From a3a5a5703f579f5f6c1176e4b782cc322c82aa5d Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Mon, 10 Mar 2025 08:33:41 +0000 Subject: [PATCH 1/2] doc: update new chart versions --- README.md | 4 +- charts/index.yaml | 108 +++--- charts/v1.24.7/blob-csi-driver-v1.24.7.tgz | Bin 0 -> 6313 bytes charts/v1.24.7/blob-csi-driver/Chart.yaml | 5 + .../blob-csi-driver/templates/NOTES.txt | 5 + .../blob-csi-driver/templates/_helpers.tpl | 49 +++ .../templates/csi-blob-controller.yaml | 261 ++++++++++++++ .../templates/csi-blob-driver.yaml | 16 + .../templates/csi-blob-node.yaml | 339 ++++++++++++++++++ .../templates/rbac-csi-blob-controller.yaml | 115 ++++++ .../templates/rbac-csi-blob-node.yaml | 29 ++ .../serviceaccount-csi-blob-controller.yaml | 17 + .../serviceaccount-csi-blob-node.yaml | 17 + charts/v1.24.7/blob-csi-driver/values.yaml | 186 ++++++++++ charts/v1.25.3/blob-csi-driver-1.25.3.tgz | Bin 0 -> 6336 bytes charts/v1.25.3/blob-csi-driver/Chart.yaml | 5 + .../blob-csi-driver/templates/NOTES.txt | 5 + .../blob-csi-driver/templates/_helpers.tpl | 49 +++ .../templates/csi-blob-controller.yaml | 265 ++++++++++++++ .../templates/csi-blob-driver.yaml | 16 + .../templates/csi-blob-node.yaml | 339 ++++++++++++++++++ .../templates/rbac-csi-blob-controller.yaml | 115 ++++++ .../templates/rbac-csi-blob-node.yaml | 29 ++ .../serviceaccount-csi-blob-controller.yaml | 17 + .../serviceaccount-csi-blob-node.yaml | 17 + charts/v1.25.3/blob-csi-driver/values.yaml | 186 ++++++++++ deploy/v1.24.7/csi-blob-controller.yaml | 168 +++++++++ deploy/v1.24.7/csi-blob-driver.yaml | 12 + deploy/v1.24.7/csi-blob-node.yaml | 248 +++++++++++++ deploy/v1.24.7/kustomization.yaml | 10 + deploy/v1.24.7/rbac-csi-blob-controller.yaml | 108 ++++++ deploy/v1.24.7/rbac-csi-blob-node.yaml | 30 ++ deploy/v1.25.3/csi-blob-controller.yaml | 172 +++++++++ deploy/v1.25.3/csi-blob-driver.yaml | 14 + deploy/v1.25.3/csi-blob-node.yaml | 248 +++++++++++++ deploy/v1.25.3/kustomization.yaml | 10 + deploy/v1.25.3/rbac-csi-blob-controller.yaml | 108 ++++++ deploy/v1.25.3/rbac-csi-blob-node.yaml | 30 ++ docs/install-blob-csi-driver.md | 4 +- docs/install-csi-driver-v1.24.7.md | 47 +++ docs/install-csi-driver-v1.25.3.md | 47 +++ 41 files changed, 3401 insertions(+), 49 deletions(-) create mode 100644 charts/v1.24.7/blob-csi-driver-v1.24.7.tgz create mode 100644 charts/v1.24.7/blob-csi-driver/Chart.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/NOTES.txt create mode 100644 charts/v1.24.7/blob-csi-driver/templates/_helpers.tpl create mode 100644 charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/csi-blob-driver.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-controller.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-node.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml create mode 100644 charts/v1.24.7/blob-csi-driver/values.yaml create mode 100644 charts/v1.25.3/blob-csi-driver-1.25.3.tgz create mode 100644 charts/v1.25.3/blob-csi-driver/Chart.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/NOTES.txt create mode 100644 charts/v1.25.3/blob-csi-driver/templates/_helpers.tpl create mode 100644 charts/v1.25.3/blob-csi-driver/templates/csi-blob-controller.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/csi-blob-driver.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/csi-blob-node.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/rbac-csi-blob-controller.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/rbac-csi-blob-node.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml create mode 100644 charts/v1.25.3/blob-csi-driver/values.yaml create mode 100644 deploy/v1.24.7/csi-blob-controller.yaml create mode 100644 deploy/v1.24.7/csi-blob-driver.yaml create mode 100644 deploy/v1.24.7/csi-blob-node.yaml create mode 100644 deploy/v1.24.7/kustomization.yaml create mode 100644 deploy/v1.24.7/rbac-csi-blob-controller.yaml create mode 100644 deploy/v1.24.7/rbac-csi-blob-node.yaml create mode 100644 deploy/v1.25.3/csi-blob-controller.yaml create mode 100644 deploy/v1.25.3/csi-blob-driver.yaml create mode 100644 deploy/v1.25.3/csi-blob-node.yaml create mode 100644 deploy/v1.25.3/kustomization.yaml create mode 100644 deploy/v1.25.3/rbac-csi-blob-controller.yaml create mode 100644 deploy/v1.25.3/rbac-csi-blob-node.yaml create mode 100644 docs/install-csi-driver-v1.24.7.md create mode 100644 docs/install-csi-driver-v1.25.3.md diff --git a/README.md b/README.md index 18dfce59f..a888daeea 100644 --- a/README.md +++ b/README.md @@ -20,8 +20,8 @@ Disclaimer: Deploying this driver manually is not an officially supported Micros |----------------|------------------------------------------------------|-----------------------| |master branch |mcr.microsoft.com/k8s/csi/blob-csi:latest | 1.21+ | |v1.26.0 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.26.0 | 1.21+ | -|v1.25.1 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.25.1 | 1.21+ | -|v1.24.6 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.6 | 1.21+ | +|v1.25.3 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.25.3 | 1.21+ | +|v1.24.7 |mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.24.7 | 1.21+ | ### Driver parameters Please refer to `blob.csi.azure.com` [driver parameters](./docs/driver-parameters.md) diff --git a/charts/index.yaml b/charts/index.yaml index cc54f59cf..c5c53c71f 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -3,16 +3,25 @@ entries: blob-csi-driver: - apiVersion: v1 appVersion: 1.26.0 - created: "2025-03-07T00:57:58.797717184Z" + created: "2025-03-10T08:33:37.620541048Z" description: Azure Blob Storage CSI driver - digest: 46e3cb89791a367e4dc422266a9d94c24f3a77a7a4c5b2ed5c07f863eb36d69e + digest: b9873665d432610c308a4e4bd35e34b54f3b70793b3dde853dbdfabdbc82eea6 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.26.0/blob-csi-driver-1.26.0.tgz version: 1.26.0 + - apiVersion: v1 + appVersion: 1.25.3 + created: "2025-03-10T08:33:37.619868017Z" + description: Azure Blob Storage CSI driver + digest: e45b0030f09ca92e7e8d2d65e28e15b1d9ec93bb6348e2b663ea32cc3784fa55 + name: blob-csi-driver + urls: + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.25.3/blob-csi-driver-1.25.3.tgz + version: 1.25.3 - apiVersion: v1 appVersion: 1.25.1 - created: "2025-03-07T00:57:58.797066631Z" + created: "2025-03-10T08:33:37.619182868Z" description: Azure Blob Storage CSI driver digest: 2d546ab7f2f365ddbc10667e2385773d5a3ac1465161fb7ca4fcc1c2baf1c0b8 name: blob-csi-driver @@ -21,16 +30,25 @@ entries: version: 1.25.1 - apiVersion: v1 appVersion: 1.25.0 - created: "2025-03-07T00:57:58.796395514Z" + created: "2025-03-10T08:33:37.618538654Z" description: Azure Blob Storage CSI driver digest: de80f1865c1d95134dfc35faaa2c143c09957e3de6e07196aac5a54529fde9a6 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.25.0/blob-csi-driver-1.25.0.tgz version: 1.25.0 + - apiVersion: v1 + appVersion: v1.24.7 + created: "2025-03-10T08:33:37.617880475Z" + description: Azure Blob Storage CSI driver + digest: 240bdbb48717f23755d82e792c47a31b57c15fe0bd9b20915861d97d35e51d9d + name: blob-csi-driver + urls: + - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/v1.24.7/blob-csi-driver-v1.24.7.tgz + version: v1.24.7 - apiVersion: v1 appVersion: v1.24.6 - created: "2025-03-07T00:57:58.795669258Z" + created: "2025-03-10T08:33:37.617217785Z" description: Azure Blob Storage CSI driver digest: 5325f237fabfc4a2bfaa8271fb6ffc638b4afc97ad12992c5cd7ccb055a9fa27 name: blob-csi-driver @@ -39,7 +57,7 @@ entries: version: v1.24.6 - apiVersion: v1 appVersion: v1.24.5 - created: "2025-03-07T00:57:58.794014648Z" + created: "2025-03-10T08:33:37.616556306Z" description: Azure Blob Storage CSI driver digest: d8271336dabc6957f287488f97bc7189f1134d94f8a720359762c1adb24bb8cf name: blob-csi-driver @@ -48,7 +66,7 @@ entries: version: v1.24.5 - apiVersion: v1 appVersion: v1.24.3 - created: "2025-03-07T00:57:58.793358872Z" + created: "2025-03-10T08:33:37.615845501Z" description: Azure Blob Storage CSI driver digest: d8fac26124eaa218c4e3aeb187b8204c5266b4e4a3fca0df39e76376e846c8d8 name: blob-csi-driver @@ -57,7 +75,7 @@ entries: version: v1.24.3 - apiVersion: v1 appVersion: v1.24.2 - created: "2025-03-07T00:57:58.792725999Z" + created: "2025-03-10T08:33:37.614921296Z" description: Azure Blob Storage CSI driver digest: 36567735f655d0c11a2b0247421a85577e5badd0a9413785075b29b58e2b049a name: blob-csi-driver @@ -66,7 +84,7 @@ entries: version: v1.24.2 - apiVersion: v1 appVersion: v1.24.1 - created: "2025-03-07T00:57:58.792028393Z" + created: "2025-03-10T08:33:37.613705456Z" description: Azure Blob Storage CSI driver digest: d4d98037428523005015a3f62441a7665b8a4126d39f7f0d563c474387edef0b name: blob-csi-driver @@ -75,7 +93,7 @@ entries: version: v1.24.1 - apiVersion: v1 appVersion: v1.24.0 - created: "2025-03-07T00:57:58.791354995Z" + created: "2025-03-10T08:33:37.61305445Z" description: Azure Blob Storage CSI driver digest: 183f724b7d67bf336de373b0e5ac22a50af63e42ff0e26ad73a7c11fd0ec6bfc name: blob-csi-driver @@ -84,7 +102,7 @@ entries: version: v1.24.0 - apiVersion: v1 appVersion: v1.23.10 - created: "2025-03-07T00:57:58.786393515Z" + created: "2025-03-10T08:33:37.609106517Z" description: Azure Blob Storage CSI driver digest: 945952507f26b8ea1e77ceb07fe1be8504a67a838708c282605491bdb7f8375d name: blob-csi-driver @@ -93,7 +111,7 @@ entries: version: v1.23.10 - apiVersion: v1 appVersion: v1.23.9 - created: "2025-03-07T00:57:58.790685014Z" + created: "2025-03-10T08:33:37.612421193Z" description: Azure Blob Storage CSI driver digest: cb3b402c2ea03f71a7d57ae8f2d92181664489d4dd8f6130314f6dbd791871ab name: blob-csi-driver @@ -102,7 +120,7 @@ entries: version: v1.23.9 - apiVersion: v1 appVersion: v1.23.7 - created: "2025-03-07T00:57:58.790048452Z" + created: "2025-03-10T08:33:37.611763488Z" description: Azure Blob Storage CSI driver digest: 95f9e01cec77cda71ba7f556cf00ba377270df264aa11caf3d99062d959c8e66 name: blob-csi-driver @@ -111,7 +129,7 @@ entries: version: v1.23.7 - apiVersion: v1 appVersion: v1.23.4 - created: "2025-03-07T00:57:58.789386265Z" + created: "2025-03-10T08:33:37.611099827Z" description: Azure Blob Storage CSI driver digest: 3ce2ee0c9255ebbd004fcdb9f3e5eb702b2203182eb7046754c9b2244c417b02 name: blob-csi-driver @@ -120,7 +138,7 @@ entries: version: v1.23.4 - apiVersion: v1 appVersion: v1.23.3 - created: "2025-03-07T00:57:58.788750753Z" + created: "2025-03-10T08:33:37.610430827Z" description: Azure Blob Storage CSI driver digest: 55b2f47774558d16dec5c93655e5625634e35424466c10244fabd471c9b2a5c6 name: blob-csi-driver @@ -129,7 +147,7 @@ entries: version: v1.23.3 - apiVersion: v1 appVersion: v1.23.2 - created: "2025-03-07T00:57:58.788031061Z" + created: "2025-03-10T08:33:37.609795323Z" description: Azure Blob Storage CSI driver digest: d85ba0c55d74c22b2b4cb964d70d8e38ede06f521cc5ca5502f57ed4b52d49f4 name: blob-csi-driver @@ -138,7 +156,7 @@ entries: version: v1.23.2 - apiVersion: v1 appVersion: v1.23.1 - created: "2025-03-07T00:57:58.785747082Z" + created: "2025-03-10T08:33:37.607628853Z" description: Azure Blob Storage CSI driver digest: 66215f12a4e3acdcf09416d817b737e14546058b081a2cfd8bf9ef507229ca07 name: blob-csi-driver @@ -147,7 +165,7 @@ entries: version: v1.23.1 - apiVersion: v1 appVersion: v1.23.0 - created: "2025-03-07T00:57:58.785097008Z" + created: "2025-03-10T08:33:37.606980747Z" description: Azure Blob Storage CSI driver digest: 57151e21e33660522f25694bd8ae985e5e17c7ffe09904ad2af4025e8bf1da72 name: blob-csi-driver @@ -156,7 +174,7 @@ entries: version: v1.23.0 - apiVersion: v1 appVersion: v1.22.9 - created: "2025-03-07T00:57:58.784470311Z" + created: "2025-03-10T08:33:37.606317258Z" description: Azure Blob Storage CSI driver digest: 2ba7025c4c9917e5550b702c205ffd329ccec0a85b6a4fb74a4dc7206fa9ca64 name: blob-csi-driver @@ -165,7 +183,7 @@ entries: version: v1.22.9 - apiVersion: v1 appVersion: v1.22.8 - created: "2025-03-07T00:57:58.783836656Z" + created: "2025-03-10T08:33:37.60568733Z" description: Azure Blob Storage CSI driver digest: a2ab602708e9c3b08d01baa66ffc7937b67119c060b4b90a41bedf15b709313c name: blob-csi-driver @@ -174,7 +192,7 @@ entries: version: v1.22.8 - apiVersion: v1 appVersion: v1.22.6 - created: "2025-03-07T00:57:58.783142103Z" + created: "2025-03-10T08:33:37.605055056Z" description: Azure Blob Storage CSI driver digest: ef7b5c287fca46351903cb819b3ccc8b8b2021addda87c59bea94d9ed61015a0 name: blob-csi-driver @@ -183,7 +201,7 @@ entries: version: v1.22.6 - apiVersion: v1 appVersion: v1.22.5 - created: "2025-03-07T00:57:58.782515587Z" + created: "2025-03-10T08:33:37.604413948Z" description: Azure Blob Storage CSI driver digest: ff3c2c2e05dd048dd0af3e5c7d002eae2928a5d17fb269a1e4d5cadd30e8ab51 name: blob-csi-driver @@ -192,7 +210,7 @@ entries: version: v1.22.5 - apiVersion: v1 appVersion: v1.22.4 - created: "2025-03-07T00:57:58.781855962Z" + created: "2025-03-10T08:33:37.603738052Z" description: Azure Blob Storage CSI driver digest: 6c38e79d2f50616daac0658cfa5b1a569e6ff8ce8f24ed40f563e87fb1d1340a name: blob-csi-driver @@ -201,7 +219,7 @@ entries: version: v1.22.4 - apiVersion: v1 appVersion: v1.22.3 - created: "2025-03-07T00:57:58.78120632Z" + created: "2025-03-10T08:33:37.6030539Z" description: Azure Blob Storage CSI driver digest: 6cdee296d22ecd330f477f2ca6da51b07320c546c04ae46c23eef48146b772c1 name: blob-csi-driver @@ -210,7 +228,7 @@ entries: version: v1.22.3 - apiVersion: v1 appVersion: v1.22.2 - created: "2025-03-07T00:57:58.780521947Z" + created: "2025-03-10T08:33:37.602029542Z" description: Azure Blob Storage CSI driver digest: 259e66dc12db7310fe1c51e49c964398e0a6b7d511133916dd7d25f748f0b791 name: blob-csi-driver @@ -219,7 +237,7 @@ entries: version: v1.22.2 - apiVersion: v1 appVersion: v1.22.1 - created: "2025-03-07T00:57:58.778936485Z" + created: "2025-03-10T08:33:37.600761609Z" description: Azure Blob Storage CSI driver digest: 8329d477d55c82f97bb09fb172c5f39a1677bedc13c7410bd93b306194516438 name: blob-csi-driver @@ -228,7 +246,7 @@ entries: version: v1.22.1 - apiVersion: v1 appVersion: v1.21.7 - created: "2025-03-07T00:57:58.778314861Z" + created: "2025-03-10T08:33:37.600132241Z" description: Azure Blob Storage CSI driver digest: 1095721182d611e2556c611dd330758d8130fe66493db4f9189586a9219896d3 name: blob-csi-driver @@ -237,7 +255,7 @@ entries: version: v1.21.7 - apiVersion: v1 appVersion: v1.21.6 - created: "2025-03-07T00:57:58.777695391Z" + created: "2025-03-10T08:33:37.599515654Z" description: Azure Blob Storage CSI driver digest: d5ba1f92795ec45970eb6e5fc54aa13a5684f9936216c064f8a3843bf722bf54 name: blob-csi-driver @@ -246,7 +264,7 @@ entries: version: v1.21.6 - apiVersion: v1 appVersion: v1.21.5 - created: "2025-03-07T00:57:58.777088025Z" + created: "2025-03-10T08:33:37.598860798Z" description: Azure Blob Storage CSI driver digest: b403e9d49abfe076ecd83d6dd50166347ee4305f33dc840019474b2876723b9b name: blob-csi-driver @@ -255,7 +273,7 @@ entries: version: v1.21.5 - apiVersion: v1 appVersion: v1.21.4 - created: "2025-03-07T00:57:58.776501591Z" + created: "2025-03-10T08:33:37.598264444Z" description: Azure Blob Storage CSI driver digest: e4fa13670caf6b0d3e9fefa55d100daa439cd7187dabd45318ab03c7d4b17710 name: blob-csi-driver @@ -264,7 +282,7 @@ entries: version: v1.21.4 - apiVersion: v1 appVersion: v1.20.3 - created: "2025-03-07T00:57:58.775908324Z" + created: "2025-03-10T08:33:37.597635766Z" description: Azure Blob Storage CSI driver digest: 8c2c20547b2e0e1b39d2f2efd04c1bd778f14af5feae2bda86d722dac3c02643 name: blob-csi-driver @@ -273,7 +291,7 @@ entries: version: v1.20.3 - apiVersion: v1 appVersion: v1.19.6 - created: "2025-03-07T00:57:58.775300449Z" + created: "2025-03-10T08:33:37.597053039Z" description: Azure Blob Storage CSI driver digest: 0007ef225b5658d3989aa6fdc3a91a4b33696a438eee46ad9a675af615cbdf21 name: blob-csi-driver @@ -282,7 +300,7 @@ entries: version: v1.19.6 - apiVersion: v1 appVersion: v1.19.5 - created: "2025-03-07T00:57:58.774700833Z" + created: "2025-03-10T08:33:37.596438189Z" description: Azure Blob Storage CSI driver digest: 183c3e5cd84b709f1455cc7c84ed5bd573e8a24149fd6442d38999835b0a1711 name: blob-csi-driver @@ -291,7 +309,7 @@ entries: version: v1.19.5 - apiVersion: v1 appVersion: v1.18.0 - created: "2025-03-07T00:57:58.774083876Z" + created: "2025-03-10T08:33:37.59580903Z" description: Azure Blob Storage CSI driver digest: 3eac15488da5be7d1e78431929f7cda35bceb1af3fe107ffbd84606e047c9204 name: blob-csi-driver @@ -300,7 +318,7 @@ entries: version: v1.18.0 - apiVersion: v1 appVersion: v1.17.0 - created: "2025-03-07T00:57:58.773468326Z" + created: "2025-03-10T08:33:37.595130417Z" description: Azure Blob Storage CSI driver digest: 22cfa17fc5e8d771ff8edd26729266a9a8ee55c0e150df85ef15698f7fe985e9 name: blob-csi-driver @@ -309,7 +327,7 @@ entries: version: v1.17.0 - apiVersion: v1 appVersion: v1.16.0 - created: "2025-03-07T00:57:58.772629153Z" + created: "2025-03-10T08:33:37.593583229Z" description: Azure Blob Storage CSI driver digest: bf6249c0e3e3d3d009d4c79ceb7fda9a56c0565b969de753628792ea3ea5ece8 name: blob-csi-driver @@ -318,7 +336,7 @@ entries: version: v1.16.0 - apiVersion: v1 appVersion: v1.15.0 - created: "2025-03-07T00:57:58.771378719Z" + created: "2025-03-10T08:33:37.592978368Z" description: Azure Blob Storage CSI driver digest: 8daa35cd4957695cb64b45da05a15b4020df5545a8ac44c4668dad4bba82c8a9 name: blob-csi-driver @@ -327,7 +345,7 @@ entries: version: v1.15.0 - apiVersion: v1 appVersion: v1.14.0 - created: "2025-03-07T00:57:58.770768856Z" + created: "2025-03-10T08:33:37.592343631Z" description: Azure Blob Storage CSI driver digest: 442bc579b231aab626b9e474e2c0ed3f101d47d61c99aa9a7f863af7ce268d9d name: blob-csi-driver @@ -336,7 +354,7 @@ entries: version: v1.14.0 - apiVersion: v1 appVersion: v1.13.0 - created: "2025-03-07T00:57:58.770137638Z" + created: "2025-03-10T08:33:37.591727903Z" description: Azure Blob Storage CSI driver digest: b577b0b771138109aa90eb09d56fc07273ca0b584a263ee8f789e35796279f31 name: blob-csi-driver @@ -345,7 +363,7 @@ entries: version: v1.13.0 - apiVersion: v1 appVersion: v1.12.0 - created: "2025-03-07T00:57:58.769519873Z" + created: "2025-03-10T08:33:37.591062213Z" description: Azure Blob Storage CSI driver digest: 124e87af2581b374b89a39940698620c23d3eae6dcee518d302461ffea93e9a8 name: blob-csi-driver @@ -354,7 +372,7 @@ entries: version: v1.12.0 - apiVersion: v1 appVersion: v1.11.0 - created: "2025-03-07T00:57:58.768904595Z" + created: "2025-03-10T08:33:37.590437937Z" description: Azure Blob Storage CSI driver digest: 07c4d76017491b3d0bdd70de90e814096938bf7916da0c149c3805294bd57560 name: blob-csi-driver @@ -363,7 +381,7 @@ entries: version: v1.11.0 - apiVersion: v1 appVersion: v1.10.0 - created: "2025-03-07T00:57:58.768279126Z" + created: "2025-03-10T08:33:37.589792328Z" description: Azure Blob Storage CSI driver digest: 79716efa958385adf57eb3570843e1b4512d8c801e8e070625e94264f3e917a9 name: blob-csi-driver @@ -372,11 +390,11 @@ entries: version: v1.10.0 - apiVersion: v1 appVersion: latest - created: "2025-03-07T00:57:58.767583102Z" + created: "2025-03-10T08:33:37.5891245Z" description: Azure Blob Storage CSI driver - digest: fd10d188ce3841f9a485cf606b9ebd3e180d3e4cf113e360e605536d6c3d35ec + digest: 23d757d640e8bcb54d3cf154dd44ffab8aa9597defca3392afaf9760a282a0a8 name: blob-csi-driver urls: - https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/master/charts/latest/blob-csi-driver-v0.0.0.tgz version: v0.0.0 -generated: "2025-03-07T00:57:58.766656402Z" +generated: "2025-03-10T08:33:37.588253514Z" diff --git a/charts/v1.24.7/blob-csi-driver-v1.24.7.tgz b/charts/v1.24.7/blob-csi-driver-v1.24.7.tgz new file mode 100644 index 0000000000000000000000000000000000000000..baad475b13cf5b371a43a61cb30788203bb6dc22 GIT binary patch literal 6313 zcmV;a7*^*WiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKDHbKx z0lKjzSCZM#H2?c|B-!|F3}KVB7k8!`Z0VdM`Mh*=jy$vJ%rH4NEQVKz)vuS3iP{=E z_IC%n8jVKd{Pa})+h{bB|2CTEXWunXFV0)1=jRuvC*L)ir>#cwJJ2{B3Hg`D1!Uhf zo{TFwxWC8+UHkDv{_q$AS2mr2iJ%NF5V)T7 zf##kHfevbe1W#2~Nr*2!=;O7ylJdWTwuks(6+p54H=8G?&7}OFo}3-!|2Zz~zy)eo z0GL6J#>k~@;FzrDV3Sc!=b~m(M?SUbOtu1mA(wJ2C|kEdopN5k^Ja(O*9|*GaGup#wZ=A- zHeMluI3F=OL*+0AU0m5Eg0EF;o^3}+sD-*p(8g$ixnOXIfy&Olm>MkT9w*^sI|(Mo zW5n?vyG$|D9b&Jvc~WZ@lJl>G#<-0!}gF9)K!r2F>K8Nbno4L9xcQq|}t|h6D`>p#sWZiYK6D zsef!6h$R9pwRpv)Rwr!L1`m&EFgBbay9mOKYM?s z0luV6l;wVt5)-*16aY0lbtwd{kJ@kJ>Li&p^EqzUBfshG~0TAZC~h3v5DL zVxJ(>ldToMp?d)ql2SRJ)O9Hn9+3|P19b+~CFNp(#8=AhHhMxVG2hIO zNj=+=0%c(iXEw5=5(o(g7DaMi1+b8dhy^GCpCIi)$!HaZuIANL|@m zLaX-fF&8{|faY^#iZ-YY=)_zi%d=6n6ntMeT*-{z9E))vG}pd#qDDA30r zxnAalW8g@P5wto>1g#1F1Er?o8k$Qqf@0YQbw{ltperrSEq2gEK*#M9)uf9fR>6^; z;0Q4XbFTfe#>K@&+6p|YUd~;By{su{JrxQ3gUtC?D9oir7vFY7dzphw4W^~ABT4_H z)=Qf2Dsu#d#}qHj`3FWlH&|avHvO4lfri9HQgOVW+^$`;f%O3itz9Mp%2k`@#ftX8 z+p(oa&E&YIl%5~r(B8asCp!xyiK$8&z2Nu6o6qrm8&rpriLpesBcH1NALyj}@n)l6 zs#Wj?Y%~|p0X2F1Eum5k@gLrSZtv>zhj*Yqct3mxe(sD1{lSNKpf?^5$I>B`UcIlB z6cO@9_`70b;@!*9NCj*o(FXMuWOWi(UIQUrq0Hn7kPLsF?o_tK`&+NfHk+%Y1e z-}TYF0l!kU8i4k1pg&jce5ccu!Y*Avy_8aGIc7l4@q!==IFP`FbV+@<0Bc_q6V;!~ z6{0{yE>|H}xBT^lLMY^Vn9KF8YSQn5uUITqv)!=zDEeK=e?BZVtd|b3z49v={}sq_ zZ72}04~DnBNln~~C*#<*|8v?%#(&SwFHVo~-{-h)rHmKt=}38A_zO`Bxi(!R6+cmN z3SX3KmC7vz<`S8ATY%}nhJeE3?|^F~$dOz=wky6iGldNdg9JY2<--H0jge|s+jySf z@llebff)w(tAiQ3?w^~c9bMK$Z)yO3DQI1@kc ztL(W-8BpyW9t>ciIVK2Hm6IjgRe=#cf}SlvO=lS>S*(50JC3sDaD^Dd76N}tPmq}4 z{6zhU9qoOAsu2Q1#8Q7N+A7y7q^xPt)JanPooDHJsGWq_I;2>Kc59Vv!c~(HnaeN{ zb5Q+1Zu}pw#s{GP_SbRXPZcqfTB`d0s-QZp?lTzbI8^#YTCwpwB7+7x1g)WE>%ca6 zcmRQH$KFj1WOhIv+^PNr3L^i-p`h$d)>hdS}-J>EltB;QrxxlFLWnHmh z))0LDtVPN3B`LZsp&tW5e}Rr&&|-r)_GY!