From 9c12a5fabaeddc0147894eec01642b950e5e0843 Mon Sep 17 00:00:00 2001 From: Harrison Affel Date: Thu, 18 Apr 2024 13:20:34 -0400 Subject: [PATCH] make remove rancher-vsphere-csi-104.0.0+up3.1.2-rancher3 --- ...r-vsphere-csi-104.0.0+up3.1.2-rancher3.tgz | Bin 10473 -> 0 bytes .../104.0.0+up3.1.2-rancher3/Chart.yaml | 24 -- .../104.0.0+up3.1.2-rancher3/README.md | 84 ----- .../104.0.0+up3.1.2-rancher3/app-readme.md | 14 - .../104.0.0+up3.1.2-rancher3/questions.yaml | 162 -------- .../templates/_helpers.tpl | 48 --- .../templates/configmap.yaml | 23 -- .../templates/controller/deployment.yaml | 254 ------------- .../templates/controller/role-binding.yaml | 14 - .../templates/controller/role.yaml | 61 --- .../templates/controller/service-account.yaml | 7 - .../templates/controller/service.yaml | 20 - .../templates/csi-driver.yaml | 8 - .../templates/node/daemonset.yaml | 186 ---------- .../templates/node/role-binding.yaml | 32 -- .../templates/node/role.yaml | 29 -- .../templates/node/service-account.yaml | 7 - .../templates/node/windows-daemonset.yaml | 167 --------- .../templates/secret.yaml | 9 - .../templates/storageclass.yaml | 17 - .../104.0.0+up3.1.2-rancher3/values.yaml | 349 ------------------ index.yaml | 28 -- 22 files changed, 1543 deletions(-) delete mode 100644 assets/rancher-vsphere-csi/rancher-vsphere-csi-104.0.0+up3.1.2-rancher3.tgz delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/Chart.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/README.md delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/app-readme.md delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/questions.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/_helpers.tpl delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/configmap.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/deployment.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role-binding.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service-account.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/csi-driver.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/daemonset.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role-binding.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/service-account.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/windows-daemonset.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/secret.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/storageclass.yaml delete mode 100644 charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/values.yaml diff --git a/assets/rancher-vsphere-csi/rancher-vsphere-csi-104.0.0+up3.1.2-rancher3.tgz b/assets/rancher-vsphere-csi/rancher-vsphere-csi-104.0.0+up3.1.2-rancher3.tgz deleted file mode 100644 index 4307c444220bda083f2583879d973224d0afef30..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 10473 zcmVGZriwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKD1avL|&=>FzYpy>U|_O}{dBucVbk?SZF?eIjFw4$u+R-BT- z8IZ(k2uuJBWhU`?_EWeGF*jaxp_GmA!xm?N?na}#0W`WX3=)5gm^bCo7%}Ae9M?Nz z$V6=hC*j}jr8F9i#$KzX{%B1APz>po%v4>1bbz{pBrwE*)dgfox8 z32K9BUr7__^m~Q1uj2vorigJ&NgKR;cL18T?MAKPHNbcB&$sf=mxWCw0vvdmhH?J9hk}SwM61*PL5#@Das zA90jn{9|kC!;~WXKZRk8`29@)i|zkTqt)EY+W(#Av;E&lnRbx07Si^QDHm-}tyTbt zC=+eaYVA}2z=R_|X6StgM{Q7T%J+U4bAebdF!ci{psxUN^CaeoX?4{AA?MPJn4dl+ zLpzMNt`BMvEh>Dg)BOeGSOkh&s;k_#=V z93Kh+CCIkv<3em)3csGt6$)q?o3;huQ@vahI@4`SfQNXB2;%&V(E(Z;zHJ@J)+HDW zGy5~*uh@eXMuRJ8 zL&`uz0{}V4BQin6)Hz4P`2ujh8d3{)>hroZHr^=40jd)kAdjOE`ErR_SMB9;j0UK$ zo>JBZze^kO0(>Gqok%QTfI@l$1P!H$#*_d&1Tz`~f=~b;0dO>8h;uweias>OzOF`q z4>ToROp_gWXTHb`13yp>sw2h`0^n2)EV=@Xbzovu#NOcW9 z!YIOIR74QrlM(C3JVGSsFa!lEWtu4Oy?u4Y&=4_11cu=e6i}M1LP96->)Dk19A7{- zLV}+mb~!1k7l#60>KVPmap3?czDU+ei`RZ^$jE2~soy@mU zfz`E7=f~<%MQ=5X>rRBG)7mL!pc?kibb}Y*5QIi@`)D#nOm3qjQ!x>M3x>&vtIZB3 zC;)?5kwfJplslRUCIPQ=1>`k=Bmj=*0MIF73-D5rhna5=TL zwtyI84wQEa+~6<-zMMg%ymN%)%r3?V_%V}a$JHpay?V(lNHBrIA0u9Q0U(*le#(|S z+gG0K?EvJGDh?=7RVOggG@lZQ8}^WQ6$Z zEz=L(-r|N)6k-%e?o$>ZrZJvSAx*bjp_~%HVnTF>$0(ctVfNNr;0O6L=7=lMUuqo~ z!2u4jz=+ol&w9pR`9<>kW()wW*`ZO1!2YV9_U4&UtTzdfpr#Uy;; zxHD}BJfBV?DDWUeo)j(5aikd9td)zxc!Y`9tYkG%O{w70vSi5Uk~-u5OKllQ%GBGc0M zh!TH~#@8}iPC$3Iz%6Zo_nxE$Zfx2DZ*SHD?>~Y(zI_4)I5)1FF~F_IGQiEpH^7Z2 zVSpb`;2*&LZrAqjVt@aiw7WY`(C*4%+Nj+vSQf~84`Kj!?`!~@PtpMH)>_X7@SeqR?+F;d+_-MW05+e(3NYRG$1{MB zC3z2G09$u9fQ=_<09%`00dDy4XXg>bu=NBCU~XJDV*ndZ!2q_N#0v1SB=51aF*aX{ z@_%g52d`g^Q5Ye{Ya+TsD$tVr&+XmjZYKX{zt!4(&i~m&`Tchf=vXgM)lp+tCcNp& zsOYQ;yl>wsvLYUqq_`Buni_V1^;Q5-$Wij6I;RJbAoq90?GcQkaCVuA zbD6jQdlI7t+6N%OzDQoFK&p8K`98@($-r~jqr4OV-&<8QsJ&*OgVBPR{pnc=(FRj zUh4V90j>wy1m0KOykNPUR4i+ow(@}uudklazQHda&x7%+-CtuER?EfBA%mN6VNF9i z>Nv?XF5t0_%{F0>D*sExRT{y79K>8lWvY-jRZGPO*YZqJZ%^O^RSPuH`yXBfHJ#}% z>)5}o2>v0b))4v#RR2*0)vGG_0|*uqAMEX@Kk=j=4~O_GsCs#Y)O|TNfy-kkoJc$v z1SkNM=%7i4bn0%wn5xzqHjJW7(nON4`}^;f^ur`++D!?|H=RHNM=0C!_+cERxmp96Za=m$zeQO*|LX+H35@QP47_aq-)rq>=l}h^ z#`FBYiSh#UmHxGFnKz%gxFCQ6$`yK5R+-o=p=#UB;dJwdY9@p}oqeiW!&r1>}Pdwe&N!KcA8%;eyy+J-{%bVyB{xrbF8D3?4 zQdwRe*J)m!uhtTUvR0Z8R;C7Kw7tm5{PL1?lngf(r-_xIn82@Iq;kbPp_9eDNKQY7+H6}qDbkw}~5k{2>63`kwo#2B_!lY*sCOt0X zTqW(=s4PGFju8*SX>$ccRn9&%-|bpAK~)p~%Ukj^HEtba4q;`x8OxxbgW|7m-B zXLtX3{@+BA%U3(zrTgWY-oz-;KT6~vHTT0P;`M2>Kp)&i!(5(LlzU*ZAGOy{ZL;k` z-0lx*;157B2@nyWCEM@_sdQnvfx$lHZLp(K>KGJAr<4L9W)W(Ga~g)2j6SKHEcKkZ zPpqqP0>6GDa0+oK%|RP9=g<2w8=*F6NCY-Pw4&b$e|+rF4kU{faKjFQY3{I5xj<8p zmccT;R3MT(Bjhn!npfb$=_ zIz!sBQ_FIuo^v~bC*?M?WjA9Ug^-|3OV>fuBe|F9BSRNqRj?RU^YrQoadn!rzMTd1 zolvnJiDuDTy$#p5?~U!=U!CuT`dDgmT=!*_C{>lh->R+>e&UQsLV%nUM%3rHXi_K`N;5`haTq4c!Nc$d&Q=pn*}v||(b;M5 z-920orC(ZsR0{QkImb=*C<>ip2{ z{8$1qzs1b}>z?-xkFPFIkFO3poo>H>b;x*L+Hb#Z(@je)!NmzdG(-c8^P7o}Hf_ed=8FPEV@9-do4p;7B$( zJ^R=_x!3~pI)zwzC!OO@{fqATRp+?ZJ-N90=UIt4sumdc5*XiqI`5aTu^dWDor)U2 zXLOSH6sTLi&e1Uc#=O(k&^mK#i3Z=oq9#LFXje1$W^16Cnhe3v25YbY+e&Um8EgI%t*UN1^S?n~y_1XX`Q_p9)yLk+r;BdcY`9Z0jXf_2o)-jnUl6!{hvJ;2hwwW%IaX`?9o)80 z#5cPE&zGrT814LGj(oaTL366GvG+XQGsbT zCVeC=`hkt1Iw;x-RXvXjhJ7)Q$6CIhe6o%V7hnP_=gKJ5L+*S5$9tgJFcxFV@NYV9`}&Pe!&p7y%L>o!V!C1#0IS+~Koi|h1qxL_ ze(uY=4_Apflag-c@EmuR^^xg1Fv1@gjiUvudm_mqYw7v)S5y z*8feEyoBGs;v1z{U+Y;MBBSzFqj($qT&?QwgxTCN^-N_3R<}SkqJjE9$z9^6`V_H& zsyaeKRtPay|KC92k5!!&&_t3oTp%L!RPKimPgcXQ1*-b?|GVL;%RO_PLmAzr7b|x_ zrxZ9{*#gx7g-HLk77b{Mh`1BtQglA0EWpGS*dhv)?JuJs!E8yHcXLjGp{jrcbML?c z?52hvLe911n#`12%jPPiC{e_ zc1na&_8j_K2>b$La4$q!am>-0wflu!$_Qs6USnpB>jCG7Ww{l4>{Z+Sm6g~3CN0A= z0k!LF1(xmqx3l@*+dJEP&-?$4l)|laCaL=g^pxD6U=4uY(Vm-R*W^e$qCt-g=_yf1efDFlkInU`Qx@yL z+$Yroh$fV9wEo2prYzR~=I-`R_WZB0-`siD|4o$j?|)Fz&_}nq{y~b<1}=VB|0V`Q znBMUB3vP<2rml+6(F!Zy6>-O_9Sm{0Jlv%YCp170aGgUwQBNV-^t}uVkpAUvWcYJu z+N+V=c#eHJ*5~Z{=j{58W!Epe9LJd}#*~W_ByK3XP6c?n3Hs*T|2<}0{Dj5$2i<0s zg#Bfgx!*NLR4JT}@GQ86eqo5{lBR1!i0H!nh546A^r5ko`#^$dzJ`1Y+ng{&UpLEZGTu0JfVoCXCO zwRM9qO_06*SpDh=7jEMe;}?T)t2)&dBn6?b^EHkwKAlV;39^qpMdAvdKaf=y$;~~m z+#;FK038%#%6%cBFk>m7RaClWy;ozfqT)a2=stLk?#by6Q~* zA?|z35B_-gudB<`<4+&E{j0O?`PE5zrtt3DDtG}t!moG|PXLK01H=Fw+SqS>)A`(s z3w%gG6c0ko$ND0Bq^8Xp=nXYYfH@#k0FDHp4E%-|1wSTh2oNA22MCPm4VXYOOYlgz z17txv_rcFmyXXqLy)-RaHeH$!ect`&)#c%F@8~d>)H8=vc#X&dcJ2@;5yf}zxz&%xQF@SZKLAmX=$)@2{ zn+K`K3Ov_|GyoGWm0XN5pD(!OHY*1yVl;vyD5Sze|Jv%fT{cQfr?g-xC-{-F8`OEX zu(J7~f>COePr zu}{YS8fAs^-#cV}>aryMquFZgWaGbf8qe_`8!7rw_W=?=mA7l2^7&wAzPC*bO*~Y$ zN(n8^1x?NZR?Gsec%E0OJaiVWqRM=>&vW(p&&2a(X}Gyg{;3jiAE~Tp{~z-EZ_S-A>6o0$6 z`tATUYun9rP9qBP`mzabHg_x=08!fXm-I!kD`$cijP-w0-qwAU73}{VGQV_Lp8wU% z-v83reqR4?q})CK>w$whADcn{_#M6&cn?wF4vD(tqQO%&+%W7^WOdR$|6TethTBHp zI?Y!Pq%8@f-TSkI(LM*#{&xn_K1abmS`_R91bHyNiQ&Yv^nKvzUuRc%>xVWef_@JqPnX@r&j+6+@fZxaTX}bCB(t_HB(& z+s0of(l(=Bw~n)Ysp4#lIsYe&v(+RYpMF?`=&1Ysrw^sV``;0!dp}d{%T8NrXR&y! z8VoCe$k|IyUS_^2257z=@O5TCE19!K4%E+|Yo8+=q0h@&<)II8i1gI6E{5`!c`O0u z*XzPBYLkbYPyoYd4A;X@-u5~E^*R3aFCPC|V5vT5LtH-E#N?XB`}Qpx z8(`xHWW|CLz12Tqw8{aWg`NFoooXVYa4|0ZT+S}Wi*c5Ok< z6r`{y6X0kdfP_#nKf+DPVESAT^W^Jy>UB91%#X}Th=a-bxMAt_k}6&KQY{p_Un58~ z2g=YC)mE4wgA*jo5#l1AOP0w8=+pTz(3a7CRE|2;&}C=(JZlkd^F#ZwPZG;)9!Ki& z;<3y_D5K=BW@n#jDYF0P-NU1g-P$C$Cmc)c|Nc%R8~@*GHJ;=DH&R}JXxAoqAyj92?dNURn)L}Jc!;>*_33u4S!