From 77bde848a5f752bb883709122c85d0c4d3f87ba3 Mon Sep 17 00:00:00 2001 From: actions Date: Tue, 4 May 2021 08:26:16 +0000 Subject: [PATCH] Merge pull request #72 from jcaamano/sriov Add multus & sr-iov charts --- .../rke2-multus-v3.7.1-build2021041601.tgz | Bin 0 -> 2146 bytes assets/rke2-sriov/rke2-sriov-crd-v1.0.001.tgz | Bin 0 -> 3086 bytes .../rke2-sriov-v1.0.0-build2021042901.tgz | Bin 0 -> 3617 bytes .../v3.7.1-build2021041601/Chart.yaml | 12 ++ .../templates/_helpers.tpl | 7 + .../templates/clusterrole.yaml | 27 ++++ .../templates/clusterrolebinding.yaml | 12 ++ .../templates/daemonset.yaml | 57 +++++++ .../networkattachmendefinitions.crd.yaml | 44 +++++ .../templates/serviceaccount.yaml | 5 + .../v3.7.1-build2021041601/values.yaml | 16 ++ .../rke2-sriov-crd/v1.0.001/Chart.yaml | 5 + ...-network-operator-sriovibnetworks_crd.yaml | 73 +++++++++ ...iov-network-operator-sriovnetwork.crd.yaml | 109 +++++++++++++ ...k-operator-sriovnetworknodepolicy.crd.yaml | 131 +++++++++++++++ ...rk-operator-sriovnetworknodestate.crd.yaml | 153 ++++++++++++++++++ ...work-operator-sriovoperatorconfig.crd.yaml | 80 +++++++++ .../v1.0.0-build2021042901/Chart.yaml | 13 ++ .../templates/NOTES.txt | 10 ++ .../templates/_helpers.tpl | 7 + .../templates/_webhook-certs.tpl | 30 ++++ .../templates/certmanagercerts.yaml | 42 +++++ .../templates/clusterrole.yaml | 47 ++++++ .../templates/clusterrolebinding.yaml | 25 +++ .../templates/deployment.yaml | 86 ++++++++++ .../templates/role.yaml | 97 +++++++++++ .../templates/rolebinding.yaml | 38 +++++ .../templates/secrets.yaml | 21 +++ .../templates/serviceaccount.yaml | 11 ++ .../templates/validate-install-crd.yaml | 18 +++ .../v1.0.0-build2021042901/values.yaml | 45 ++++++ index.yaml | 46 ++++++ 32 files changed, 1267 insertions(+) create mode 100755 assets/rke2-multus/rke2-multus-v3.7.1-build2021041601.tgz create mode 100755 assets/rke2-sriov/rke2-sriov-crd-v1.0.001.tgz create mode 100755 assets/rke2-sriov/rke2-sriov-v1.0.0-build2021042901.tgz create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/Chart.yaml create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/_helpers.tpl create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrole.yaml create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrolebinding.yaml create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/daemonset.yaml create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/networkattachmendefinitions.crd.yaml create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/serviceaccount.yaml create mode 100755 charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/values.yaml create mode 100755 charts/rke2-sriov/rke2-sriov-crd/v1.0.001/Chart.yaml create mode 100755 charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovibnetworks_crd.yaml create mode 100755 charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetwork.crd.yaml create mode 100755 charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodepolicy.crd.yaml create mode 100755 charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodestate.crd.yaml create mode 100755 charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovoperatorconfig.crd.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/Chart.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/NOTES.txt create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_helpers.tpl create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_webhook-certs.tpl create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/certmanagercerts.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrole.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrolebinding.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/deployment.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/role.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/rolebinding.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/secrets.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/serviceaccount.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/validate-install-crd.yaml create mode 100755 charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/values.yaml diff --git a/assets/rke2-multus/rke2-multus-v3.7.1-build2021041601.tgz b/assets/rke2-multus/rke2-multus-v3.7.1-build2021041601.tgz new file mode 100755 index 0000000000000000000000000000000000000000..3162f7bb570f1cf50442e55d7f7015c3b79332a9 GIT binary patch literal 2146 zcmV-o2%YyIiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI>(Z`(NX@3TI|z>7Z${Bf3K$4T}KEO6blSme6R70IFZus9Sn zHIjLuNF6zHn=SI)4Ovo~2(s*Klz^ z2(e1MLt}+jb68CxR#ltFqxdwQL>XFcL`A;sjrSBdyEq3_Y$4GCBVv3hQ~}P7L?sav z(g$s>K`26#GmaKWL!~ndLc!~Lfkq*rjiaS5aSltO%FdId5VWipG1p~s{j+VjRI)A? zLKPp1B>3r=D-j9q#90qC>_Z#|*A@-eicrz#@JUK$2~Cn|o`{kaXp^wSxKc$_GNFhG zg~raKF<{AroC9|-v41m6@g*8JO9Y^pTgYW-gWuW0Mxm(#u*mA#aP+*sV9Be#VaAJE z$ZVQUC+Tc*l1`#8vVRxi6UWO~5=Q&2GdJOc3U@BRQ7th5!R z&CMJdH&2$#WT-G3cRbSdC06YA$SC4URI)CFdJuoE#JCyOnIMh-I+$PGGa~FoZWQFkL-!{T$`X@Os3MM_f)cUtRy3}$@?YB3XP4adW5ZDAO4Th z;rV}jIy*k#|0(Fxr!i!h3xzNWzWqK6&i&pr-aUfx?QP^biX7s1;gAT3hvW zRpK|J>&njIkC7Y7m590Gc`Wqk-%T*khQ;7%4A1}nx&OaHv)F3xGHqXtMtAXYSx4_7 zvBaE|J0>WQ+W&QxF~U9bxxctVMYhq)T~dTjyXNEu!#s_IjQDaO#J9BnUi>eF%3NUd z72Ci*{Lj)s{69^n>EZl;657K5ufg7ru?=X6mzcZuHG=M86#;DTMFWnuUi=3+`2;$2 zzCyDS9A9v*YemEU;n7x%;~YMHg7^|8GK=xWx*2Y7zqbXxFYU&E#<0}N;^R~U_u&61 zoelHHVt(V>hu8?*h{JLJ?x)6|kCe9*TA@?aXO5~(XI0H*} z;Qh`PDBDAEfZ?@UHvK!oIFh}gTY~}C(>hveOBbQWHU~2G`rIWg(fHk{b2977wP`bl zS09BX+fIRbj-2Ljp|AK7vs$j%*xqh*F_Z*AC_!g>Q&U_|6@(sEKKuw@HE~K^tKptJ zEr#1$r~W3>+SFfS&nDi~UEub1eqT>wg)`Y&ij|giiErGhI;!r-y%4Hx1}I&}w~Ur^ zNSw+OT~Wf7NV?rnt+rWRy*_{Y{_NuX{jcX2FD}ntU3Iwn@?`L@ZL!-jP%AaRQ_mgm zeH1+hR{M0^>ow4?FIzd#{V_^Vk-4d~P!!u`6C*ofrs(N@G;T|ATIJ(hNc@G>q(}We z&Z(Np@h@q76i+tqx8l^$_}>~W_1XYU~~{#J!g)q&RyNFDEpmP<~_i%`lE{(FmPgA=fIi zbC{%2SM0qKyIK5%J@r*Vga=B0FR$)OzV``rpl?aLxeUKUX`p3ll!I(!Jtq@Et%QV+4l|0ZoG zUUsRC5A_;h#*TBt)p3k`#m86XD+Fzz)CNK7LU1PCbG5v&?tgEV#!