2020-04-23 13:52:01 +00:00
|
|
|
apiVersion: v1
|
|
|
|
kind: ServiceAccount
|
|
|
|
metadata:
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-driver
|
|
|
|
imagePullSecrets:
|
|
|
|
{{- toYaml .Values.imagePullSecrets | nindent 2 }}
|
2020-04-23 13:52:01 +00:00
|
|
|
---
|
|
|
|
kind: ClusterRole
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-provisioner
|
2020-04-23 13:52:01 +00:00
|
|
|
rules:
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["secrets"]
|
|
|
|
verbs: ["get", "list"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["persistentvolumes"]
|
|
|
|
verbs: ["get", "list", "watch", "create", "delete"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["persistentvolumeclaims"]
|
|
|
|
verbs: ["get", "list", "watch", "update"]
|
|
|
|
- apiGroups: ["storage.k8s.io"]
|
|
|
|
resources: ["storageclasses"]
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["events"]
|
|
|
|
verbs: ["list", "watch", "create", "update", "patch"]
|
|
|
|
- apiGroups: ["snapshot.storage.k8s.io"]
|
|
|
|
resources: ["volumesnapshots"]
|
|
|
|
verbs: ["get", "list"]
|
|
|
|
- apiGroups: ["snapshot.storage.k8s.io"]
|
|
|
|
resources: ["volumesnapshotcontents"]
|
|
|
|
verbs: ["get", "list"]
|
|
|
|
- apiGroups: ["storage.k8s.io"]
|
|
|
|
resources: ["csinodes"]
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["nodes"]
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-provisioner
|
2020-04-23 13:52:01 +00:00
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-driver
|
|
|
|
namespace: {{ .Release.Namespace }}
|
2020-04-23 13:52:01 +00:00
|
|
|
roleRef:
|
|
|
|
kind: ClusterRole
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-provisioner
|
2020-04-23 13:52:01 +00:00
|
|
|
apiGroup: rbac.authorization.k8s.io
|
2020-04-24 11:48:09 +00:00
|
|
|
---
|
|
|
|
kind: ClusterRole
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-broker
|
2020-04-24 11:48:09 +00:00
|
|
|
rules:
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["persistentvolumes"]
|
|
|
|
verbs: ["get"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["pods"]
|
2020-04-24 17:02:44 +00:00
|
|
|
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
|
2020-04-24 11:48:09 +00:00
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-broker
|
2020-04-24 11:48:09 +00:00
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-driver
|
|
|
|
namespace: {{ .Release.Namespace }}
|
2020-04-24 11:48:09 +00:00
|
|
|
roleRef:
|
|
|
|
kind: ClusterRole
|
2020-04-28 13:22:20 +00:00
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-broker
|
2020-04-24 11:48:09 +00:00
|
|
|
apiGroup: rbac.authorization.k8s.io
|
Support online volume expansion
Summary:
Online volume expansion is a 2 phase process:
1. The backing storage, in this case the raw file, needs to be resized. (i.e. `truncate -s`)
2. The node should be notified, so that it can both refresh its device capacity (i.e. `losetup -c`) and resize the filesystem (`resize2fs`) accordingly.
Although in our case both steps could be performed on the node itself, for the sake of following the semantics of how volume expansion works, we perform step 1 from the controller, and step 2 from the node.
Also, the `external-resizer` component is added which watches for PVC size updates, and notifies the CSI controller about it.
Test Plan:
Setup:
- Deploy
- Create a rawfile-backed pvc, and attach a Deployment to it
- Keep an eye on `rawfile` pod logs in `kube-system` namespace to see if any errors pop out during all scenarios
Scenario 1:
- Increase the size of the pvc
- Exec into the pod and verify that the volume is resized indeed (using `df`)
Scenario 2:
- Decrease deployment's replica to 0
- Increase the size of the pvc. Wait for a couple of minutes.
- Increase deployment's replica to 1
- Exec into the pod and verify that the volume is resized indeed.
Reviewers: bghadiri, mhyousefi, h.marvi, sina_rad
Reviewed By: bghadiri, mhyousefi, sina_rad
Differential Revision: https://phab.hamravesh.ir/D817
2020-06-12 12:12:49 +00:00
|
|
|
---
|
|
|
|
kind: ClusterRole
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-resizer
|
|
|
|
rules:
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["secrets"]
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["persistentvolumes"]
|
|
|
|
verbs: ["get", "list", "watch", "patch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["persistentvolumeclaims"]
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["pods"]
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["persistentvolumeclaims/status"]
|
|
|
|
verbs: ["patch"]
|
|
|
|
- apiGroups: [""]
|
|
|
|
resources: ["events"]
|
|
|
|
verbs: ["list", "watch", "create", "update", "patch"]
|
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-resizer
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-driver
|
|
|
|
namespace: {{ .Release.Namespace }}
|
|
|
|
roleRef:
|
|
|
|
kind: ClusterRole
|
|
|
|
name: {{ include "rawfile-csi.fullname" . }}-resizer
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|