From b5a9fd67a069081a7c66f52b0d7870b4f9748661 Mon Sep 17 00:00:00 2001 From: Ye Chen <127243817+yec-akamai@users.noreply.github.com> Date: Tue, 13 Feb 2024 15:17:49 -0500 Subject: [PATCH] Release v0.7.0 (#62) * release v0.7.0 * add release v0.7.0 --- package.json | 2 +- releases/v0.7.0/component.css | 3 + releases/v0.7.0/component.js | 138 ++++++ releases/v0.7.0/linode-addons.yml | 718 ++++++++++++++++++++++++++++++ releases/v0.7.0/linode.svg | 22 + 5 files changed, 882 insertions(+), 1 deletion(-) create mode 100644 releases/v0.7.0/component.css create mode 100644 releases/v0.7.0/component.js create mode 100644 releases/v0.7.0/linode-addons.yml create mode 100644 releases/v0.7.0/linode.svg diff --git a/package.json b/package.json index ea17b7e..337de64 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "ui-driver-linode", - "version": "0.6.0", + "version": "0.7.0", "description": "Rancher UI driver for the Linode docker-machine driver", "repository": { "type": "git", diff --git a/releases/v0.7.0/component.css b/releases/v0.7.0/component.css new file mode 100644 index 0000000..da41fd1 --- /dev/null +++ b/releases/v0.7.0/component.css @@ -0,0 +1,3 @@ +.machine-driver.linode { + background-image: url('linode.svg'); +} diff --git a/releases/v0.7.0/component.js b/releases/v0.7.0/component.js new file mode 100644 index 0000000..098acdc --- /dev/null +++ b/releases/v0.7.0/component.js @@ -0,0 +1,138 @@ +"use strict"; + +define("nodes/components/driver-linode/component", ["exports", "shared/mixins/node-driver"], function (exports, _nodeDriver) { + "use strict"; + + Object.defineProperty(exports, "__esModule", { + value: true + }); + const LAYOUT = "<section class="horizontal-form">
  {{#accordion-list showExpandAll=false as | al expandFn |}}
   {{#if (eq step 1)}}
      {{#accordion-list-item
         title=(t "modalAddCloudKey.linode.token.label")
         detail=(t "modalAddCloudKey.linode.token.help" htmlSafe=true)
         expandAll=expandAll
         expand=(action expandFn)
         expandOnInit=true
      }}
        {{form-auth-cloud-credential
          driverName=driverName
          parseAndCollectErrors=(action "errorHandler")
          primaryResource=primaryResource
          cloudCredentials=cloudCredentials
          finishAndSelectCloudCredential=(action "finishAndSelectCloudCredential")
          progressStep=(action "authLinode")
          cancel=(action "cancel")
          createLabel="modalAddCloudKey.linode.authAccountButton"
        }}
      {{/accordion-list-item}}
    {{top-errors errors=errors}}
  {{else}}
  {{#accordion-list showExpandAll=false as | al expandFn |}}
    {{!-- This line shows the driver title which you don't have to change it --}}
    <div class="over-hr"><span>{{driverOptionsTitle}}</span></div>
      {{#accordion-list-item
        title="Instance Options"
        detail="Configure the options for the Linode Instances that will be created by this template."