@zhH?F%-xi+OgQ-Q6R zkZd6l7(MJ7ffze8x#d3ZOhz}(&$O>H^ui673y{D;K+^$FuYG6%XQt4v`PLFN)c6Hv zYwhbCXelfhbZSI3U9P_i2^=;nc1bvQOx1vVBLDge6HSnnk+%&nE6o5Tg@Ml5R5#wHoA zP$pIsV`lhL5OS&wCae-;zZey^jWYYGjaZ)#rVEC%WQH#4L42=qUJI249E9OvZLJN+ zH92ctzPkEn8!~%4Z7n%iWHZ!mjN=q3RE{QCI5)cVTv25{*7pxw3RJYk*47IbOt+yq zkdEPuDWwS(*c6Gg7|s=(u@dE(OT9a$`6i}t8n zx(B!ntuPJ`xEP8(G{ha}|L*v&DP*uv$oSeK;J*6*WUKyndNe)M|DS{g_y2ZQ)$gqEAL{D| YI?#a*^uyBs0ssL2|Fe}5*#IyA0IRbw+5i9m literal 0 HcmV?d00001 diff --git a/assets/rke2-sriov/rke2-sriov-crd-v1.0.001.tgz b/assets/rke2-sriov/rke2-sriov-crd-v1.0.001.tgz new file mode 100755 index 0000000000000000000000000000000000000000..9407aeef34fdca07ca22e986b2959ae056d2b226 GIT binary patch literal 3086 zcmV+p4Ds_HiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI}dbK|zI-)H|77~h9%XJSXr*KRZSKBUQ}_1sN1jnkZmPNzdj zkj+LSbx6udPTT+e3`xl!vc8;nolQr0Sg#}q1V8{Jeo`dvala=8<D-VF|&!^3@N|M19p=L`-$91h-rvq2q7DUphZcg~B) z${Y7ah{W^`g`}LFz;w{@QF?;L${Y`wR3r=~s0qT^&AEht3z$btzr#p`C$Jnt9rYCB z36MArsYkS=&U8LP-|0Kfp!3>hx0F&Y{}o1YNEFIFdyb)c;Nrf=V-!SjVOgo0o|nIS z!mlkCHTi#ZFc>W7|Nhb8(P5ka+n~k#Co#oGg-jpG{{2VUr+jZZ=-gB0pTJon6_0LE z@7~!+R;Pemr zP6xmfXl}oy5lTg(_ykxIh8+M~YjW||H^=EwpU24Lga)clc}K?RX&uIbCvkdXA)^(Y z>T7KsY3AV%SC-ve2&q*6UvTj=mC7*0VIoMlqM^AaDH|st5&5ef0O@gEF0Zr-G4asv z0Hkg)D)mysrvod=n_xt&t^nGO)9c~g!D#6;z)~GwRv4%)==K&<()D3ZZ8*Ii&ZNac z=f9$vlPoQS&cfN;*gIN1%LTrU8MLFPCZeBO1UvvWp%Mhf0wppVMN5J~GZ6;d{R2JK zhY<=b2IPb%p|3-2ib8=vkB=Gs&rG%i#m%6mvZ3RQmf>Pcg3-Bj6$=u}>8GeHb!0BN2vYMB-PU0PShn(~fO61&bvx&uqQ6a3L#9CG)kMt)m#d zrNr@3QlUdz5rsM-3TjnG#d)jABQbGlNQ91e8ed@132U6^SKNqKU>N zszI|gVzyw_SU2Od6&@iC)KjI1H;Is``Bnlvv&Wbfp>@>C?$P7b zs5H76e!0u^03WB+L%n>DDVrCpSs~QRZ*xU-8PoZ>tU_-|y+%bs5tYd1Wx}v86$4-_20%Ps;@QpT|NG8PN&PUi}1hyr(-C) zuxipX=d;Besuhtj=fT*-(7Xh7IqMdl4uaM575XZXNL8<_ zVS|YK_IQk*C9df;NN z-ept{Gup29Rx4cHc--ot1)b`deu~jllm(FS?n3tAGz|GemMzd_sI2(zZUH#aod%Tm zVvly0dzRTn*Z1`b2U6$eU`8ys=Tnkthfx%i>?)w7n?{E zd<2jCwzl2$hWswQk_(SQp#WXSKl-S{WpMOi-~N7d&95^!NPmyg-w)}pTM#@@J*i+J z&I=kUEb#G)fkPGuB9%zY+LNJ*dI`2(*ZZWv2%DK%VqlsZW*e-CcfXg)8lIm#rqnC= zC!#X72i;*t1k&R3ffcnT&x5K~~EnfZ$x&qTEE`>$4#c-xnz5 zE9*T)<`?DbipsZUAFY{RoGc%mkHZ%1FSsfmIfU~i=n?By%hg7vtIKeXbt|mzdtz0rw05rJhj-bRl5fHmFaM=0Q?#&8sfeSwpeOW-xl?4QQvO>^)*?%KIl6ya~V}& zzOj96t}vY|%!Vv|0#evom-fchC{YdGTC0+!a=fvjfI^gR@!sNg#S$xQRvM06)?GFo zJof0R1u&ki!Zi3%ueGHDDq)ZM3AR-AtYIx}(?LyFQrsp!LtJ&=`3!;6;D)gACS+A0 z6U!{6h*)7WYpJ&oKc)Cf$=GG1ZmNT|#qi|~>^jx)t5mp({N6}v-4(v^xJdP7#FBlZ zusBrm(rQzn`T@YY!pzghjfjefw;4I*YsR9SdaqZlA8Tn;zZR?|t_qS~S5(j}4(gm$ zRm&{ZRJ4pqEA;hBZhi3A`mH+PYj5Awu4)uxxwp5lFDuX0Z+TBw{b=xQ>)-Ps|$?Y;P)WYeDpuo(NWo5p=f^3}u;zv}P)nNXt|7%+@ zm0yA&T5~24C(*Fd@Q!AVTMuk)SJ{(mXr51KKJ6xI--Xlo}gnugmwAz7x^c zjTQCKtTowaF|w(}O$tO#9(t(;z?qHEHD8M7ZRwr7WkqE3b``g_;1IbRmo|yLNn6-)nkisFN;av_s5R@L6@0CdQlslLtID?r cle~6c*HTL@wNyv{4FCZD|EzE-y8vha0L;=IQUCw| literal 0 HcmV?d00001 diff --git a/assets/rke2-sriov/rke2-sriov-v1.0.0-build2021042901.tgz b/assets/rke2-sriov/rke2-sriov-v1.0.0-build2021042901.tgz new file mode 100755 index 0000000000000000000000000000000000000000..8bc46049b5448c1c356f55dd8d105b8c2d83ba08 GIT binary patch literal 3617 zcmV++4&Lz}iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH+}bK*LZ^Y8gn^m=CNWu}5L2}$;-dR4~|-aKydNDA_1?&@lb z5_SW+7|AQi z0TR+LC?w^q0kfJ#!f@rM<2tV8qx1v~m3h`-Qjs8ley`HG`~o~gK@=B<;4un>`QYP> zdI%v8qA_KTHQ`fiz(lD~HmcPzRg-AwczjyD`I}^@Zn?M#gJ?RWYx-r z)(y^Yx$tGfs(=&~%4gP;P^JiFD9lrw5*jqX(^FXfmmtiWpwM(I07f(mz4#eikfF5V zN6WcyNgfFg4XPYo6MR+EA*Nx?*40!QMl|q`+@qRXKl)F%X1(^nZV4;)KO;ee@*6mS z68k@LPfxP;Uq5#D_Wu%)+E~K^pi?qN{RKc^$R$-=%o~u-{s|F2GW072R;v3cGS0UM z%kmg~JQ0u46}(5z=?d24nrpBQC>v2mhlKf$AwY+@G_t%KDzR4^gvO~oT~#rfN{nWO z=CO0^)Uq@w`+xMFH8KJdw^m7Ut;(692Y`$W18l&E1QIRF<7`C71E1iOKSSmiO(jNC zHb-u8IN|)}>C_SgC3H4qeG486HJB1c#we1v5-3wR7DR_WxTR`hT2<0kio+P0p8S{~ zpd;!Lg%U?I0 zK_J6h5&%(ve}pvV^U!(=j4Kf6@#z$qkG|n16x@$IBZ(J8QlXHJwJLN2l!(x>#sMFa zKr3F(rNZesjz|=!9*(J0dIW6yM~Q8FD2J8!uW%X$dahNwm)GsSqyA94p;5N}Kdooi z|MkBC>_Q zj6K}K#ah=Bl$g_r0A~nuBm!n6pgvV|le1{|Ya|#V2(C0nD{-^bBSA2C;CezO$O(@E zKW#~Je5wOi0TPMeV;JzcrLji|FN?TQ=#I56k@=}w4oPvaC7p%=9nEdc z?i5IzjPXc;(#rxP(;;Y~=S%*r6+ObOSvU+aUC<2YK)|P?5ej4qT206LP)*$0!W(Ou z2B|Cqj|?@Odkt>ny-@$S8kp=Effm=gyCr&nYZSWOT>6Z8QytJzfDC+QKp*) z6^UX-J#_vm9Xa!CaC&IwgIS)+ka)O)O3UB)S&w($jHywGrodAMvY068=S8+`Hb_m77yw<-SQcvYxVC*;l=w>Kb-1c+imX*a^t@iKFL<% z6~Ob(1j^$7k(-VGXZ8L1|7BpA|L3RwP>}rRzcW+fH zmF@U!Ems#g%oc^VM>FRMRNXR^K9i=q?ougi=oFFD9^V3p)z`yOyxx1X)NLA zf(N*Za)7e6lL|jA= z#hs)ccXNRAK$9|d%v4RZ=kO4joY0ZV<>f;Tvdki4$Ck5RGx2Y3K8A7?XVe^*tz+;6 z#_Yeg8~tISEdD3v{j6m`N&K(X&NAo!N3MIcKmUIbc)Az+7|)DHECYCeNq({E5=;8R z!bv>9rX{1HPI`>9j7jw4c-xHQ?UpH72`|rc{@bc869XQvyKLdzt1EDwq1T@HdoYme z|KsWvy_(!fHF$~tKXZ>yv-#g~ZSVhI1Rk+Pn@L8hvs$$qn|5=NeVi|nkKFBBGux(7 zpd$I4-P^*&`_kj~b(71)Ww(sy$#J>K5!fTQ>fS=r_hCda@Fh%8;G&?olh$k-Bn3O? z#zDs4QwF~#bJiz1TD&2?D0>H(>O|#&3^9=LgHp<= z7fbrDu&g0iLsg0lAZ5}tUe)*#1^2OHw#wGEJ|#Lpr)o}`D;{8yqNW%sfTIz5ssUZz z_a^8^CZxw;&LbbDuxPuu$^q>^s8lj}A=e^!w@hF&$rd-OQrwktO~vpQdKd6wQJA`xPTuoKhPk&hn-J+}}5f+bJ@R4JrkX zPp8TKk)_C`!Wv{(Q4pk?+?`REt1E#L%~~l1WV2PwOLcy2UblW7beq4m`&Z3Yd#w$C zxsdgX;L}Ft1;oy0v00zvK)50zjV5tkInA+w_F!*DwR=is0^~J* zfd6j$`s-!y^Pt!6U;f@}wflok_rKe%>&xEG#aKkl5(zTx9$^0Rs@-d9R<*6=b6RTc z*`Z7o(z@*a()lzvZ?=EC-2ITQUBfD!lR1q`r(`O}*Y?L>FE2muT!M5VQ^Natvj@0N zC*a_!*Z!sRKlz-dSAZ$c#nJ9IKVGy4&GX+n{eI`Ns|WGAcX@Hq?&agN%}p^o-!fj? ze_vgm7f$Tm(JvT`i*~c$9(-x{v>pqm&9;F!FDQNNbO%?>>tFMcS9z$a9;4M^a;Gwj zsCDss|GM29T>tM?!L+uQ>#Fq;esXn8My4%p$>edKT4bv^`1pJG{Gy2cb+as}8`W01 zDP2-YSn&9@v(r6%YslUI+10^+0%hm_r*3xt=fvHg|Gx}8awGe32mjmc1LT}HhzJUI><^kseHMZB@HI4%qJOdHeE$ z-PILnXY&me^_1Z8L~WH+73{d2VCQ;!y06|^UwI@R)>A%H+vw-DjlanMCyU`-rGO>= z-#x2uiDYVD=BCQdFDJ#w?(TpxFNpl2E5;7|36%NB z6dYx)&1$!lktt{Y?r}nGb7ki_(iL6oeL&2u_VEhre>KB;wi_t3|KpR5`=7P?{{H8S zK*20u3ynKo=w(y4r;>fjvgx(e{oO&X{U?_zu#)^)SH%QI>wEiu z33!_X!m)yb02v$voZmzt6kiRh&T2N;EA_{wT+g=OzX#VW7v7o^q<5y44;nv%Pd&Br zLZV7v7T?0D&T3Ut!q@qj)EL_Fe|0_?(QeUnxsP$t&khmx6;b$HeCsujo7eR`k=u3QC{5Pyz2$Uf=399ar{4whgM_l0Q ne-@gmHuKV1l&L-_-u{yF9`>+@?-c$O00960PuEnQ0Av6F9PlOZ literal 0 HcmV?d00001 diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/Chart.