From 03c2371b51bdceb0008b3773f4797414dfd94d2d Mon Sep 17 00:00:00 2001 From: lubronzhan Date: Tue, 18 Oct 2022 18:32:57 -0700 Subject: [PATCH] Bump to 1.25.0 --- charts/vsphere-cpi-1.25.0.tgz | Bin 0 -> 6679 bytes charts/vsphere-cpi/Chart.yaml | 4 +- charts/vsphere-cpi/README.md | 2 +- charts/vsphere-cpi/templates/daemonset.yaml | 18 +- charts/vsphere-cpi/values.yaml | 4 +- cluster/images/controller-manager/Dockerfile | 2 +- .../book/tutorials/disable-node-deletion.yaml | 2 +- index.yaml | 25 +- .../vsphere-cloud-controller-manager.yaml | 263 ++++++++++++++++++ 9 files changed, 301 insertions(+), 19 deletions(-) create mode 100644 charts/vsphere-cpi-1.25.0.tgz create mode 100644 releases/v1.25/vsphere-cloud-controller-manager.yaml diff --git a/charts/vsphere-cpi-1.25.0.tgz b/charts/vsphere-cpi-1.25.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..22cec3a59499cfba59ad4ea1370a7096917eba32 GIT binary patch literal 6679 zcmV+y8tCO8iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBjbKADEa6j``>|?i+I47k1o{Z*6XI$Iq@!Z7qjnmwAayvCd zt|ZhXzypAC)HwII-@yw>kfJQvR^9d<^Fv}0%Uxix*j+4^%Zbd#C@_q3+B+N*p`t0t z(yvx}ZEkLE?(goJ|2H=`+y8Iw?`?jywY#&uv%mXddu!*b&8?l??cJ|nbG6;*z6z;` z_-gaswAzFFn_MKPA5cijSsy0b0m<{~=T@}67i|U!%2?1`nR^HDPfRn2wWPq13z(c6 z`GLcf7YUpRKA{N;IAIFKki-aY2_qvE@bvKPWFr{!4Er!vDwq9UZ$#C&7(_A8dY8oj z1w)0h7i&~u?ofqJLIWD>4wR1yauwOf3yC7;Od(UtVd`Z>Dipnh$Feucu86>2Q$FHR z&PKr{POrE~WIqU@q#S~U3PLa#gAhub`c_T@M)a_}wG>ERh!_o;JB@bInuR}V{{8ho zA!&hf^$K9Y`rm!Ax7S|(`!62X|ASoXaD+orqzdfpHy8EUNffNZ`!SV3B@p=e;O(1m z$VEn!!UTpiMGfG=muQGU7ztkFn808PG0$?&kf|UTrF=lregF`2Hl!o{7XUIcNHOWd zkfaiWpl)lm0JIjHSw9v$0GPz6RZkz*++R`3W0I}~09sMlXV>(f`c_V))XTjOYx+-p zDSfH{)T8Hx-V>+ZL;cAR(i~`P0 zJIFCF(gX$wu|Q&2DR|}>;#g>K*ycVcQJ_QmevF0%z=xp5SfUg-L?JK%#ep)@(#0Y; zH2=LNxkGm{gefls{70pdAWwYjmY3r!rQl#pv)lDp3g=ku)EZs7ZmODZj$xOmMAVPDzHc z4^N&wxeboQDm4#BAD$#UzSMT#ww3rwZq^6~sFuPf3Z`g=HNs#W-W5zQV?`)KA@u?o zlZjanR-lci@<~ON+NBbnFh1bP^a(uO-`m^S?U{c!^eRrMRD!1{Wl&-`v9m6= z*n#{}YR$E^xw#bp4CVJ)2fN?8d*2-#IyF-WBbk91kXU2uQdb6CpmSzs)mG5bP=Q1- zp)nrBF)x^!hnB#318y9+S9Zo0TdbaVd9)QfV@akr&{1-c*@n8K&j0mK*D6% za+ns{Q+-W^)GcwAq?DnxE-4?4C>!-*+sW}89-GdV>@nSQMV{;NRgKW87@-rKJq zte)K3ercY}d2%o_#p~;EPz}H+@stcOm9|MNs~7o13nyOnuDH0QY!qHmH4gdUH;k3+ zS(H87hd1VjM_#Kx>xbzXa>@l1Pti)LbW^E0N@7ev<2K$+nBb5yGrPur@Sf?z$6vZO z5x)PgFw>?VW$*Nd_s8dv`lMFkV=mhN?`&}|K! z|NiFo*5mqri0kv`-ZPlctZ%k;+Ni5(j<592io|2=!?WI(FF~Neg5yuQ-sh>7A7+Aq zQD6W+e-6PKAy|uZ8fmyS2r@a9NO)t%O=H2nD9MCGda z>c8@NSUtH0PbrJjBAF4yXroIOYm#%NvL>^(%wzWug|*I+-c=47>?Jvk29za~jn-x; z_rHlYhxOpx7CAzeTY|ILahW^e0pPMb(JHkdNo9d<<$2@53xy@_UTQ!YI=wI-4OcSAn zZb_^Fp>_i8W9ClDAdgoqw*A?b_OE$$`+rr`U?qn^3;e(By%+8C-~FBK7mxnmLtHI| zZ6`i*kwv(!ExZG;r#Edly}lYJ$y>oCWl7&VZOBlOgecOl0(5#8*CguV~MH?X}EF?7Hsz6y~<3SdP#S zi}m5!1);3zfn4w$g`z0!NsT>QF|oUbFQ|9qdb=xK05yThp*fk7P_R_1cJ8bg(}+G$ zp$d{(kP>5LNY`g>`qGNO54*cN?)SR!