%yPj=tw&muOh4Fk2vfr~C?wmzlc1U4z zdrcxvZMmsV43Y&Z><2cxa&mfeMiU>{OY7X%bmiOsj4hHq(?W{vf9vG*;v{bWTg^tR zakT%>aou5JwLw=o_6{PV5={t$uFLDIW+mA13?nE~)&gY`vIp_agKp(ViSu0e3h=Fk zjuELn(`{e@NSh6NV=n##1QQDp0ZwIe?jp6@9PVIcgAbl-6oD0L`@vRWE^i`amL@cd z)U<^QNj}#d1NrmOMQ8TF|r>#AoU%Y+e=2 z+ia9*_`Y_|LAlwN4>WkfkcH0+h7d6TanO;Zfv`^`-=LjgIuqUg1W~Ms0R;@0F|ce) zCa)|zm?R?AJ5ENL4D;RaA8IB7|#$YW5^-dOkjC;qd((u6F{1 zf!reI@M?U%Rq(PHWWZ)Y6g~QS%e+VR(@zAVEK{E)XD+vqp2Q5Af>$KR+ezKky9Ssc ztLrgL7XH>FCX4=p(9P}MJu*F&H5};~X9hKg@yF7iQ(Cuo?=s|X9VJ?%#HncX5p57+ zP&=-r_H|R8qua51FC&vWM63+VTj)-_kkS>PcCi4{h%Mg$-u%_t&; zsi)E9kp_@V@!5=sBU3I7M~u#~jiM|g)-Gy;u}1`UP*=ww3da}OzzPw^cC~gGakyFv zX)+>v^U?fOpFNh4j~G%hf_gQs^=t8@nOc~>31V!c^Lk?{PWKP;e8J;m>RA!&_O{jn zE~Lh+Y!p;EdJcy(?nwXu*&?Ai3{W*zm#u2*rdk0(%aRJ`^82@)ZguQrWUo(6QW@w>|}&l*K7 zW*+0>vf0RL|r%25lYz3<>ZL>nTq zO1>&BA^xjK=qStqkK1)i^)@zomqNG(B9==r5tlYKp)I?$v%Ti{P{S0gjZI8Vv5!TyG+fHW<(`m}Q@LII z;~@8u{sQ@ySH5!CL;7RXzO3-8B>fU1uL2AQmGm^kw797@d&>2G@XPre#ww4s{j8yE zCtxFc-@m<{^ryW+cQot|ZnNAHKQ(frD;hQRUyiIs5-GDW>tOI^^W2A^?*@^jEH6s! zD;PReXMu>w=$%Nj$_5ldFu2+*%K((f%*vri<+JJ%2t)5-7|CHpCMGl6bvMYNt5*_y zffuNfW)0-HVjaVm13ohYHvw7d*%XIvmMA)BwhYr`x;uW8#50#sK}~A6!R_@ZP#)P) ziS1^o6sbiPBa3d`;*YI#r^G!ocU50=h;5Id+a*JMNo`9f9*38-t{;#{s$EyxjDVsi z8F3x*YlDsHPU6~g3iHf)05M8@YRUk>1Pcu9F0$czf=o&*-UcU)SR3Du**tE>AG?TQ zYGrrMUrPMv^SC#?9{0Mv!EL{DGkxE`>18b}-ZSc?Lrz-sK0)^*T945@-5}s5Ka-vz z%a~(3D}bb8Ir2?sMr?EjW+ZbvIgqF^$X*zE1mCyo^?Z*pErq^T4RcRHwVD<`O~6mL zx1-5)G#>u@mu&oLZ5@G|0Gh)kg%p+{aCiE4AurBUABNLO_v7?t_+fg}`_j89i#44; zoHGqk1t4`hsH!}>iGb#vQueu1p$Y5_zVye#!KdEfRf+QcqY{Byx#I zA+G(GQ?lCxT@OdUOs|K7>(AqHZ*cv~^h@XFbEe?6LA9BRJY<8>!^nvXR9nSRu0Fqi z-y2UqT;&l_-Dx$k$$5CT5JIwZ;+RPs!XbyXK6ZKu|6~?w3U#JUE^SH#0~bwA?=^{zP2m7N%vx z-kCx3=Lm)W!&pLM*~rjp)WF2!$UuxycBzVc{_(OwxO5}g~YnAL-cym*LBmy$)NENaU#WYkK9ct1T>dp zKiw!SE_bQbCv!R^(Zbl^TLHbI!oT@ zxl80A25nX6e22(5RzPh4=vf%4!U^c&cD=5QM5lWz+xG6wB_s>g^LIA)6$!ZWD z>JiUBAN9MjSXFV7dZeL6cwp6o49>u_-z7U;lDKbPdMaa7OV0keuz#U^>rDo-(8sN$ zuQ1biKt-Qqw(-wG$$Ta;tS}QEw2kl-laNay;-Ka|no^%3>+v?*biVGHNLEt4biy_ zudt04a-o#k4|rNEz96{T?OpXdgX#P6aB$ljbhCr3RYHl%|AnT&t5lA#hSVQSZaX(O z)2o}|)%(wrye-0{?-Dz(t(G`*EhDC^kp)PmUwY$7e>m6+S>p7!Tx7|SwGJ_~*4DAL z4l=mbuA?j3c~9ZYawzf;O?tP}Pn~~Hhojy=?f*^(pFiz2w$uT8xi}@hC!uo6;pz4# zovWMP^z*3Ox$SlHwx)}5B~Jg#MfUOYRqv*EJIzl6h$7OFW8Wy}PgMWIxO3Z^e*AGV z9rs4V{U$4RNMRu(jC-B#wDXhv|D^w){gg%WX$?ZMK~A#2lFYJ6n-b3IvK3n$ z743&A;IA^7KKp|XC73zm6w|}9^i~9EHp}X=CwqSj?7Opim=BR^=9|LJOH;`WE)>hl z@85RE{V%=oblm$eoeZx(DifQA5NF`SCN4yLiVRw^VHH^Wx@&t2On5zanB zc8<+_F^Fi>eU(NAdmZa=Uh`7COdXE4I)|#jiLc$GJ>$!wLLhoElz^3@x!jVeYN(w% zY+Zi;R{HzX!LZw#4mzKDS(x{&_$g6eqiFsXl{NW*3u=O5Ky}uxHg}P!Y!jQCHMA zpZcvU=e4drZ5bymU~cK#rXI&3+IUuXsO8xxIh(<@!pz8ie%M;JL;xqVifz~VGolj_ zd~E3$g~^Y?{K9aHwhDD>?LNy~E= z%M|7w3qcQX<=20)88nT9d<0}m{pb0~dFuNg7p-Ic*Rxy+xsflurjHd?AMWvsKlNw+ z#?(f!0x{JZdSXc#{zDnZNZn{*)tKt(yDA2{7l;vPM~}i*r=0I!Kgy&=X{(O|K^Lo% zPu>QA=s^1<6 z)d|X_vFh5kEL`#0-7L(03)6<2mmFuwF`*SAVvm{gNAnI;-8^*Lhh=gsZR9}*^dx{L zrOd)4DiT>ZRBhxzCaq!^MkOt+SD09sEWU-%CXTK*WL zjv`yHK24!MyLOWN{oK0gFbw`TP)do3D6NnVs*mIw$$eX!$qBN(o=++HpS8?ka-XMv z%bAb^aPV&P@;_i>_hOVXJpJ(ScUZ0;{3^Ttf65^+Th{;0lap5R{HN2iv*Y^zIj$}1 z|7SG>svhPwnSd8k{Ly)MEh;~HaK^JJ`wV6{s`oowu2Jf^=ztg=TgNEe=6#x!5i3$O-LaX z+b9-@z%mr;c3V+L!98sIe*RIl{(Y|9_5bcGfvx)g>>{E6TW9ANNB#dC*Nf@@(4jnP f{-fqUUdQWr9k1i{%-8=900960m`n?a0I&c68gVmt literal 0 HcmV?d00001 diff --git a/charts/v1.24.7/blob-csi-driver/Chart.yaml b/charts/v1.24.7/blob-csi-driver/Chart.yaml new file mode 100644 index 000000000..10ee5cf69 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +appVersion: v1.24.7 +description: Azure Blob Storage CSI driver +name: blob-csi-driver +version: v1.24.7 diff --git a/charts/v1.24.7/blob-csi-driver/templates/NOTES.txt b/charts/v1.24.7/blob-csi-driver/templates/NOTES.txt new file mode 100644 index 000000000..c75dafbb5 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/NOTES.txt @@ -0,0 +1,5 @@ +The Azure Blob Storage CSI driver is getting deployed to your cluster. + +To check Azure Blob Storage CSI driver pods status, please run: + + kubectl --namespace={{ .Release.Namespace }} get pods --selector="app.kubernetes.io/name={{ .Release.Name }}" --watch diff --git a/charts/v1.24.7/blob-csi-driver/templates/_helpers.tpl b/charts/v1.24.7/blob-csi-driver/templates/_helpers.tpl new file mode 100644 index 000000000..d99392f32 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/_helpers.tpl @@ -0,0 +1,49 @@ +{{/* vim: set filetype=mustache: */}} + +{{/* Expand the name of the chart.*/}} +{{- define "blob.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "blob.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Common selectors. +*/}} +{{- define "blob.selectorLabels" -}} +app.kubernetes.io/name: {{ template "blob.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end -}} + +{{/* +Common labels. +*/}} +{{- define "blob.labels" -}} +{{- include "blob.selectorLabels" . }} +app.kubernetes.io/component: csi-driver +app.kubernetes.io/part-of: {{ template "blob.name" . }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +helm.sh/chart: {{ template "blob.chart" . }} +{{- if .Values.customLabels }} +{{ toYaml .Values.customLabels }} +{{- end }} +{{- end -}} + + +{{/* pull secrets for containers */}} +{{- define "blob.pullSecrets" -}} +{{- if .Values.imagePullSecrets }} +imagePullSecrets: +{{- range .Values.imagePullSecrets }} + - name: {{ . }} +{{- end }} +{{- end }} +{{- end -}} \ No newline at end of file diff --git a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml new file mode 100644 index 000000000..f8174004b --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml @@ -0,0 +1,261 @@ +kind: Deployment +apiVersion: apps/v1 +metadata: + name: {{ .Values.controller.name }} + namespace: {{ .Release.Namespace }} + labels: + app: {{ .Values.controller.name }} + {{- include "blob.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.controller.replicas }} + selector: + matchLabels: + app: {{ .Values.controller.name }} + {{- include "blob.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app: {{ .Values.controller.name }} + {{- include "blob.labels" . | nindent 8 }} + {{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + {{- end }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + hostNetwork: {{ .Values.controller.hostNetwork }} + serviceAccountName: {{ .Values.serviceAccount.controller }} + nodeSelector: + kubernetes.io/os: linux + # runOnControlPlane=true or runOnMaster=true only takes effect if affinity is not set + {{- if tpl "{{ .Values.controller.affinity }}" . | contains "nodeSelectorTerms" }} + {{- with .Values.controller.affinity }} + affinity: +{{ toYaml . | indent 8 }} + {{- end }} + {{- else if or .Values.controller.runOnControlPlane .Values.controller.runOnMaster}} + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + {{- if .Values.controller.runOnControlPlane}} + - key: node-role.kubernetes.io/control-plane + operator: Exists + {{- end}} + {{- if .Values.controller.runOnMaster}} + - key: node-role.kubernetes.io/master + operator: Exists + {{- end}} + {{- end }} +{{- with .Values.controller.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} + securityContext: + seccompProfile: + type: RuntimeDefault +{{- with .Values.controller.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + containers: + - name: csi-provisioner +{{- if hasPrefix "/" .Values.image.csiProvisioner.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- else }} + image: "{{ .Values.image.csiProvisioner.repository }}:{{ .Values.image.csiProvisioner.tag }}" +{{- end }} + args: + - "-v=2" + - "--csi-address=$(ADDRESS)" + - "--leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - "--timeout=1200s" + - "--extra-create-metadata=true" + - "--kube-api-qps=50" + - "--kube-api-burst=100" + - "--feature-gates=HonorPVReclaimPolicy=true" + - "--retry-interval-max=30m" + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiProvisioner.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + resources: {{- toYaml .Values.controller.resources.csiProvisioner | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: liveness-probe +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s +{{- if eq .Values.controller.hostNetwork true }} + - --http-endpoint=localhost:{{ .Values.controller.livenessProbe.healthPort }} +{{- else }} + - --health-port={{ .Values.controller.livenessProbe.healthPort }} +{{- end }} + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.livenessProbe | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: blob +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + args: + - "--v={{ .Values.controller.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--metrics-address=0.0.0.0:{{ .Values.controller.metricsPort }}" + - "--drivername={{ .Values.driver.name }}" + - "--custom-user-agent={{ .Values.driver.customUserAgent }}" + - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" + - "--cloud-config-secret-name={{ .Values.controller.cloudConfigSecretName }}" + - "--cloud-config-secret-namespace={{ .Values.controller.cloudConfigSecretNamespace }}" + - "--allow-empty-cloud-config={{ .Values.controller.allowEmptyCloudConfig }}" + ports: + - containerPort: {{ .Values.controller.metricsPort }} + name: metrics + protocol: TCP +{{- if ne .Values.controller.hostNetwork true }} + - containerPort: {{ .Values.controller.livenessProbe.healthPort }} + name: healthz + protocol: TCP +{{- end }} + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz +{{- if eq .Values.controller.hostNetwork true }} + host: localhost + port: {{ .Values.controller.livenessProbe.healthPort }} +{{- else }} + port: healthz +{{- end }} + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + {{- if ne .Values.driver.httpsProxy "" }} + - name: HTTPS_PROXY + value: {{ .Values.driver.httpsProxy }} + {{- end }} + {{- if ne .Values.driver.httpProxy "" }} + - name: HTTP_PROXY + value: {{ .Values.driver.httpProxy }} + {{- end }} + - name: AZURE_GO_SDK_LOG_LEVEL + value: {{ .Values.driver.azureGoSDKLogLevel }} + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: AZURE_ENVIRONMENT_FILEPATH + value: /etc/kubernetes/azurestackcloud.json + {{- end }} + - name: AZCOPY_CONCURRENCY_VALUE + value: "10" + - name: AZCOPY_CONCURRENT_FILES + value: "20" + - name: AZCOPY_BUFFER_GB + value: "1" + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + - name: ssl-pki + mountPath: /etc/pki/ca-trust/extracted + readOnly: true + {{- end }} + resources: {{- toYaml .Values.controller.resources.blob | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: csi-resizer +{{- if hasPrefix "/" .Values.image.csiResizer.