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/Chart.yaml new file mode 100755 index 0000000..73e46e0 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v3.7.1 +description: Multus CNI enables attaching multiple network interfaces to pods in Kubernetes. +home: https://github.com/k8snetworkplumbingwg/multus-cni +icon: https://raw.githubusercontent.com/k8snetworkplumbingwg/multus-cni/master/doc/images/Multus.png +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-multus +sources: +- https://github.com/k8snetworkplumbingwg/multus-cni +version: v3.7.1-build2021041601 diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/_helpers.tpl b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/_helpers.tpl new file mode 100755 index 0000000..b647c75 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/_helpers.tpl @@ -0,0 +1,7 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrole.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrole.yaml new file mode 100755 index 0000000..0a37472 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrole.yaml @@ -0,0 +1,27 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: multus +rules: + - apiGroups: ["k8s.cni.cncf.io"] + resources: + - '*' + verbs: + - '*' + - apiGroups: + - "" + resources: + - pods + - pods/status + verbs: + - get + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update \ No newline at end of file diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrolebinding.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrolebinding.yaml new file mode 100755 index 0000000..61af8e9 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/clusterrolebinding.yaml @@ -0,0 +1,12 @@ +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: multus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: multus +subjects: +- kind: ServiceAccount + name: multus + namespace: {{ .Release.Namespace }} \ No newline at end of file diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/daemonset.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/daemonset.yaml new file mode 100755 index 0000000..889ceb5 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/daemonset.yaml @@ -0,0 +1,57 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: kube-multus-ds + namespace: {{ .Release.Namespace }} +spec: + selector: + matchLabels: + name: multus + template: + metadata: + labels: + name: multus + spec: + hostNetwork: true + tolerations: + - operator: Exists + effect: NoSchedule + serviceAccountName: multus + initContainers: + - name: cni-plugins + image: {{ template "system_default_registry" . }}{{ .Values.cniplugins.image.repository }}:{{ .Values.cniplugins.image.tag }} + volumeMounts: + - name: cnibin + mountPath: /host/opt/cni/bin + env: + - name: SKIP_CNI_BINARIES + value: {{ .Values.cniplugins.skipcnis }} + containers: + - name: kube-multus + image: {{ template "system_default_registry" . }}{{ .Values.multus.image.repository }}:{{ .Values.multus.image.tag }} + command: ["/entrypoint.sh"] + args: + - "--multus-conf-file=auto" + - "--cni-version=0.3.1" + resources: + requests: + cpu: "100m" + memory: "50Mi" + limits: + cpu: "100m" + memory: "50Mi" + securityContext: + privileged: true + volumeMounts: + - name: cni + mountPath: /host/etc/cni/net.d + - name: cnibin + mountPath: /host/opt/cni/bin + terminationGracePeriodSeconds: 10 + volumes: + - name: cni + hostPath: + path: /etc/cni/net.d + - name: cnibin + hostPath: + path: /opt/cni/bin diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/networkattachmendefinitions.crd.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/networkattachmendefinitions.crd.yaml new file mode 100755 index 0000000..5b21ab6 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/networkattachmendefinitions.crd.yaml @@ -0,0 +1,44 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: network-attachment-definitions.k8s.cni.cncf.io +spec: + group: k8s.cni.cncf.io + scope: Namespaced + names: + plural: network-attachment-definitions + singular: network-attachment-definition + kind: NetworkAttachmentDefinition + shortNames: + - net-attach-def + versions: + - name: v1 + served: true + storage: true + schema: + openAPIV3Schema: + description: 'NetworkAttachmentDefinition is a CRD schema specified by the Network Plumbing + Working Group to express the intent for attaching pods to one or more logical or physical + networks. More information available at: https://github.com/k8snetworkplumbingwg/multi-net-spec' + type: object + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this represen + tation of an object. Servers should convert recognized schemas to the + latest internal value, and may reject unrecognized values. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: 'NetworkAttachmentDefinition spec defines the desired state of a network attachment' + type: object + properties: + config: + description: 'NetworkAttachmentDefinition config is a JSON-formatted CNI configuration' + type: string \ No newline at end of file diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/serviceaccount.