mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-18 02:50:30 +00:00
helm: CSIDriver add labels and seLinuxMount disabling method
Signed-off-by: Ruslan Khizhnyak <rkhizhnyak@ptsecurity.com>
This commit is contained in:
parent
cd18490451
commit
d56c9abbce
@ -2,10 +2,16 @@ apiVersion: storage.k8s.io/v1
|
|||||||
kind: CSIDriver
|
kind: CSIDriver
|
||||||
metadata:
|
metadata:
|
||||||
name: {{ .Values.driverName }}
|
name: {{ .Values.driverName }}
|
||||||
|
labels:
|
||||||
|
app: {{ include "ceph-csi-cephfs.name" . }}
|
||||||
|
chart: {{ include "ceph-csi-cephfs.chart" . }}
|
||||||
|
release: {{ .Release.Name }}
|
||||||
|
heritage: {{ .Release.Service }}
|
||||||
|
{{- with .Values.commonLabels }}{{ toYaml . | trim | nindent 4 }}{{- end }}
|
||||||
spec:
|
spec:
|
||||||
attachRequired: false
|
attachRequired: false
|
||||||
podInfoOnMount: false
|
podInfoOnMount: false
|
||||||
fsGroupPolicy: {{ default "File" .Values.CSIDriver.fsGroupPolicy }}
|
fsGroupPolicy: {{ .Values.CSIDriver.fsGroupPolicy }}
|
||||||
{{- if semverCompare ">= 1.25.x" .Capabilities.KubeVersion.Version }}
|
{{- if and (semverCompare ">= 1.25.x" .Capabilities.KubeVersion.Version) .Values.seLinuxMount }}
|
||||||
seLinuxMount: true
|
seLinuxMount: true
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
@ -57,6 +57,7 @@ sidecarLogLevel: 1
|
|||||||
# accessModes contains ReadWriteOnce.
|
# accessModes contains ReadWriteOnce.
|
||||||
CSIDriver:
|
CSIDriver:
|
||||||
fsGroupPolicy: "File"
|
fsGroupPolicy: "File"
|
||||||
|
seLinuxMount: true
|
||||||
|
|
||||||
nodeplugin:
|
nodeplugin:
|
||||||
name: nodeplugin
|
name: nodeplugin
|
||||||
|
@ -2,10 +2,16 @@ apiVersion: storage.k8s.io/v1
|
|||||||
kind: CSIDriver
|
kind: CSIDriver
|
||||||
metadata:
|
metadata:
|
||||||
name: {{ .Values.driverName }}
|
name: {{ .Values.driverName }}
|
||||||
|
labels:
|
||||||
|
app: {{ include "ceph-csi-rbd.name" . }}
|
||||||
|
chart: {{ include "ceph-csi-rbd.chart" . }}
|
||||||
|
release: {{ .Release.Name }}
|
||||||
|
heritage: {{ .Release.Service }}
|
||||||
|
{{- with .Values.commonLabels }}{{ toYaml . | trim | nindent 4 }}{{- end }}
|
||||||
spec:
|
spec:
|
||||||
attachRequired: true
|
attachRequired: true
|
||||||
podInfoOnMount: false
|
podInfoOnMount: false
|
||||||
fsGroupPolicy: File
|
fsGroupPolicy: {{ .Values.CSIDriver.fsGroupPolicy }}
|
||||||
{{- if semverCompare ">= 1.25.x" .Capabilities.KubeVersion.Version }}
|
{{- if and (semverCompare ">= 1.25.x" .Capabilities.KubeVersion.Version) .Values.seLinuxMount }}
|
||||||
seLinuxMount: true
|
seLinuxMount: true
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
@ -69,6 +69,24 @@ logLevel: 5
|
|||||||
# sidecarLogLevel is the variable for Kubernetes sidecar container's log level
|
# sidecarLogLevel is the variable for Kubernetes sidecar container's log level
|
||||||
sidecarLogLevel: 1
|
sidecarLogLevel: 1
|
||||||
|
|
||||||
|
# Set fsGroupPolicy for CSI Driver object spec
|
||||||
|
# https://kubernetes-csi.github.io/docs/support-fsgroup.html
|
||||||
|
# The following modes are supported:
|
||||||
|
# - None: Indicates that volumes will be mounted with no modifications, as the
|
||||||
|
# CSI volume driver does not support these operations.
|
||||||
|
# - File: Indicates that the CSI volume driver supports volume ownership and
|
||||||
|
# permission change via fsGroup, and Kubernetes may use fsGroup to change
|
||||||
|
# permissions and ownership of the volume to match user requested fsGroup in
|
||||||
|
# the pod's SecurityPolicy regardless of fstype or access mode.
|
||||||
|
# - ReadWriteOnceWithFSType: Indicates that volumes will be examined to
|
||||||
|
# determine if volume ownership and permissions should be modified to match
|
||||||
|
# the pod's security policy.
|
||||||
|
# Changes will only occur if the fsType is defined and the persistent volume's
|
||||||
|
# accessModes contains ReadWriteOnce.
|
||||||
|
CSIDriver:
|
||||||
|
fsGroupPolicy: "File"
|
||||||
|
seLinuxMount: true
|
||||||
|
|
||||||
nodeplugin:
|
nodeplugin:
|
||||||
name: nodeplugin
|
name: nodeplugin
|
||||||
# set user created priorityclassName for csi plugin pods. default is
|
# set user created priorityclassName for csi plugin pods. default is
|
||||||
|
Loading…
Reference in New Issue
Block a user