Merge pull request #19 from ctrox/cleanup

Clean up old references to encryptionKey and fix up deployment
This commit is contained in:
Cyrill Troxler 2019-05-18 11:51:26 +02:00 committed by GitHub
commit 29c10b9418
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 8 additions and 60 deletions

View file

@ -1,8 +1,8 @@
---
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: csi-attacher-sa name: csi-attacher-sa
namespace: kube-system
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
@ -43,6 +43,7 @@ kind: Service
apiVersion: v1 apiVersion: v1
metadata: metadata:
name: csi-attacher-s3 name: csi-attacher-s3
namespace: kube-system
labels: labels:
app: csi-attacher-s3 app: csi-attacher-s3
spec: spec:
@ -56,6 +57,7 @@ kind: StatefulSet
apiVersion: apps/v1beta1 apiVersion: apps/v1beta1
metadata: metadata:
name: csi-attacher-s3 name: csi-attacher-s3
namespace: kube-system
spec: spec:
serviceName: "csi-attacher-s3" serviceName: "csi-attacher-s3"
replicas: 1 replicas: 1

View file

@ -1,8 +1,8 @@
---
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: csi-s3 name: csi-s3
namespace: kube-system
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
@ -42,6 +42,7 @@ kind: DaemonSet
apiVersion: apps/v1beta2 apiVersion: apps/v1beta2
metadata: metadata:
name: csi-s3 name: csi-s3
namespace: kube-system
spec: spec:
selector: selector:
matchLabels: matchLabels:
@ -92,31 +93,6 @@ spec:
valueFrom: valueFrom:
fieldRef: fieldRef:
fieldPath: spec.nodeName fieldPath: spec.nodeName
- name: ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: accessKeyID
- name: SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: secretAccessKey
- name: S3_ENDPOINT
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: endpoint
- name: REGION
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: region
- name: ENCRYPTION_KEY
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: encryptionKey
imagePullPolicy: "Always" imagePullPolicy: "Always"
volumeMounts: volumeMounts:
- name: plugin-dir - name: plugin-dir

View file

@ -1,8 +1,8 @@
---
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: csi-provisioner-sa name: csi-provisioner-sa
namespace: kube-system
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
@ -42,6 +42,7 @@ kind: Service
apiVersion: v1 apiVersion: v1
metadata: metadata:
name: csi-provisioner-s3 name: csi-provisioner-s3
namespace: kube-system
labels: labels:
app: csi-provisioner-s3 app: csi-provisioner-s3
spec: spec:
@ -55,6 +56,7 @@ kind: StatefulSet
apiVersion: apps/v1beta1 apiVersion: apps/v1beta1
metadata: metadata:
name: csi-provisioner-s3 name: csi-provisioner-s3
namespace: kube-system
spec: spec:
serviceName: "csi-provisioner-s3" serviceName: "csi-provisioner-s3"
replicas: 1 replicas: 1
@ -91,31 +93,6 @@ spec:
valueFrom: valueFrom:
fieldRef: fieldRef:
fieldPath: spec.nodeName fieldPath: spec.nodeName
- name: ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: accessKeyID
- name: SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: secretAccessKey
- name: S3_ENDPOINT
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: endpoint
- name: REGION
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: region
- name: ENCRYPTION_KEY
valueFrom:
secretKeyRef:
name: csi-s3-secret
key: encryptionKey
imagePullPolicy: "Always" imagePullPolicy: "Always"
volumeMounts: volumeMounts:
- name: socket-dir - name: socket-dir

View file

@ -7,5 +7,4 @@ type Config struct {
Region string Region string
Endpoint string Endpoint string
Mounter string Mounter string
EncryptionKey string
} }

View file

@ -55,7 +55,6 @@ func newS3ClientFromSecrets(secrets map[string]string) (*s3Client, error) {
SecretAccessKey: secrets["secretAccessKey"], SecretAccessKey: secrets["secretAccessKey"],
Region: secrets["region"], Region: secrets["region"],
Endpoint: secrets["endpoint"], Endpoint: secrets["endpoint"],
EncryptionKey: secrets["encryptionKey"],
// Mounter is set in the volume preferences, not secrets // Mounter is set in the volume preferences, not secrets
Mounter: "", Mounter: "",
}) })

View file

@ -3,28 +3,23 @@ CreateVolumeSecret:
secretAccessKey: DSG643HGDS secretAccessKey: DSG643HGDS
endpoint: http://127.0.0.1:9000 endpoint: http://127.0.0.1:9000
region: "" region: ""
encryptionKey: ""
DeleteVolumeSecret: DeleteVolumeSecret:
accessKeyID: FJDSJ accessKeyID: FJDSJ
secretAccessKey: DSG643HGDS secretAccessKey: DSG643HGDS
endpoint: http://127.0.0.1:9000 endpoint: http://127.0.0.1:9000
region: "" region: ""
encryptionKey: ""
NodeStageVolumeSecret: NodeStageVolumeSecret:
accessKeyID: FJDSJ accessKeyID: FJDSJ
secretAccessKey: DSG643HGDS secretAccessKey: DSG643HGDS
endpoint: http://127.0.0.1:9000 endpoint: http://127.0.0.1:9000
region: "" region: ""
encryptionKey: ""
NodePublishVolumeSecret: NodePublishVolumeSecret:
accessKeyID: FJDSJ accessKeyID: FJDSJ
secretAccessKey: DSG643HGDS secretAccessKey: DSG643HGDS
endpoint: http://127.0.0.1:9000 endpoint: http://127.0.0.1:9000
region: "" region: ""
encryptionKey: ""
ControllerValidateVolumeCapabilitiesSecret: ControllerValidateVolumeCapabilitiesSecret:
accessKeyID: FJDSJ accessKeyID: FJDSJ
secretAccessKey: DSG643HGDS secretAccessKey: DSG643HGDS
endpoint: http://127.0.0.1:9000 endpoint: http://127.0.0.1:9000
region: "" region: ""
encryptionKey: ""