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/serviceaccount.yaml new file mode 100755 index 0000000..f66d274 --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: multus + namespace: {{ .Release.Namespace }} \ No newline at end of file diff --git a/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/values.yaml b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/values.yaml new file mode 100755 index 0000000..73f6b2b --- /dev/null +++ b/charts/rke2-multus/rke2-multus/v3.7.1-build2021041601/values.yaml @@ -0,0 +1,16 @@ +multus: + image: + repository: rancher/hardened-multus-cni + tag: v3.7.1-build20210416 + +cniplugins: + image: + repository: rancher/hardened-cni-plugins + tag: v0.9.1-build20210414 + + # skipcnis is a comma separated list of cni binaries to skip from + # installing. + skipcnis: flannel + +global: + systemDefaultRegistry: "" diff --git a/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/Chart.yaml b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/Chart.yaml new file mode 100755 index 0000000..6af30b8 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +description: Installs the CRDs for rke2-sriov. +name: rke2-sriov-crd +type: application +version: v1.0.001 diff --git a/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovibnetworks_crd.yaml b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovibnetworks_crd.yaml new file mode 100755 index 0000000..b0f9aca --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovibnetworks_crd.yaml @@ -0,0 +1,73 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.3.0 + creationTimestamp: null + name: sriovibnetworks.sriovnetwork.openshift.io +spec: + group: sriovnetwork.openshift.io + names: + kind: SriovIBNetwork + listKind: SriovIBNetworkList + plural: sriovibnetworks + singular: sriovibnetwork + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + description: SriovIBNetwork is the Schema for the sriovibnetworks API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: SriovIBNetworkSpec defines the desired state of SriovIBNetwork + properties: + capabilities: + description: 'Capabilities to be configured for this network. Capabilities + supported: (infinibandGUID), e.g. ''{"infinibandGUID": true}''' + type: string + ipam: + description: IPAM configuration to be used for this network. + type: string + linkState: + description: VF link state (enable|disable|auto) + enum: + - auto + - enable + - disable + type: string + networkNamespace: + description: Namespace of the NetworkAttachmentDefinition custom resource + type: string + resourceName: + description: SRIOV Network device plugin endpoint resource name + type: string + required: + - resourceName + type: object + status: + description: SriovIBNetworkStatus defines the observed state of SriovIBNetwork + type: object + type: object + served: true + storage: true + subresources: + status: {} +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetwork.crd.yaml b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetwork.crd.yaml new file mode 100755 index 0000000..ea0caac --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetwork.crd.yaml @@ -0,0 +1,109 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.3.0 + creationTimestamp: null + name: sriovnetworks.sriovnetwork.openshift.io +spec: + group: sriovnetwork.openshift.io + names: + kind: SriovNetwork + listKind: SriovNetworkList + plural: sriovnetworks + singular: sriovnetwork + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + description: SriovNetwork is the Schema for the sriovnetworks API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: SriovNetworkSpec defines the desired state of SriovNetwork + properties: + capabilities: + description: 'Capabilities to be configured for this network. Capabilities + supported: (mac|ips), e.g. ''{"mac": true}''' + type: string + ipam: + description: IPAM configuration to be used for this network. + type: string + linkState: + description: VF link state (enable|disable|auto) + enum: + - auto + - enable + - disable + type: string + maxTxRate: + description: Maximum tx rate, in Mbps, for the VF. Defaults to 0 (no + rate limiting) + minimum: 0 + type: integer + metaPlugins: + description: MetaPluginsConfig configuration to be used in order to + chain metaplugins to the sriov interface returned by the operator. + type: string + minTxRate: + description: Minimum tx rate, in Mbps, for the VF. Defaults to 0 (no + rate limiting). min_tx_rate should be <= max_tx_rate. + minimum: 0 + type: integer + networkNamespace: + description: Namespace of the NetworkAttachmentDefinition custom resource + type: string + resourceName: + description: SRIOV Network device plugin endpoint resource name + type: string + spoofChk: + description: VF spoof check, (on|off) + enum: + - "on" + - "off" + type: string + trust: + description: VF trust mode (on|off) + enum: + - "on" + - "off" + type: string + vlan: + description: VLAN ID to assign for the VF. Defaults to 0. + maximum: 4096 + minimum: 0 + type: integer + vlanQoS: + description: VLAN QoS ID to assign for the VF. Defaults to 0. + maximum: 7 + minimum: 0 + type: integer + required: + - resourceName + type: object + status: + description: SriovNetworkStatus defines the observed state of SriovNetwork + type: object + type: object + served: true + storage: true + subresources: + status: {} +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodepolicy.crd.yaml b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodepolicy.crd.yaml new file mode 100755 index 0000000..23f5f96 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodepolicy.crd.yaml @@ -0,0 +1,131 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.3.0 + creationTimestamp: null + name: sriovnetworknodepolicies.sriovnetwork.openshift.io +spec: + group: sriovnetwork.openshift.io + names: + kind: SriovNetworkNodePolicy + listKind: SriovNetworkNodePolicyList + plural: sriovnetworknodepolicies + singular: sriovnetworknodepolicy + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + description: SriovNetworkNodePolicy is the Schema for the sriovnetworknodepolicies + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: SriovNetworkNodePolicySpec defines the desired state of SriovNetworkNodePolicy + properties: + deviceType: + description: The driver type for configured VFs. Allowed value "netdevice", + "vfio-pci". Defaults to netdevice. + enum: + - netdevice + - vfio-pci + type: string + eSwitchMode: + description: NIC Device Mode. Allowed value "legacy","switchdev". + enum: + - legacy + - switchdev + type: string + isRdma: + description: RDMA mode. Defaults to false. + type: boolean + linkType: + description: NIC Link Type. Allowed value "eth", "ETH", "ib", and + "IB". + enum: + - eth + - ETH + - ib + - IB + type: string + mtu: + description: MTU of VF + minimum: 1 + type: integer + nicSelector: + description: NicSelector selects the NICs to be configured + properties: + deviceID: + description: The device hex code of SR-IoV device. Allowed value + "0d58", "1572", "158b", "1013", "1015", "1017", "101b". + type: string + netFilter: + description: Infrastructure Networking selection filter. Allowed + value "openstack/NetworkID:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" + type: string + pfNames: + description: Name of SR-IoV PF. + items: + type: string + type: array + rootDevices: + description: PCI address of SR-IoV PF. + items: + type: string + type: array + vendor: + description: The vendor hex code of SR-IoV device. Allowed value + "8086", "15b3". + type: string + type: object + nodeSelector: + additionalProperties: + type: string + description: NodeSelector selects the nodes to be configured + type: object + numVfs: + description: Number of VFs for each PF + minimum: 0 + type: integer + priority: + description: Priority of the policy, higher priority policies can + override lower ones. + maximum: 99 + minimum: 0 + type: integer + resourceName: + description: SRIOV Network device plugin endpoint resource name + type: string + required: + - nicSelector + - nodeSelector + - numVfs + - resourceName + type: object + status: + description: SriovNetworkNodePolicyStatus defines the observed state of + SriovNetworkNodePolicy + type: object + type: object + served: true + storage: true + subresources: + status: {} +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodestate.crd.yaml b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodestate.crd.yaml new file mode 100755 index 0000000..f35989b --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovnetworknodestate.crd.yaml @@ -0,0 +1,153 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.3.0 + creationTimestamp: null + name: sriovnetworknodestates.sriovnetwork.openshift.io +spec: + group: sriovnetwork.openshift.io + names: + kind: SriovNetworkNodeState + listKind: SriovNetworkNodeStateList + plural: sriovnetworknodestates + singular: sriovnetworknodestate + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + description: SriovNetworkNodeState is the Schema for the sriovnetworknodestates + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: SriovNetworkNodeStateSpec defines the desired state of SriovNetworkNodeState + properties: + dpConfigVersion: + type: string + interfaces: + items: + properties: + eSwitchMode: + type: string + linkType: + type: string + mtu: + type: integer + name: + type: string + numVfs: + type: integer + pciAddress: + type: string + vfGroups: + items: + properties: + deviceType: + type: string + policyName: + type: string + resourceName: + type: string + vfRange: + type: string + type: object + type: array + required: + - pciAddress + type: object + type: array + type: object + status: + description: SriovNetworkNodeStateStatus defines the observed state of + SriovNetworkNodeState + properties: + interfaces: + items: + properties: + Vfs: + items: + properties: + Vlan: + type: integer + assigned: + type: string + deviceID: + type: string + driver: + type: string + mac: + type: string + mtu: + type: integer + name: + type: string + pciAddress: + type: string + vendor: + type: string + vfID: + type: integer + required: + - pciAddress + - vfID + type: object + type: array + deviceID: + type: string + driver: + type: string + eSwitchMode: + type: string + linkSpeed: + type: string + linkType: + type: string + mac: + type: string + mtu: + type: integer + name: + type: string + netFilter: + type: string + numVfs: + type: integer + pciAddress: + type: string + totalvfs: + type: integer + vendor: + type: string + required: + - pciAddress + type: object + type: array + lastSyncError: + type: string + syncStatus: + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovoperatorconfig.crd.yaml b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovoperatorconfig.crd.yaml new file mode 100755 index 0000000..abaf27e --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov-crd/v1.0.001/templates/sriov-network-operator-sriovoperatorconfig.crd.yaml @@ -0,0 +1,80 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: sriovoperatorconfigs.sriovnetwork.openshift.io +spec: + group: sriovnetwork.openshift.io + names: + kind: SriovOperatorConfig + listKind: SriovOperatorConfigList + plural: sriovoperatorconfigs + singular: sriovoperatorconfig + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + description: SriovOperatorConfig is the Schema for the sriovoperatorconfigs + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: SriovOperatorConfigSpec defines the desired state of SriovOperatorConfig + properties: + configDaemonNodeSelector: + additionalProperties: + type: string + description: NodeSelector selects the nodes to be configured + type: object + disableDrain: + description: Flag to disable nodes drain during debugging + type: boolean + enableInjector: + description: Flag to control whether the network resource injector + webhook shall be deployed + type: boolean + enableOperatorWebhook: + description: Flag to control whether the operator admission controller + webhook shall be deployed + type: boolean + enableOvsOffload: + description: Flag to enable OVS hardware offload. Set to 'true' to + provision switchdev-configuration.service and enable OpenvSwitch + hw-offload on nodes. + type: boolean + logLevel: + description: Flag to control the log verbose level of the operator. + Set to '0' to show only the basic logs. And set to '2' to show all + the available logs. + maximum: 2 + minimum: 0 + type: integer + type: object + status: + description: SriovOperatorConfigStatus defines the observed state of SriovOperatorConfig + properties: + injector: + description: Show the runtime status of the network resource injector + webhook + type: string + operatorWebhook: + description: Show the runtime status of the operator admission controller + webhook + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/Chart.