{V6jcW(Q&5`5pF3{Q33-yWZY)5R%!cI7_ zYOwaKcNU$#zYv)L`ipua-S)qBz#qW=@9*!n_rT=v+ko@#7g%>Cl_bFT&wQlaEP($!zn+H$Cwl;&Jqg+Pq9VACT%W81E8I2q8ASwf1*;!rAD3$uDE!?d8&8I=g1t z^oFUkRguvQqBAcgrt_gXXU2b)h*4|z5r)mooL6N|brWdvs*{RKvWZ-NjZex)Ze9DE zQFz%jQ9`xw^p=Jn(iEGty=dtrPM^cqM!%Y%>0FHMT%6g_eEw|E!Iv+eKkJp~uzvZX zhgSXg{JAOYohtxf!qXzdw_3tmb7Int&WIY%ncMj+^U%!Xks7$rQfR8N z>gp6XUpG|wNv%=O)qgdbTKjEn-e7-AmU$$?B?lRok+psYhwNO=3F_(T3_C+_w#6Ku zeEH(b`AoOTaHviGv?i|A%fZZDFu7S&U~*Il%0|x4Q8qdmF<#xarb=%@nuFm9o;z3g zJ&H^=n?vgvAAiaPO6fZ;HN+iketFHYmn)*(@@M7}{e$;^-TVKXC#4Ov*}V6P11yUF zZ*T24_y60QTYEc?`~QcyS}JiS^WAsB{8)iY@}6uBP?0iZaMphMPYE4#B%|Ldh_GO1 zw~%8q;epnMxWk0pjN}@cA%l*9fjRO$6LdmT9O1EyNlNS+d*#~-dD-Z_!O$>1Av~#U z%9HYrjjvZfG0WBThzfn9;k1?*_05yB!{&{%lcV}Z?QvUX7b*7P$=gDzce=%r64e>8 z)3ub{)29sVYc2*f zF*)08Wb-pQSN6@VsM-0gX1DhD_ICDy+SPi;xq4k?lh^Mgl;&UX{E*~iKvSw{EprEN z-gpQ0f3`OK_q)37zxG!`m(X(mBY;Kre|M|>{^$OSok#osAXm$pi2;ct_j2FdL;W{Y zdWQn=`Aa|*X69XIAKu_1g&K1~e>c`Bx_oJT--*^G7S}tT;&)cif_CiLIt(sy5)(yI zK5{7fB&YTSHq;c5DQe$-F%dRr$kW?~%;z{1{%WWKC(HQ~%N;#v0`G8Gx;@l|vgR_- zz}5Won1!DdGR^*QF@t1bUq{hoLyzp*nuovnl9fkkx!Bfn4Ir-Mk8Tg}K5U|yY zmU=tDPXPB`66mTbw8EDKybSf#y(S=)plo#H2E2+C@~EzEwTkrdYxq~eRdwRAg8r>G z3*GDAzxf94p4UA6Z#4=I(ww|NF)6#rW$#8e^JKlb5qn8jIHd-pu*W&i>A0{f`H^*5QmOg~C>qvXc*2V`MNW zXlhP{a}r;Y5z49*sC#!@f*fO-nwJZ0HWX!}=O8d8icV1Pw#VLm!jfPe7>;a}vZuMg zA^lXAulj!*5&Xc?DR5?<)Lqj1Trg>YL3DKf>$&0rgLOFMS;iTBI6Q}h3K>Krs(R*M z+x;LK{4RRt-}1(I)YJczKjnn=YD5DPUlzG7g%&)EQ)Uj8zcP1WC`r3I5yPQ8)PO|K0Jy(c9xFOIA$d=Jmh5v-6@||7ZKf z{$u^$2f5ap6}-bkYa>yFW#Mj9@Y~dP34)J{%6g(U`o^v#@kg&G36BetPNkoznbc8M zQ4x75dnCyyqvlZ54Wj4fJ8b)Rz4du5rRTR%N<~%hPIu3UxqCg`$o)>V`Hvv@_^uGri;rrWX~7 zjTudFf+^26r$AB`Bb@RHZ0$UU?al4Y2wrnxYwS^GD|1uMo`Xa?k00yhE8z%pfv!rZ zrg-3}pK?X#tX;3)>)#x|{^q-v-@JSsCN-jvuq1TD2$?~&VT?U|v@aOeXf>`#j(dZY zj~vcWGtNiX+px6*Ns<^OHX3S%;*UhDg6?(m+!Qm639DA^kf$lX(o-7qEF&!G2f@X~ z#em3hV9E;WJ{W?YG3=`H>DV&2^s9%>1#vGfE`s135k8JF%}vuRJB)}MKI?ye)j+)s zJ3`yv=1S50(f*mK^KGQJuEJ(mHki8Qs)t+_Zt#So7Yj^~DN0iLe0eSv`ACoiAq-2h zKD!#<5%BJZVYR_>6}(M;AcSFEeYcDfzA_aj8Z9n>^y>eY<2X6{wh2*&tZI-S-JKR- z89S;0&)l6BU|oQq20g0oeQPK6AT|0?uh4Y*+?B>RJ|w6yQB}Mc&O?jq081^Kz|~kIqD|#w>+G5Jj-N=Dr`VpNu89eU;CyXe$g!nqCCo!ij>6OiM#J#4E@sE3}@lRc}OQ7?*Qby{*Xm!MAXs z`4g+u)G{?~{tEf}^x*CB`PsqYv8K?V+6@%g^8Ii{Yz1t`Y-{!T6@v@E63vCt51t8j zb^0$n{$Ie;VJ%_LZ3T1foIzHkDo@cb`_Zck(s1Ebb}?l+Hfl}WSqQeHXU%@N&JCs} z$GBVtwVwJo$ARb;yGYWJEE5(~p-nYOr6;Z-XCB+*vBWR;J(l+s** zsh5=>FyMWvLh?TA2IRa$WeS(Ml=tY=vL?pYiS zWnx9yazv{JZ?x-fl?1Msw0nA)ftAnhl+RXufRFEv-y9#DAOEVA@-LPJdbd!HOJK$) zXm^*oqyA2;-fR*nc}&elsamSFLuY#`{RJHP=CJC`LW5ZIZfTSFo=ZvO{Nn6@; zYEE3t0GH#|^xS7$+#+&C6dY~)MWj2?u3qSx;rY9=rSavM3;X4m3!u!