Skip to content

Commit

Permalink
Initial release
Browse files Browse the repository at this point in the history
  • Loading branch information
Stephan Feurer committed Jan 30, 2023
1 parent 1c86843 commit 8913f47
Show file tree
Hide file tree
Showing 8 changed files with 811 additions and 2 deletions.
34 changes: 34 additions & 0 deletions class/defaults.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,3 +2,37 @@ parameters:
csi_hetznercloud:
=_metadata: {}
namespace: syn-csi-hetznercloud

images:
hcloud_csi_driver:
registry: docker.io
repository: hetznercloud/hcloud-csi-driver
tag: latest
csi_attacher:
registry: registry.k8s.io
repository: sig-storage/csi-attacher
tag: v4.1.0
csi_resizer:
registry: registry.k8s.io
repository: sig-storage/csi-resizer
tag: v1.7.0
csi_provisioner:
registry: registry.k8s.io
repository: sig-storage/csi-provisioner
tag: v3.4.0
csi_registrar:
registry: registry.k8s.io
repository: sig-storage/csi-node-driver-registrar
tag: v2.7.0
liveness_probe:
registry: registry.k8s.io
repository: sig-storage/livenessprobe
tag: v2.9.0

resources:
csi_attacher: {}
csi_resizer: {}
csi_provisioner: {}
hcloud_csi_driver: {}

hcloudToken: insertCoin
271 changes: 271 additions & 0 deletions component/main.jsonnet
Original file line number Diff line number Diff line change
@@ -1,10 +1,281 @@
// main template for csi-hetznercloud
local kap = import 'lib/kapitan.libjsonnet';
local kube = import 'lib/kube.libjsonnet';
local sc = import 'lib/storageclass.libsonnet';
local inv = kap.inventory();

// The hiera parameters for the component
local params = inv.parameters.csi_hetznercloud;
local isOpenshift = std.startsWith(inv.parameters.facts.distribution, 'openshift');

local namespace = kube.Namespace(params.namespace) {
metadata+: {
labels+: {
'app.kubernetes.io/name': params.namespace,
'pod-security.kubernetes.io/enforce': 'privileged',
// Configure the namespaces so that the OCP4 cluster-monitoring
// Prometheus can find the servicemonitors and rules.
[if isOpenshift then 'openshift.io/cluster-monitoring']: 'true',
},
},
};


// CSI Controller

local controlerName = 'hcloud-csi-controller';

local controlerServiceAccount = kube.ServiceAccount(controlerName) {
metadata+: {
namespace: params.namespace,
},
};

local controlerClusterRole = kube.ClusterRole(controlerName) {
rules: [
{ apiGroups: [ '*' ], resources: [ '*' ], verbs: [ '*' ] },
{ nonResourceURLs: [ '*' ], verbs: [ '*' ] },
// attacher
{ apiGroups: [ '' ], resources: [ 'persistentvolumes' ], verbs: [ 'get', 'list', 'watch', 'update', 'patch' ] },
{ apiGroups: [ '' ], resources: [ 'nodes' ], verbs: [ 'get', 'list', 'watch' ] },
{ apiGroups: [ 'csi.storage.k8s.io' ], resources: [ 'csinodeinfos' ], verbs: [ 'get', 'list', 'watch' ] },
{ apiGroups: [ 'storage.k8s.io' ], resources: [ 'csinodes' ], verbs: [ 'get', 'list', 'watch' ] },
{ apiGroups: [ 'storage.k8s.io' ], resources: [ 'volumeattachments' ], verbs: [ 'get', 'list', 'watch', 'update', 'patch' ] },
{ apiGroups: [ 'storage.k8s.io' ], resources: [ 'volumeattachments/status' ], verbs: [ 'patch' ] },
// provisioner
{ apiGroups: [ '' ], resources: [ 'secrets' ], verbs: [ 'get', 'list' ] },
{ apiGroups: [ '' ], resources: [ 'persistentvolumes' ], verbs: [ 'get', 'list', 'watch', 'create', 'delete', 'patch' ] },
{ apiGroups: [ '' ], resources: [ 'persistentvolumeclaims', 'persistentvolumeclaims/status' ], verbs: [ 'get', 'list', 'watch', 'update', 'patch' ] },
{ apiGroups: [ 'storage.k8s.io' ], resources: [ 'storageclasses' ], verbs: [ 'get', 'list', 'watch' ] },
{ apiGroups: [ '' ], resources: [ 'events' ], verbs: [ 'list, watch, create, update, patch' ] },
{ apiGroups: [ 'snapshot.storage.k8s.io' ], resources: [ 'volumesnapshots' ], verbs: [ 'get', 'list' ] },
{ apiGroups: [ 'snapshot.storage.k8s.io' ], resources: [ 'volumesnapshotcontents' ], verbs: [ 'get', 'list' ] },
// resizer
{ apiGroups: [ '' ], resources: [ 'pods' ], verbs: [ 'get', 'list', 'watch' ] },
// node
{ apiGroups: [ '' ], resources: [ 'events' ], verbs: [ 'get', 'list', 'watch', 'create', 'update', 'patch' ] },