        expandAll=expandAll
        expand=(action expandFn)
        expandOnInit=true
      }}
      {{!-- Start of Linode Options --}}
        <div class="row">
          <div class="col span-6">
            <label class="acc-label">Region</label>
            <select class="form-control" onchange={{action (mut model.linodeConfig.region) value="target.value" }}>
              {{#each regionChoices as |choice|}}
                <option value={{choice.id}} selected={{eq model.linodeConfig.region choice.id}}>{{choice.label}}</option>
              {{/each}}
            </select>
          </div>

          <div class="col span-6">
            <label class="acc-label">Instance Type</label>
            <select class="form-control" onchange={{action (mut model.linodeConfig.instanceType) value="target.value" }}>
              {{#each sizeChoices as |choice|}}
                <option value={{choice.id}} selected={{eq model.linodeConfig.instanceType choice.id}}>{{choice.label}} - {{choice.vcpus}} vCPUs, {{choice.memory}}GB Memory, {{choice.disk}}GB Disk space</option>
              {{/each}}
            </select>
          </div>
        </div>
        <div class="row">
          <div class="col span-6">
            <label class="acc-label">Image</label>
            <select class="form-control" onchange={{action (mut model.linodeConfig.image) value="target.value" }}>
              {{#each imageChoices as |choice|}}
                <option value={{choice.id}} selected={{eq model.linodeConfig.image choice.id}}>{{choice.label}}</option>
              {{/each}}
            </select>
          </div>
          {{#unless profile.restricted }}
            <div class="col span-6">
              <label class="acc-label">Tags</label>
              {{ input classNames="form-control" placeholder="Examples: tagA, tagB, tagC" value=model.linodeConfig.tags }}
            </div>
          {{/unless}}
        </div>
        <div class="row">
          <div class="col span-6">
            <label class="acc-label">Private IP</label>
            <div class="checkbox">
              <label class="acc-label">{{input type="checkbox" checked=model.linodeConfig.createPrivateIp}} Add a Private IP</label>
            </div>
          </div>
        </div>
      {{/accordion-list-item}}
      {{!-- End of Linode Options --}}
      {{#accordion-list-item
        title="Authentication"
        detail="Configure Linode user SSH Keys and a password for the 'root' user account"
        expandAll=expandAll
        expand=(action expandFn)
        expandOnInit=false
      }}
        <div class="row">
          <div class="col span-12">
            <label class="acc-label">Password for the "root" user</label>
            {{ input
              type="password"
              classNames="form-control"
              value=model.linodeConfig.rootPass
              placeholder="aComplexP@ssword"
            }}
          </div>
          <div class="col span-12">
            <label class="acc-label">Linode Usernames</label>
            {{ input classNames="form-control" placeholder="yourusername" value=model.linodeConfig.authorizedUsers }}
          </div>
        </div>
      {{/accordion-list-item}}
      {{#accordion-list-item
        title="StackScripts"
        detail="Configure a StackScript to run on first boot"
        expandAll=expandAll
        expand=(action expandFn)
        expandOnInit=false
      }}
        <div class="row">
          <div class="col span-12">
            <label class="acc-label">StackScript (<a href="https://cloud.linode.com/stackscripts" target="_blank" rel="nofollow noreferrer noopener">manage your StackScripts</a>)</label>
            {{ input
            classNames="form-control"
            placeholder="Examples: 'username/Stackscript Label' or '12345'"
            value=model.linodeConfig.stackscript
            }}
          </div>
          <div class="col span-12">
            <label class="acc-label">StackScript Variables</label>
            {{ textarea classNames="form-control" placeholder='{ "example": "value", "json": true }' value=model.linodeConfig.stackscriptData }}
          </div>
        </div>
      {{/accordion-list-item}}
      {{!-- End of Linode Options --}}

    {{!-- This following contains the Name, Labels and Engine Options fields --}}