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" +{{- else }} + image: "{{ .Values.image.csiResizer.repository }}:{{ .Values.image.csiResizer.tag }}" +{{- end }} + args: + - "-csi-address=$(ADDRESS)" + - "-v=2" + - "-leader-election" + - "--leader-election-namespace={{ .Release.Namespace }}" + - '-handle-volume-inuse-error=false' + env: + - name: ADDRESS + value: /csi/csi.sock + imagePullPolicy: {{ .Values.image.csiResizer.pullPolicy }} + volumeMounts: + - name: socket-dir + mountPath: /csi + resources: {{- toYaml .Values.controller.resources.csiResizer | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + volumes: + - name: socket-dir + emptyDir: {} + - name: azure-cred + hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + hostPath: + path: /etc/ssl/certs + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + - name: ssl-pki + hostPath: + path: /etc/pki/ca-trust/extracted + {{- end }} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-driver.yaml b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-driver.yaml new file mode 100644 index 000000000..9c5de5b91 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-driver.yaml @@ -0,0 +1,16 @@ +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: {{ .Values.driver.name }} + labels: + {{- include "blob.labels" . | nindent 4 }} +spec: + attachRequired: false + podInfoOnMount: true + fsGroupPolicy: {{ .Values.feature.fsGroupPolicy }} + volumeLifecycleModes: + - Persistent + - Ephemeral + tokenRequests: + - audience: api://AzureADTokenExchange diff --git a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml new file mode 100644 index 000000000..5b3ab945d --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml @@ -0,0 +1,339 @@ +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: {{ .Values.node.name }} + namespace: {{ .Release.Namespace }} + labels: + app: {{ .Values.node.name }} + {{- include "blob.labels" . | nindent 4 }} +spec: + updateStrategy: + rollingUpdate: + maxUnavailable: {{ .Values.node.maxUnavailable }} + type: RollingUpdate + selector: + matchLabels: + app: {{ .Values.node.name }} + {{- include "blob.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app: {{ .Values.node.name }} + {{- include "blob.labels" . | nindent 8 }} + {{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + {{- end }} + {{- if .Values.podLabels }} +{{- toYaml .Values.podLabels | nindent 8 }} + {{- end }} +{{- if .Values.podAnnotations }} + annotations: +{{ toYaml .Values.podAnnotations | indent 8 }} +{{- end }} + spec: + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + {{- if or .Values.node.enableBlobfuseProxy .Values.node.enableAznfsMount }} + hostPID: true + {{- end }} + hostNetwork: true + dnsPolicy: Default + serviceAccountName: {{ .Values.serviceAccount.node }} + nodeSelector: + kubernetes.io/os: linux +{{- with .Values.node.nodeSelector }} +{{ toYaml . | indent 8 }} +{{- end }} + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: type + operator: NotIn + values: + - virtual-kubelet + {{- if .Values.node.affinity }} +{{- toYaml .Values.node.affinity | nindent 8 }} + {{- end }} + priorityClassName: {{ .Values.priorityClassName | quote }} + securityContext: + seccompProfile: + type: RuntimeDefault +{{- with .Values.node.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} +{{- end }} + initContainers: + - name: install-blobfuse-proxy +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + imagePullPolicy: IfNotPresent + command: + - "/blobfuse-proxy/init.sh" + securityContext: + privileged: true + capabilities: + drop: + - ALL + env: + - name: DEBIAN_FRONTEND + value: "noninteractive" + - name: INSTALL_BLOBFUSE + value: "{{ .Values.node.blobfuseProxy.installBlobfuse }}" + - name: BLOBFUSE_VERSION + value: "{{ .Values.node.blobfuseProxy.blobfuseVersion }}" + - name: INSTALL_BLOBFUSE2 + value: "{{ .Values.node.blobfuseProxy.installBlobfuse2 }}" + - name: BLOBFUSE2_VERSION + value: "{{ .Values.node.blobfuseProxy.blobfuse2Version }}" + - name: INSTALL_BLOBFUSE_PROXY + value: "{{ .Values.node.enableBlobfuseProxy }}" + - name: SET_MAX_OPEN_FILE_NUM + value: "{{ .Values.node.blobfuseProxy.setMaxOpenFileNum }}" + - name: MAX_FILE_NUM + value: "{{ .Values.node.blobfuseProxy.maxOpenFileNum }}" + - name: DISABLE_UPDATEDB + value: "{{ .Values.node.blobfuseProxy.disableUpdateDB }}" + - name: KUBELET_PATH + value: "{{ .Values.linux.kubelet }}" + - name: MIGRATE_K8S_REPO + value: "{{ .Values.node.blobfuseProxy.migrateK8sRepo }}" + - name: SET_READ_AHEAD_SIZE + value: "{{ .Values.node.blobfuseProxy.setReadAheadSize }}" + volumeMounts: + - name: host-usr + mountPath: /host/usr + - name: host-usr-local + mountPath: /host/usr/local + - name: host-etc + mountPath: /host/etc + containers: + - name: liveness-probe + imagePullPolicy: {{ .Values.image.livenessProbe.pullPolicy }} + volumeMounts: + - mountPath: /csi + name: socket-dir +{{- if hasPrefix "/" .Values.image.livenessProbe.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- else }} + image: "{{ .Values.image.livenessProbe.repository }}:{{ .Values.image.livenessProbe.tag }}" +{{- end }} + args: + - --csi-address=/csi/csi.sock + - --probe-timeout=3s + - --health-port={{ .Values.node.livenessProbe.healthPort }} + - --v=2 + resources: {{- toYaml .Values.node.resources.livenessProbe | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: node-driver-registrar +{{- if hasPrefix "/" .Values.image.nodeDriverRegistrar.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- else }} + image: "{{ .Values.image.nodeDriverRegistrar.repository }}:{{ .Values.image.nodeDriverRegistrar.tag }}" +{{- end }} + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=2 + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }}/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: {{- toYaml .Values.node.resources.nodeDriverRegistrar | nindent 12 }} + securityContext: + capabilities: + drop: + - ALL + - name: blob +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + args: + - "--v={{ .Values.node.logLevel }}" + - "--endpoint=$(CSI_ENDPOINT)" + - "--blobfuse-proxy-endpoint=$(BLOBFUSE_PROXY_ENDPOINT)" + - "--enable-blobfuse-proxy={{ .Values.node.enableBlobfuseProxy }}" + - "--nodeid=$(KUBE_NODE_NAME)" + - "--drivername={{ .Values.driver.name }}" + - "--cloud-config-secret-name={{ .Values.node.cloudConfigSecretName }}" + - "--cloud-config-secret-namespace={{ .Values.node.cloudConfigSecretNamespace }}" + - "--custom-user-agent={{ .Values.driver.customUserAgent }}" + - "--user-agent-suffix={{ .Values.driver.userAgentSuffix }}" + - "--allow-empty-cloud-config={{ .Values.node.allowEmptyCloudConfig }}" + - "--enable-get-volume-stats={{ .Values.feature.enableGetVolumeStats }}" + - "--append-timestamp-cache-dir={{ .Values.node.appendTimeStampInCacheDir }}" + - "--mount-permissions={{ .Values.node.mountPermissions }}" + - "--allow-inline-volume-key-access-with-idenitity={{ .Values.node.allowInlineVolumeKeyAccessWithIdentity }}" + - "--enable-aznfs-mount={{ .Values.node.enableAznfsMount }}" + - "--metrics-address=0.0.0.0:{{ .Values.node.metricsPort }}" + livenessProbe: + failureThreshold: 5 + httpGet: + host: localhost + path: /healthz + port: {{ .Values.node.livenessProbe.healthPort }} + initialDelaySeconds: 30 + timeoutSeconds: 10 + periodSeconds: 30 + env: + - name: AZURE_CREDENTIAL_FILE + valueFrom: + configMapKeyRef: + name: azure-cred-file + key: path + optional: true + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: BLOBFUSE_PROXY_ENDPOINT + value: unix:///csi/blobfuse-proxy.sock + {{- if ne .Values.driver.httpsProxy "" }} + - name: HTTPS_PROXY + value: {{ .Values.driver.httpsProxy }} + {{- end }} + {{- if ne .Values.driver.httpProxy "" }} + - name: HTTP_PROXY + value: {{ .Values.driver.httpProxy }} + {{- end }} + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: AZURE_GO_SDK_LOG_LEVEL + value: {{ .Values.driver.azureGoSDKLogLevel }} + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: AZURE_ENVIRONMENT_FILEPATH + value: /etc/kubernetes/azurestackcloud.json + {{- end }} + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + securityContext: + privileged: true + capabilities: + drop: + - ALL + volumeMounts: + - mountPath: /csi + name: socket-dir + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir + - mountPath: /etc/kubernetes/ + name: azure-cred + - mountPath: /mnt + name: blob-cache + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + {{- end }} + {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + - name: ssl + mountPath: /etc/ssl/certs + readOnly: true + - name: ssl-pki + mountPath: /etc/pki/ca-trust/extracted + readOnly: true + {{- end }} + {{- if .Values.node.enableAznfsMount }} + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: /lib/modules + name: lib-modules + readOnly: true + {{- end }} + resources: {{- toYaml .Values.node.resources.blob | nindent 12 }} +{{- if .Values.node.enableAznfsMount }} + - name: aznfswatchdog +{{- if hasPrefix "/" .Values.image.blob.repository }} + image: "{{ .Values.image.baseRepo }}{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- else }} + image: "{{ .Values.image.blob.repository }}:{{ .Values.image.blob.tag }}" +{{- end }} + command: + - "aznfswatchdog" + imagePullPolicy: {{ .Values.image.blob.pullPolicy }} + securityContext: + privileged: true + capabilities: + drop: + - ALL + resources: {{- toYaml .Values.node.resources.aznfswatchdog | nindent 12 }} + volumeMounts: + - mountPath: /opt/microsoft/aznfs/data + name: aznfs-data + - mountPath: {{ .Values.linux.kubelet }}/ + mountPropagation: Bidirectional + name: mountpoint-dir +{{- end }} + volumes: + - name: host-usr + hostPath: + path: /usr + - name: host-usr-local + hostPath: + path: /usr/local + - name: host-etc + hostPath: + path: /etc + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins/{{ .Values.driver.name }} + type: DirectoryOrCreate + name: socket-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/ + type: DirectoryOrCreate + name: mountpoint-dir + - hostPath: + path: {{ .Values.linux.kubelet }}/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /etc/kubernetes/ + type: DirectoryOrCreate + name: azure-cred + - hostPath: + path: {{ .Values.node.blobfuseCachePath }} + name: blob-cache + {{- if eq .Values.cloud "AzureStackCloud" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + {{- end }} + {{- if eq .Values.linux.distro "fedora" }} + - name: ssl + hostPath: + path: /etc/ssl/certs + - name: ssl-pki + hostPath: + path: /etc/pki/ca-trust/extracted + {{- end }} + {{- if .Values.node.enableAznfsMount }} + - hostPath: + path: /opt/microsoft/aznfs/data + type: DirectoryOrCreate + name: aznfs-data + - name: lib-modules + hostPath: + path: /lib/modules + type: DirectoryOrCreate + {{- end }} + {{- if .Values.securityContext }} + securityContext: {{- toYaml .Values.securityContext | nindent 8 }} + {{- end }} diff --git a/charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-controller.yaml b/charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-controller.yaml new file mode 100644 index 000000000..833dcc640 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-controller.yaml @@ -0,0 +1,115 @@ +{{- if .Values.rbac.create -}} +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-external-provisioner-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] + +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-provisioner-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-provisioner-role + apiGroup: rbac.authorization.k8s.io + +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-external-resizer-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumeclaims/status"] + verbs: ["update", "patch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "list", "watch", "create", "update", "patch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ .Values.rbac.name }}-csi-resizer-role + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ .Values.rbac.name }}-external-resizer-role + apiGroup: rbac.authorization.k8s.io + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-controller-secret-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "create"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-controller-secret-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: csi-{{ .Values.rbac.name }}-controller-secret-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-node.yaml b/charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-node.yaml new file mode 100644 index 000000000..c041cf8db --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/rbac-csi-blob-node.yaml @@ -0,0 +1,29 @@ +{{- if .Values.rbac.create -}} +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-node-secret-role + labels: + {{- include "blob.labels" . | nindent 4 }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-{{ .Values.rbac.name }}-node-secret-binding + labels: + {{- include "blob.labels" . | nindent 4 }} +subjects: + - kind: ServiceAccount + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: csi-{{ .Values.rbac.name }}-node-secret-role + apiGroup: rbac.authorization.k8s.io +{{ end }} diff --git a/charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml b/charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml new file mode 100644 index 000000000..7433bccf1 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-controller.yaml @@ -0,0 +1,17 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.controller }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "blob.labels" . | nindent 4 }} +{{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + annotations: + azure.workload.identity/client-id: {{ .Values.workloadIdentity.clientID }} +{{- if .Values.workloadIdentity.tenantID }} + azure.workload.identity/tenant-id: {{ .Values.workloadIdentity.tenantID }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml b/charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml new file mode 100644 index 000000000..a25090e30 --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/templates/serviceaccount-csi-blob-node.yaml @@ -0,0 +1,17 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.serviceAccount.node }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "blob.labels" . | nindent 4 }} +{{- if .Values.workloadIdentity.clientID }} + azure.workload.identity/use: "true" + annotations: + azure.workload.identity/client-id: {{ .Values.workloadIdentity.clientID }} +{{- if .Values.workloadIdentity.tenantID }} + azure.workload.identity/tenant-id: {{ .Values.workloadIdentity.tenantID }} +{{- end }} +{{- end }} +{{- end -}} diff --git a/charts/v1.24.7/blob-csi-driver/values.yaml b/charts/v1.24.7/blob-csi-driver/values.yaml new file mode 100644 index 000000000..3b4440bdd --- /dev/null +++ b/charts/v1.24.7/blob-csi-driver/values.yaml @@ -0,0 +1,186 @@ +image: + baseRepo: mcr.microsoft.com + blob: + repository: /oss/kubernetes-csi/blob-csi + tag: v1.24.7 + pullPolicy: IfNotPresent + csiProvisioner: + repository: /oss/kubernetes-csi/csi-provisioner + tag: v5.2.0 + pullPolicy: IfNotPresent + livenessProbe: + repository: /oss/kubernetes-csi/livenessprobe + tag: v2.15.0 + pullPolicy: IfNotPresent + nodeDriverRegistrar: + repository: /oss/kubernetes-csi/csi-node-driver-registrar + tag: v2.13.0 + pullPolicy: IfNotPresent + csiResizer: + repository: /oss/kubernetes-csi/csi-resizer + tag: v1.13.1 + pullPolicy: IfNotPresent + +cloud: AzurePublicCloud + +## Reference to one or more secrets to be used when pulling images +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ +imagePullSecrets: [] +# - name: myRegistryKeySecretName + +serviceAccount: + create: true # When true, service accounts will be created for you. Set to false if you want to use your own. + controller: csi-blob-controller-sa # Name of Service Account to be created or used + node: csi-blob-node-sa # Name of Service Account to be created or used + +rbac: + create: true + name: blob + +## Collection of annotations to add to all the pods +podAnnotations: {} +## Collection of labels to add to all the pods +podLabels: {} +# -- Custom labels to add into metadata +customLabels: {} + # k8s-app: blob-csi-driver + +## Leverage a PriorityClass to ensure your pods survive resource shortages +## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ +priorityClassName: system-cluster-critical +## Security context give the opportunity to run container as nonroot by setting a securityContext +## by example : +## securityContext: { runAsUser: 1001 } +securityContext: {} + +controller: + name: csi-blob-controller + cloudConfigSecretName: azure-cloud-provider + cloudConfigSecretNamespace: kube-system + allowEmptyCloudConfig: true + hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting + metricsPort: 29634 + livenessProbe: + healthPort: 29632 + replicas: 2 + runOnMaster: false + runOnControlPlane: false + logLevel: 5 + resources: + csiProvisioner: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + blob: + limits: + memory: 800Mi + requests: + cpu: 10m + memory: 20Mi + csiResizer: + limits: + memory: 500Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - key: "node-role.kubernetes.io/master" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/controlplane" + operator: "Exists" + effect: "NoSchedule" + - key: "node-role.kubernetes.io/control-plane" + operator: "Exists" + effect: "NoSchedule" + - key: "CriticalAddonsOnly" + operator: "Exists" + effect: "NoSchedule" + +node: + name: csi-blob-node + cloudConfigSecretName: azure-cloud-provider + cloudConfigSecretNamespace: kube-system + allowEmptyCloudConfig: true + allowInlineVolumeKeyAccessWithIdentity: false + maxUnavailable: 1 + metricsPort: 29635 + livenessProbe: + healthPort: 29633 + logLevel: 5 + enableBlobfuseProxy: true + blobfuseProxy: + installBlobfuse: false + blobfuseVersion: "1.4.5" + installBlobfuse2: true + blobfuse2Version: "2.4.1" + setMaxOpenFileNum: true + maxOpenFileNum: "9000000" + disableUpdateDB: true + migrateK8sRepo: false + setReadAheadSize: true + blobfuseCachePath: /mnt + appendTimeStampInCacheDir: false + mountPermissions: 0777 + resources: + livenessProbe: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + nodeDriverRegistrar: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + blob: + limits: + memory: 2100Mi + requests: + cpu: 10m + memory: 20Mi + aznfswatchdog: + limits: + memory: 100Mi + requests: + cpu: 10m + memory: 20Mi + affinity: {} + nodeSelector: {} + tolerations: + - operator: "Exists" + enableAznfsMount: true + +feature: + fsGroupPolicy: ReadWriteOnceWithFSType + enableGetVolumeStats: false + +driver: + name: blob.csi.azure.com + customUserAgent: "" + userAgentSuffix: "OSS-helm" + azureGoSDKLogLevel: "" # available values: ""(no logs), DEBUG, INFO, WARNING, ERROR + httpsProxy: "" + httpProxy: "" + +linux: + kubelet: /var/lib/kubelet + distro: debian + +workloadIdentity: + clientID: "" + # [optional] If the AAD application or user-assigned managed identity is not in the same tenant as the cluster + # then set tenantID with the application or user-assigned managed identity tenant ID + tenantID: "" diff --git a/charts/v1.25.3/blob-csi-driver-1.25.3.tgz b/charts/v1.25.3/blob-csi-driver-1.25.3.tgz new file mode 100644 index 0000000000000000000000000000000000000000..9b3aaa68598ce004e2c35e66cee288c58322f538 GIT binary patch literal 6336 zcmV;x7(eG9iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKDHbK5rZcz@Pkfl>OIOYa-%{e?sdL-41r6V&cH-a1{Vli zP5MAHPlZ4SwLyZVDysy*=N|I$id;$gUqRbL{ICk3SpJ*MlhbBW{!dTNj`IH$7k1zR zwJQM3AV*{5(l&5RR&%h)D5rB#GpQq=+H@vc0l<(;ITnO*9|*GaGup# zwZ=A-HeMluI3F=OL*+0AU0m5Eg0EF;o^3}+sD-*p(8g$ixnOXIfy&Olm>MkT9w*^s zI|(MoW5n^dU8b1n4zX9-JgGH{aaBy4dX{f9M&8WE=9Rotsl0jx#%PWhA|?WY0!k2| z3^&$2;PUni0godKd|e`<&|tCvieb3~!O*-7mO{9^U5`**!?bQulh+00x4dpr zGRF&#A;YDXVNxO>CWzG~JVOC9T!vRrpkPwh^@_Sb@@#vescD1Xey_X&2GADHS^KYV z{SmEolL2&4rNR+gVH0&slX^tR2{svm0=0o)9s;kxFLEgI?>E423!rYy!B=eCa?HAm z1?H52HT7y>f`puoIkY(fcrI^(uaKyl9!K&w1N1AYNqm$DMr|9hwtUrw7RSv^gG2BN zNMZq0WnpjhKdQff+nLxP5cPyyvH z#S_r7)IYWj#1a9QTD;;?s}r_rgZqax7#q%zT?FA;HPD@bVSp=-3+g2LVInASkbo8x zuwtqvk&Xbo0=MtD0bMuk21%N((F!T234#&Blwq;HvLRRS5#iFeQZG{y1-Qpnc!dB% zoO;YefG;T%Wx3y^#6+$L1whSCT?&Egqc&WIkfS`idc}>>Gf;1Yuem^uVcH%Sh#4ls z0-Mm5*eA&JWNXE5=uUuzq*Tr)bzRDYN90360rLph2pxbN5K0)O0?gKcBO#{2L__kWR8LoG zzCx*P11J@kp&n{$W97HzE;Laa$QNSh`KtiQYxHZ+apml8`fS*LNx2vx@s+aMjh+xo z%s2C6QqQ)eKv|f>nT;%|1VX}rMUk9W0W9PqVgX9Pr%6BPUICJ088-QdGSLRDf1RJ4 zW*fgHg0@(O%~};@A8c$w-UjNIM~37Rl>E@v3MsgGrRf>jkf899O&5~q?KU`5urw!g zjV{aLOS&8^c<@US?H^k;p=SDIdqX zN8(6Y^6xcua6ZRUoP8B1wf_W3)k>LvOHdmzU;8R32DnA*HmE8~!KjUDaSi1t4yyVX zsVjR+Xw}{w=7I+g(0q$Iwqx1UYPsi%EnV}ia=+jG!IwC%f_QMMX z1^W1o>t$Xz29CrSL94Sw(3;?HC^Z#V&|IPs6w5ZKJ8BgHU1@1CRC~+{?i-K?OlHU@CNh;?}u-|FP-tAKltzl^v2`iSUQB# ztM`?XB0}B>e^+cwygNA>seo-H+MvFItZw63-M>>&ia;>h1{RuONGcWSUfL8|8&#{6 zJ4QtGyFQv%;5VvP1JM2*^ykW*?{vCS*rf}omr`mi#|+3hUJzsf2NJlDE~yU}VC{=y zqWW{WLKKL|Oko4VAc2p0aeohLW2D;E zHl8PVc#tG%V1~hc>vK_suA6YtC8QJ(@bFLthM~;m|GIw2m;dP!*)C$dCfrAE1#OZ4 z*2(#4LjKRsj{Cn)bKT$9{|Q#uX)7x{$2Jmc7hO1VTFfPCgMZc^9x4^ptas-^VkzTH z{J^iW=PG4DwY$GJfQ9CmAW&6KmTXrAM)(MNwg5GqWuRoS_C@bF%9g_wVhmdd{3$&_ zVuJG%^(S_;_XVm(2n-QR{jF%LT&a+f4mwWfd1QG$ALdp#7t_b>i?^P>a@DgV5s9z=@)6m#`A~_8t4$ThL)`Z z+u;5l1hO4_H#LyiNiAK8sXHdMXFka~T%Jd-9idY`#Kg2cD{nM8l$q3VDN!DJB)Xn% z=Rzh7I^TKZzH4dB*730idmI7n^We>QHaQd705|y$5?ZRupWqLVirB0^JXGWYqsEtY z#fDi!@cFYACC8Vf=(dD@3CG8Ud|=P5b6?VxZ~rs4NcKz%DYpNulk;T$SF71* zHIMfHDXv>gtTyN>$KF9iRH6xC&~#aqm)HLam*QAk~8KQM8Yas0B@HL42mJ!sb=M zyv;_5hVN_V9F&`V`9Omw3|aWRU>B zP2~%@^VZ7IA+=OwM!=rViqfTt!7UFG9FBsAf;XrsuDR@P4yq(lty=#CO zvbr9_WZ`c;VzTHj2;JQ7-67LcX~U78ab{3+7=JANIi+=bcP>Nz)={EGN}P&DAJGOO z2DRf_YF{_iIl3LI_cAi6L&VC!yoK(>3n@*p-cNr#sR?zN$Ij7Lm{?&HYeWDt(u^Wf zn0gvr9%%r{6ratAI5OqZaKz{w+bGI1V(p?f7<)uu2X%D}qHuhX4XhAxY*%ZC5r?a# zkR~ItHy_Pk_1R+y`G_GEBdAy7TE7-gnyH29n;^zEI2}Ax$>gVuhBks0 zVg~Y43%9o@5zNj2A~}_M;-cAVGZ1iP}OdDcHZ_wruz>r{T0~3MR3fhJP?=DUnPP8E+ ztK_TF65_v#gx*q{s%=pB6O?P5nzu=28%6SxxA9S!!yIR!mD)^Jo6{*)()kTKDI&;s z4=+u^0-~MRBvOWH%@r)V$dJk z9DU_OCwvYGaVdmrAY!=`6LDcv6WX#{JKJlH4>e4|+StU@6#H0IOT(p1T5rn}=eNj!5I71X458{Axt0_Bk% zmDp~UN|9P*F|z2^Exv7~J0@i@Gsb^U-uQti6hW&{*H z%82WbUmI*pcM{j0Q2CRku-caaU(6J%0i@isVV#M=0N%;s@3{@6tf zQ!Bf3{!-#UpU1uF)wtK~4Q~3K>*@RcbuVjS@t#p99dgp5_X)Zm(Rz&L=>`Ee`I+<# zS;idOSpg&!%aLz7Gh(ANFe91U$$>i4YwHNy1kfBVDWtFrfxFYU3wd#-`Y@bMx*w<4!w=Kz-k08WS*+>& z;hbrRDgde5K~?41O$0P=m9o#B3Qb^d@TET<4nFk;H;U~?otvL?