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/Chart.yaml new file mode 100755 index 0000000..ce5a2ab --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/Chart.yaml @@ -0,0 +1,13 @@ +apiVersion: v1 +appVersion: v1.0.0 +description: Install SR-IOV operator, cni and device polugin. +home: https://github.com/k8snetworkplumbingwg/sriov-network-operator +keywords: +- sr-iov +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-sriov +sources: +- https://github.com/rancher/rke2-charts +version: v1.0.0-build2021042901 diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/NOTES.txt b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/NOTES.txt new file mode 100755 index 0000000..0d5a0db --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/NOTES.txt @@ -0,0 +1,10 @@ +{{- if or (.Values.webhook.enable) (.Values.injector.enable) }} +{{- if not .Values.cert_manager }} +Thank you for installing {{ .Chart.Name }}. + +WARNING! Self signed certificates have been generated for webhooks. +These certificates have a one year validity and will not be rotated +automatically. This should not be a production cluster. Please deploy +and use cert-manager for production clusters. +{{- end }} +{{- end }} \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_helpers.tpl b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_helpers.tpl new file mode 100755 index 0000000..b647c75 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_helpers.tpl @@ -0,0 +1,7 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_webhook-certs.tpl b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_webhook-certs.tpl new file mode 100755 index 0000000..b9ac809 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/_webhook-certs.tpl @@ -0,0 +1,30 @@ +{{/* +Generate TLS certificates for webhooks. +Note: these 2 lines, that are repeated several times below, are a trick to +ensure the CA certs are generated only once: + $ca := .ca | default (genCA "sriov-network-operator.k8s.cni.cncf.io" 365) + $_ := set . "ca" $ca - +Please, don't try to "simplify" them as without this trick, every generated +certificate would be signed by a different CA. +*/}} +{{- define "sriov_operator_ca_cert" }} +{{- $ca := .ca | default (genCA "sriov-network-operator.k8s.cni.cncf.io" 365) -}} +{{- $_ := set . "ca" $ca -}} +{{- printf "%s" $ca.Cert | b64enc -}} +{{- end }} +{{- define "sriov_operator_cert" }} +{{- $ca := .ca | default (genCA "sriov-network-operator.k8s.cni.cncf.io" 365) -}} +{{- $_ := set . "ca" $ca -}} +{{- $cn := printf "operator-webhook-service.%s.svc" .Release.Namespace -}} +{{- $cert := genSignedCert $cn nil (list $cn) 365 $ca -}} +tls.crt: {{ $cert.Cert | b64enc }} +tls.key: {{ $cert.Key | b64enc }} +{{- end }} +{{- define "sriov_resource_injector_cert" }} +{{- $ca := .ca | default (genCA "sriov-network-operator.k8s.cni.cncf.io" 365) -}} +{{- $_ := set . "ca" $ca -}} +{{- $cn := printf "network-resources-injector-service.%s.svc" .Release.Namespace -}} +{{- $cert := genSignedCert $cn nil (list $cn) 365 $ca -}} +tls.crt: {{ $cert.Cert | b64enc }} +tls.key: {{ $cert.Key | b64enc }} +{{- end }} \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/certmanagercerts.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/certmanagercerts.yaml new file mode 100755 index 0000000..13726d5 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/certmanagercerts.yaml @@ -0,0 +1,42 @@ +{{- if or .Values.webhook.enable .Values.injector.enable -}} +{{- if .Values.cert_manager -}} +{{- if not (.Capabilities.APIVersions.Has "cert-manager.io/v1") -}} +{{- required "cert-manager is required but not found!" "" -}} +{{- end -}} +apiVersion: cert-manager.io/v1 +kind: Issuer +metadata: + name: sriov-network-operator-selfsigned-issuer + namespace: {{ .Release.Namespace }} +spec: + selfSigned: {} +--- +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: operator-webhook-service + namespace: {{ .Release.Namespace }} +spec: + secretName: operator-webhook-service + dnsNames: + - operator-webhook-service.{{ .Release.Namespace }}.svc + issuerRef: + name: sriov-network-operator-selfsigned-issuer + privateKey: + rotationPolicy: Always +--- +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: network-resources-injector-service + namespace: {{ .Release.Namespace }} +spec: + secretName: network-resources-injector-secret + dnsNames: + - network-resources-injector-service.{{ .Release.Namespace }}.svc + issuerRef: + name: sriov-network-operator-selfsigned-issuer + privateKey: + rotationPolicy: Always +{{- end -}} +{{- end -}} \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrole.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrole.yaml new file mode 100755 index 0000000..b537622 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrole.yaml @@ -0,0 +1,47 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: sriov-network-operator +rules: +- apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch", "patch", "update"] +- apiGroups: [""] + resources: ["pods"] + verbs: ["*"] +- apiGroups: ["apps"] + resources: ["daemonsets"] + verbs: ["get"] +- apiGroups: [""] + resources: [namespaces, serviceaccounts] + verbs: ["*"] +- apiGroups: ["k8s.cni.cncf.io"] + resources: ["network-attachment-definitions"] + verbs: ["*"] +- apiGroups: ["rbac.authorization.k8s.io"] + resources: [clusterroles, clusterrolebindings] + verbs: ["*"] +- apiGroups: ["admissionregistration.k8s.io"] + resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"] + verbs: ["*"] +- apiGroups: ["sriovnetwork.openshift.io"] + resources: ["*"] + verbs: ["*"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: sriov-network-config-daemon +rules: +- apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch", "patch", "update"] +- apiGroups: [""] + resources: ["pods"] + verbs: ["*"] +- apiGroups: ["apps"] + resources: ["daemonsets"] + verbs: ["get"] +- apiGroups: [""] + resources: ["pods/eviction"] + verbs: ["create"] diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrolebinding.