158 lines
6.4 KiB
YAML
158 lines
6.4 KiB
YAML
{{/*
|
|
Copyright (c) HashiCorp, Inc.
|
|
SPDX-License-Identifier: MPL-2.0
|
|
*/}}
|
|
|
|
{{- template "vault.csiEnabled" . -}}
|
|
{{- if .csiEnabled -}}
|
|
apiVersion: apps/v1
|
|
kind: DaemonSet
|
|
metadata:
|
|
name: {{ template "vault.fullname" . }}-csi-provider
|
|
namespace: {{ include "vault.namespace" . }}
|
|
labels:
|
|
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
|
{{- if .Values.csi.daemonSet.extraLabels -}}
|
|
{{- toYaml .Values.csi.daemonSet.extraLabels | nindent 4 -}}
|
|
{{- end -}}
|
|
{{ template "csi.daemonSet.annotations" . }}
|
|
spec:
|
|
updateStrategy:
|
|
type: {{ .Values.csi.daemonSet.updateStrategy.type }}
|
|
{{- if .Values.csi.daemonSet.updateStrategy.maxUnavailable }}
|
|
rollingUpdate:
|
|
maxUnavailable: {{ .Values.csi.daemonSet.updateStrategy.maxUnavailable }}
|
|
{{- end }}
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/name: {{ template "vault.name" . }}-csi-provider
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
{{- if .Values.csi.pod.extraLabels -}}
|
|
{{- toYaml .Values.csi.pod.extraLabels | nindent 8 -}}
|
|
{{- end -}}
|
|
{{ template "csi.pod.annotations" . }}
|
|
spec:
|
|
{{ template "csi.daemonSet.securityContext.pod" . }}
|
|
{{- if .Values.csi.priorityClassName }}
|
|
priorityClassName: {{ .Values.csi.priorityClassName }}
|
|
{{- end }}
|
|
serviceAccountName: {{ template "vault.fullname" . }}-csi-provider
|
|
{{- template "csi.pod.tolerations" . }}
|
|
{{- template "csi.pod.nodeselector" . }}
|
|
{{- template "csi.pod.affinity" . }}
|
|
containers:
|
|
- name: {{ include "vault.name" . }}-csi-provider
|
|
{{ template "csi.resources" . }}
|
|
{{ template "csi.daemonSet.securityContext.container" . }}
|
|
image: "{{ .Values.csi.image.repository }}:{{ .Values.csi.image.tag }}"
|
|
imagePullPolicy: {{ .Values.csi.image.pullPolicy }}
|
|
args:
|
|
- --endpoint=/provider/vault.sock
|
|
- --debug={{ .Values.csi.debug }}
|
|
{{- if .Values.csi.hmacSecretName }}
|
|
- --hmac-secret-name={{ .Values.csi.hmacSecretName }}
|
|
{{- else }}
|
|
- --hmac-secret-name={{- include "vault.name" . }}-csi-provider-hmac-key
|
|
{{- end }}
|
|
{{- if .Values.csi.extraArgs }}
|
|
{{- toYaml .Values.csi.extraArgs | nindent 12 }}
|
|
{{- end }}
|
|
env:
|
|
- name: VAULT_ADDR
|
|
{{- if eq (.Values.csi.agent.enabled | toString) "true" }}
|
|
value: "unix:///var/run/vault/agent.sock"
|
|
{{- else if .Values.global.externalVaultAddr }}
|
|
value: "{{ .Values.global.externalVaultAddr }}"
|
|
{{- else }}
|
|
value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ include "vault.namespace" . }}.svc:{{ .Values.server.service.port }}
|
|
{{- end }}
|
|
volumeMounts:
|
|
- name: providervol
|
|
mountPath: "/provider"
|
|
{{- if eq (.Values.csi.agent.enabled | toString) "true" }}
|
|
- name: agent-unix-socket
|
|
mountPath: /var/run/vault
|
|
{{- end }}
|
|
{{- if .Values.csi.volumeMounts }}
|
|
{{- toYaml .Values.csi.volumeMounts | nindent 12}}
|
|
{{- end }}
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /health/ready
|
|
port: 8080
|
|
failureThreshold: {{ .Values.csi.livenessProbe.failureThreshold }}
|
|
initialDelaySeconds: {{ .Values.csi.livenessProbe.initialDelaySeconds }}
|
|
periodSeconds: {{ .Values.csi.livenessProbe.periodSeconds }}
|
|
successThreshold: {{ .Values.csi.livenessProbe.successThreshold }}
|
|
timeoutSeconds: {{ .Values.csi.livenessProbe.timeoutSeconds }}
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /health/ready
|
|
port: 8080
|
|
failureThreshold: {{ .Values.csi.readinessProbe.failureThreshold }}
|
|
initialDelaySeconds: {{ .Values.csi.readinessProbe.initialDelaySeconds }}
|
|
periodSeconds: {{ .Values.csi.readinessProbe.periodSeconds }}
|
|
successThreshold: {{ .Values.csi.readinessProbe.successThreshold }}
|
|
timeoutSeconds: {{ .Values.csi.readinessProbe.timeoutSeconds }}
|
|
{{- if eq (.Values.csi.agent.enabled | toString) "true" }}
|
|
- name: {{ include "vault.name" . }}-agent
|
|
image: "{{ .Values.csi.agent.image.repository }}:{{ .Values.csi.agent.image.tag }}"
|
|
imagePullPolicy: {{ .Values.csi.agent.image.pullPolicy }}
|
|
{{ template "csi.agent.resources" . }}
|
|
command:
|
|
- vault
|
|
args:
|
|
- agent
|
|
- -config=/etc/vault/config.hcl
|
|
{{- if .Values.csi.agent.extraArgs }}
|
|
{{- toYaml .Values.csi.agent.extraArgs | nindent 12 }}
|
|
{{- end }}
|
|
ports:
|
|
- containerPort: 8200
|
|
env:
|
|
- name: VAULT_LOG_LEVEL
|
|
value: "{{ .Values.csi.agent.logLevel }}"
|
|
- name: VAULT_LOG_FORMAT
|
|
value: "{{ .Values.csi.agent.logFormat }}"
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 100
|
|
runAsGroup: 1000
|
|
volumeMounts:
|
|
- name: agent-config
|
|
mountPath: /etc/vault/config.hcl
|
|
subPath: config.hcl
|
|
readOnly: true
|
|
- name: agent-unix-socket
|
|
mountPath: /var/run/vault
|
|
{{- if .Values.csi.volumeMounts }}
|
|
{{- toYaml .Values.csi.volumeMounts | nindent 12 }}
|
|
{{- end }}
|
|
{{- end }}
|
|
volumes:
|
|
- name: providervol
|
|
hostPath:
|
|
path: {{ .Values.csi.daemonSet.providersDir }}
|
|
{{- if eq (.Values.csi.agent.enabled | toString) "true" }}
|
|
- name: agent-config
|
|
configMap:
|
|
name: {{ template "vault.fullname" . }}-csi-provider-agent-config
|
|
- name: agent-unix-socket
|
|
emptyDir:
|
|
medium: Memory
|
|
{{- end }}
|
|
{{- if .Values.csi.volumes }}
|
|
{{- toYaml .Values.csi.volumes | nindent 8}}
|
|
{{- end }}
|
|
{{- include "imagePullSecrets" . | nindent 6 }}
|
|
{{- end }}
|