],
};

local controlerClusterRoleBinding = kube.ClusterRoleBinding(controlerName) {
subjects_: [ controlerServiceAccount ],
roleRef_: controlerClusterRole,
};

local hcloudToken = kube.Secret('hcloud-token') {
stringData: {
token: params.hcloudToken,
},
};

local controller = kube.Deployment(controlerName) {
spec+: {
replicas: 1,
template+: {
spec+: {
serviceAccountName: controlerName,
containers_:: {
attacher: kube.Container('csi-attacher') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.csi_attacher,
resources: params.resources.csi_attacher,
args: [
'--default-fstype=ext4',
],
volumeMounts_:: {
'socket-dir': { mountPath: '/run/csi' },
},
},
resizer: kube.Container('csi-resizer') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.csi_resizer,
resources: params.resources.csi_resizer,
volumeMounts_:: {
'socket-dir': { mountPath: '/run/csi' },
},
},
provisioner: kube.Container('csi-provisioner') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.csi_provisioner,
resources: params.resources.csi_provisioner,
args: [
'--feature-gates=Topology=true',
'--default-fstype=ext4',
],
volumeMounts_:: {
'socket-dir': { mountPath: '/run/csi' },
},
},
default: kube.Container('hcloud-csi-driver') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.hcloud_csi_driver,
resources: params.resources.hcloud_csi_driver,
env_:: {
CSI_ENDPOINT: 'unix:///run/csi/socket',
METRICS_ENDPOINT: '0.0.0.0:9189',
ENABLE_METRICS: 'true',
KUBE_NODE_NAME: kube.FieldRef('spec.nodeName'),
HCLOUD_TOKEN: { secretKeyRef: { name: 'hcloud-token', key: 'token' } },
},
command: [ '/bin/hcloud-csi-driver-controller' ],
ports_:: {
metrics: { containerPort: 9189 },
healthz: { containerPort: 9808 },
},
livenessProbe: {
failureThreshold: 5,
httpGet: {
path: '/healthz',
port: 'healthz',
},
initialDelaySeconds: 10,
timeoutSeconds: 3,
periodSeconds: 2,
},
volumeMounts_:: {
'socket-dir': { mountPath: '/run/csi' },
},
},
probe: kube.Container('liveness-probe') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.liveness_probe,
volumeMounts_:: {
'socket-dir': { mountPath: '/run/csi' },
},
},
},
volumes_:: {
'socket-dir': kube.EmptyDirVolume(),
},
},
},
},
};

local controllerService = kube.Service(controlerName) {
target_pod:: controller.spec.template,
spec+: {
sessionAffinity: 'None',
},
};