    <div class="over-hr"><span>{{templateOptionsTitle}}</span></div>

    {{form-name-description
      model=model
      nameRequired=true
    }}

    {{form-user-labels
      initialLabels=labelResource.labels
      setLabels=(action 'setLabels')
      expandAll=expandAll
      expand=(action expandFn)
    }}

    {{form-engine-opts
      machine=model
      showEngineUrl=showEngineUrl
    }}
  {{/accordion-list}}


  {{!-- This component shows errors produced by validate() in the component --}}
  {{top-errors errors=errors}}

  {{!-- This component shows the Create and Cancel buttons --}}
  {{save-cancel save=(action "save") editing=editing cancel=(action "cancel")}}
  {{/if}}
  {{/accordion-list}}
</section>
"; + const computed = Ember.computed; + const get = Ember.get; + const set = Ember.set; + const alias = Ember.computed.alias; + const service = Ember.inject.service; + const observer = Ember.observer; + const hash = Ember.RSVP.hash; + const defaultRadix = 10; + const defaultBase = 1024; + exports.default = Ember.Component.extend(_nodeDriver.default, { + driverName: 'linode', + step: 1, + config: alias('model.linodeConfig'), + app: service(), + intl: service(), + linode: service(), + init() { + const decodedLayout = window.atob(LAYOUT); + const template = Ember.HTMLBars.compile(decodedLayout, { + moduleName: 'nodes/components/driver-linode/template' + }); + set(this, 'layout', template); + this._super(...arguments); + }, + bootstrap: function () { + let config = get(this, 'globalStore').createRecord({ + type: 'linodeConfig', + instanceType: 'g6-standard-4', + region: 'us-iad', + image: 'linode/ubuntu22.04', + uaPrefix: 'Rancher', + tags: '', + authorizedUsers: '', + createPrivateIp: true, + stackscript: '', + stackscriptData: '', + rootPass: null + }); + set(this, 'model.linodeConfig', config); + }, + validate() { + this._super(); + var errors = get(this, 'errors') || []; + if (!get(this, 'model.name')) { + errors.push('Name is required'); + } + if (!this.get('model.linodeConfig.instanceType')) { + errors.push('Specifying a linode Instance Type is required'); + } + if (!this.get('model.linodeConfig.image')) { + errors.push('Specifying a linode Image is required'); + } + if (!this.get('model.linodeConfig.region')) { + errors.push('Specifying a linode Region is required'); + } + if (!this.validateCloudCredentials()) { + errors.push(this.intl.t('nodeDriver.cloudCredentialError')); + } + if (get(errors, 'length')) { + set(this, 'errors', errors); + return false; + } else { + set(this, 'errors', null); + return true; + } + }, + actions: { + finishAndSelectCloudCredential(cred) { + if (cred) { + set(this, 'model.cloudCredentialId', get(cred, 'id')); + this.send('authLinode'); + } + }, + authLinode(cb) { + const auth = { + type: 'cloud', + token: get(this, 'model.cloudCredentialId') + }; + hash({ + regions: this.linode.request(auth, 'regions'), + images: this.linode.request(auth, 'images'), + sizes: this.linode.request(auth, 'linode/types') + }).then(responses => { + this.setProperties({ + errors: [], + step: 2, + restricted: responses.regions.restricted, + regionChoices: responses.regions.data.map(region => { + region.label = region.id.slice(0, 4).toUpperCase() + region.id.slice(4) + " (" + region.country.toUpperCase() + ")"; + return region; + }).sort((a, b) => String.prototype.localeCompare(a, b)), + imageChoices: responses.images.data.filter(image => /^linode.(ubuntu22.04|ubuntu20.04|ubuntu18.04|ubuntu16.04|debian10|debian9)/.test(image.id) && !image.id.includes('kube')).sort((a, b) => a.id > b.id), + sizeChoices: responses.sizes.data.map(size => { + size.disk /= 1024; + size.memory /= 1024; + return size; + }) + }); + }).catch(err => { + let errors = get(this, 'errors') || []; + if (err && err.body && err.body.errors && err.body.errors[0]) { + errors.push(`Error received from Linode: ${err.body.errors[0].reason}`); + } else { + errors.push(`Error received from Linode`); + } + this.setProperties({ + errors + }); + cb(); + }); + } + } + }); +});; +"use strict"; + +define("ui/components/driver-linode/component", ["exports", "nodes/components/driver-linode/component"], function (exports, _component) { + "use strict"; + + Object.defineProperty(exports, "__esModule", { + value: true + }); + Object.defineProperty(exports, "default", { + enumerable: true, + get: function () { + return _component.default; + } + }); +}); \ No newline at end of file diff --git a/releases/v0.7.0/linode-addons.yml b/releases/v0.7.0/linode-addons.yml new file mode 100644 index 0000000..c55b8a8 --- /dev/null +++ b/releases/v0.7.0/linode-addons.yml @@ -0,0 +1,718 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: ccm-linode + namespace: kube-system +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: system:ccm-linode +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + # TODO: make these permissions more fine-grained + name: cluster-admin +subjects: + - kind: ServiceAccount + name: ccm-linode + namespace: kube-system +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: ccm-linode + labels: + app: ccm-linode + namespace: kube-system +spec: + selector: + matchLabels: + app: ccm-linode + template: + metadata: + labels: + app: ccm-linode + spec: + serviceAccountName: ccm-linode + nodeSelector: + # The CCM will only run on a Node labelled as a master, you may want to change this + node-role.kubernetes.io/controlplane: "true" + tolerations: + # The CCM can run on Nodes tainted as masters + - key: "node-role.kubernetes.io/controlplane" + effect: "NoSchedule" + # The CCM is a "critical addon" + - key: "CriticalAddonsOnly" + operator: "Exists" + # This taint is set on all Nodes when an external CCM is used + - key: node.cloudprovider.kubernetes.io/uninitialized + value: "true" + effect: NoSchedule + - key: node.kubernetes.io/not-ready + operator: Exists + effect: NoSchedule + - key: node.kubernetes.io/unreachable + operator: Exists + effect: NoSchedule + hostNetwork: true + containers: + - image: linode/linode-cloud-controller-manager:latest + imagePullPolicy: Always + name: ccm-linode + args: + - --cloud-provider=linode + - --v=3 + volumeMounts: + - mountPath: /etc/kubernetes + name: k8s + env: + - name: LINODE_API_TOKEN + valueFrom: + secretKeyRef: + name: linode + key: token + - name: LINODE_REGION + valueFrom: + secretKeyRef: + name: linode + key: region + volumes: + - name: k8s + hostPath: + path: /etc/kubernetes +--- +allowVolumeExpansion: true +apiVersion: storage.k8s.io/v1 +kind: StorageClass +metadata: + name: linode-block-storage + namespace: kube-system +provisioner: linodebs.csi.linode.com +--- +allowVolumeExpansion: true +apiVersion: storage.k8s.io/v1 +kind: StorageClass +metadata: + annotations: + storageclass.kubernetes.io/is-default-class: "true" + name: linode-block-storage-retain + namespace: kube-system +provisioner: linodebs.csi.linode.com +reclaimPolicy: Retain +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-controller-sa + namespace: kube-system +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-node-sa + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: linode-csi-role + namespace: kube-system +rules: + - apiGroups: + - "" + resources: + - events + verbs: + - get + - list + - watch + - create + - update + - patch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: external-attacher-role +rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - watch + - update + - patch + - apiGroups: + - storage.k8s.io + resources: + - csinodes + verbs: + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - volumeattachments + verbs: + - get + - list + - watch + - update + - patch +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: external-provisioner-role +rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - watch + - create + - delete + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - watch + - update + - apiGroups: + - storage.k8s.io + resources: + - storageclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - events + verbs: + - list + - watch + - create + - update + - patch + - apiGroups: + - snapshot.storage.k8s.io + resources: + - volumesnapshots + verbs: + - get + - list + - apiGroups: + - snapshot.storage.k8s.io + resources: + - volumesnapshotcontents + verbs: + - get + - list + - apiGroups: + - storage.k8s.io + resources: + - csinodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: external-resizer-role +rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - watch + - patch + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims/status + verbs: + - patch + - apiGroups: + - "" + resources: + - events + verbs: + - list + - watch + - create + - update + - patch +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: linode-csi-binding + namespace: kube-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linode-csi-role +subjects: + - kind: ServiceAccount + name: csi-node-sa + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: csi-controller-attacher-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: external-attacher-role +subjects: + - kind: ServiceAccount + name: csi-controller-sa + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: csi-controller-provisioner-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: external-provisioner-role +subjects: + - kind: ServiceAccount + name: csi-controller-sa + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: csi-controller-resizer-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: external-resizer-role +subjects: + - kind: ServiceAccount + name: csi-controller-sa + namespace: kube-system +--- +apiVersion: v1 +data: + get-linode-id.sh: |- + #!/bin/bash -efu + id="$(kubectl get node/"${NODE_NAME}" -o jsonpath='{.spec.providerID}')" + if [[ ! -z "${id}" ]]; then + echo "${id}" + echo -n "${id:9}" > /linode-info/linode-id + exit 0 + fi + echo "Provider ID not found" + # Exit here so that we wait for the CCM to initialize the provider ID + exit 1 +kind: ConfigMap +metadata: + labels: + app: csi-linode + name: get-linode-id + namespace: kube-system +--- +apiVersion: apps/v1 +kind: StatefulSet +metadata: + labels: + app: csi-linode-controller + name: csi-linode-controller + namespace: kube-system +spec: + replicas: 1 + selector: + matchLabels: + app: csi-linode-controller + serviceName: csi-linode + template: + metadata: + labels: + app: csi-linode-controller + role: csi-linode + spec: + containers: + - args: + - --default-fstype=ext4 + - --volume-name-prefix=pvc + - --volume-name-uuid-length=16 + - --csi-address=$(ADDRESS) + - --v=2 + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + image: k8s.gcr.io/sig-storage/csi-provisioner:v3.0.0 + imagePullPolicy: IfNotPresent + name: csi-provisioner + volumeMounts: + - mountPath: /var/lib/csi/sockets/pluginproxy/ + name: socket-dir + - args: + - --v=2 + - --csi-address=$(ADDRESS) + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + image: k8s.gcr.io/sig-storage/csi-attacher:v3.3.0 + imagePullPolicy: IfNotPresent + name: csi-attacher + volumeMounts: + - mountPath: /var/lib/csi/sockets/pluginproxy/ + name: socket-dir + - args: + - --v=2 + - --csi-address=$(ADDRESS) + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + image: k8s.gcr.io/sig-storage/csi-resizer:v1.3.0 + imagePullPolicy: IfNotPresent + name: csi-resizer + volumeMounts: + - mountPath: /var/lib/csi/sockets/pluginproxy/ + name: socket-dir + - args: + - --endpoint=$(CSI_ENDPOINT) + - --token=$(LINODE_TOKEN) + - --url=$(LINODE_API_URL) + - --node=$(NODE_NAME) + - --bs-prefix=$(LINODE_BS_PREFIX) + - --v=2 + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock + - name: LINODE_API_URL + value: https://api.linode.com/v4 + - name: LINODE_BS_PREFIX + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: LINODE_TOKEN + valueFrom: + secretKeyRef: + key: token + name: linode + image: linode/linode-blockstorage-csi-driver:v0.5.0 + name: linode-csi-plugin + volumeMounts: + - mountPath: /linode-info + name: linode-info + - mountPath: /scripts + name: get-linode-id + - mountPath: /var/lib/csi/sockets/pluginproxy/ + name: socket-dir + initContainers: + - command: + - /scripts/get-linode-id.sh + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: bitnami/kubectl:1.16.3-debian-10-r36 + name: init + volumeMounts: + - mountPath: /linode-info + name: linode-info + - mountPath: /scripts + name: get-linode-id + serviceAccount: csi-controller-sa + tolerations: + - effect: NoSchedule + operator: Exists + - key: CriticalAddonsOnly + operator: Exists + - effect: NoExecute + operator: Exists + volumes: + - emptyDir: {} + name: socket-dir + - emptyDir: {} + name: linode-info + - configMap: + defaultMode: 493 + name: get-linode-id + name: get-linode-id +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + app: csi-linode-node + name: csi-linode-node + namespace: kube-system +spec: + selector: + matchLabels: + app: csi-linode-node + template: + metadata: + labels: + app: csi-linode-node + role: csi-linode + spec: + containers: + - args: + - --v=2 + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/linodebs.csi.linode.com/csi.sock + - name: KUBE_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v1.3.0 + name: csi-node-driver-registrar + volumeMounts: + - mountPath: /csi + name: plugin-dir + - mountPath: /registration + name: registration-dir + - args: + - --endpoint=$(CSI_ENDPOINT) + - --token=$(LINODE_TOKEN) + - --url=$(LINODE_API_URL) + - --node=$(NODE_NAME) + - --v=2 + env: + - name: CSI_ENDPOINT + value: unix:///csi/csi.sock + - name: LINODE_API_URL + value: https://api.linode.com/v4 + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINODE_TOKEN + valueFrom: + secretKeyRef: + key: token + name: linode + image: linode/linode-blockstorage-csi-driver:v0.5.0 + imagePullPolicy: Always + name: csi-linode-plugin + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - SYS_ADMIN + privileged: true + volumeMounts: + - mountPath: /linode-info + name: linode-info + - mountPath: /scripts + name: get-linode-id + - mountPath: /csi + name: plugin-dir + - mountPath: /var/lib/kubelet + mountPropagation: Bidirectional + name: pods-mount-dir + - mountPath: /dev + name: device-dir + hostNetwork: true + initContainers: + - command: + - /scripts/get-linode-id.sh + env: + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + image: bitnami/kubectl:1.16.3-debian-10-r36 + name: init + volumeMounts: + - mountPath: /linode-info + name: linode-info + - mountPath: /scripts + name: get-linode-id + priorityClassName: system-node-critical + serviceAccount: csi-node-sa + tolerations: + - effect: NoSchedule + operator: Exists + - key: CriticalAddonsOnly + operator: Exists + - effect: NoExecute + operator: Exists + volumes: + - emptyDir: {} + name: linode-info + - configMap: + defaultMode: 493 + name: get-linode-id + name: get-linode-id + - hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: DirectoryOrCreate + name: registration-dir + - hostPath: + path: /var/lib/kubelet + type: Directory + name: kubelet-dir + - hostPath: + path: /var/lib/kubelet/plugins/linodebs.csi.linode.com + type: DirectoryOrCreate + name: plugin-dir + - hostPath: + path: /var/lib/kubelet + type: Directory + name: pods-mount-dir + - hostPath: + path: /dev + name: device-dir + - hostPath: + path: /etc/udev + type: Directory + name: udev-rules-etc + - hostPath: + path: /lib/udev + type: Directory + name: udev-rules-lib + - hostPath: + path: /run/udev + type: Directory + name: udev-socket + - hostPath: + path: /sys + type: Directory + name: sys +--- +apiVersion: storage.k8s.io/v1 +kind: CSIDriver +metadata: + name: linodebs.csi.linode.com +spec: + attachRequired: true + podInfoOnMount: true +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: external-dns + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: external-dns + namespace: kube-system +rules: + - apiGroups: [""] + resources: ["services","endpoints","pods"] + verbs: ["get","watch","list"] + - apiGroups: ["extensions","networking.k8s.io"] + resources: ["ingresses"] + verbs: ["get","watch","list"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["list"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: external-dns-viewer + namespace: kube-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: external-dns +subjects: + - kind: ServiceAccount + name: external-dns + namespace: kube-system +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: external-dns + namespace: kube-system +spec: + strategy: + type: Recreate + selector: + matchLabels: + app: external-dns + template: + metadata: + labels: + app: external-dns + spec: + serviceAccountName: external-dns + containers: + - name: external-dns + image: registry.opensource.zalan.do/teapot/external-dns:latest + args: + - --provider=linode + # - --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above. + env: + - name: EXTERNAL_DNS_SOURCE + value: |- + service + ingress + - name: LINODE_TOKEN + valueFrom: + secretKeyRef: + name: linode + key: token +--- diff --git a/releases/v0.7.0/linode.svg b/releases/v0.7.0/linode.svg new file mode 100644 index 0000000..56989c0 --- /dev/null +++ b/releases/v0.7.0/linode.svg @@ -0,0 +1,22 @@ + + The Linode Logo consists of the 5 shaded green cubes arranged in the shape of the letter "L". + Linode Logo with linode.com domain name + + + + + + + + + + + + + + + + + + \ No newline at end of file