*3?Ltk$S?qB9Tix z3UTefoRZxp=xR9nb$T@%TzwvodxNWAr(ZhPpECuo4XVvlia{2lF z``&o^;WCei>Q1YPP0quUg%FaR8Kt6LgWpW*t}~(NM_ZsI-h2+AK)GeHDI^wny`5Ko z0EdM2c!)TW;<-oeCKLji%dwws6c(4e)asKt9g=9_aH?E5LYTjKU5mBQBx<{IjpxW* zn>PAHEwrgy9?5y(LLZ$aZ}i+Hau9>Is&l?YWE?A?HURW2j8x$SbaA_0SIWB6y^(Eu zcjgk31$se6XC>sHPzyckK)_=8KWUz|8j1R^w`XUqqx?U`<>!AxvQ2qkcCQWhzcmk2JIh53G8S!5MhiyJV+J68FtZ zPi2g1$=N>__Aiugy~#ip`nZ+!6=oU_sOXc-HvU;Cna?DK6=uSNwh^9U5^_mI9Mrr= zQ|dEhJ>F)!yz3h;H#=F4=b(AXa%Qdya+CeTtBl|fD8rS)eoX$!kB+8deTk!YgUh6j z1BsOiq}Jn8U6*gD#+TKy!8MoR6}HhrE|gM{{KrMn3&Nt^-etctn7$tm2RFSzH#kvb0Z5>Yq}U$;`F~Sut5>V>thA~)3nA@O)O^QmB5^4S+yr;;n-Z3%aScC9F zYY>tRN|Y2RDJ`48DPgWITCtT<(XOTf{vs3Wvp?=og0VABG(9YPZ$*%1xvVaGvikSH zzB}88Sq-UXzFFM7G?k*@Lb1H~@pX6H|I!;z$Gs2J$?)o z=A9Lv4O!`H!wnCPPXSDxEMGL0SbcIJ82Bw(8&G|9!1#*A(!drXSYVNst8(8fD4cM0 zCc7R^j@ZU_N%pJi(-V?g&v*C&r7a~z@$#j_!(_eDPQL!JZ0PyRhEl=PxEb3HHEzw0 zbxEb@+ovumZsp6f>l`E7%Hh+*w_?)`RA=pKa~GLPzSW2EvM4-OPVISkL1DSk^KB44 zMWIvC(lm3~$EXVzP=CAl5?dy}Ms(-&qsW>2qBrRz48_Lp8%Hrw2XPMPs zbyP2)A}c#ZB0m);AUsMObwz#i+26WyUhC>JmvPbp=9a!~>Tw*Rjc0X-TAq!Pvl(nL z%#7^khpk9U1aLBI(RQ6bBRUbmhnJ2~nEWVAUeZHs0uNYs`+SCQCuWQdzaWlS*18^C zil5fxrdTJp=qqFAwXn)3+H~vg>o!PqbF(_e&>51vU0Z@iV1sEJz#-PS$aBR=?|MPI>y-}*ZJIQF?FmnOaa@q&Tx0f zZVMNdvJd6iF=aoDLf@{Cv^;mQOtI|WvpDk!uKfBhHiM>dkdJ_DssB7bd3&1t{>R&6 z{pZtM30aXZy{3;9Rv+&1i$C>e{>Icsu>vvG8hT<$8UCgWVx(@guxd>8^xYE!-3i19 zw4+C1t5eSRuODSni?r3pfuM_3$tQ1v->TK$6{LuZ{#(`E)Oh;Nrr&6V*i1E8AW?k- zsy628U*)aKKlD7wzue%KC4CK~0PKNT9i?0vy)JUg!WA##&BE-rFm1?r$pM!f6Ivl6 z_LxF{G@HrXYgi`7(m)<`K#u}wQpzk$qOy^NLlsFLWYQ{zVN}v$dx?pK$>MuRZ{iGl zW9FmUzxLak{TG?S7hgS;Nvw>k61pI}e2An>ZK_l|{`N;&_dQ0D1#D3;?|CopyXsv3 zOr*bpzAd354yf;pZlWQl*-%qWZ4#VJo1ErLhh|&t_p!!I@ zk=(bnnVcZi>*zJJpbwR?CiMye~N3%`u|Dwzp8 - [install CSI driver master version](./install-csi-driver-master.md) (only for testing purpose) - [install v1.26.0 CSI driver](./install-csi-driver-v1.26.0.md) - - [install v1.25.1 CSI driver](./install-csi-driver-v1.25.1.md) - - [install v1.24.6 CSI driver](./install-csi-driver-v1.24.6.md) + - [install v1.25.3 CSI driver](./install-csi-driver-v1.25.3.md) + - [install v1.24.7 CSI driver](./install-csi-driver-v1.24.7.md) diff --git a/docs/install-csi-driver-v1.24.7.md b/docs/install-csi-driver-v1.24.7.md new file mode 100644 index 000000000..1267333ed --- /dev/null +++ b/docs/install-csi-driver-v1.24.7.md @@ -0,0 +1,47 @@ +# Install Azure Blob Storage CSI driver v1.24.7 version on a kubernetes cluster +> `blobfuse-proxy` is supported on CoreOS(OpenShift) from v1.23.2 +> +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +## Install with kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.24.7/deploy/install-driver.sh | bash -s v1.24.7 blobfuse-proxy -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +./deploy/install-driver.sh v1.24.7 local,blobfuse-proxy +``` + +- check pods status: +```console +kubectl -n kube-system get pod -o wide -l app=csi-blob-controller +kubectl -n kube-system get pod -o wide -l app=csi-blob-node +``` + +example output: + +```console +NAME READY STATUS RESTARTS AGE IP NODE +csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 +csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 +``` + +### clean up Blob CSI driver +- Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.24.7/deploy/uninstall-driver.sh | bash -s v1.24.7 -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +git checkout v1.24.7 +./deploy/uninstall-driver.sh v1.24.7 local +``` diff --git a/docs/install-csi-driver-v1.25.3.md b/docs/install-csi-driver-v1.25.3.md new file mode 100644 index 000000000..d7d6cb537 --- /dev/null +++ b/docs/install-csi-driver-v1.25.3.md @@ -0,0 +1,47 @@ +# Install Azure Blob Storage CSI driver v1.25.3 version on a kubernetes cluster +> `blobfuse-proxy` is supported on CoreOS(OpenShift) from v1.23.2 +> +If you have already installed Helm, you can also use it to install this driver. Please check [Installation with Helm](../charts/README.md). + +## Install with kubectl + - Option#1. remote install +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.25.3/deploy/install-driver.sh | bash -s v1.25.3 blobfuse-proxy -- +``` + + - Option#2. local install +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +./deploy/install-driver.sh v1.25.3 local,blobfuse-proxy +``` + +- check pods status: +```console +kubectl -n kube-system get pod -o wide -l app=csi-blob-controller +kubectl -n kube-system get pod -o wide -l app=csi-blob-node +``` + +example output: + +```console +NAME READY STATUS RESTARTS AGE IP NODE +csi-blob-controller-56bfddd689-dh5tk 4/4 Running 0 35s 10.240.0.19 k8s-agentpool-22533604-0 +csi-blob-controller-56bfddd689-8pgr4 4/4 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-cvgbs 3/3 Running 0 35s 10.240.0.35 k8s-agentpool-22533604-1 +csi-blob-node-dr4s4 3/3 Running 0 35s 10.240.0.4 k8s-agentpool-22533604-0 +``` + +### clean up Blob CSI driver +- Option#1. remote uninstall +```console +curl -skSL https://raw.githubusercontent.com/kubernetes-sigs/blob-csi-driver/v1.25.3/deploy/uninstall-driver.sh | bash -s v1.25.3 -- +``` + + - Option#2. local uninstall +```console +git clone https://github.com/kubernetes-sigs/blob-csi-driver.git +cd blob-csi-driver +git checkout v1.25.3 +./deploy/uninstall-driver.sh v1.25.3 local +``` From 3efd3505ee52123203f83ab58e373f54e9939572 Mon Sep 17 00:00:00 2001 From: andyzhangx Date: Mon, 10 Mar 2025 08:42:42 +0000 Subject: [PATCH 2/2] fix: avoid duplicate ssl mounts on Fedora node in AzureStack environment --- charts/v1.24.7/blob-csi-driver-v1.24.7.tgz | Bin 6313 -> 6289 bytes .../templates/csi-blob-controller.yaml | 10 ++-------- .../templates/csi-blob-node.yaml | 12 +++--------- charts/v1.24.7/blob-csi-driver/values.yaml | 2 +- charts/v1.25.3/blob-csi-driver-1.25.3.tgz | Bin 6336 -> 6313 bytes .../templates/csi-blob-controller.yaml | 10 ++-------- .../templates/csi-blob-node.yaml | 12 +++--------- charts/v1.25.3/blob-csi-driver/values.yaml | 2 +- deploy/v1.24.7/csi-blob-controller.yaml | 2 +- deploy/v1.25.3/csi-blob-controller.yaml | 2 +- 10 files changed, 14 insertions(+), 38 deletions(-) diff --git a/charts/v1.24.7/blob-csi-driver-v1.24.7.tgz b/charts/v1.24.7/blob-csi-driver-v1.24.7.tgz index baad475b13cf5b371a43a61cb30788203bb6dc22..cd899e5a3057895dac05da39c6fe8d9151487a19 100644 GIT binary patch delta 6286 zcmV;97;)#RF_AHlJAXZUlj1h=`I}FnVsmxL{notZm7{9@Ue4x!z;w<*GtGmZ4Dj! zyMtYgMx$|ldaC|yG#bf&8_n~x@0zC<=O<^a)DvzIqISE1S;1L{J772wYG4 zKub@BKnJx!LZ&LKB*vHS^zqtUN&R0z+e7@Y2B28~o6VEcW>Wu8TNg+De~t?~aDmzt z0A`S*F>+}eIDaOqIoM>B)48ab)R9kZI+IWUFyvB>1!e0ts8i1Ccis#!f&}7Hj_QFx zDPRE?q1MYAu4mgLYGZTV2L1VfiV;H`5m5oanQjn!rOlICtC&{Bw5ezLE@R})Y;0c3JC(|tH(-qBh#_JkASj>&0m^_w z83G)c3<)l8&k*o9vcQ)mB8m(q3!ns+OB4*v+h8e#%iHw`*ELM*7BzWYKz_&TCM9#c z@E9^&YJV9fB?4lCSY6^X6f(nQcm)Lt26bJpsQV+&wkMjKHu&xL${Sz+?ckiX|N7P+ z&{~5Gpo1zEj@SyDsAHPcBSH?a$q*E%4FvNLcmsZsU6Fsk1wJf*8kmDG*tTV#brTEB zDFbWj)xZP^IUI9na|G~Q-UMGDQ8zt~hXhu{s6 z%mO+G6Q2d2Uw_O4`jn~R_r*4XP6^^3h$?Ib&E%j+^qZ(biN>|$)Rf_dL=6d{0?J=X zCZJ`he{36wB?2zBc*UhwCxmK)hsQJ;8_tkjgyBX3=*GY>z_rH(brS6`5fnH`Knn_3 zF@F_Eq#*!rz}-*WfUcX4f+SBjXoXbF1i^@5%CJ~p+mI{#h;SKNsh2640^DOOyh4B> zPCaHKz?YPXveIu-Vj@?B3ZO=(E|tLbNgFOh$Weh^z2Zjs8K^hH*IXdSFl~Jwyo5?aX{x))#}IhEr{U6(T95r6qmP{2F_HcAH|2ZRzvsQ|Mz;7ACm(oibB zLU*mPNeZ(yK=;sbZ3No#cLJmh9whD#|HP%JHye#6c&wy>9xIiIN^FEJLp7vaO7nEB z#w*n7Hh|KA8S0_-Hda0~ccF>eK)w(|k6#5yS)*Tijw?rZ(`F<7OUlIni7%AhZGY^9 zSYo~zACr2vB^AoT9L{WHNh1(44lIh~xC&q)7ZD3k0zOXqLGucb63ej3N0f;+X#Mm2 zzzI zs!x%+vbDrk?cHN8c<=zt=g1UoP#w^TxkQ#{qiQMqzH+!y7{56c<3MDteSiDfu`EjX zkl5?}a8{JNPMbP;`^Ai$dfF#8Cg?M@JqLY2>yBw6&VRvT*|!i8O2h)g;lTS(1g;>q zrNwK5W|kQ{D`&<|Qicc-iS^2+v$@C7h|&A?hSOQ>u0n_j7tpo?_>jvGdXqJ&HfyJ~ zvuakm)`mvdt`#iybr(&~f`j zfpl@iD>yO|93kdl&UIYYxVX4Tdx2-Q%efPDI?2&ku0YJV=r49GcN5M%)d61b2d zsgD<69gAY3+H*NW6o|;_D&*>xKc7$pg`5v_IlomP{Vw=|#ZrOoM%5?L?@Iaeaj9;- zbb{@bU&;KhK#prefp~o|yzNbD;$A$N#hr>% zh+4?C=^Cm0iGRvd_^Mp1RBkCSm&m-^f=nki1QZ^B3tSsPj^y;QUGc4%DQsXEB#1FD zA09w$j1*jL6M2HiN6C^#W*FS}K9^PKx`_~7VoD(akB?Pg7|LD#)$K#R{!f?4b`j$> z;XZLGXp8>0PR>sg`hR|Q(LCz^b6gJ(^?!gBcG}7d&wsIv#M(udjvN+qiQ3>F^~c9b zMS=D1T}UkDoQa?KRsLL+3@EsV2Lo7WjtK%)6=X@cDlo!F(6a@o=_&)Ii?z>s#Zf{I zSBNoeA@HY+1c?dGPt>2-(a{&E8X+=7EcLhIt#YkW%9D=~G$r1i{aS*OeM__ZT^%7>VkwrAz_CWkYV zIxZzDLXTwE({L_i!l3h=d+vvp#%vw$d$7h4@P9rJ-h5|MGm(vOQ~n^arJDQ+{_v=X zjq2lLMNTkkd|6jwnAHVeK5J2Sd`*fjOX$Zy&|jfr7eH(X$KI?~d)Kq=&9dB_vM`^| zLH2ug! z?mn79z5;x2p>srP&2$@D0Mc&5-nffD0l~yVM1WHX&RwKdo5K~XZ1ll%O(O6@ zZ9my6%;iml&C-l!v6}X9A|J8(axnuJz6nL(-r>7!^H zoly%wYe9aduF~dJ!Mx2viN^0+=Nyuob@{-8CmdP$yr2sa2M|XcDH;gdMCuLN8Ll(Y z>`xG-n&?m5m-y`-K2zZCMzaS<@I!IFo`ADv^qMH{XTpLug z2Vv9l@lh*>AMbFz5*T#k7BPoc4{f z%aFfxlz>R7Q&I0D)*z&yR$NQ1>!unMkaTNSQ(VJ@SS)er8(B?=}%`hVJ`E; zIr<6{GmK)32tY=eQA7(rkom%7@cDqMMXxeUDO6+kADd4psvnA z6!tH&fE5yst!nMi<8ZbV@?=ET=A-qizIZGlA2FnI1odj%>eu2$GqtdM6U4+u*Y(Cs zoNgb~`GUvC)UzVo?QPHkE~Le*Yz$O6ehx=79!UTI*&<;%3{W*zm#u2*rkVjk%aR7? z^7|h;-R`(Inf#amXd`GLW`7{Rv~W8_iDY&L5-F+F6PL|aqro$tqkF-iq3bA(AWFQ9 zhgTb5Ri^=6Z2aN!%do6r{T z0~3MR3fhJP?=MdpP81N4Rq|D74e?(^!fvTW)i$X618tYMCe z&`K>PtHtS*DCznJT@(@2yN8$NUh;*6VPO_?o0cH@KxFMkI8u`SS7F?1s4kQkRjxCSDYOED3bHZ`Fwo3*o}=6F}b60D6+ zObxM5ML`-aW#V#A%*mnLuKsb9`)GfGe#YU0`BjmA36)m~hJ$K)8e>}B z6wID_y&wK^F^93r6K%h0C_4z)=-&4~Tu=Jb-k>`g_6N6FVSkBV8o99*jhgx|M^__- zl-ZPZGI+Ci?qkq*gUnJ^6s6V`3|*?TKtyD;PLx??BMLDXTrHMmAWBqb<#43xS@jkO zL$6^N$!9; zJ3dI_nail4CV#ct;P!eH7?13%#CEq-iq#^Ik;S)$__~$vl)7iuuIg(JvF$N*yJUzj zscq@PlOjeFDUaeuGd8{GCgH`90hn_kw$;vJ(- zI_0EQ?;~_Sp!FEd(*S`q`IYnxS;idOSqUVS%aLz7Gh?GGFe8=Q$&N&wLH5MRBlx~u zujfaMX)W}vYFK*;s@1gmX$F42y&X-aqw(-xzh=`) zdOw^_x_=+0H^cYSo8IT%Of$(4bb&)^y~C`IJo{a9`^>=Ksmwz*8r_YYyg;>8jOFUnyLY|u^!-&H6Mxm6W)qv5hi6M6BpWB*Stg>;EM*B8 zW#EVHLiS?}NG;dYbfGz@&XGkKtp1oM2%OsmlO)*#&h5I1SSm}+5VVHGUT2uZV&k!m z*8)}z_b&N9lI*&7xNbs2FprD6O30ZaF}S<)zQ^=Xir>r53ZrKPluKdz8y63rzRtv( znSVwOAoovOKap0ssbks1bY@!nIg-_XHeD}1Kr7gZH#eZL7ojM_R`Kz&6;+|}rS*jD^;H69A{!&+o z`cHqZvj34_+xCB*ou4P_KO4Us9G77jv64@&_iWYfe$ut;&5EuNy`J>-zUks( z(0GbCQR2Br?Isign#-|YZWL}Vcd6AUb2=o^jl-$!!V$*&#p_xOLbIrS-wmE4bAN5x z=p(hzX5aEijtdw1=q!1o=Pr?h7_`+s=Q~8ku?^G)fS!es+BgAS+^*M^59)MpC2a5B zTtc!yugJue(0@WL^rQm;i}nAc**a+@_J3WRot_@`|2Zzd{u?5Pk_pyqWjTo=?P`-fK~)^_9vaIo8I)(sN1>ib@P^{i)kfJ|H~!z;eXRr@1}P<%`XFp z64Hrj-zn!0RR8_BbK9GK_-Qg7_eR701}k<*VWA+5d!6pI^RxW_r2p^zj79R~!vw+Y zYeOY$HIu?9)wrA z2O$ZNQ|zxavux3(#DBB8Y{h0rMXRj}`Kv6Z&;Fo831QAS#q_Wuy_G;(%(9y7Dc;|L z`tG70R$HXNd{?-6X{vO>g<^U6{SV!7|8s9V9rxZ(C&TLx%EhKJ#0B`UWf75>B7>J~ zTm{~~?%Li06JF0<=E-8>o0L_AjbkHUj3NrUuhGa5uj4+P*MB?}FS8Fvd!0k=z=_Y@ zqb=jpqCzBkGL*oT;D9U)Zgyn6a+DD48V|I;2cJj$^d(tnN_Dvr+Qh1ljzV zk^TIz8-LUid6UeoX}gY}5gmx&8%M|FM}G1nuf8BQfCt>-`f~nfCt-|rzaV{A)~Ov_ zi=Wrir9>xp4_L+`XW@pUDCpLO&TW_y3!Vjwo!d4+MQ{{>J}DI*pP6piyH*ed?a$&~ z9OMK+Paddg_(|=3*vifF7c=&x4TS}vT#bSq>nFB&YfnfAC1^e=Vg@Bd;mXc`Ck2*{TGpXVp%sqcSWG>_l^ zdzLGq;qs-|^s&O~!#)1yPyLy{F||=_gP4Mbo>)?bzbY>s**99aYfQEDV@5L729m!_)swq?L!