From 2c05016fe5b77840e50ff98acd6e58e97b32d449 Mon Sep 17 00:00:00 2001 From: Shane Siebken Date: Thu, 3 Jan 2019 13:01:46 -0500 Subject: [PATCH] initial chart commit --- charts/aws-ebs-csi-driver/.helmignore | 22 +++ charts/aws-ebs-csi-driver/Chart.yaml | 5 + .../aws-ebs-csi-driver/templates/_helpers.tpl | 32 +++ .../templates/attacher.yaml | 166 ++++++++++++++++ charts/aws-ebs-csi-driver/templates/node.yaml | 185 ++++++++++++++++++ .../templates/provisioner.yaml | 184 +++++++++++++++++ .../aws-ebs-csi-driver/templates/secret.yaml | 7 + charts/aws-ebs-csi-driver/values.yaml | 95 +++++++++ 8 files changed, 696 insertions(+) create mode 100644 charts/aws-ebs-csi-driver/.helmignore create mode 100644 charts/aws-ebs-csi-driver/Chart.yaml create mode 100644 charts/aws-ebs-csi-driver/templates/_helpers.tpl create mode 100644 charts/aws-ebs-csi-driver/templates/attacher.yaml create mode 100644 charts/aws-ebs-csi-driver/templates/node.yaml create mode 100644 charts/aws-ebs-csi-driver/templates/provisioner.yaml create mode 100644 charts/aws-ebs-csi-driver/templates/secret.yaml create mode 100644 charts/aws-ebs-csi-driver/values.yaml diff --git a/charts/aws-ebs-csi-driver/.helmignore b/charts/aws-ebs-csi-driver/.helmignore new file mode 100644 index 0000000000..50af031725 --- /dev/null +++ b/charts/aws-ebs-csi-driver/.helmignore @@ -0,0 +1,22 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/charts/aws-ebs-csi-driver/Chart.yaml b/charts/aws-ebs-csi-driver/Chart.yaml new file mode 100644 index 0000000000..31661eb555 --- /dev/null +++ b/charts/aws-ebs-csi-driver/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +appVersion: "1.0" +description: A Helm chart for the AWS EBS CSI Driver (https://github.com/kubernetes-sigs/aws-ebs-csi-driver) +name: aws-ebs-csi-driver +version: 0.1.0 diff --git a/charts/aws-ebs-csi-driver/templates/_helpers.tpl b/charts/aws-ebs-csi-driver/templates/_helpers.tpl new file mode 100644 index 0000000000..48901c50ed --- /dev/null +++ b/charts/aws-ebs-csi-driver/templates/_helpers.tpl @@ -0,0 +1,32 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "chart.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "chart.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "chart.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} diff --git a/charts/aws-ebs-csi-driver/templates/attacher.yaml b/charts/aws-ebs-csi-driver/templates/attacher.yaml new file mode 100644 index 0000000000..b7f0dee7f0 --- /dev/null +++ b/charts/aws-ebs-csi-driver/templates/attacher.yaml @@ -0,0 +1,166 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "chart.fullname" . }}-attacher-sa + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: attacher +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "chart.fullname" . }}-external-attacher-runner + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: attacher +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list"] + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["storage.k8s.io"] + resources: ["volumeattachments"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["csi.storage.k8s.io"] + resources: ["csinodeinfos"] + verbs: ["get", "list", "watch"] + +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "chart.fullname" . }}-attacher-role + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: attacher +subjects: + - kind: ServiceAccount + name: {{ include "chart.fullname" . }}-attacher-sa + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ include "chart.fullname" . }}-external-attacher-runner + apiGroup: rbac.authorization.k8s.io + +--- + +kind: Service +apiVersion: v1 +metadata: + name: {{ include "chart.fullname" . }}-attacher + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: attacher +spec: + selector: + app.kubernetes.io/name: {{ include "chart.name" . }} + clusterIP: None +--- + +kind: StatefulSet +apiVersion: apps/v1beta1 +metadata: + name: {{ include "chart.fullname" . }}-attacher + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: attacher +spec: + serviceName: {{ include "chart.fullname" . }}-attacher + replicas: 1 + template: + metadata: + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: attacher + spec: + serviceAccount: {{ include "chart.fullname" . }}-attacher-sa + containers: + - name: csi-attacher + securityContext: + privileged: true + capabilities: + add: ["SYS_ADMIN"] + allowPrivilegeEscalation: true + image: "{{ .Values.attacher.image.repository }}:{{ .Values.attacher.image.tag }}" + imagePullPolicy: {{ .Values.attacher.image.pullPolicy }} + args: + - --v=5 + - --csi-address=$(ADDRESS) + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + resources: + {{- toYaml .Values.attacher.resources | nindent 12 }} + - name: ebs-plugin + securityContext: + privileged: true + capabilities: + add: ["SYS_ADMIN"] + allowPrivilegeEscalation: true + imagePullPolicy: {{ .Values.plugin.image.pullPolicy }} + image: "{{ .Values.plugin.image.repository }}:{{ .Values.plugin.image.tag }}" + args : + - --endpoint=$(CSI_ENDPOINT) + - --logtostderr + - --v=5 + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock + - name: AWS_ACCESS_KEY_ID + valueFrom: + secretKeyRef: + name: {{ include "chart.fullname" . }}-aws-secret + key: access_key_id + - name: AWS_SECRET_ACCESS_KEY + valueFrom: + secretKeyRef: + name: {{ include "chart.fullname" . }}-aws-secret + key: secret_access_key + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + resources: + {{- toYaml .Values.plugin.resources | nindent 12 }} + volumes: + - name: socket-dir + emptyDir: {} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} \ No newline at end of file diff --git a/charts/aws-ebs-csi-driver/templates/node.yaml b/charts/aws-ebs-csi-driver/templates/node.yaml new file mode 100644 index 0000000000..f3d9bb5e39 --- /dev/null +++ b/charts/aws-ebs-csi-driver/templates/node.yaml @@ -0,0 +1,185 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "chart.fullname" . }}-node-sa + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: node + +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "chart.fullname" . }}-node + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: node +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "update"] + - apiGroups: [""] + resources: ["namespaces"] + verbs: ["get", "list"] + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["volumeattachments"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["csi.storage.k8s.io"] + resources: ["csinodeinfos"] + verbs: ["get", "list", "watch", "update"] + +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "chart.fullname" . }}-node-role + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: node +subjects: + - kind: ServiceAccount + name: {{ include "chart.fullname" . }}-node-sa + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ include "chart.fullname" . }}-node + apiGroup: rbac.authorization.k8s.io + +--- + +kind: DaemonSet +apiVersion: apps/v1beta2 +metadata: + name: {{ include "chart.fullname" . }}-node + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: node +spec: + selector: + matchLabels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: node + template: + metadata: + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: node + spec: + serviceAccount: {{ include "chart.fullname" . }}-node-sa + hostNetwork: true + containers: + - name: csi-driver-registrar + securityContext: + privileged: true + imagePullPolicy: {{ .Values.node.image.pullPolicy }} + image: "{{ .Values.node.image.repository }}:{{ .Values.node.image.tag }}" + args: + - --v=5 + - --csi-address=$(ADDRESS) + - --mode=node-register + - --driver-requires-attachment=true + - --pod-info-mount-version="v1" + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + volumeMounts: + - name: plugin-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + resources: + {{- toYaml .Values.node.resources | nindent 12 }} + - name: ebs-plugin + securityContext: + privileged: true + imagePullPolicy: {{ .Values.plugin.image.pullPolicy }} + image: "{{ .Values.plugin.image.repository }}:{{ .Values.plugin.image.tag }}" + args: + - --endpoint=$(CSI_ENDPOINT) + - --logtostderr + - --v=5 + env: + - name: CSI_ENDPOINT + value: unix:/csi/csi.sock + - name: AWS_ACCESS_KEY_ID + valueFrom: + secretKeyRef: + name: {{ include "chart.fullname" . }}-aws-secret + key: access_key_id + - name: AWS_SECRET_ACCESS_KEY + valueFrom: + secretKeyRef: + name: {{ include "chart.fullname" . }}-aws-secret + key: secret_access_key + volumeMounts: + - name: kubelet-dir + mountPath: /var/lib/kubelet + mountPropagation: "Bidirectional" + - name: plugin-dir + mountPath: /csi + - name: device-dir + mountPath: /dev + resources: + {{- toYaml .Values.plugin.resources | nindent 12 }} + volumes: + - name: kubelet-dir + hostPath: + path: /var/lib/kubelet + type: Directory + - name: plugin-dir + hostPath: + path: /var/lib/kubelet/plugins/ebs.csi.aws.com/ + type: DirectoryOrCreate + - name: registration-dir + hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: Directory + - name: device-dir + hostPath: + path: /dev + type: Directory + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} diff --git a/charts/aws-ebs-csi-driver/templates/provisioner.yaml b/charts/aws-ebs-csi-driver/templates/provisioner.yaml new file mode 100644 index 0000000000..2dc2d9640b --- /dev/null +++ b/charts/aws-ebs-csi-driver/templates/provisioner.yaml @@ -0,0 +1,184 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "chart.fullname" . }}-provisioner-sa + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: provisioner + +--- + +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "chart.fullname" . }}-external-provisioner-runner + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: provisioner +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: [""] + resources: ["endpoints"] + verbs: ["list", "watch", "create", "update", "get"] + - apiGroups: ["snapshot.storage.k8s.io"] + resources: ["volumesnapshots"] + verbs: ["get", "list"] + - apiGroups: ["snapshot.storage.k8s.io"] + resources: ["volumesnapshotcontents"] + verbs: ["get", "list"] + - apiGroups: ["csi.storage.k8s.io"] + resources: ["csinodeinfos"] + verbs: ["get", "list", "watch"] + +--- + +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "chart.fullname" . }}-provisioner-role + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: provisioner +subjects: + - kind: ServiceAccount + name: {{ include "chart.fullname" . }}-provisioner-sa + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: {{ include "chart.fullname" . }}-external-provisioner-runner + apiGroup: rbac.authorization.k8s.io + +--- + +kind: Service +apiVersion: v1 +metadata: + name: {{ include "chart.fullname" . }}-provisioner + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: provisioner +spec: + selector: + app.kubernetes.io/name: {{ include "chart.name" . }} + clusterIP: None +--- + +kind: StatefulSet +apiVersion: apps/v1beta1 +metadata: + name: {{ include "chart.fullname" . }}-provisioner + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: provisioner +spec: + serviceName: {{ include "chart.fullname" . }}-provisioner + replicas: 1 + template: + metadata: + labels: + app.kubernetes.io/name: {{ include "chart.name" . }} + helm.sh/chart: {{ include "chart.chart" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/component: provisioner + spec: + serviceAccount: {{ include "chart.fullname" . }}-provisioner-sa + containers: + - name: csi-provisioner + securityContext: + privileged: true + capabilities: + add: ["SYS_ADMIN"] + allowPrivilegeEscalation: true + image: "{{ .Values.provisioner.image.repository }}:{{ .Values.provisioner.image.tag }}" + imagePullPolicy: {{ .Values.provisioner.image.pullPolicy }} + args: + - --provisioner=ebs.csi.aws.com + - --csi-address=$(ADDRESS) + - --v=5 + - --feature-gates=Topology=true + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + resources: + {{- toYaml .Values.provisioner.resources | nindent 12 }} + - name: ebs-plugin + securityContext: + privileged: true + capabilities: + add: ["SYS_ADMIN"] + allowPrivilegeEscalation: true + imagePullPolicy: {{ .Values.plugin.image.pullPolicy }} + image: "{{ .Values.plugin.image.repository }}:{{ .Values.plugin.image.tag }}" + args : + - --endpoint=$(CSI_ENDPOINT) + - --logtostderr + - --v=5 + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock + - name: AWS_ACCESS_KEY_ID + valueFrom: + secretKeyRef: + name: {{ include "chart.fullname" . }}-aws-secret + key: access_key_id + - name: AWS_SECRET_ACCESS_KEY + valueFrom: + secretKeyRef: + name: {{ include "chart.fullname" . }}-aws-secret + key: secret_access_key + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + resources: + {{- toYaml .Values.plugin.resources | nindent 12 }} + volumes: + - name: socket-dir + emptyDir: {} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} \ No newline at end of file diff --git a/charts/aws-ebs-csi-driver/templates/secret.yaml b/charts/aws-ebs-csi-driver/templates/secret.yaml new file mode 100644 index 0000000000..179e0fa156 --- /dev/null +++ b/charts/aws-ebs-csi-driver/templates/secret.yaml @@ -0,0 +1,7 @@ +apiVersion: v1 +kind: Secret +metadata: + name: {{ include "chart.fullname" . }}-aws-secret +stringData: + access_key_id: {{ .Values.awsAccessKeyID}} + secret_access_key: {{ .Values.awsSecretAccessKey }} diff --git a/charts/aws-ebs-csi-driver/values.yaml b/charts/aws-ebs-csi-driver/values.yaml new file mode 100644 index 0000000000..d8461f9165 --- /dev/null +++ b/charts/aws-ebs-csi-driver/values.yaml @@ -0,0 +1,95 @@ +nameOverride: "" +fullnameOverride: "" + +nodeSelector: {} + +tolerations: [] + +# NOTE: DO NOT PUT THESE KEYS IN A SHARED VALUES FILE +## Best practices suggest a secondary values file, +## out of source control, for secret values, included on +## the command line explicitly. +awsAccessKeyID: access-key-id +awsSecretAccessKey: secret-access-id + +affinity: {} + # nodeAffinity: + # requiredDuringSchedulingIgnoredDuringExecution: + # nodeSelectorTerms: + # - matchExpressions: + # - key: key + # operator: In + # values: + # - value + +node: + image: + repository: quay.io/k8scsi/driver-registrar + tag: v1.0-canary + pullPolicy: IfNotPresent + + resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +attacher: + image: + repository: quay.io/k8scsi/csi-attacher + tag: v1.0-canary + pullPolicy: Always + + resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +provisioner: + image: + repository: quay.io/k8scsi/csi-provisioner + tag: v1.0-canary + pullPolicy: Always + + resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +plugin: + image: + repository: amazon/aws-ebs-csi-driver + tag: latest + pullPolicy: Always + + resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi \ No newline at end of file