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrolebinding.yaml new file mode 100755 index 0000000..282205b --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/clusterrolebinding.yaml @@ -0,0 +1,25 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: sriov-network-operator +roleRef: + kind: ClusterRole + name: sriov-network-operator + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + namespace: {{ .Release.Namespace }} + name: sriov-network-operator +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: sriov-network-config-daemon +roleRef: + kind: ClusterRole + name: sriov-network-config-daemon + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + namespace: {{ .Release.Namespace }} + name: sriov-network-config-daemon diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/deployment.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/deployment.yaml new file mode 100755 index 0000000..521ad79 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/deployment.yaml @@ -0,0 +1,86 @@ +{{- if not (.Capabilities.APIVersions.Has "k8s.cni.cncf.io/v1/NetworkAttachmentDefinition") -}} +{{- required "rke2-multus is required but not found!" "" -}} +{{- end -}} +apiVersion: sriovnetwork.openshift.io/v1 +kind: SriovOperatorConfig +metadata: + name: default + namespace: {{ .Release.Namespace }} +spec: + # Add fields here + enableInjector: {{ .Values.injector.enable }} + enableOperatorWebhook: {{ .Values.webhook.enable }} + configDaemonNodeSelector: {feature.node.kubernetes.io/network-sriov.capable: "true"} +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: sriov-network-operator + namespace: {{ .Release.Namespace }} +spec: + replicas: 1 + selector: + matchLabels: + name: sriov-network-operator + template: + metadata: + labels: + name: sriov-network-operator + spec: + nodeSelector: + node-role.kubernetes.io/master: "true" + tolerations: + - effect: NoSchedule + key: node-role.kubernetes.io/master + operator: Exists + serviceAccountName: sriov-network-operator + containers: + - name: sriov-network-operator + # Replace this with the built image name + image: {{ template "system_default_registry" . }}{{ .Values.operator.image.repository }}:{{ .Values.operator.image.tag }} + command: + - sriov-network-operator + imagePullPolicy: IfNotPresent + env: + - name: WATCH_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: SRIOV_CNI_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.cni.image.repository }}:{{ .Values.cni.image.tag }} + - name: SRIOV_INFINIBAND_CNI_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.cni_infiniband.image.repository }}:{{ .Values.cni_infiniband.image.tag }} + - name: SRIOV_DEVICE_PLUGIN_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.device_plugin.image.repository }}:{{ .Values.device_plugin.image.tag }} + - name: NETWORK_RESOURCES_INJECTOR_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.injector.image.repository }}:{{ .Values.injector.image.tag }} + - name: OPERATOR_NAME + value: sriov-network-operator + - name: SRIOV_NETWORK_CONFIG_DAEMON_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.config_daemon.image.repository }}:{{ .Values.config_daemon.image.tag }} + - name: SRIOV_NETWORK_WEBHOOK_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.webhook.image.repository }}:{{ .Values.webhook.image.tag }} + - name: RESOURCE_PREFIX + value: rancher.io + - name: ENABLE_ADMISSION_CONTROLLER + value: "false" + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: RELEASE_VERSION + value: {{ .Values.operator.image.tag }} + - name: SRIOV_CNI_BIN_PATH + value: /opt/cni/bin + - name: CLUSTER_TYPE + value: "kubernetes" + {{- if or .Values.webhook.enable .Values.injector.enable }} + {{- if not .Values.cert_manager }} + - name: WEBHOOK_CA_BUNDLE + value: "{{ template "sriov_operator_ca_cert" . }}" + {{- end }} + {{- end }} diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/role.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/role.yaml new file mode 100755 index 0000000..b81bade --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/role.yaml @@ -0,0 +1,97 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: sriov-network-operator + namespace: {{ .Release.Namespace }} +rules: +- apiGroups: + - "" + resources: + - pods + - services + - endpoints + - persistentvolumeclaims + - events + - configmaps + - secrets + verbs: + - '*' +- apiGroups: + - apps + resources: + - deployments + - daemonsets + - replicasets + - statefulsets + verbs: + - '*' +- apiGroups: + - monitoring.coreos.com + resources: + - servicemonitors + verbs: + - get + - create +- apiGroups: + - apps + resourceNames: + - sriov-network-operator + resources: + - deployments/finalizers + verbs: + - update +- apiGroups: + - rbac.authorization.k8s.io + resources: + - serviceaccounts + - roles + - rolebindings + verbs: + - '*' +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: sriov-network-config-daemon + namespace: {{ .Release.Namespace }} +rules: +- apiGroups: + - "" + resources: + - pods + verbs: + - '*' +- apiGroups: + - apps + resources: + - daemonsets + verbs: + - '*' +- apiGroups: + - sriovnetwork.openshift.io + resources: + - '*' + - sriovnetworknodestates + verbs: + - '*' +- apiGroups: + - "" + resources: + - configmaps + verbs: + - get + - update +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: operator-webhook-sa + namespace: {{ .Release.Namespace }} +rules: +- apiGroups: + - "" + resources: + - configmaps + verbs: + - get + \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/rolebinding.