*PX z_G^u}S$_>M2QUe@QL_dJ5XU2;18ejg2Ie2UvgXWqoWKMUI6@Qoh7zY^r_3KC<#?iu zgIAqX{u=Pu9|OppgQFU_7^4h&H3{$pkKSK%Nem_ejnqn7MMWiESNt0azzt>BA%y`4 zEG7h#k)+4P^oh%doqlgCfvsk+05QIm(02Jz&RtvT@o1^B!U9Vp){biz{ug(ebZ230o*MRa|vB?B<4t+)=8Lxf@B4- zW$usO((cJE#k3)16DU-Ddmf0sMwHKw0VNo7KYFEdk$RwbZ1n|m@TGWx@ugO&ym$f5 z7*e-_ax4(9RJ^3+UTq(I+WAMtb2~O|*0vk+*=a01I`pL0%=I{=aRAPYWTX`HtoOR& zfkU%hll+>|m=&;We!dFj@Fk$tNXT7O%#5s)0Qd|AhzJZruKLo`!>j``Di`WrlQCq% z-g_z))=+>~rNAUJ|zVC!k)_7jUf0pjguLe+Oa zK_)f*ySl9Mt_^+~BccFObz&-ekx=O1!Q9xjU`zMK;Q?d_NST(Zf;F(iGbQXcVF?9V zA=KgcO!7r{)u^VhGk}EWt^dZDyCGYC^qXNLsA3{2S;V%_nIpN^|9DwR~ z^Plgk6`%%MJ(qt-64cWOa(+XZZef4uHAA#A z#4yy_2CCnUDHrcl4wht>uO4&NI`F;byDcF9-+s3RYPDKb^11R+&MBB^n=5%BXXAb^ zu{~+c|5-kpFEa8giJDwt*d3~g+tL$-oa*Z-6&;I7_(F^E)%6>GrM;f7Ygu94UL>q? zapQ}yQaMLaD9x?`@ZVK$7N=TJh}H8sJk?gL9V; zN)ay1SN|&&HQ{N!RQ8zym{dn(iWwzpX|8+!8lu~~W+4T+^oQ(@Kv&ay3oGb*5NNMjOY2Tu-{duuBqb-jr9 z3`Q^6m3U^m<(-A`$it+*Eq6o{T{*FVkvBp@s6iHx2^7>neCi!}&AsjJ{_dM?Z-0B| zd#`oac<&v)-P!kc4m;g9+ug(WM>|bz3r8^yP>2cQ9wdP`KwNkcgT7FA{S2vVN@F;)E0oje`0Rd)yftooYRXk$c-(O>jgUpTPV_8m_asI27dYS<*|3s zf8J8$|AA5DF$9ANx*s3V693P3v$>n`|LnGQ_n!SfnCxn zfLG^es6*Vp=tF@ofHLsq2nmSgz#k#*GpwV#zr21v$ocb?qWNEat6k~r9Rq(%S(5+1 zv(w0Y|E;;#*m*wx*+@yoTHhu#g$(PI^@Wi@YLBZ@*4yBNbx^wAnvQB^JqKz>JU12d zHjXPeZK7a-?^nLv-D2r_kxd5F1?NFyl5YE_|ps|G|3bZaB! zI%%rZN$oz_wtp)ZN~Y6CvUw*%!K&0-uTd80r|k1om+V`;KDZ_0tWzqB`YiiAh1$Md zfI0!ZigG8NG}ue^86+8lDSA%w2O_so>Ywtb4UUdFt{MAOuS{G;H5^}E1*O_m7g{{~ zNtFyEeU1}nnT?lndDzwa71{5(Q!U3iQ)}*Hb21(0K}u?wib;BTXtxYfdnA@uhYQ?s z|4<&gr6x^(BiG@czB?epygVlkV=?ZGk$=5_6RBJCfG=xvxpLL_HmHj+FqzVDsvL4Q zriniY$&`ecARDeF5D69#eyS=1T^s1?r6Y-w;4eA^XO|t5unLvrs$I)q1|T@2fwaA9 zkD||#AUL4`S~!Z^4>^j0;n4`O4#)4~Fyu4hFOh0l4fJQk&-3C(gdz?)Cw&k{#<-iE zvb*;&+jeuDkn*{{vYX(uOTMMpxTR8E^mdL@K*_^!0m_d5Ge&HthkF4J4rNuK>KfU| zGom+ zC4Di9Z7S!xqJop01I2V%gvX7lEF2 zvkK~jznAo?U`xAr$C~LgSYZ>J%LT}8f>Ip@C+VG-;Z@Z=O5lEVX>teh zywCB!kMtanrW$H(2{PdGW1Sy|WkeUH9AxQN)7O0Inypnd)iJ3ucD6Iq`CtZ6fJG8W zMHxdpqUu8ea(M>mK!;+Lu3p`xYl+&d&w*UhL74>U8d(u4+rg$A>F^-6MqhWAUz(;- z=)RD65pdt8{SD{GmO`~&RoIA+XUStd&gJ3A&7}N&O*VKI_+_r$xVs6AJdp~ zsql!4#7CxY(nP`QT4`@HRyuPNnQOq#)Kj27lq4zrlKocFm%KT9PZ{8JzLX>*=YY!( zVy}=xDd7q6H40}^h8)AE!#%dZ%^3S*Ip4nQv|rwp flaK8|e=g7ExjdIYXZimD00960>pc8P02l!PE`d*p diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/Chart.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/Chart.yaml deleted file mode 100644 index ea7fd6dbed2..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/Chart.yaml +++ /dev/null @@ -1,24 +0,0 @@ -annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: vSphere CSI - catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.29.0-0' - catalog.cattle.io/namespace: kube-system - catalog.cattle.io/os: linux,windows - catalog.cattle.io/permits-os: linux,windows - catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' - catalog.cattle.io/release-name: vsphere-csi -apiVersion: v1 -appVersion: 3.1.2-rancher3 -description: vSphere Cloud Storage Interface (CSI) -icon: https://charts.rancher.io/assets/logos/vsphere-csi.svg -keywords: -- infrastructure -maintainers: -- email: jiaqi.luo@suse.com - name: Jiaqi Luo -- email: brad.davidson@suse.com - name: Brad Davidson -name: rancher-vsphere-csi -sources: -- https://github.com/kubernetes-sigs/vsphere-csi-driver -version: 104.0.0+up3.1.2-rancher3 diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/README.md b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/README.md deleted file mode 100644 index 4cb94f45f26..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/README.md +++ /dev/null @@ -1,84 +0,0 @@ -# vSphere Container Storage Interface (CSI) - -[vSphere Container Storage Interface (CSI)](https://github.com/kubernetes-sigs/vsphere-csi-driver/tree/release-2.1/manifests/v2.1.0/vsphere-7.0u1/) is a specification designed to enable persistent storage volume management on Container Orchestrators (COs) such as Kubernetes. The specification allows storage systems to integrate with containerized workloads running on Kubernetes. Using CSI, storage providers, such as VMware, can write and deploy plugins for storage systems in Kubernetes without a need to modify any core Kubernetes code. - -CSI allows volume plugins to be installed on Kubernetes clusters as extensions. Once a CSI compatible volume driver is deployed on a Kubernetes cluster, users can use the CSI to provision, attach, mount, and format the volumes exposed by the CSI driver. - -The CSI driver for vSphere is `csi.vsphere.vmware.com`. - -## Prerequisites - -- vSphere 6.7 U3+ -- Kubernetes v1.20+ -- Out-of-tree vSphere Cloud Provider Interface (CPI) -- A Secret on your Kubernetes cluster that contains vSphere CSI configuration and credentials - -## Installation - -This chart requires a Secret in your Kubernetes cluster that contains the CSI configuration and credentials to connect to the vCenter. You can have the chart generate it for you, or create it yourself and provide the name of the Secret during installation. - -Warning: When the option to generate the Secret is enabled, the credentials are visible in the API to authorized users. If you create the Secret yourself they will not be visible. - -You can create a Secret in one of the following ways: - -### Option 1: Create a Secret using the Rancher UI - -Go to your cluster's project (Same project you will be installing the chart) > Resources > Secrets > Add Secret. -```yaml -# Example of data required in the Secret -# The csi-vsphere.conf key name is required, otherwise the installation will fail -csi-vsphere.conf: | - [Global] - cluster-id = "" - user = "" - password = "" - port = "" - insecure-flag = "" - - [VirtualCenter ""] - datacenters = ", , ..." -``` -More information on CSI vSphere configuration [here](https://vsphere-csi-driver.sigs.k8s.io/driver-deployment/installation.html#create_k8s_secret). - -### Option 2: Create a Secret using kubectl - -Replace placeholders with actual values, and execute the following: -```bash -# The csi-vsphere.conf key name is required, otherwise the installation will fail -cat < - namespace: -stringData: - csi-vsphere.conf: | - [Global] - cluster-id = "" - user = "" - password = "" - port = "" - insecure-flag = "" - - [VirtualCenter ""] - datacenters = ", , ..." -EOF -``` - -More information on managing Secrets using kubectl [here](https://kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-kubectl/). - -## Migration - -The CSI migration feature is only available for vSphere 7.0 U1. - -## vSphere CSI with Topology - -When deploying to a vSphere environment using zoning, the topology plugin can be enabled for the CSI to make intelligent volume provisioning decisions. More information on vSphere zoning and prerequisites for the CSI toplogy plugin can be found [here](https://docs.vmware.com/en/VMware-vSphere-Container-Storage-Plug-in/2.0/vmware-vsphere-csp-getting-started/GUID-162E7582-723B-4A0F-A937-3ACE82EAFD31.html#guidelines-and-best-practices-for-deployment-with-topology-0). - -To enable the topology plugin, adjust the values for the chart as follows: - -```yaml -topology: - enabled: true -``` \ No newline at end of file diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/app-readme.md b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/app-readme.md deleted file mode 100644 index bae1876f09f..