Automated Manifest Update (#2342)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #2342
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #2342.
This commit is contained in:
2025-12-10 00:19:03 +00:00
committed by Alex Lebens
parent 648daeec0a
commit 81048e096c
1118 changed files with 29 additions and 1632 deletions

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/driver.yaml
apiVersion: storage.k8s.io/v1
kind: CSIDriver
metadata:
@@ -12,8 +11,3 @@ metadata:
spec:
attachRequired: true
podInfoOnMount: true
# https://kubernetes.io/blog/2020/12/14/kubernetes-release-1.20-fsgroupchangepolicy-fsgrouppolicy/
# added in Kubernetes 1.16
# volumeLifecycleModes:
# - Persistent
# - Ephemeral

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller-rbac.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
@@ -10,7 +9,6 @@ metadata:
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
rules:
# Allow listing and creating CRDs
- apiGroups: ['apiextensions.k8s.io']
resources: ['customresourcedefinitions']
verbs: ['list', 'create']
@@ -71,7 +69,6 @@ rules:
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["get", "watch", "list", "delete", "update", "create"]
# capacity rbac
- apiGroups: ["storage.k8s.io"]
resources: ["csistoragecapacities"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node-rbac.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
@@ -10,7 +9,6 @@ metadata:
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
rules:
# Allow listing and creating CRDs
- apiGroups: ['apiextensions.k8s.io']
resources: ['customresourcedefinitions']
verbs: ['list', 'create']

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller-rbac.yaml
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node-rbac.yaml
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node.yaml
kind: DaemonSet
apiVersion: apps/v1
metadata:
@@ -33,11 +32,9 @@ spec:
spec:
serviceAccount: democratic-csi-synology-iscsi-node-sa
priorityClassName: "system-node-critical"
# Required by iSCSI
hostNetwork: true
dnsPolicy: ClusterFirstWithHostNet
hostAliases: []
# Required by multipath detach
hostIPC: true
hostPID: true
containers:
@@ -68,7 +65,6 @@ spec:
value: nsenter
- name: ISCSIADM_HOST_PATH
value: /usr/local/sbin/iscsiadm
# prevent crazy error messages due to the /dev host mount
terminationMessagePath: /tmp/termination-log
terminationMessagePolicy: File
livenessProbe:
@@ -155,7 +151,6 @@ spec:
- "--"
args: ["while true; do sleep 2; done;"]
lifecycle:
# note this runs *before* other containers are terminated
preStop:
exec:
command: ["/bin/sh", "-c", "rm -rf /plugins/org.democratic-csi.iscsi-synology /registration/org.democratic-csi.iscsi-synology-reg.sock"]

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller.yaml
kind: Deployment
apiVersion: apps/v1
metadata:
@@ -39,7 +38,6 @@ spec:
hostAliases: []
hostIPC: false
containers:
# https://github.com/kubernetes-csi/external-attacher
- name: external-attacher
image: "registry.k8s.io/sig-storage/csi-attacher:v4.4.0"
args:
@@ -52,7 +50,6 @@ spec:
volumeMounts:
- mountPath: /csi-data
name: socket-dir
# https://github.com/kubernetes-csi/external-provisioner
- name: external-provisioner
image: "registry.k8s.io/sig-storage/csi-provisioner:v3.6.0"
args:
@@ -82,7 +79,6 @@ spec:
fieldRef:
apiVersion: v1
fieldPath: metadata.name
# https://github.com/kubernetes-csi/external-resizer
- name: external-resizer
image: "registry.k8s.io/sig-storage/csi-resizer:v1.9.0"
args:
@@ -111,10 +107,6 @@ spec:
fieldRef:
apiVersion: v1
fieldPath: metadata.name
# https://github.com/kubernetes-csi/external-snapshotter
# beware upgrading version:
# - https://github.com/rook/rook/issues/4178
# - https://github.com/kubernetes-csi/external-snapshotter/issues/147#issuecomment-513664310
- name: external-snapshotter
image: "registry.k8s.io/sig-storage/csi-snapshotter:v8.2.1"
args:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/templates/external-secret.yaml
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:

View File

@@ -1,5 +1,3 @@
---
# Source: democratic-csi-synology-iscsi/templates/namespace.yaml
apiVersion: v1
kind: Namespace
metadata:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller-rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node-rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/storage-classes.yaml
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
@@ -15,4 +14,3 @@ allowVolumeExpansion: true
volumeBindingMode: Immediate
parameters:
fsType: "ext4"
# this loop is deeply connected to the loop for Secret creation below

View File

@@ -1,5 +1,4 @@
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/storage-classes.yaml
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
@@ -15,5 +14,3 @@ allowVolumeExpansion: true
volumeBindingMode: Immediate
parameters:
fsType: "ext4"
# this loop is deeply connected to the loop for Secret creation below
# this loop is deeply connected to the loop for secret parameter settings above