csi-blob-node.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ spec:
3535
volumeMounts:
3636
- mountPath: /csi
3737
name: socket-dir
38-
image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.2.0
38+
image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.3.0
3939
args:
4040
- --csi-address=/csi/csi.sock
4141
- --probe-timeout=3s
@@ -49,7 +49,7 @@ spec:
4949
cpu: 10m
5050
memory: 20Mi
5151
- name: node-driver-registrar
52-
image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.1.0
52+
image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.2.0
5353
args:
5454
- --csi-address=$(ADDRESS)
5555
- --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)

deploy/rbac-csi-blob-controller.yaml

Lines changed: 7 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -46,84 +46,44 @@ roleRef:
4646
kind: ClusterRole
4747
name: blob-external-provisioner-role
4848
apiGroup: rbac.authorization.k8s.io
49-
5049
---
5150

5251
kind: ClusterRole
5352
apiVersion: rbac.authorization.k8s.io/v1
5453
metadata:
55-
name: blob-external-attacher-role
54+
name: blob-external-resizer-role
5655
rules:
5756
- apiGroups: [""]
5857
resources: ["persistentvolumes"]
59-
verbs: ["get", "list", "watch", "update"]
60-
- apiGroups: [""]
61-
resources: ["nodes"]
62-
verbs: ["get", "list", "watch"]
63-
- apiGroups: ["csi.storage.k8s.io"]
64-
resources: ["csinodeinfos"]
65-
verbs: ["get", "list", "watch"]
66-
- apiGroups: ["storage.k8s.io"]
67-
resources: ["volumeattachments"]
6858
verbs: ["get", "list", "watch", "update", "patch"]
69-
- apiGroups: ["coordination.k8s.io"]
70-
resources: ["leases"]
71-
verbs: ["get", "list", "watch", "create", "update", "patch"]
72-
73-
---
74-
75-
kind: ClusterRole
76-
apiVersion: rbac.authorization.k8s.io/v1
77-
metadata:
78-
name: blob-external-snapshotter-role
79-
rules:
80-
- apiGroups: [""]
81-
resources: ["persistentvolumes"]
82-
verbs: ["get", "list", "watch"]
8359
- apiGroups: [""]
8460
resources: ["persistentvolumeclaims"]
8561
verbs: ["get", "list", "watch"]
86-
- apiGroups: ["storage.k8s.io"]
87-
resources: ["storageclasses"]
88-
verbs: ["get", "list", "watch"]
62+
- apiGroups: [""]
63+
resources: ["persistentvolumeclaims/status"]
64+
verbs: ["update", "patch"]
8965
- apiGroups: [""]
9066
resources: ["events"]
9167
verbs: ["list", "watch", "create", "update", "patch"]
92-
- apiGroups: [""]
93-
resources: ["secrets"]
94-
verbs: ["get", "list"]
95-
- apiGroups: ["snapshot.storage.k8s.io"]
96-
resources: ["volumesnapshotclasses"]
97-
verbs: ["get", "list", "watch"]
98-
- apiGroups: ["snapshot.storage.k8s.io"]
99-
resources: ["volumesnapshotcontents"]
100-
verbs: ["create", "get", "list", "watch", "update", "delete"]
101-
- apiGroups: ["snapshot.storage.k8s.io"]
102-
resources: ["volumesnapshots"]
103-
verbs: ["get", "list", "watch", "update"]
104-
- apiGroups: ["apiextensions.k8s.io"]
105-
resources: ["customresourcedefinitions"]
106-
verbs: ["create", "list", "watch", "delete"]
10768
- apiGroups: ["coordination.k8s.io"]
10869
resources: ["leases"]
10970
verbs: ["get", "list", "watch", "create", "update", "patch"]
110-
11171
---
11272

11373
kind: ClusterRoleBinding
11474
apiVersion: rbac.authorization.k8s.io/v1
11575
metadata:
116-
name: blob-csi-snapshotter-binding
76+
name: blob-csi-resizer-role
11777
subjects:
11878
- kind: ServiceAccount
11979
name: csi-blob-controller-sa
12080
namespace: kube-system
12181
roleRef:
12282
kind: ClusterRole
123-
name: blob-external-snapshotter-role
83+
name: blob-external-resizer-role
12484
apiGroup: rbac.authorization.k8s.io
125-
12685
---
86+
12787
kind: ClusterRole
12888
apiVersion: rbac.authorization.k8s.io/v1
12989
metadata:

0 commit comments

Comments
 (0)