>_eC~QG$~~kCVx?t$fBY4Mjm9)Du!WH(%O23iG|7HTPSVf z=z3%3liGjFw>SF_GKH_Tx+{~|?yX7~FYWUEkuqCSrM2-_K+-1fDfTN6i-K{_dwJi~ z)cVIY{WqA|5+>rnR`y90>iYAxNkV(}BHOM$&7eNJb&~S^+_vd30{%Z>loA6`+J7J& z)E>zScYQ_x0Q4h-NUx;=O0b$|IW3${oj2i zu+{#bT_o&(>+HOFwExd>y_o$E1InZ2KU)6db-a$(@j715eEoj_00960Wd}-xfdH@o E0G@qUp8x;= delta 6310 zcmV;X7+L3$F{v?-JAZxqbKx z0lKjzSCZM#H2?c|B-!|F3}KVB7k8!`Z0VdM`Mh*=jy$vJ%rH4NEQVKz)vuS3iP{=E z_IC%n8jVKd{Pa})+h{bB|2CTEXWunXFV0)1=jRuvC*L)ir+=+R^E=Qu90~cC#|32H zHJ*$sIk>;b1zr3FF^(x|gH^KvT{rTx);g_SR4l|zhFzggEPZGYgHtma^oQBLQgW>QB!wdqW@0)Qcxax5rYw?Un9Ucd8Zh!G?ZmwZ$Y z7)mu3a1lzqyy1GbJ)$-?*KN?B52zS1#1Rn{08EZYjIOX$6^NBXCK=ZaJ4JAw)mpX2 zHk3AAA%Zv`F*-x#Fa}***(HLnRcoGYM@XoJx=PT-Xn%pZU~q?l%Fe!+8Z77@C*fo} z2`0y5#PJ`yOfl0PVz0D$Qfn6Ds+czQEZ<~|yqS&7Yk8+qdGiL0(Ht>EOauf4lpsJE za4187BaZSh9-+F1Y2BhGuM5cUc-^FA zju#$7hJQ;f!=yw&Oc1L}c!mOIxD2nLK*6N0>lJl>75scb4Vr}`V4K0qFn+AvA z4UohFItLS<1fO1i&IA0Esp)hOi2{r9$VoR z0t|8LF%tp4q)e3Mev=Xtxgrz*H9K`F1g?+Ta2Z05a_s6AH%iYyy%E0V0y&0hdt4x9 zm<$VSLR(^=Ak&kr6~Cc-0Tz-{IiJ*ZDSs0lkq-q0%p+hUbO3TdC}ETeFk1tTgpeW) zrO+#I*BY9{Fk1t34;|M=pe=tVnzX@#gx%qvxn%WbqtOJ9m2{)WN+lu^8)nN84at{M zJzcB$3Z=RYpj2RndZ?|9mEW4X&_rz@Ux=aSuL2~m(XTznm9x9)vtj=wyKRyvh(vp9xse|)5mg4NIIH~<7NUB!K{9A(Bi22%AK{3D`TDL(}SqesNREujU zM{!Wq$4Fh-TSBY$?lBiUc!1_}WQsPZ4(P;OBFnQ;wG@0`I9$n$-yDl^Ab&L1zJBdk z7A1U0?Dc*yE6QA_Rh_*3VoFXu?Gqal^o812*_=`40v0mOt0Xxl;ikjk+2CTdb` z)=q0@)vSK44UVv1E9}^+oqyJvx+6#86TBa~h`h%(8hB2mr;~V4{g+;G>Yl!d`0QFx zpzc+)A6_sh(8nLSUgm{k;7E)Sv^q-!tqJ}ErKaKCd~!I7Te2r&n9uKlvc#l=P13OuV`&Ru}LtSM+c6$$)<%zyb;D9oir7vFY7 zdzphw4W^~ABT4_H)=Qf2Dsu#d#}qHj`3FWlH&|avHvO4lfri9HQgOVW+^$`;f%O3i ztz9Mp%2k`@#ftX8+p(oa&E&YIl%5~r(B8asCp!xyiK$8&z2Nu6o6qrm8&rpriLpes zBcH1NALyj}@n)l6s()4R25dAJ&;d1h`z@hT4e=k|fo|{W^M`k!KX^ZU2Y&912mQf^ zcc3>O5699WlwQ5BloS#2M) zNcYmF(Aub4rQ9(hqTlt=yaB&bwHko-Z=gR{?tG`ymBKDvK!3fIQfoP8K+f@kAPYE< zz=d>4eYgN?UlbG7pUV}ZKtwKAAy>Ej^@Ktw5b5U&r0x4lVC+>0mU*tY+3+DOKK&(1GSkMZB-r&I{-;Z1 zyNL0caG$spv_<|~C+DXL`9D9qxH!uHb6gJ(^?!mDc7NK+3eT~P#M(udj+_>AiQ3?w z^~c9bMK$Z)yO3DQI1@kctL(W-8BpyW9t>ciIVK2Hm6IjgRe=#cf}SlvO=lS>S*(50 zJC3sDaD^Dd76N}tPmq}4{6zhU9qoOAsu2Q1#8Q7N+A7y7q^xPt)JanPooDHJsGWq_ zI;2>Kc7JP?Y{FHO5Shy`5pz)eKW_XVuf_+U|Mu5$;7=7XlUl0!|Ei!mt?n}z>Nr&T zMOv}(JR*YzIs~nuW$VB;cz6JTY{%YB4PTMv z8%+*nCUsm&l!qRPuBY3%kO_m%cOJR#S{k!;e1Gi09!Eg?Jb3e+P0mC%z)kvtgqG^^ zC-~i?A~vg!j}^JVsPSc8v0>H_eEzIO$?+vAx-Fp}13`a*j$P1VgE;nPwb;9!ZEv>a z=9Go;d=9eTvm5T5MP7DDVRCy-B2I0&sZI=%1uE*Vy}ByRs(%|@$nwExd>-C<(2L038U4kDrwO$dXo%j>IVCD`!{BPdeV z0%a1i2l35=ZskXb^IZ4}@U4Z85ve`XZD0XNn+vK7ZF81NrmOMQ8TF|r>#AoU%Y+e=2+ia9*_`Y_|LAlwN4>WkfkcH0+h7d6TanO;Zfv`^` z-=LjgIuqUg1W~Ms0R;@0F|ce)Ca)|zm?R?AJ5EN z0xg6PixF?$P25YOybV-fQ$2r^-c-I+TjP{P_n`fI#9jjd?-2Jl#Ngudds{=_0vxTqAXLN zC1)3mA%CmuF-#Wz)*~j1{({iW?cO~yJ(V>a=^1ARHHY!X z(w|dWw|DO{=DNdN%ZBB419P&HPUt!nC~ zS^+`Jk_zYY`?sBLcifvyet*blXd`GLW*|ScaC?gq!R!nml2fTCE}N}JgJ(QP_kuw~ z=TRDgmv|X>uQrWUo(6QW@w>|}&l*K7W*+0>vf0RL|r% z25lYz3<>ZL>nTqO1>&BA^xjK=q8$BYWS!y`J=^y?;S>H0%# zC^~1h4AW$~JAZzY#50#sK}~A6!R_@ZP#)P)iS1^o6sbiPBa3d`;*YI#r^G!ocU50= zh;5Id+a*JMNo`9f9*38-t{;#{s$EyxjDVsi8F3x*YlDsHPU6~g3iHf)05M8@YRUk> z1Pcu9F0$czf=o&*-UcU)SR3Du**tE>AG?TQYGrrMUw=yc=kvHXy&m_vy}@n2b2EM4 zzv*QyEZ#Hfq(e?x^gcoNBU+EqJl!DRCO?y&A-Bt(F)f9@RtA>Wn*f@_C5050 zA#iv4c7Gu+&Qu?U(@FQ^^k(>Bdei&TyD5t`oj;s24N(Okbvvl4JiCd2=ABaZxl^GD z>{g+d++XP(?N54$3hlA_S<8g0r z{mb-A=jL;!;I%=unTkAQgVDpti3?O)#Zaz3zkh$<8&5x6 zon-U-P4K%Tzp5Wm8 zUE?glNp{XmDT+|=(y4m~xk}`J`fHW_j|AIR|8;hLp2+`fG+XD#{LkmO48w?}d~#j0 zRlEC9=dL#^Iz#k&(${s<#mS)Y5OE^KbC29jC5U^POPnu_qWc}C0+1auF^I0xG z{~IEQk_p-){abOzArrq70QXWGo_{+2Vj>t6XyIorN}m{$g+3W0a6ppBj3nuZKMyGK z6Uw3h_sJYjjr2uw#xtlmW{V%Q#eEVYDaMLXGEUCPY7idk5zjv#^}DfHRdJGfq@hK4 zVAX>R&cL(ZB|BY`xNly1Dq~bj&i=Wuf1!NqO$M^i$E~EVFw=NIMW1B0@qf=k$$Ta; ztS}QEw2kl-laNay;-Ka|no^%3>+v?*biVGHNLEt4biy_udt04a-o#k4|rNEz96{T z?OpXdgX#P6aB$ljbhCr3RewT>%KwF?z^hb_u!hthOl~_jH`A+|;nn-kle{g$r0)_t zu&tIjb1fsLtdRvsreAvFNq;!l3t8gyw_Ie&k+lvnwAR+KwGJ}4)~=%~+Idgm%yKC5 z5KVfw(@&j$Plu!4K<)od2cJLfHMZ0Nd$~9zz9*q_%HiquC!MRC-hcG-sN1>ib@R5S zi*Y4R|I0=8@$*&hrguBdPXmY|(vf4|DCbX9|HHU*+nav;aWWnEM#KFkD|Sd>AtQ`? zo$j>rll=dr|DXMoMe^js1j6mRH_}}-JYKYSBb(HdO_Kc$m7`SxNb6Ptz*XW+voE<}8a3|g{b6eU(NA zdmZa=Uh`7COdXE4I)|#jiLc$GJ>$!wLLhoElz^3@x!jVeYN(w%Y+Zi;R{HzX!LZw# z4mzKDS(x{&_$g6eqiFsXl{NW*3u{yFbioShnk>XaqJb$~+F|w^3K23ZdHr+sV)~+^p zk*VZceGD&)!eh16o(C2bmKeR3`d%9>*ctcvg3)<=H4Xo58li%*cLz*jlzk04KAGZP)oTq7xB(Z0Q(<$&bS1 zB|5|=@PM_pFJ}mMV#e6;3*v}nt?R+1_<2okigj|!#WHqV3oDAEO}Fm2ZiAHAc`ev= z-B#rkfl<`-Niq5O5_wCRTY)>aKZ$!$kmHR#d4Hm&;kUi_AuD&gp_s5I)gBi3l%=O5 zmh!OqiesETa-Gk;7E{NX#uTt!YZ`ZV?6z=WDf>{K9aHwhDD>?LNy~E=%M|7w3qcQX z<=20)88nT9d<0}m{pb0~dFuNg7p-Ic*Rxy+xsflurjHd?AMWvsKlNw+#?(f!0x{JZ zdVgX`8U8~V$4K31Vbz%G>ANZhx)+EMXh)C2R;QfrUq8yEMro^$13?$7l26_SzgDZi zDM%4_{nx6ysqyq3PruO$v6*VHK%)8%RBg=Fzshr$f9QFVe_7JqK&sy!2-OM7rLpST zwk%xn+TAS7ehbrvoR=JD$uXf7B4Ur3^M6P44piMdblZnzax87+K?n3CfF`BP!XzpZ zSvXW}?w<@6*vdi~J z%9Nx^ZR78Nq*dNi^jE+Z1@oTw^1i96^$%3~E2!BLD&oLe_DLA(`t!C)M0<`RTYs-U zO`$%!c9Q)4+`8#74E{GzN{NXmt&k3?kK`N4eOsH!39`MOPbvAIwaj61pQnGznUDi; z@NV<+KVW0`Vw5sG{qXR2Sgs%ZD!cxF${{dY*8k0ulUDNlr_-~u z9_BTffEQBy(Rp|+DnEK~#oowu2Jf^=ztg=TgNEe=6#x!5i3$O-LaX+b9-@ zz%mr;c3V+L!98sIe*RIl{(Y|9_5bcGfvx)g>>{E6TW9ANNB#dC*Nf@@&>x{ZYW}0< cKVHY{cpb0f^~~4*4*&rF|Cme*i2$$w0P=S|0ssI2 diff --git a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml index f8174004b..60dbe4057 100644 --- a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml +++ b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-controller.yaml @@ -194,15 +194,12 @@ spec: name: socket-dir - mountPath: /etc/kubernetes/ name: azure-cred - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl mountPath: /etc/ssl/certs readOnly: true {{- end }} {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - name: ssl-pki mountPath: /etc/pki/ca-trust/extracted readOnly: true @@ -243,15 +240,12 @@ spec: hostPath: path: /etc/kubernetes/ type: DirectoryOrCreate - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl hostPath: path: /etc/ssl/certs {{- end }} {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - name: ssl-pki hostPath: path: /etc/pki/ca-trust/extracted diff --git a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml index 5b3ab945d..9f4a76f97 100644 --- a/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml +++ b/charts/v1.24.7/blob-csi-driver/templates/csi-blob-node.yaml @@ -238,15 +238,12 @@ spec: name: azure-cred - mountPath: /mnt name: blob-cache - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl mountPath: /etc/ssl/certs readOnly: true {{- end }} - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true + {{- if eq .Values.linux.distro "fedora" }} - name: ssl-pki mountPath: /etc/pki/ca-trust/extracted readOnly: true @@ -311,15 +308,12 @@ spec: - hostPath: path: {{ .Values.node.blobfuseCachePath }} name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl hostPath: path: /etc/ssl/certs {{- end }} {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - name: ssl-pki hostPath: path: /etc/pki/ca-trust/extracted diff --git a/charts/v1.24.7/blob-csi-driver/values.yaml b/charts/v1.24.7/blob-csi-driver/values.yaml index 3b4440bdd..8ae1a2339 100644 --- a/charts/v1.24.7/blob-csi-driver/values.yaml +++ b/charts/v1.24.7/blob-csi-driver/values.yaml @@ -18,7 +18,7 @@ image: pullPolicy: IfNotPresent csiResizer: repository: /oss/kubernetes-csi/csi-resizer - tag: v1.13.1 + tag: v1.13.2 pullPolicy: IfNotPresent cloud: AzurePublicCloud diff --git a/charts/v1.25.3/blob-csi-driver-1.25.3.tgz b/charts/v1.25.3/blob-csi-driver-1.25.3.tgz index 9b3aaa68598ce004e2c35e66cee288c58322f538..71bb85b9a081e4e575a54165f7f14e54cdb5ec4f 100644 GIT binary patch delta 6296 zcmV;J7-#3eF{v?-Nq=kaTk7RUdYbVMilwBQII>4_((83P8i-s;IFkemfQl8@|ND0U zkm8%7WW~H=O<^K&g=8`cdhnm`*r&})H)mq#h1?oW`Ezco{TF!xc`s~d*l-^ zPN>^Ot9A{0-sWe!(K&0J)GXj8Bc4$AdS847=#5QhXd)=X3qY5XA=1oKbFl+mlwzsc zDh2SRhkU$ZS6cp8*!F=RRsodDf4hBh+D^;=Y3KD({-5I_4qiaFhR_Ui7=uT<$T3;N zAts}o&PBtdj(>b=)0u3A5Ce~LA}CvTQIm4syz^(kToAw|A2maUQjG;(NVTHnUf%G0 z+rFVTG1px*oR6ruVZgx^HH1t~ZWvt=sVjh0Lnay5i#o+{o;5m+);5$jS%C|j-!M9Z zY8b;Vp6n9C*J-rRwj*?@1$`xGV^|O_7~Wx^vU4D&27e2?CrLQjPJ+qF7&!T|%M>%+ zA@NGvCyh=yu9|66-wJHTjX$%Ac`5JIYOh|QG0cI1YXTA!Q5O(p$e|1n2a|!|^7agn z&%r{Um*6Ti#9bi8uv~&*Fz=$J5FYO~V^lW?ZCcdiO@a9xZ<^GdlZDT~@Tg^&)D@Vx zz?u@Cp?`oG9wRF(Ae_{7v!?Ff__jUK)O6ABf7D(f18EEAtb^CLeh+KiWP}~4)i|&f zF`;Lg)OUrPV3PqB&_#mzfL@_rpNVbDG3zcCnp1|>)Nh~(2ss^d zY;!3(QBnok#t;h-x15SNr0^&=`L{;uL zscV8KA^}jd)09Hs1*i>=0XWLDYu3CtJtOr-_?ioF4Ab_x0A`qs2x4MeVxNHN%hrnD z;9j7Gq*Tr)^*qXi@5+aQBIdhjBXkIJKuhMsSZE z&j!?$zf(=R=t08n@sC`xdb`zXqsLmd(POO^6NwG8<%ovlOR1hN)qF)#-9=a`Fhf1m z*2XGs%{^>F7s(f5==rN5$!qlU!13hlZu)H4e@VF*f%r_>-9}G{CE=U-F{y7`Qh%T< z!tu-oODchgaAZ-C^D2-99=H~wF8VMThTUsOax5bzzoATYQRg4$C#U(wZwc5I%cz-D z@C-bgn3#8w`sKUV?guRSp{o^Ac=J-zb7Nx{qDMAeNS?R5=uE-VoXj=4Jc}>sa){vJ zFG;+kjMG`G^??L;8T{!3kGC>CUw?9elj+t8d*zI`7+L#?$RdBK7{|{~#F4h-Uu){{ zd`_e|2P#f#{|QLdN?CAAP#ajFeH9b~-NCwx>dI0uYC|Kbp&Z3Q^#CLFWN!(rKDZ}b z@bCf5=U|F1s*mWzT!Q7>P_G0(5Drf=<5$OG90<*2pkI5IMO}XF+Uxyb)_;__&Z;_j z`^A);dOCD%;=(6t`wqN^by8}62Yi3+f%}%&Fn{u$SWhSQp#BfN;?z9@6Y!Xct5gWSit+AxnAZ) zW8fghfUVvVur(oHATt%0*j&O57RxSbI%*YxJ!xrfi31aX9dGEWCVdjK3Xb#yZ-6<3 zbM2S4UcY{wwF1womkSqQFKY@qPep>ixO4s)3v+4F#n&CtUgjWIgMVo$>`Br;sP&TO zyV@ME@R{O;Ie*8f?}h72$)>+DBH-FJK`M^7liRfi8(8l^Xzel)SgzVMFV?gN-c2ku z8YU+VrSyUjhxX>BJK0-+B&IHD^uym1e?BMoT~xoGOpGPij(n>6zoV1>`>Tz9sn^jf zw9#Bh2h`;4A6zQc5P$#iC)6Lj`S|W9G#tIX{t5ls8;^#gcR!)QczivU4x#kw1Er*h zkT;^=HJiBpy&R2Hz&403YOXMA+GN%Y?$neb5R7(_1v7%(T1~o_HpSLP)hgvqz!k%O zfaVqYovPIUw*NrGxpL=wy}lH7=>qDdlv>L%19MImE?CIHE`MG~mo$Kji1tN^tNL@f zLKNW22!&h^bGg1%O@@8+nTVxowj0&}#jr2=FMy?n_0j>hZ~RKfe+4+6 zjRo-L==ydrX^4CAWE|V}e@B z1ftxi)ov*=mw#a1Z2_hO8v+ZT|AagnFbBDO?A8KpW(pe_h8y~r7Y`4pF$UGHvGF|7 zDEc9ru5q=X!W({vEA|(^Xb@PHYfs4=x-zE#?xs=zs6c$H!VtH5=S}*tL{#c7wpL zvgaygK(%{#Fpvdv;sUBGCrh@gBO`i*eOsW0&N5K4*!ZM(9A(Sv6);9DKz~V3&^6Kd ziTaZ`+WSIvBLW7lrT$j5)h<;?S<|AalcWY)&(iZyI|;LOM6nL-Hfs5Vt0oaLj}ceQ zQT_k8@qd53o*aPwJ6Ok|zf{CbYN`7FtE2j~zRzH&<51}rX~o8ihzuL(5VVGtuLHa2 z;Q@uRop?75l-o%yU0qXmOl!|#l6APeh+aEJr+i3U)Ap^R(G*Z-QpcmN^3Y?^^=vy2 zGhxvA&La<8OJlZ9jy>Gt2x*^(Z@#z5naBsY$$x*4&@x^ALVx;HBxd#Tu_hN74ZdtD zHq0ABz@LpcIe{d_w-#5Z^3Ai1AA$m`z>9?_CIHfWY4saa{J#oIc=x%zdG$! z>wolU|DWT!Bd*m&edX9Y;EGy2Aq;ySZ?4+4aK|%>ph#H@l}W@NZeSjCs~}2T=`P2~%VCyK=A|p;^ zqmOBW2!q;jt+cP3=^WpV)q5Ga)PZZ|VBSJ^>V;IMSnsDloz#@NEMn*QD@?60$~7WF zIcY{QDa<^LFOM{Ubc)YrL>x@HG`wMSPHc#?j97cnMPuI;#DTt!L6nX!wts;YAx`XS z?J(kKwG`20#P;Un`KtkYEHS@fpkf5gdQ$5*l1Vd-D18$p*hc5|CRCj6ALjX@$H&aG zGT7a1tp#34jal0$sA}{a4rkJnKnSx%N^=;fZmcdk^~_DR0>YLh70$)?KlJ+j@nACf zF{hyo*aBuikXpFCMTKB?4u25Isni!2?M|!3bDqP!VA#-klt$G6xRR#}Ug&$zf~xAGbV+p@+&E)Oq$p)O@NpT=O?m^gZawuk@*f~^hW3ScX28xFp| zIB7ZYhTyK!uS!cu@G4SzOKqxlQ8P$TZg6VerJ3y}mY2MZkD?srB!3I7)Mm2UoX)V4 z&Tr635n;Z2bZP1(T_6mLu!Qjp^B+)-OPg4j1PxQ<#+==DCrNOjc9fTiJv<{e5d<2}^4}LYD z!&nuuc91oc?*wdQ@B1GvC&TGr)W5kNj&AeZk{~s5qbphs^?zT1ti}>4^D*mS@MiNo zfS~V&k)=E@O6@BcI#p)@uE^<~O0&ub6hSb!+APZfl*-I1ph)Gj>JkV;?_n6}VZ|mU zH`{eL$dRj85qyaksFG$4a6GY2;41*1n}M5xEcI-LLpMtloikg7X>#42ph@bP$Ectt zwY%u{@+MRs`F~M~?PjSGsbv-;k8a)K%T~HG;+~tks;@aFw$I>p$$&4ZZRy10=#tj; z9f-8r^|Z|hDSDC-*CD?y+L-P%u05x)$ef1|xI$hrO%m+kfHJAa7yumQg1ga?+yr0ekOZ zJ%)LSRqff)}_2|Q3bgS6@rg!