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/app-readme.md +++ /dev/null @@ -1,14 +0,0 @@ -# vSphere Container Storage Interface (CSI) - -[vSphere Container Storage Interface (CSI)](https://github.com/kubernetes-sigs/vsphere-csi-driver) is a specification designed to enable persistent storage volume management on Container Orchestrators (COs) such as Kubernetes. The specification allows storage systems to integrate with containerized workloads running on Kubernetes. Using CSI, storage providers, such as VMware, can write and deploy plugins for storage systems in Kubernetes without a need to modify any core Kubernetes code. - -CSI allows volume plugins to be installed on Kubernetes clusters as extensions. Once a CSI compatible volume driver is deployed on a Kubernetes cluster, users can use the CSI to provision, attach, mount, and format the volumes exposed by the CSI driver. - -The CSI driver for vSphere is `csi.vsphere.vmware.com`. - -## Prerequisites - -- vSphere 6.7 U3+ -- Kubernetes v1.14+ -- Out-of-tree vSphere Cloud Provider Interface (CPI) -- A Secret on your Kubernetes cluster that contains vSphere CSI configuration and credentials (Refer to `README` or `Detailed Descriptions`) diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/questions.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/questions.yaml deleted file mode 100644 index adc85206153..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/questions.yaml +++ /dev/null @@ -1,162 +0,0 @@ -questions: - - variable: vCenter.configSecret.generate - label: Generate CSI vSphere Config Secret - description: Generates a Secret that contains a CSI vSphere config and credentials (If the option to generate it is enabled, credentials will be visible in the API to authorized users) - type: boolean - default: true - required: true - group: vCenter Configuration - show_subquestion_if: true - subquestions: - - variable: vCenter.host - label: vCenter Host - description: IP address or FQDN of the vCenter - type: string - - - variable: vCenter.datacenters - description: Comma-separated list of paths to data centers. E.g ", , ..." - label: Data Centers - type: string - - - variable: vCenter.username - label: Username - description: Username for vCenter - type: string - - - variable: vCenter.password - label: Password - description: Password for vCenter - type: password - - - variable: vCenter.configSecret.name - label: CSI vSphere Config Secret Name - description: Name of the Secret that contains a CSI vSphere config and credentials (Will not be visible in the API. More info in the README) - type: string - group: vCenter Configuration - show_if: "vCenter.configSecret.generate=false" - - - variable: csiMigration.enabled - label: Enable CSI Migration - description: Enable migration of volumes provisioned by in-tree vSphere provider to CSI (Available for vSphere 7.0 U1+ only) - type: boolean - default: false - group: Driver Configuration - - - variable: csiAuthCheck.enabled - label: Enable authorization checks on operations involving datastores - type: boolean - default: false - group: Driver Configuration - - - variable: onlineVolumeExtend.enabled - label: Enable Online Volume Extend - description: Enable expansion of PVCs that are in use by a Pod or mounted in a Node (Available for vSphere 7.0 U2+ only) - type: boolean - default: false - group: Driver Configuration - - - variable: triggerCsiFullsync.enabled - label: Enable CSI Full Sync - description: Keeps CNS up to date with Kubernetes volume metadata information (such as PVs, PVCs, pods, and so on) - type: boolean - default: false - group: Driver Configuration - - - variable: asyncQueryVolume.enabled - label: Enable Async Query Volume - description: Improves retrieval of volume information - type: boolean - default: false - group: Driver Configuration - - - variable: improvedCsiIdempotency.enabled - label: Enable Improved CSI Idempotency - description: Enhances driver to ensure volume operations are idempotent - type: boolean - default: false - group: Driver Configuration - - - variable: improvedVolumeTopology.enabled - label: Enable Improved Volume Topology - description: Allows using the topology feature without the need to mount vSphere credentials in the CSI node daemonset - type: boolean - default: false - group: Driver Configuration - - - variable: multiVcenterCsiTopology.enabled - label: Enable Multi vCenter CSI Topology - description: Enables the vSphere CSI Driver to operate on a topology-aware Kubernetes Cluster (Generally this should always be enabled for CSI Plugin v3.1.0 and up) - type: boolean - default: true - group: Driver Configuration - - - variable: csiWindowsSupport.enabled - label: Enable CSI Windows Support - description: Enables Windows support. - type: boolean - default: false - group: Driver Configuration - - - variable: topology.enabled - label: Enable CSI Topology Plugin - description: Enables the CSI Topology Plugin - type: boolean - default: false - group: Driver Configuration - - - variable: csiController.csiResizer.enabled - label: Enable CSI Volume Resizer - description: This feature is available for vSphere 7.0 U1+ only - type: boolean - default: false - group: Storage - - - variable: storageClass.enabled - default: true - label: Create Storage Class - description: Create a storageClass with the vSphere CSI provisioner - type: boolean - required: true - show_subquestion_if: true - group: Storage - subquestions: - - variable: storageClass.name - label: Storage Class Name - default: "vsphere-csi-sc" - type: string - - - variable: storageClass.isDefault - label: Default Storage Class - description: Set the Storage Class as the default - default: true - type: boolean - - - variable: storageClass.allowVolumeExpansion - label: Allow Volume Expansion - description: Allows resizing the volume by editing the corresponding PVC object (Available for vSphere 7.0+ only) - default: false - type: boolean - - - variable: storageClass.storagePolicyName - label: Storage Policy Name - description: Name of the Storage Policy created in vCenter - type: string - - - variable: storageClass.datastoreURL - label: Data Store URL - description: URL of the data store to use for new volumes (If unspecified, any data store that matches the request will be selected). - type: string - - - variable: csiNode.prefixPath - label: Prefix Path for `/var/lib/kubelet` - description: For some operating systems including RancherOS, RKE prefixes `/var/lib/kubelet` with `/opt/rke`. Add the prefix path of the location of /var/lib/kubelet - type: string - default: "" - group: Node Configuration - - - variable: csiNode.prefixPathWindows - label: Prefix Path for `/var/lib/kubelet` - description: For some operating systems including RancherOS, RKE prefixes `/var/lib/kubelet` with `/opt/rke`. For Windows, this will likely be the default value, which is 'C:' - type: string - default: "" - group: Node Configuration diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/_helpers.tpl b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/_helpers.tpl deleted file mode 100644 index 77fc1c47ebb..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/_helpers.tpl +++ /dev/null @@ -1,48 +0,0 @@ -{{- define "system_default_registry" -}} -{{- if .Values.global.cattle.systemDefaultRegistry -}} -{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} -{{- else -}} -{{- "" -}} -{{- end -}} -{{- end -}} - -{{- define "applyVersionOverrides" -}} -{{- $overrides := dict -}} -{{- range $override := .Values.versionOverrides -}} -{{- if semverCompare $override.constraint $.Capabilities.KubeVersion.Version -}} -{{- $_ := mergeOverwrite $overrides $override.values -}} -{{- end -}} -{{- end -}} -{{- $_ := mergeOverwrite .Values $overrides -}} -{{- end -}} - -{{/* -Windows cluster will add default taint for linux nodes, -add below linux tolerations to workloads could be scheduled to those linux nodes -*/}} -{{- define "linux-node-tolerations" -}} -- key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" -{{- end -}} - -{{- define "linux-node-selector" -}} -kubernetes.io/os: linux -{{- end -}} - -{{/* -Create chart name and version as used by the chart label. -*/}} -{{- define "chartName" -}} -{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* -Labels that should be added on each resource -*/}} -{{- define "labels" -}} -app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} -app.kubernetes.io/managed-by: {{ .Release.Service }} -helm.sh/chart: {{ include "chartName" . }} -{{- end -}} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/configmap.