ceph-csi/deploy/rbd/kubernetes
ShyamsundarR 2064e674a4 Addressed using k8s client APIs to fetch secrets
Based on the review comments addressed the following,
- Moved away from having to update the pod with volumes
when a new Ceph cluster is added for provisioning via the
CSI driver

- The above now used k8s APIs to fetch secrets
  - TBD: Need to add a watch mechanisim such that these
secrets can be cached and updated when changed

- Folded the Cephc configuration and ID/key config map
and secrets into a single secret

- Provided the ability to read the same config via mapped
or created files within the pod

Tests:
- Ran PV creation/deletion/attach/use using new scheme
StorageClass
- Ran PV creation/deletion/attach/use using older scheme
to ensure nothing is broken
- Did not execute snapshot related tests

Signed-off-by: ShyamsundarR <srangana@redhat.com>
2019-03-26 16:19:24 +00:00
..
csi-attacher-rbac.yaml add csinodeinfos rules 2019-02-27 19:32:07 +05:30
csi-nodeplugin-rbac.yaml Addressed using k8s client APIs to fetch secrets 2019-03-26 16:19:24 +00:00
csi-provisioner-rbac.yaml add event rules for provisioner 2019-03-04 14:34:14 +00:00
csi-rbdplugin-attacher.yaml rename socket directory to a common name 2019-03-22 09:58:21 +05:30
csi-rbdplugin-provisioner.yaml Addressed using k8s client APIs to fetch secrets 2019-03-26 16:19:24 +00:00
csi-rbdplugin.yaml Addressed using k8s client APIs to fetch secrets 2019-03-26 16:19:24 +00:00