^G z!I~O`8LKC3DiXQGqYyX#&8fTF1YKU={5HM39$kJMj|Zd6-=?2>S08f)uZ!yKOynUS zj2=coT%g`5hw|p*+qZ-9^xc~xBI-M>CN?<_&wmy|NOxwGie>|UF{!uCg`yvAfs%Uj z1%N{3mdB=)p&z!h>W_&=YSX8o)74RZ4i;s&{$mk4ac-9^wd4pmx0@!gOsty$wys@! zougRGRnRtCOGq`myYyR4lk44)ril%~d@htBR+S7sJZ5_28muinax9Zv^{BZ`E+4krJH2Pv zCroW}uCJL+Fy6HJss=CL*lit4*76l+*njL|)QSz-R+6?@w+wx${qYp17ViS*2}rtg zZi-Nhf|pLkdy%U`{%5dO+5bqeZS`Mg=jW;X&sMwBI_7^q$7L8sBIT3onytp&&pLO# zUDFw&my@Bcn=VfVO@@e5DV}@eZek&@xf}=SMp1FON3Eedr`K-0a5z&g93w2)ynk*a zT4)lr)w&{cFxRFHAE*VJy5$==FI?!Ov*e9|w*&_mwpE?;9k}B}0kwg!ZxK+16WAl& zW>eXMUjJ6M9o(Bs>@MINQZ*Ii-=!8j=|I48`9EoQPE+#VetmX!tp9qJE6D%G;81r0 zd!&CW?l@%PcM9NMYQtB@UrYqU0)G}k=A!hKiM!AzV}uS%`k0Y49m(e*ML|MY9N<2g z4WdImlKJO1!+s)$Ri30CYiPMVwCZ67XSfpB zB|BY`xNly1CSz1f&i=Wu|3UfIn+#;3k6X!JQKs>TilLj^CO8Wv_nE}7B7aQy*fye5 zOd>9ciG!N=cuIYatS8%Smv?>R+s#f^<2h(vvYeUAlHBCr@G2ub1j_KFupg6uies;t zNMh>f-S9H0<6zgyglU_}scyC$cosokPD^EKEcys^d&*p{@~59H=4d3 zUyp7FqkewyweC_^<^N(+kbhMsM_5A|jwZLgtE=gotLry!KTe9a2-Chx;=r~>>ddvA zShGeJBAI>~j3>kE(O$?>r@s{CQ4uASZThryZQm6kF zB76Vw&ERTqJ1tHFh$GSg;=m{uPt@?;xOY34zW;eL9S?4<_nWN5A%&%kFdp>!)7~%g z|C8ar_EQ$=lMhn}x9{pmch&HD*`AJU(o8o=_cv6IRs|@{Y{LXB5au>0QIoRLq*R)J z1n)Vrt9ML{IMyJ1qklCB=>`=_3Y3&qP2iL;R~MbcN~vtmR001c6YKLo?offTb51lp zEPHQ7kY%~NE_<^2*TB9z+ebMQnP!1m+`KfE0O4V=y!ify{&@IlFrJPF@1~RM%lFFM zW+5aQ_^`;7Om>U|jG zVcxg;r$VibqWNo7*%SjVsjvC=>XoWg{OHhTg<78^BP~FL*>zlC!7p-l$Ma6nE+AAL z0Iz&KF0kVnCVw`UAk}Y{)S|QE^C2sJZFtea@fm>WljX~%lBiD(gaf~WwSm=F2aL}| zEDd6TO9T;FxvKWPg3<|BXR_=DdSUI)l;RU7TMlZKP^c;mwWlPiCWgnv+USR$0;y1)n>D)?B=8~ZLC|CXKRZ1lR zId0m5#=oH~{iHmeK9*U18)a7cnF+-iFnJt6J<;5JZMUg>#-{qZWFA{+mooD>3DG9A zrb8{?hJWtORC#Uy(a`h3SK z!%8IWT4lJq-?oLxDyjeK+?Fv9MycyoN?MUOSf#-ASep4?e-+n%u^BdvgM0*JOa15h z$?Mbf_di}A>p!38N=dbR=?#6Xu=;RMQ2ePs^Eak8Bnre-YwU|9W#o&p%(1%B(yB4l zGk@@t47eA-Tx`dW!d9o8?_WR4q`vE_j{{+ksFF|KMZeeUe<((clTb6WsKmphTvpPz-GJ0L)mWL}@#G8jXXkprz z^NItmI3`$uEB2VeU^JV_+-q1SC(@K3bbmlk0%%goEaJvxBM*lvl03+y)eOU^WySUl zaV_F5zJ~Os&agLT0jm9Lzx~<2!4!e`>Y+>$Wn8t$S=!}8BvootrP>L$KeD>-DT*v) zi;{USdU;<}=LRP({U_+#3M%5jTJ}j8n)*ApX+(RDB44jQO`$%!c9Q)4+`8#741fM# zpp;S*QCT4!R3FJVQuwwulM|+TJ)cqvzHeE;3Yt z7*&X_s_Xx!90Idt{og)0>7>tpIz4@TT>n4EwPpSPtomQoz+0PO&>ov z<5_fk4l^9J`{A!*{U0y@)(r5JNPqA){ogu2OX>g9R{Q*@|DWT^?CK=_yT}rxl0S15 zN$J9Di|e@i!C^Zn!ClX$s&+0_;_#=kZW_Enti*(rQn8I<0WPjWv2M2&bsXHow(sX3 zRqKDxwY&b`eI>9}|DU~1>Hp5z`SJY6XSrTX|3?nxQS%=)|M5Cr$Ln|iEvZbV&IFd$k((83P8i<4>oJoKMK*fsd|NT1v zNbyZkvSPbEu``WD0=o-vUs&vdGn>u~lVihTc!gN~Y6+RBt)XN8aImYO*9|*GaGup#wZ=A-HeMluI3F=O zL*+0AU0m5Eg0EF;o^3}+sD-*p(8g$ixnOXIfy&Oln1329=pHBGWIG8a$796tw_T=~ z=?<}1+B~T>i*Z#naq1;%KO7$PPDf&xkqpbR*aA;6Kzkl^z6 z3;~ZL3w&K7qR?Qn0E%I`1i{d}4VFTJ43SmR1kYD#}Yf`)`p0p%~n6VS5MKei3T z5&@T5yy8-;6SiuD`-e0b8_tkj1mRjW(4B!{fGdv+>LmJMA}DZ>fEE<6VyY&QjsUy@ zw}0=r0bMuk21%N((F!T234#&Blwq;HvLRRS5#iFeQZG{y1-Qpnc!dB%oO;YefG;T% zWx3y^#6+$L1whSCT?&Egqc&WIkfS`idc}>>Gf;1Yuem^uVcH%Sh#4ls0-Mm5*eA&J zWNXE5=uUuzq*Tr)bzRDYN90360rLph2!9=b91uzvr2@>>fFmKKNJA;~3fz^3CNa#` z0Np{ywGn8`--#w|a4%tZ_-8Izz1e6q!9yk8=%G@Hh{T53GDJi2rBqK>YQ93LZUZP4 zn4unOYh&fN<}Nf*8^{-8==rMv$!qj$&vE7KZu)H4e@VF*An}#5+l`(OOUyU(V}DZ5 zwxmE=n8TTkEU5%S!huDRoL2!XZol4BV*`G_*n2CaXcpPXhJza@gU zScc776=ff6Y(m}!>X%1`GA z94vV7OA_xW<8;<&e8T=+hW_vnkAJo@T~Bg>lj_zAdS#3^A6fH}$U=W9AIG~#;z(NZ z?=^LBKF3m=eHACQ{{%_ZN|}F4P#ZB{`zj~~xJBzWs47drsEulI4do~fs`?nID|<_5 z)!rTEf(H-Ke2z@f2Gs$bm`h}NHma6_?+b@3nen@0F%E?0%Ga+Q%c6u2iGRJ`4`xM~ z>$Iwqx1UYPsi%EnV}ia=+jG!IwCo0UV)9~0y>~3Z-2igRH`BV(;Lw3U4H)X2J{E-hi||yo$;VQ`0xhw#^d2wI)u`z z_mz?&Lf!~}S8PnYJ2@JufNdn&puU2vZsS?qzf)0)Krq?{7Mfv5Di!Ho+7wzFRjZUc zMnv?xKAKnHH>y?x(Ec6t=gOV$bh=X5r3Neq!xdr-TL}Cq zJwalE^Aq(acC_~eszwM55lj88XscYQkg}#lQzuFFx1Ocvp>`5x>yTm{+O1Wx30F-* zWG=%*%zr`k|G4pgyc!>X{@Y*2fj?EmOlqm>|Eq%Pw7Sn=sN+!S7iq=D^N0)@=n%Aq zmaPNZ;Qk&2vK@OjHIUg!EnSJJJ0`VfKFK;CG8Ud|=P5b6?VxZ~rs4NcKz%DYpNulk;T$ zSAVP7Xf==a|0%9pOsqEOD#zYIL{y>)VbFDXebuZ4JDy<#Mao*BOhWb`zIo8C{3vmr z3ts`gwa_slwP(5wEC6Y=JKKjVStB78Vl7Ag&DLZlRQe8r=os1yWg78takB+DXO>04X zrmn)~Rl&T?Mu~>+Yv&x4n|=8}gC`7G_`F~U5d#nh9Z4Dp`$X~$+8L%Z(d|zV#hMsU zz3PV=fi^* z4&UG5dM7X#$PHo+ug2$F1uu(125c5Y(W9@o%zIQn{X`(jGWA(<=5ib9Nz9-rctvu& zozz{uYk(QDx*o%1;cq=+vgj`e-GAKf-67LcX~U78ab{3+7=JANIi+=bcP>Nz)={EG zN}P&DAJGOO2DRf_YF{_iIl3LI_cAi6L&VC!yoK(>3n@*p-cNr#sR?zN$Ij7Lm{?&H zYeWDt(u^Wfn0gvr9%%r{6ratAI5OqZaKz{w+bGI1V(p?f7<)uu2X%D}qJMCFkqxX6 zacoy>hY^RXrI02gvNs>iU-j8z3HgX26(guu<66HKPnxNP>6;+NHaf32rs8z}AkP;( zJfxl#!ESGBE#N|G%*sYVm80iyIOCoK0FW&bn!^B9V|CH0rf#Yg5VS0*a4vp)-RXA6 zy~*UKjD|LX7GehSQwz7ZD1Q;m&Hy4gm3rc$*=jU+#&dKh7&LSqr4e|E7jgG$(^%zc zKo=W-xcuU*QPg7QF)l8ejjTrgwyd#`%fpMGDWPoiWsFQ4Vn=V#<`KY|P8v?MAtI~ftI`tUzlwz3Qk$x6Q1=s*Yn+<5NoE^G@{+glQGb}j9A}}G+DulP z(2u?&yHYODg#Y2^`byr;f86vi^zDz2CExLvnY zZ)2l3PI&NQ&>!0zeShUcCwvYGaVdmrAY!=`6LDcv6WX#{JKJlH4>e4|+StU@6#H0I zOT(p1TNaiS<3RF)V_kDQ*{=Ih>YHeG^=btAq0b~&9V$YiOj4Vic~(UE`c!g9)^(| zR%Bu_vt4(C9J+cX!54UeDrwe0jw{wNd^zAVGjJ1-rJhZ3=w^wcb7sphO{Tl!H%UBm z85Pu|b{pJWjei2=ksX!TZk9@sT4XV@=+-U1ZKXRU?wPr(`kF&*dkozy8RAQ7TRQPL zyrgygfJ9R5y4q$06g|p_>yTd?Y)p3&*Pc_DXU+qNQQ}im1^^~lU}$%d4c8N7QeyEo zIBCS%_HGe5FKc1(o>3`_^w^A=X;E4 zDfG2!n0pGU)wK9&0)D=^8BM06@$lcjX5&w5>j>Ng&>Su)q_7NuyVJJ|d2y!tFq}@h zAE(#D4}a6^-k08WS*+>&;hbrRDgde5K~?41O$0P=m9o#B3Qb^d@TET<4nFk;H;U~? zotvL?*3?Ltk$S?qB9Tix3UTefoRZxp=xR9nb$T@%TzwvodxNWAr(ZhPpECuo4XVvl zia{2lF``&o^;WCei>Q1YPO@GeAlZ6nHof)N~UW4CE>aH`P=to2<0sDTg0+?$0_S$!L@X8T zW(ZnCVy`naYq1WB3@DSMCexio~niePZ@l!b%Z& z-hY*A^c;h7VRpZ`^57x%Ot_h$?x5xVq4h`ND!05X8$8bpy+1`j{U62>63a%0R>lS< z9!CaZjIs+=BJ_{v4MhiY|I!0dA*s(H%X$_vcF{5iuU5^fAo2bo)g#j!Zt0O>_vD&N z&24;fvfY~M9my_cY72EeWIBC$)8_k{(|>IHv~@6PW0jx4vx~_*7&-Z-aVxMbb}}{4 z#6Et4=ks@~vqUY~IWv_hLcu}v|4QV4`fHW_j|AIR|8;hLp2+`fG+XD#{LiPj48w?} zd~#j0Rl9wsbJv>{ogsQP>Fc`b;$+Zxh&Ykrxkv6M6at#dv7c@f7MHu!>XSJgl7DF7 zaH?E5LYTjKU5mBQBx<{IjpxW*n>PAHEwrgy9?5y(LLZ$aZ}i+Hau9>Is&l?YWE?A? zHURW2j8x$SbaA_0SIWB6y^(Eucjgk31$se6XC>sHPzyckK)_=8KWUz|8j1R^w`XUq zqx?U`<>!AxOA`0ZOHXBtYRTC@7xpidZ@tMt7W%lA^c7|r4}YlWlgu{$ zStyy$B!(4c!h^OEo?;SmNkkmfyhl^&Gh{v9X1l!W8!tCIS&iqQdC78St_pIK{llw_ z;1DRomBM~Z{>hJyreb}Gqj!VLq>clLl?tTR<5OLiZ>YwX)w01gm*Ew*(LyeiQjz?} zMbQhwqTSwQzcZM=9}fpNy?;SBJ3Lw?l&Jh)XbQYabA3I%ydGY@|2)at zB24-&u>;#`i8I$SqQM$jfMoimH=gu|gT0U?PJhcqmK<5@5JPKi9b4-lgKOJ8NX?{x6_(_Ujs9k7>+Q{sCRDyJNtZhwE$xxDU8KaaYd zn_f3>Yq}U$;`F~Sut5>V>thA~)3 znA@O)O^QmB5^4S+ynm<2uHG>*;#h<5LTeC`4N8<0C@C$Qz$sy_E?TjbQqiua0{$Ws z>$5-ZP=c{DPBc9%dv8UMX1S~`d$RiXz`i@%hgl7&X1-b6yfl@f;6kyy`0;gj-2c)W zPshCv)5-AaqcXQ?2yq5JZ2CdOzsR5^8&-kkue-Llz=YRxw|{)Hi1;q)3t{Kj%ol@* zHr-cgWU$wB&P=9p*yz=$9fR1aJ&|D&^e$%ApofV%AS?O!T4G)e_0Zg7OUo@3ieR3ce z_$^u+P8QTsuZq1H$Nu}u9r++RfZsp6f>l`E7%Hh+*w_?)` zRA=pKa~GLPzSW2EvM4-OPVISkL1DSk^KB44MWIvC(lm3~$EXVzP=CAl5?dy}Ms(-&qsW>2qBrRz48_Lp8%Hrw2XPMPsbyP2)A}c#ZB0m);AUsMObwz#i+26Wy zUhC>Jmw$260_K*!ZR&9xqK#*DhgzPElCv3XG0cqY=ZCFGO9XH-YteR{KO;I3!H1WQ zQJDNFOkUDMYyuBhcl&&Xa3^Mr4Zk3cSk}58T#BF8pg-q@ojY8rm$dmplLw;PHHdsIDO zflpa_I%4S$n=d-X*(2Ba+-os)tTRjj+qKSccgJoE7nZUQ<=HW1Ka4`(u8_1mcd<;d z?BBCE^9io}`Y$$vrg4yufNZJ%JU@ARn*9F9+hhIb(_9HzkuSZbj}=xQ?(vI1^=JOZ z)PF{?0x{JZdSXc#{-z9Kq;9mZYE1R?-4g@d3B(Arqeo$@Q_lCVA7xUDwAIIfpo>+> zCvSt_s@2~Wq=<|DTh-mvc>2z!-)M!{Of^^_QGEldHsMuRZ{iGlW9FmUzxLak{TG?S7hgS;Nvw>k z61pI}e2An>ZK_l|{`N;&_dQ0D1#D3;?|CopyXsv3Or*bpzAd354yXU0H$=^?{n-0U^e*>kIn26E}>7e>ZzLDIwwV9kC)$8e$lK*|n947a9 z`uCg(IRFRmHZT7JHg+#YDZ|tE_kY#3`uDiXuKyo%2+WrCfAi#|l|29H^z7`o{(p*V z%liLG^}nitc}bf8ne=^h9$t#3kAEJV@gzDvgBgz6{qR@5{`VOGY6f^rBzT+tZ=9bc z^#5t2b$ZnQPjRL8O5*-qXbBR@pP7oJaACH^b=>{nupN}(u4hw~JC`bU_)}3g4c@?3 zY(fgD*haBH1eT##x7&(33hsW}_w$dc_3v}-uK#ym32fE>XKxewzjb#0_9&?TpW=Ep l{U17%N6mlK{KxBf9k1hcyq@^_{{a91|NoQndshIk008J!RN?>t diff --git a/charts/v1.25.3/blob-csi-driver/templates/csi-blob-controller.yaml b/charts/v1.25.3/blob-csi-driver/templates/csi-blob-controller.yaml index 151f9eb05..9b443e7ee 100644 --- a/charts/v1.25.3/blob-csi-driver/templates/csi-blob-controller.yaml +++ b/charts/v1.25.3/blob-csi-driver/templates/csi-blob-controller.yaml @@ -196,15 +196,12 @@ spec: name: azcopy-dir - mountPath: /etc/kubernetes/ name: azure-cred - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl mountPath: /etc/ssl/certs readOnly: true {{- end }} {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true - name: ssl-pki mountPath: /etc/pki/ca-trust/extracted readOnly: true @@ -247,15 +244,12 @@ spec: hostPath: path: /etc/kubernetes/ type: DirectoryOrCreate - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl hostPath: path: /etc/ssl/certs {{- end }} {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - name: ssl-pki hostPath: path: /etc/pki/ca-trust/extracted diff --git a/charts/v1.25.3/blob-csi-driver/templates/csi-blob-node.yaml b/charts/v1.25.3/blob-csi-driver/templates/csi-blob-node.yaml index 7c53b4714..7e21de76a 100644 --- a/charts/v1.25.3/blob-csi-driver/templates/csi-blob-node.yaml +++ b/charts/v1.25.3/blob-csi-driver/templates/csi-blob-node.yaml @@ -238,15 +238,12 @@ spec: name: azure-cred - mountPath: /mnt name: blob-cache - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl mountPath: /etc/ssl/certs readOnly: true {{- end }} - {{- if and (eq .Values.cloud "AzureStackCloud") (ne .Values.linux.distro "fedora") }} - - name: ssl - mountPath: /etc/ssl/certs - readOnly: true + {{- if eq .Values.linux.distro "fedora" }} - name: ssl-pki mountPath: /etc/pki/ca-trust/extracted readOnly: true @@ -311,15 +308,12 @@ spec: - hostPath: path: {{ .Values.node.blobfuseCachePath }} name: blob-cache - {{- if eq .Values.cloud "AzureStackCloud" }} + {{- if or (eq .Values.cloud "AzureStackCloud") (eq .Values.linux.distro "fedora") }} - name: ssl hostPath: path: /etc/ssl/certs {{- end }} {{- if eq .Values.linux.distro "fedora" }} - - name: ssl - hostPath: - path: /etc/ssl/certs - name: ssl-pki hostPath: path: /etc/pki/ca-trust/extracted diff --git a/charts/v1.25.3/blob-csi-driver/values.yaml b/charts/v1.25.3/blob-csi-driver/values.yaml index 048d7c062..3f7033b40 100644 --- a/charts/v1.25.3/blob-csi-driver/values.yaml +++ b/charts/v1.25.3/blob-csi-driver/values.yaml @@ -18,7 +18,7 @@ image: pullPolicy: IfNotPresent csiResizer: repository: /oss/kubernetes-csi/csi-resizer - tag: v1.13.1 + tag: v1.13.2 pullPolicy: IfNotPresent cloud: AzurePublicCloud diff --git a/deploy/v1.24.7/csi-blob-controller.yaml b/deploy/v1.24.7/csi-blob-controller.yaml index c8f35db53..ec2b02f00 100644 --- a/deploy/v1.24.7/csi-blob-controller.yaml +++ b/deploy/v1.24.7/csi-blob-controller.yaml @@ -136,7 +136,7 @@ spec: drop: - ALL - name: csi-resizer - image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.13.1 + image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.13.2 args: - "-csi-address=$(ADDRESS)" - "-v=2" diff --git a/deploy/v1.25.3/csi-blob-controller.yaml b/deploy/v1.25.3/csi-blob-controller.yaml index b5b60801d..28a34bbfc 100644 --- a/deploy/v1.25.3/csi-blob-controller.yaml +++ b/deploy/v1.25.3/csi-blob-controller.yaml @@ -138,7 +138,7 @@ spec: drop: - ALL - name: csi-resizer - image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.13.1 + image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.13.2 args: - "-csi-address=$(ADDRESS)" - "-v=2"