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/configmap.yaml deleted file mode 100644 index 09a88467337..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/configmap.yaml +++ /dev/null @@ -1,23 +0,0 @@ -# Source: https://github.com/kubernetes-sigs/vsphere-csi-driver -apiVersion: v1 -data: - "csi-migration": {{ .Values.csiMigration.enabled | quote }} - "csi-auth-check": {{ .Values.csiAuthCheck.enabled | quote }} - "online-volume-extend": {{ .Values.onlineVolumeExtend.enabled | quote }} - "trigger-csi-fullsync": {{ .Values.triggerCsiFullsync.enabled | quote }} - "async-query-volume": {{ .Values.asyncQueryVolume.enabled | quote }} - "improved-csi-idempotency": {{ .Values.improvedCsiIdempotency.enabled | quote }} - "improved-volume-topology": {{ .Values.improvedVolumeTopology.enabled | quote }} - "block-volume-snapshot": {{ .Values.blockVolumeSnapshot.enabled | quote }} - "csi-windows-support": {{ .Values.csiWindowsSupport.enabled | quote }} - "use-csinode-id": {{ .Values.useCsinodeId.enabled | quote }} - "list-volumes": {{ .Values.listVolumes.enabled | quote }} - "pv-to-backingdiskobjectid-mapping": {{ .Values.pvToBackingdiskobjectidMapping.enabled | quote }} - "cnsmgr-suspend-create-volume": {{ .Values.cnsmgrSuspendCreateVolume.enabled | quote }} - "topology-preferential-datastores": {{ .Values.topologyPreferentialDatastores.enabled | quote }} - "max-pvscsi-targets-per-vm": {{ .Values.maxPvscsiTargetsPerVm.enabled | quote }} - "multi-vcenter-csi-topology": {{ .Values.multiVcenterCsiTopology.enabled | quote }} -kind: ConfigMap -metadata: - name: internal-feature-states.csi.vsphere.vmware.com - namespace: {{ .Release.Namespace }} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/deployment.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/deployment.yaml deleted file mode 100644 index 99d39ac14c1..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/deployment.yaml +++ /dev/null @@ -1,254 +0,0 @@ -{{- template "applyVersionOverrides" . -}} -kind: Deployment -apiVersion: apps/v1 -metadata: - name: vsphere-csi-controller - namespace: {{ .Release.Namespace }} - labels: - {{- include "labels" . | nindent 4 }} -spec: - replicas: 3 - strategy: - type: RollingUpdate - rollingUpdate: - maxUnavailable: 1 - maxSurge: 0 - selector: - matchLabels: - app: vsphere-csi-controller - template: - metadata: - labels: - app: vsphere-csi-controller - role: vsphere-csi - {{- include "labels" . | nindent 8 }} - {{- with .Values.csiController.podLabels }} - {{- toYaml . | nindent 8 }} - {{- end }} - spec: - serviceAccountName: vsphere-csi-controller - {{- if .Values.csiController.nodeSelector }} - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} - {{- with .Values.csiController.nodeSelector }} - {{- toYaml . | nindent 8 }} - {{- end }} - {{- else }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - # RKE node selector label - - key: node-role.kubernetes.io/controlplane - operator: In - values: - - "true" - # Rancher node selector label - - key: kubernetes.io/os - operator: NotIn - values: - - "windows" - - matchExpressions: - # RKE2 node selector label - - key: node-role.kubernetes.io/control-plane - operator: In - values: - - "true" - # Rancher node selector label - - key: kubernetes.io/os - operator: NotIn - values: - - "windows" - {{- end }} - {{- if .Values.csiController.tolerations }} - tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} - {{- with .Values.csiController.tolerations }} - {{- toYaml . | nindent 8 }} - {{- end }} - {{- else }} - tolerations: - - key: node-role.kubernetes.io/master - operator: Exists - effect: NoSchedule - # Rancher specific change: These tolerations are added to account for RKE1 and RKE2 taints - - key: node-role.kubernetes.io/controlplane - effect: NoSchedule - value: "true" - - key: node-role.kubernetes.io/control-plane - effect: NoSchedule - operator: Exists - - key: node-role.kubernetes.io/etcd - effect: NoExecute - operator: Exists - {{- end }} - dnsPolicy: "Default" - containers: - - name: csi-attacher - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.csiAttacher.repository }}:{{ .Values.csiController.image.csiAttacher.tag }}" - args: - - "--v=4" - - "--timeout=300s" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--kube-api-qps=100" - - "--kube-api-burst=100" - env: - - name: ADDRESS - value: /csi/csi.sock - volumeMounts: - - mountPath: /csi - name: socket-dir -{{- if .Values.csiController.csiResizer.enabled }} - - name: csi-resizer - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.csiResizer.repository }}:{{ .Values.csiController.image.csiResizer.tag }}" - args: - - "--v=4" - - "--timeout=300s" - - "--handle-volume-inuse-error=false" - - "--csi-address=$(ADDRESS)" - - "--kube-api-qps=100" - - "--kube-api-burst=100" - - "--leader-election" - env: - - name: ADDRESS - value: /csi/csi.sock - volumeMounts: - - mountPath: /csi - name: socket-dir -{{- end }} -{{- if .Values.blockVolumeSnapshot.enabled }} - - name: csi-snapshotter - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.csiSnapshotter.repository }}:{{ .Values.csiController.image.csiSnapshotter.tag }}" - args: - - "--v=4" - - "--kube-api-qps=100" - - "--kube-api-burst=100" - - "--timeout=300s" - - "--csi-address=$(ADDRESS)" - - "--leader-election" - - "--leader-election-lease-duration=120s" - - "--leader-election-renew-deadline=60s" - - "--leader-election-retry-period=30s" - env: - - name: ADDRESS - value: /csi/csi.sock - volumeMounts: - - mountPath: /csi - name: socket-dir -{{- end }} - - name: vsphere-csi-controller - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.repository }}:{{ .Values.csiController.image.tag }}" - args: - - "--fss-name=internal-feature-states.csi.vsphere.vmware.com" - - "--fss-namespace=$(CSI_NAMESPACE)" - {{- if semverCompare "< 1.24" $.Capabilities.KubeVersion.Version }} - - "--use-gocsi=false" - {{- end }} - imagePullPolicy: "Always" - env: - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: X_CSI_MODE - value: "controller" - - name: X_CSI_SPEC_DISABLE_LEN_CHECK - value: "true" - - name: X_CSI_SERIAL_VOL_ACCESS_TIMEOUT - value: 3m - - name: VSPHERE_CSI_CONFIG - value: "/etc/cloud/csi-vsphere.conf" - - name: LOGGER_LEVEL - value: "PRODUCTION" # Options: DEVELOPMENT, PRODUCTION - - name: INCLUSTER_CLIENT_QPS - value: "100" - - name: INCLUSTER_CLIENT_BURST - value: "100" - - name: CSI_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - volumeMounts: - - mountPath: /etc/cloud - name: vsphere-config-volume - readOnly: true - - mountPath: /csi - name: socket-dir - ports: - - name: healthz - containerPort: 9808 - protocol: TCP - - name: prometheus - containerPort: 2112 - protocol: TCP - livenessProbe: - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 10 - timeoutSeconds: 3 - periodSeconds: 5 - failureThreshold: 3 - - name: liveness-probe - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.livenessProbe.repository }}:{{ .Values.csiController.image.livenessProbe.tag }}" - args: - - "--v=4" - - "--csi-address=/csi/csi.sock" - volumeMounts: - - name: socket-dir - mountPath: /csi - - name: vsphere-syncer - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.vsphereSyncer.repository }}:{{ .Values.csiController.image.vsphereSyncer.tag }}" - args: - - "--leader-election" - - "--fss-name=internal-feature-states.csi.vsphere.vmware.com" - - "--fss-namespace=$(CSI_NAMESPACE)" - imagePullPolicy: "Always" - ports: - - containerPort: 2113 - name: prometheus - protocol: TCP - env: - - name: FULL_SYNC_INTERVAL_MINUTES - value: "30" - - name: VSPHERE_CSI_CONFIG - value: "/etc/cloud/csi-vsphere.conf" - - name: LOGGER_LEVEL - value: "PRODUCTION" # Options: DEVELOPMENT, PRODUCTION - - name: INCLUSTER_CLIENT_QPS - value: "100" - - name: INCLUSTER_CLIENT_BURST - value: "100" - - name: CSI_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - volumeMounts: - - mountPath: /etc/cloud - name: vsphere-config-volume - readOnly: true - - name: csi-provisioner - image: "{{ template "system_default_registry" . }}{{ .Values.csiController.image.csiProvisioner.repository }}:{{ .Values.csiController.image.csiProvisioner.tag }}" - args: - - "--v=4" - - "--timeout=300s" - - "--csi-address=$(ADDRESS)" - - "--kube-api-qps=100" - - "--kube-api-burst=100" - - "--leader-election" - - "--default-fstype=ext4" - {{- if .Values.topology.enabled }} - # needed only for topology aware setup - - "--feature-gates=Topology=true" - - "--strict-topology" - {{- end }} - env: - - name: ADDRESS - value: /csi/csi.sock - volumeMounts: - - mountPath: /csi - name: socket-dir - volumes: - - name: vsphere-config-volume - secret: - secretName: {{ .Values.vCenter.configSecret.name }} - - name: socket-dir - emptyDir: {} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role-binding.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role-binding.yaml deleted file mode 100644 index 6e2e8361906..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: vsphere-csi-controller-binding - labels: - {{- include "labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: vsphere-csi-controller - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: vsphere-csi-controller-role - apiGroup: rbac.authorization.k8s.io diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role.yaml deleted file mode 100644 index b6cd1c0ab20..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/role.yaml +++ /dev/null @@ -1,61 +0,0 @@ -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: vsphere-csi-controller-role - labels: - {{- include "labels" . | nindent 4 }} -rules: - - apiGroups: [""] - resources: ["nodes", "pods", "configmaps"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: [""] - resources: ["persistentvolumeclaims/status"] - verbs: ["patch"] - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "update", "delete", "patch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["get", "list", "watch", "create", "update", "patch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "watch", "list", "delete", "update", "create"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses", "csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["storage.k8s.io"] - resources: ["volumeattachments"] - verbs: ["get", "list", "watch", "patch"] - - apiGroups: ["cns.vmware.com"] - resources: ["triggercsifullsyncs"] - verbs: ["create", "get", "update", "watch", "list"] - - apiGroups: ["cns.vmware.com"] - resources: ["cnsvspherevolumemigrations"] - verbs: ["create", "get", "list", "watch", "update", "delete"] - - apiGroups: ["apiextensions.k8s.io"] - resources: ["customresourcedefinitions"] - verbs: ["get", "create", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["volumeattachments/status"] - verbs: ["patch"] - - apiGroups: ["cns.vmware.com"] - resources: ["cnsvolumeoperationrequests"] - verbs: ["create", "get", "list", "update", "delete"] - - apiGroups: [ "snapshot.storage.k8s.io" ] - resources: [ "volumesnapshots" ] - verbs: [ "get", "list" ] - - apiGroups: [ "snapshot.storage.k8s.io" ] - resources: [ "volumesnapshotclasses" ] - verbs: [ "watch", "get", "list" ] - - apiGroups: [ "snapshot.storage.k8s.io" ] - resources: [ "volumesnapshotcontents" ] - verbs: [ "create", "get", "list", "watch", "update", "delete", "patch"] - - apiGroups: [ "snapshot.storage.k8s.io" ] - resources: [ "volumesnapshotcontents/status" ] - verbs: [ "update", "patch" ] - - apiGroups: [ "cns.vmware.com" ] - resources: [ "csinodetopologies" ] - verbs: ["get", "update", "watch", "list"] diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service-account.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service-account.yaml deleted file mode 100644 index 332a814df3b..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -kind: ServiceAccount -apiVersion: v1 -metadata: - name: vsphere-csi-controller - namespace: {{ .Release.Namespace }} - labels: - {{- include "labels" . | nindent 4 }} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service.yaml deleted file mode 100644 index ae0f17f44b8..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/controller/service.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: vsphere-csi-controller - namespace: {{ .Release.Namespace }} - labels: - app: vsphere-csi-controller - {{- include "labels" . | nindent 4 }} -spec: - ports: - - name: ctlr - port: 2112 - targetPort: 2112 - protocol: TCP - - name: syncer - port: 2113 - targetPort: 2113 - protocol: TCP - selector: - app: vsphere-csi-controller diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/csi-driver.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/csi-driver.yaml deleted file mode 100644 index 9b6909e6acc..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/csi-driver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -# Source: https://github.com/kubernetes-sigs/vsphere-csi-driver -apiVersion: storage.k8s.io/v1 # For k8s 1.17 use storage.k8s.io/v1beta1 -kind: CSIDriver -metadata: - name: csi.vsphere.vmware.com -spec: - attachRequired: true - podInfoOnMount: false diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/daemonset.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/daemonset.yaml deleted file mode 100644 index 892e44fc391..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/daemonset.yaml +++ /dev/null @@ -1,186 +0,0 @@ -{{- template "applyVersionOverrides" . -}} -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: vsphere-csi-node - namespace: {{ .Release.Namespace }} - labels: - {{- include "labels" . | nindent 4 }} -spec: - selector: - matchLabels: - app: vsphere-csi-node - updateStrategy: - type: "RollingUpdate" - rollingUpdate: - maxUnavailable: 1 - template: - metadata: - labels: - app: vsphere-csi-node - role: vsphere-csi - {{- include "labels" . | nindent 8 }} - {{- with .Values.csiNode.podLabels }} - {{- toYaml . | nindent 8 }} - {{- end }} - spec: - {{- if .Values.csiNode.nodeSelector }} - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} - {{- with .Values.csiNode.nodeSelector }} - {{- toYaml . | nindent 8 }} - {{- end }} - {{- else }} - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - # Rancher node selector label - - key: kubernetes.io/os - operator: NotIn - values: - - "windows" - {{- end }} - {{- if .Values.csiNode.tolerations }} - tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} - {{- with .Values.csiNode.tolerations }} - {{- toYaml . | nindent 8 }} - {{- end }} - {{- else }} - tolerations: - - key: node-role.kubernetes.io/master - operator: Exists - effect: NoSchedule - # Rancher specific change: These tolerations are added to account for RKE1 and RKE2 taints - - key: node-role.kubernetes.io/controlplane - effect: NoSchedule - value: "true" - - key: node-role.kubernetes.io/control-plane - effect: NoSchedule - operator: Exists - - key: node-role.kubernetes.io/etcd - effect: NoExecute - operator: Exists - {{- end }} - serviceAccountName: vsphere-csi-node - hostNetwork: true - dnsPolicy: "ClusterFirstWithHostNet" - containers: - - name: node-driver-registrar - image: "{{ template "system_default_registry" . }}{{ .Values.csiNode.image.nodeDriverRegistrar.repository }}:{{ .Values.csiNode.image.nodeDriverRegistrar.tag }}" - args: - - "--v=5" - - "--csi-address=$(ADDRESS)" - - "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)" - env: - - name: ADDRESS - value: /csi/csi.sock - - name: DRIVER_REG_SOCK_PATH - value: {{ .Values.csiNode.prefixPath }}/var/lib/kubelet/plugins/csi.vsphere.vmware.com/csi.sock - volumeMounts: - - name: plugin-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path=/var/lib/kubelet/plugins/csi.vsphere.vmware.com/csi.sock - - --mode=kubelet-registration-probe - initialDelaySeconds: 3 - - name: vsphere-csi-node - image: "{{ template "system_default_registry" . }}{{ .Values.csiNode.image.repository }}:{{ .Values.csiNode.image.tag }}" - args: - - "--fss-name=internal-feature-states.csi.vsphere.vmware.com" - - "--fss-namespace=$(CSI_NAMESPACE)" - {{- if semverCompare "< 1.24" $.Capabilities.KubeVersion.Version }} - - "--use-gocsi=false" - {{- end }} - imagePullPolicy: "Always" - env: - - name: NODE_NAME - valueFrom: - fieldRef: - fieldPath: spec.nodeName - - name: CSI_ENDPOINT - value: unix:///csi/csi.sock - - name: MAX_VOLUMES_PER_NODE - value: "59" # Maximum number of volumes that controller can publish to the node. If value is not set or zero Kubernetes decide how many volumes can be published by the controller to the node. - - name: X_CSI_MODE - value: "node" - - name: X_CSI_SPEC_REQ_VALIDATION - value: "false" - - name: X_CSI_SPEC_DISABLE_LEN_CHECK - value: "true" - - name: LOGGER_LEVEL - value: "PRODUCTION" # Options: DEVELOPMENT, PRODUCTION - - name: CSI_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: NODEGETINFO_WATCH_TIMEOUT_MINUTES - value: "1" - securityContext: - privileged: true - capabilities: - add: ["SYS_ADMIN"] - allowPrivilegeEscalation: true - volumeMounts: - - name: plugin-dir - mountPath: /csi - - name: pods-mount-dir - mountPath: {{ .Values.csiNode.prefixPath }}/var/lib/kubelet - # needed so that any mounts setup inside this container are - # propagated back to the host machine. - mountPropagation: "Bidirectional" - - name: device-dir - mountPath: /dev - - name: blocks-dir - mountPath: /sys/block - - name: sys-devices-dir - mountPath: /sys/devices - ports: - - name: healthz - containerPort: 9808 - protocol: TCP - livenessProbe: - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 10 - timeoutSeconds: 5 - periodSeconds: 5 - failureThreshold: 3 - - name: liveness-probe - image: "{{ template "system_default_registry" . }}{{ .Values.csiNode.image.livenessProbe.repository }}:{{ .Values.csiNode.image.livenessProbe.tag }}" - args: - - "--v=4" - - "--csi-address=/csi/csi.sock" - volumeMounts: - - name: plugin-dir - mountPath: /csi - volumes: - - name: registration-dir - hostPath: - path: {{ .Values.csiNode.prefixPath }}/var/lib/kubelet/plugins_registry - type: Directory - - name: plugin-dir - hostPath: - path: {{ .Values.csiNode.prefixPath }}/var/lib/kubelet/plugins/csi.vsphere.vmware.com - type: DirectoryOrCreate - - name: pods-mount-dir - hostPath: - path: {{ .Values.csiNode.prefixPath }}/var/lib/kubelet - type: Directory - - name: device-dir - hostPath: - path: /dev - - name: blocks-dir - hostPath: - path: /sys/block - type: Directory - - name: sys-devices-dir - hostPath: - path: /sys/devices - type: Directory diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role-binding.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role-binding.yaml deleted file mode 100644 index 8424efe294f..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role-binding.yaml +++ /dev/null @@ -1,32 +0,0 @@ -kind: RoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: vsphere-csi-node-binding - namespace: {{ .Release.Namespace }} - labels: - {{- include "labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: vsphere-csi-node - namespace: {{ .Release.Namespace }} -roleRef: - kind: Role - name: vsphere-csi-node-role - apiGroup: rbac.authorization.k8s.io - ---- - -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: vsphere-csi-node-cluster-role-binding - labels: - {{- include "labels" . | nindent 4 }} -subjects: - - kind: ServiceAccount - name: vsphere-csi-node - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: vsphere-csi-node-cluster-role - apiGroup: rbac.authorization.k8s.io diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role.yaml deleted file mode 100644 index 00d6fe3d60f..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/role.yaml +++ /dev/null @@ -1,29 +0,0 @@ -kind: Role -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: vsphere-csi-node-role - namespace: {{ .Release.Namespace }} - labels: - {{- include "labels" . | nindent 4 }} -rules: - - apiGroups: [""] - resources: ["configmaps"] - verbs: ["get", "list", "watch"] ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: vsphere-csi-node-cluster-role - labels: - {{- include "labels" . | nindent 4 }} -rules: - - apiGroups: ["cns.vmware.com"] - resources: ["csinodetopologies"] -{{- if semverCompare ">= 1.21" $.Capabilities.KubeVersion.Version }} - verbs: ["create", "watch", "get", "patch"] -{{- else }} - verbs: ["create", "watch"] -{{- end }} - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get"] diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/service-account.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/service-account.yaml deleted file mode 100644 index 88f1f63c055..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -kind: ServiceAccount -apiVersion: v1 -metadata: - name: vsphere-csi-node - namespace: {{ .Release.Namespace }} - labels: - {{- include "labels" . | nindent 4 }} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/windows-daemonset.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/windows-daemonset.yaml deleted file mode 100644 index a3b62be48d5..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/node/windows-daemonset.yaml +++ /dev/null @@ -1,167 +0,0 @@ -{{- if .Values.csiWindowsSupport.enabled }} -{{- template "applyVersionOverrides" . -}} -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: vsphere-csi-node-windows - namespace: {{ .Release.Namespace }} -spec: - selector: - matchLabels: - app: vsphere-csi-node-windows - updateStrategy: - type: RollingUpdate - rollingUpdate: - maxUnavailable: 1 - template: - metadata: - labels: - app: vsphere-csi-node-windows - role: vsphere-csi-windows - spec: - nodeSelector: - kubernetes.io/os: windows - {{- if .Values.csiNode.tolerations }} - tolerations: - {{- with .Values.csiNode.tolerations }} - {{- toYaml . | nindent 6 }} - {{- end }} - {{- else }} - tolerations: - - key: node-role.kubernetes.io/master - operator: Exists - effect: NoSchedule - # Rancher specific change: These tolerations are added to account for RKE1 and RKE2 taints - - key: node-role.kubernetes.io/controlplane - effect: NoSchedule - value: "true" - - key: node-role.kubernetes.io/control-plane - effect: NoSchedule - operator: Exists - - key: node-role.kubernetes.io/etcd - effect: NoExecute - operator: Exists - {{- end }} - serviceAccountName: vsphere-csi-node - containers: - - name: node-driver-registrar - image: "{{ template "system_default_registry" . }}{{ .Values.csiNode.image.nodeDriverRegistrar.repository }}:{{ .Values.csiNode.image.nodeDriverRegistrar.tag }}" - args: - - "--v=5" - - "--csi-address=$(ADDRESS)" - - "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)" - {{- if semverCompare "< 1.24" $.Capabilities.KubeVersion.Version }} - - "--health-port=9809" - {{- end }} - env: - - name: ADDRESS - value: 'unix://C:\\csi\\csi.sock' - - name: DRIVER_REG_SOCK_PATH - value: '{{ .Values.csiNode.prefixPathWindows | default "C:" }}\\var\\lib\\kubelet\\plugins\\csi.vsphere.vmware.com\\csi.sock' - volumeMounts: - - name: plugin-dir - mountPath: /csi - - name: registration-dir - mountPath: /registration - livenessProbe: - exec: - command: - - /csi-node-driver-registrar.exe - - --kubelet-registration-path=C:\\var\\lib\\kubelet\\plugins\\csi.vsphere.vmware.com\\csi.sock - - --mode=kubelet-registration-probe - initialDelaySeconds: 3 - - name: vsphere-csi-node - image: "{{ template "system_default_registry" . }}{{ .Values.csiNode.image.repository }}:{{ .Values.csiNode.image.tag }}" - args: - - "--fss-name=internal-feature-states.csi.vsphere.vmware.com" - - "--fss-namespace=$(CSI_NAMESPACE)" - imagePullPolicy: "Always" - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: CSI_ENDPOINT - value: 'unix://C:\\csi\\csi.sock' - - name: MAX_VOLUMES_PER_NODE - value: "0" # Maximum number of volumes that controller can publish to the node. If value is not set or zero Kubernetes decide how many volumes can be published by the controller to the node. - - name: X_CSI_MODE - value: node - - name: X_CSI_SPEC_REQ_VALIDATION - value: 'false' - - name: X_CSI_SPEC_DISABLE_LEN_CHECK - value: "true" - - name: LOGGER_LEVEL - value: "PRODUCTION" # Options: DEVELOPMENT, PRODUCTION - - name: X_CSI_LOG_LEVEL - value: DEBUG - - name: CSI_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: NODEGETINFO_WATCH_TIMEOUT_MINUTES - value: "1" - volumeMounts: - - name: plugin-dir - mountPath: 'C:\csi' - - name: pods-mount-dir - mountPath: 'C:\var\lib\kubelet' - - name: csi-proxy-volume-v1 - mountPath: \\.\pipe\csi-proxy-volume-v1 - - name: csi-proxy-filesystem-v1 - mountPath: \\.\pipe\csi-proxy-filesystem-v1 - - name: csi-proxy-disk-v1 - mountPath: \\.\pipe\csi-proxy-disk-v1 - - name: csi-proxy-system-v1alpha1 - mountPath: \\.\pipe\csi-proxy-system-v1alpha1 - ports: - - name: healthz - containerPort: 9808 - protocol: TCP - livenessProbe: - httpGet: - path: /healthz - port: healthz - initialDelaySeconds: 10 - timeoutSeconds: 5 - periodSeconds: 5 - failureThreshold: 3 - - name: liveness-probe - image: "{{ template "system_default_registry" . }}{{ .Values.csiNode.image.livenessProbe.repository }}:{{ .Values.csiNode.image.livenessProbe.tag }}" - args: - - "--v=4" - - "--csi-address=/csi/csi.sock" - volumeMounts: - - name: plugin-dir - mountPath: /csi - volumes: - - name: registration-dir - hostPath: - path: 'C:\var\lib\kubelet\plugins_registry\' - type: Directory - - name: plugin-dir - hostPath: - path: 'C:\var\lib\kubelet\plugins\csi.vsphere.vmware.com\' - type: DirectoryOrCreate - - name: pods-mount-dir - hostPath: - path: \var\lib\kubelet - type: Directory - - name: csi-proxy-disk-v1 - hostPath: - path: \\.\pipe\csi-proxy-disk-v1 - type: '' - - name: csi-proxy-volume-v1 - hostPath: - path: \\.\pipe\csi-proxy-volume-v1 - type: '' - - name: csi-proxy-filesystem-v1 - hostPath: - path: \\.\pipe\csi-proxy-filesystem-v1 - type: '' - - name: csi-proxy-system-v1alpha1 - hostPath: - path: \\.\pipe\csi-proxy-system-v1alpha1 - type: '' -{{ end }} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/secret.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/secret.yaml deleted file mode 100644 index 2a8c5302574..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/secret.yaml +++ /dev/null @@ -1,9 +0,0 @@ -{{- if .Values.vCenter.configSecret.generate -}} -apiVersion: v1 -kind: Secret -metadata: - name: {{ .Values.vCenter.configSecret.name }} - namespace: {{ .Release.Namespace }} -data: - csi-vsphere.conf: {{ tpl .Values.vCenter.configSecret.configTemplate . | b64enc | quote }} -{{- end -}} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/storageclass.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/storageclass.yaml deleted file mode 100644 index 30dfbd46a98..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/templates/storageclass.yaml +++ /dev/null @@ -1,17 +0,0 @@ -{{- if .Values.storageClass.enabled -}} -apiVersion: storage.k8s.io/v1 -kind: StorageClass -metadata: - name: {{ .Values.storageClass.name | quote }} - annotations: - storageclass.kubernetes.io/is-default-class: {{ .Values.storageClass.isDefault | quote }} -provisioner: csi.vsphere.vmware.com -allowVolumeExpansion: {{ .Values.storageClass.allowVolumeExpansion }} -parameters: - {{- if .Values.storageClass.datastoreURL }} - datastoreURL: {{ .Values.storageClass.datastoreURL | quote }} - {{- end }} - {{- if .Values.storageClass.storagePolicyName }} - storagepolicyname: {{ .Values.storageClass.storagePolicyName | quote }} - {{- end }} -{{- end -}} diff --git a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/values.yaml b/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/values.yaml deleted file mode 100644 index abfa7689b00..00000000000 --- a/charts/rancher-vsphere-csi/104.0.0+up3.1.2-rancher3/values.yaml +++ /dev/null @@ -1,349 +0,0 @@ -vCenter: - host: "" - port: 443 - insecureFlag: "1" - clusterId: "" - datacenters: "" - username: "" - password: "" - configSecret: - name: "vsphere-config-secret" - generate: true - configTemplate: | - [Global] - cluster-id = {{ required ".Values.vCenter.clusterId must be provided" (default .Values.vCenter.clusterId .Values.global.cattle.clusterId) | quote }} - user = {{ .Values.vCenter.username | quote }} - password = {{ .Values.vCenter.password | quote }} - port = {{ .Values.vCenter.port | quote }} - insecure-flag = {{ .Values.vCenter.insecureFlag | quote }} - - [VirtualCenter {{ .Values.vCenter.host | quote }}] - datacenters = {{ .Values.vCenter.datacenters | quote }} - -csiController: - csiResizer: - enabled: false - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: latest - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: latest - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: latest - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: latest - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: latest - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: latest - csiSnapshotter: - repository: rancher/mirrored-sig-storage-csi-snapshotter - tag: latest - ## Node labels for pod assignment - ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ - ## - nodeSelector: {} - # Uncomment below toleration if you need an aggressive pod eviction in case when - # node becomes not-ready or unreachable. Default is 300 seconds if not specified. - tolerations: [] - # - key: node.kubernetes.io/not-ready - # operator: Exists - # effect: NoExecute - # tolerationSeconds: 30 - # - key: node.kubernetes.io/unreachable - # operator: Exists - # effect: NoExecute - # tolerationSeconds: 30 - ## - ## Optional additional labels to add to pods - podLabels: {} - -# Internal features -csiMigration: - enabled: false -csiAuthCheck: - enabled: false -onlineVolumeExtend: - enabled: false -triggerCsiFullsync: - enabled: false -asyncQueryVolume: - enabled: false -improvedCsiIdempotency: - enabled: false -improvedVolumeTopology: - enabled: false -blockVolumeSnapshot: - enabled: false -csiWindowsSupport: - enabled: false -useCsinodeId: - enabled: true -listVolumes: - enabled: false -pvToBackingdiskobjectidMapping: - enabled: false -cnsmgrSuspendCreateVolume: - enabled: false -topology: - enabled: false -topologyPreferentialDatastores: - enabled: false -maxPvscsiTargetsPerVm: - enabled: false -multiVcenterCsiTopology: - enabled: true - -csiNode: - ## Node labels for pod assignment - ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ - ## - nodeSelector: {} - ## List of node taints to tolerate (requires Kubernetes >= 1.6) - tolerations: [] - ## Optional additional labels to add to