// CSI Node

local csiNode = kube.DaemonSet('hcloud-csi-node') {
spec+: {
template+: {
spec+: {
tolerations: [
{ effect: 'NoExecute', operator: 'Exists' },
{ effect: 'NoSchedule', operator: 'Exists' },
{ key: 'CriticalAddonsOnly', operator: 'Exists' },
],
affinity: {
nodeAffinity: {
requiredDuringSchedulingIgnoredDuringExecution: {
nodeSelectorTerms: [ {
matchExpressions: [ {
key: 'instance.hetzner.cloud/is-root-server',
operator: 'NotIn',
values: [ 'true' ],
} ],
} ],
},
},
},
containers_:: {
registrar: kube.Container('csi-node-driver-registrar') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.csi_registrar,
resources: params.resources.csi_attacher,
args: [
'--kubelet-registration-path=/var/lib/kubelet/plugins/csi.hetzner.cloud/socket',
],
volumeMounts_:: {
'plugin-dir': { mountPath: '/run/csi' },
'registration-dir': { mountPath: '/registration' },
},
},
default: kube.Container('hcloud-csi-driver') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.hcloud_csi_driver,
resources: params.resources.hcloud_csi_driver,
env_:: {
CSI_ENDPOINT: 'unix:///run/csi/socket',
METRICS_ENDPOINT: '0.0.0.0:9189',
ENABLE_METRICS: 'true',
KUBE_NODE_NAME: kube.FieldRef('spec.nodeName'),
HCLOUD_TOKEN: { secretKeyRef: { name: 'hcloud-token', key: 'token' } },
},
command: [ '/bin/hcloud-csi-driver-node' ],
ports_:: {
metrics: { containerPort: 9189 },
healthz: { containerPort: 9808 },
},
securityContext: { privileged: true },
livenessProbe: {
failureThreshold: 5,
httpGet: {
path: '/healthz',
port: 'healthz',
},
initialDelaySeconds: 10,
timeoutSeconds: 3,
periodSeconds: 2,
},
volumeMounts_:: {
'kubelet-dir': { mountPath: '/var/lib/kubelet', mountPropagation: 'Bidirectional' },
'plugin-dir': { mountPath: '/run/csi' },
'device-dir': { mountPath: '/dev' },
},
},
probe: kube.Container('liveness-probe') {
image: '%(registry)s/%(repository)s:%(tag)s' % params.images.liveness_probe,
volumeMounts_:: {
'plugin-dir': { mountPath: '/run/csi' },
},
},
},
volumes_:: {
'kubelet-dir': { hostPath: { path: '/var/lib/kubelet', type: 'Directory' } },
'plugin-dir': { hostPath: { path: '/var/lib/kubelet/plugins/csi.hetzner.cloud/', type: 'DirectoryOrCreate' } },
'registration-dir': { hostPath: { path: '/var/lib/kubelet/plugins_registry/', type: 'Directory' } },
'device-dir': { hostPath: { path: '/dev', type: 'Directory' } },
},
},
},
},
};

local csiNodeService = kube.Service('hcloud-csi-node') {
target_pod:: csiNode.spec.template,
spec+: {
sessionAffinity: 'None',
},
};


// CSI Driver

local csiDriver = kube._Object('storage.k8s.io/v1', 'CSIDriver', 'csi.hetzner.cloud') {
spec: {
attachRequired: true,
podInfoOnMount: true,
volumeLifecycleModes: [ 'Persistent' ],
fsGroupPolicy: 'File',
},
};


// Storage Class

local storageClass = sc.storageClass('hcloud-volumes') {
allowVolumeExpansion: true,
provisioner: 'csi.hetzner.cloud',
volumeBindingMode: 'WaitForFirstConsumer',
};

// Define outputs below
{
'00_namespace': namespace,
'10_controller': [ controller, controllerService, controlerServiceAccount, controlerClusterRole, controlerClusterRoleBinding ],
'20_csi_node': [ csiNode, csiNodeService ],
'30_csi_driver': csiDriver,
'40_storage_class': storageClass,
}
14 changes: 12 additions & 2 deletions tests/defaults.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,13 @@
# Overwrite parameters here
applications:
- storageclass

# parameters: {...}
parameters:
kapitan:
dependencies:
- type: https
source: https://raw.githubusercontent.com/projectsyn/component-storageclass/v1.0.0/lib/storageclass.libsonnet
output_path: vendor/lib/storageclass.libsonnet

storageclass:
defaults: {}
defaultClass: ""
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
apiVersion: v1
kind: Namespace
metadata:
annotations: {}
labels:
app.kubernetes.io/name: syn-csi-hetznercloud
name: syn-csi-hetznercloud
pod-security.kubernetes.io/enforce: privileged
name: syn-csi-hetznercloud
Loading

0 comments on commit 8913f47

Please sign in to comment.