>-rC&UT5jA+ zUk0@P5REO?&<(W|x~_4%H`h9N{@S+OFzUb4xSL+f%y2!dRZ(e4wI2>z$EFA$%CGmp zt!2%7(SJT+gZ0!e?(V)%RuRrferMXwC%b9fumAJtRBt9u&U6n-C#nqvjgPx6MZ5I& z<`Td5i(J|)m`*6uyl~hJ+NA@z1nnxrrJJ^Hz8&q_C!It6+H+B*aX-q>$N9{^21w$? zl$*30DP&#bD>--Wt%>maB3{zIg)N!Q7V94PTse1rsc3g4n9ZT>rOz)|V{Y6=w-|>+ z{{`+nA9GJnx*Z3e{E^nRq3rca;|CD<+vCQN9M)o=t=24rD^-0ubZ9nYdGZzdS6QHMhO=mf4R{v%%knl&eN%XAnj&x&NhNSR;O0g zEa!~-O(HEws&xg+|J$T; zN)z+x%{JJMb(w@$2k8}=$`zc}-R+z%2-ervo!M7pB!j>=fqXdB_=q`Fp{huXQ}j^- z-tkneJh9rS`aN+uYhIkud{&_R=0M#~II=kgD8S~w>Y;pZPu(uO^SBF}Bv(_PLCzdApcfAqn8unuQ7tSdXN1uqN_ETA_8ZPg5=~H3 zwuu;)0hA^9NsldxJhqs-5J4CgBE1ufgLODX8@JDRqSc9AJ8EpdSA}3vRAFP?Wagoe z2E?8S8*vzo!<>vz1|zD>{72@mm}ePP5N5CzMNzb7Zsvs?+txA0m%LETr!y2IbhvAH htrY(3%)7_y@p`--uRr(t-v9sr|Nl1Jo}B=S006sTV" + 10.0.0.1.password: "" + 1.2.3.4.username: "" + 1.2.3.4.password: "" +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: vsphere-cloud-config + labels: + vsphere-cpi-infra: config + component: cloud-controller-manager + namespace: kube-system +data: + # NOTE: this is just an example configuration, update with real values based on your environment + vsphere.conf: | + # Global properties in this section will be used for all specified vCenters unless overriden in VirtualCenter section. + global: + port: 443 + # set insecureFlag to true if the vCenter uses a self-signed cert + insecureFlag: true + # settings for using k8s secret + secretName: vsphere-cloud-secret + secretNamespace: kube-system + + # vcenter section + vcenter: + your-vcenter-name-here: + server: 10.0.0.1 + user: use-your-vcenter-user-here + password: use-your-vcenter-password-here + datacenters: + - hrwest + - hreast + could-be-a-tenant-label: + server: 1.2.3.4 + datacenters: + - mytenantdc + secretName: cpi-engineering-secret + secretNamespace: kube-system + + # labels for regions and zones + labels: + region: k8s-region + zone: k8s-zone +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: servicecatalog.k8s.io:apiserver-authentication-reader + labels: + vsphere-cpi-infra: role-binding + component: cloud-controller-manager + namespace: kube-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader +subjects: + - apiGroup: "" + kind: ServiceAccount + name: cloud-controller-manager + namespace: kube-system + - apiGroup: "" + kind: User + name: cloud-controller-manager +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: system:cloud-controller-manager + labels: + vsphere-cpi-infra: cluster-role-binding + component: cloud-controller-manager +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:cloud-controller-manager +subjects: + - kind: ServiceAccount + name: cloud-controller-manager + namespace: kube-system + - kind: User + name: cloud-controller-manager +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: system:cloud-controller-manager + labels: + vsphere-cpi-infra: role + component: cloud-controller-manager +rules: + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - "" + resources: + - nodes + verbs: + - "*" + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - apiGroups: + - "" + resources: + - services + verbs: + - list + - patch + - update + - watch + - apiGroups: + - "" + resources: + - services/status + verbs: + - patch + - apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - create + - get + - list + - watch + - update + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - get + - list + - watch + - update + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - "coordination.k8s.io" + resources: + - leases + verbs: + - create + - get + - list + - watch + - update +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: vsphere-cloud-controller-manager + labels: + component: cloud-controller-manager + tier: control-plane + namespace: kube-system +spec: + selector: + matchLabels: + name: vsphere-cloud-controller-manager + updateStrategy: + type: RollingUpdate + template: + metadata: + labels: + name: vsphere-cloud-controller-manager + component: cloud-controller-manager + tier: control-plane + spec: + tolerations: + - key: node.cloudprovider.kubernetes.io/uninitialized + value: "true" + effect: NoSchedule + - key: node-role.kubernetes.io/master + effect: NoSchedule + operator: Exists + - key: node-role.kubernetes.io/control-plane + effect: NoSchedule + operator: Exists + - key: node.kubernetes.io/not-ready + effect: NoSchedule + operator: Exists + securityContext: + runAsUser: 1001 + serviceAccountName: cloud-controller-manager + priorityClassName: system-node-critical + containers: + - name: vsphere-cloud-controller-manager + image: gcr.io/cloud-provider-vsphere/cpi/release/manager:v1.25.0 + args: + - --cloud-provider=vsphere + - --v=2 + - --cloud-config=/etc/cloud/vsphere.conf + volumeMounts: + - mountPath: /etc/cloud + name: vsphere-config-volume + readOnly: true + resources: + requests: + cpu: 200m + hostNetwork: true + volumes: + - name: vsphere-config-volume + configMap: + name: vsphere-cloud-config + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: node-role.kubernetes.io/control-plane + operator: Exists + - matchExpressions: + - key: node-role.kubernetes.io/master + operator: Exists