pods - podLabels: {} - prefixPath: "" - prefixPathWindows: "" - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: latest - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: latest - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: latest - -storageClass: - enabled: true - allowVolumeExpansion: false - name: "vsphere-csi-sc" - isDefault: true - storagePolicyName: "" - datastoreURL: "" - -global: - cattle: - systemDefaultRegistry: "" - -# A list of Semver constraint strings (defined by https://github.com/Masterminds/semver) and values.yaml overrides. -# -# For each key in versionOverrides, this chart will check to see if the current Kubernetes cluster's version matches -# any of the semver constraints provided as keys on the map. -# -# On seeing a match, the default value for each values.yaml field overridden will be updated with the new value. -# -# If multiple matches are encountered (due to overlapping semver ranges), the matches will be applied in order. -# -# Notes: -# - On running a helm template, Helm uses the `.Capabilities.APIVersion` of whatever -# Kubernetes release that version of Helm was built against. -# - On running a helm install --dry-run, the correct kubeVersion should be chosen. -# -# Supported versions can be found at: -# https://docs.vmware.com/en/VMware-vSphere-Container-Storage-Plug-in/3.0/vmware-vsphere-csp-getting-started/GUID-D4AAD99E-9128-40CE-B89C-AD451DA8379D.html#kubernetes-versions-compatible-with-vsphere-container-storage-plugin-1 -versionOverrides: - # Versions from https://github.com/kubernetes-sigs/vsphere-csi-driver/blob/v3.1.2/manifests/vanilla/vsphere-csi-driver.yaml - - constraint: ">= 1.26 < 1.29" - values: - csiController: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v3.1.2 - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: v4.3.0 - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: v1.8.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.10.0 - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: v3.1.2 - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: v3.5.0 - csiSnapshotter: - repository: rancher/mirrored-sig-storage-csi-snapshotter - tag: v6.2.2 - csiNode: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v3.1.2 - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: v2.8.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.10.0 - # Versions from https://github.com/kubernetes-sigs/vsphere-csi-driver/blob/release-3.0/manifests/vanilla/vsphere-csi-driver.yaml - - constraint: ">= 1.24 < 1.26" - values: - csiController: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v3.0.2 - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: v4.2.0 - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: v1.7.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.9.0 - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: v3.0.2 - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: v3.4.0 - csiSnapshotter: - repository: rancher/mirrored-sig-storage-csi-snapshotter - tag: v6.2.1 - csiNode: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v3.0.2 - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: v2.7.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.9.0 - # Versions from https://github.com/kubernetes-sigs/vsphere-csi-driver/blob/release-2.7/manifests/vanilla/vsphere-csi-driver.yaml - - constraint: "~ 1.23" - values: - csiController: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.7.2 - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: v3.5.0 - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: v1.6.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.8.0 - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: v2.7.2 - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: v3.3.0 - csiNode: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.7.2 - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: v2.6.2 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.8.0 - # Versions from https://github.com/kubernetes-sigs/vsphere-csi-driver/blob/release-2.6/manifests/vanilla/vsphere-csi-driver.yaml - - constraint: "~ 1.22" - values: - csiController: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.6.3 - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: v3.4.0 - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: v1.4.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.7.0 - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: v2.6.3 - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: v3.2.1 - csiNode: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.6.3 - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: v2.5.1 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.7.0 - # Versions from https://github.com/kubernetes-sigs/vsphere-csi-driver/blob/release-2.5/manifests/vanilla/vsphere-csi-driver.yaml - - constraint: "~ 1.21" - values: - csiController: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.5.4 - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: v3.4.0 - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: v1.4.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.6.0 - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: v2.5.4 - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: v3.1.0 - csiNode: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.5.4 - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: v2.5.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.6.0 - # Versions from https://github.com/kubernetes-sigs/vsphere-csi-driver/blob/release-2.4/manifests/vanilla/vsphere-csi-driver.yaml - - constraint: "~ 1.20" - values: - csiController: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.4.3 - csiAttacher: - repository: rancher/mirrored-sig-storage-csi-attacher - tag: v3.3.0 - csiResizer: - repository: rancher/mirrored-sig-storage-csi-resizer - tag: v1.3.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.4.0 - vsphereSyncer: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-syncer - tag: v2.4.3 - csiProvisioner: - repository: rancher/mirrored-sig-storage-csi-provisioner - tag: v3.0.0 - csiNode: - image: - repository: rancher/mirrored-cloud-provider-vsphere-csi-release-driver - tag: v2.4.3 - nodeDriverRegistrar: - repository: rancher/mirrored-sig-storage-csi-node-driver-registrar - tag: v2.3.0 - livenessProbe: - repository: rancher/mirrored-sig-storage-livenessprobe - tag: v2.4.0 diff --git a/index.yaml b/index.yaml index 5d5efc8e49d..49f329b7b71 100755 --- a/index.yaml +++ b/index.yaml @@ -18835,34 +18835,6 @@ entries: - assets/rancher-vsphere-cpi/rancher-vsphere-cpi-1.0.000.tgz version: 1.0.000 rancher-vsphere-csi: - - annotations: - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: vSphere CSI - catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.29.0-0' - catalog.cattle.io/namespace: kube-system - catalog.cattle.io/os: linux,windows - catalog.cattle.io/permits-os: linux,windows - catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' - catalog.cattle.io/release-name: vsphere-csi - apiVersion: v1 - appVersion: 3.1.2-rancher3 - created: "2024-04-11T16:35:19.264121-04:00" - description: vSphere Cloud Storage Interface (CSI) - digest: dd8a788c7eeb02233430096cdf2f81b4884c1226a3acb79d425f1a02e430c823 - icon: https://charts.rancher.io/assets/logos/vsphere-csi.svg - keywords: - - infrastructure - maintainers: - - email: jiaqi.luo@suse.com - name: Jiaqi Luo - - email: brad.davidson@suse.com - name: Brad Davidson - name: rancher-vsphere-csi - sources: - - https://github.com/kubernetes-sigs/vsphere-csi-driver - urls: - - assets/rancher-vsphere-csi/rancher-vsphere-csi-104.0.0+up3.1.2-rancher3.tgz - version: 104.0.0+up3.1.2-rancher3 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/display-name: vSphere CSI