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/rolebinding.yaml new file mode 100755 index 0000000..5d8e330 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/rolebinding.yaml @@ -0,0 +1,38 @@ +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: sriov-network-operator + namespace: {{ .Release.Namespace }} +subjects: +- kind: ServiceAccount + name: sriov-network-operator +roleRef: + kind: Role + name: sriov-network-operator + apiGroup: rbac.authorization.k8s.io +--- +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: sriov-network-config-daemon + namespace: {{ .Release.Namespace }} +subjects: +- kind: ServiceAccount + name: sriov-network-config-daemon +roleRef: + kind: Role + name: sriov-network-config-daemon + apiGroup: rbac.authorization.k8s.io +--- +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: operator-webhook-sa + namespace: {{ .Release.Namespace }} +subjects: +- kind: ServiceAccount + name: operator-webhook-sa +roleRef: + kind: Role + name: operator-webhook-sa + apiGroup: rbac.authorization.k8s.io diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/secrets.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/secrets.yaml new file mode 100755 index 0000000..2e0825c --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/secrets.yaml @@ -0,0 +1,21 @@ +{{- if not .Values.cert_manager -}} +{{- if .Values.webhook.enable }} +apiVersion: v1 +kind: Secret +metadata: + name: operator-webhook-service + namespace: {{ .Release.Namespace }} +data: +{{ include "sriov_operator_cert" . | indent 2 }} +{{- end }} +--- +{{- if .Values.injector.enable }} +apiVersion: v1 +kind: Secret +metadata: + name: network-resources-injector-secret + namespace: {{ .Release.Namespace }} +data: +{{ include "sriov_resource_injector_cert" . | indent 2 }} +{{- end }} +{{- end }} diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/serviceaccount.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/serviceaccount.yaml new file mode 100755 index 0000000..523afb7 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/serviceaccount.yaml @@ -0,0 +1,11 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: sriov-network-operator + namespace: {{ .Release.Namespace }} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: sriov-network-config-daemon + namespace: {{ .Release.Namespace }} diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/validate-install-crd.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/validate-install-crd.yaml new file mode 100755 index 0000000..08688ad --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/templates/validate-install-crd.yaml @@ -0,0 +1,18 @@ +#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} +# {{- $found := dict -}} +# {{- set $found "sriovnetwork.openshift.io/v1/SriovIBNetwork" false -}} +# {{- set $found "sriovnetwork.openshift.io/v1/SriovNetwork" false -}} +# {{- set $found "sriovnetwork.openshift.io/v1/SriovNetworkNodePolicy" false -}} +# {{- set $found "sriovnetwork.openshift.io/v1/SriovNetworkNodeState" false -}} +# {{- set $found "sriovnetwork.openshift.io/v1/SriovOperatorConfig" false -}} +# {{- range .Capabilities.APIVersions -}} +# {{- if hasKey $found (toString .) -}} +# {{- set $found (toString .) true -}} +# {{- end -}} +# {{- end -}} +# {{- range $_, $exists := $found -}} +# {{- if (eq $exists false) -}} +# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}} +# {{- end -}} +# {{- end -}} +#{{- end -}} \ No newline at end of file diff --git a/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/values.yaml b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/values.yaml new file mode 100755 index 0000000..3046742 --- /dev/null +++ b/charts/rke2-sriov/rke2-sriov/v1.0.0-build2021042901/values.yaml @@ -0,0 +1,45 @@ +operator: + image: + repository: rancher/hardened-sriov-network-operator + tag: v1.0.0-build20210429 + +cni: + image: + repository: rancher/hardened-sriov-cni + tag: v2.6-build20210310 + +cni_infiniband: + image: + repository: rancher/hardened-ib-sriov-cni + tag: v1.0.0-build20210310 + +device_plugin: + image: + repository: rancher/hardened-sriov-network-device-plugin + tag: v3.3.1-build20210310 + +injector: + image: + repository: rancher/hardened-sriov-network-resources-injector + tag: v1-build20210310 + enable: false + +config_daemon: + image: + repository: rancher/hardened-sriov-network-config-daemon + tag: v1.0.0-build20210429 + +webhook: + image: + repository: rancher/hardened-sriov-network-webhook + tag: v1.0.0-build20210429 + enable: false + +# cert_manager enables integration with cert-manager to generate +# certificates for the operator webhooks. Otherwise the chart will +# generate ad-hoc certificates with no automated renewal at expiration, +# not recommended for production clusters. +cert_manager: true + +global: + systemDefaultRegistry: "" diff --git a/index.yaml b/index.yaml index c8d9a6c..bf9acc8 100755 --- a/index.yaml +++ b/index.yaml @@ -864,4 +864,50 @@ entries: urls: - assets/rke2-metrics-server/rke2-metrics-server-2.11.100-build2021022300.tgz version: 2.11.100-build2021022300 + rke2-multus: + - apiVersion: v1 + appVersion: v3.7.1 + created: "2021-05-04T08:26:16.874798019Z" + description: Multus CNI enables attaching multiple network interfaces to pods + in Kubernetes. + digest: d56208323b8a6d806040e0cf4101b1db249e3e7efcd8ef3cd1c863f664ff9136 + home: https://github.com/k8snetworkplumbingwg/multus-cni + icon: https://raw.githubusercontent.com/k8snetworkplumbingwg/multus-cni/master/doc/images/Multus.png + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-multus + sources: + - https://github.com/k8snetworkplumbingwg/multus-cni + urls: + - assets/rke2-multus/rke2-multus-v3.7.1-build2021041601.tgz + version: v3.7.1-build2021041601 + rke2-sriov: + - apiVersion: v1 + appVersion: v1.0.0 + created: "2021-05-04T08:26:16.875599966Z" + description: Install SR-IOV operator, cni and device polugin. + digest: d3b40f84956f2df45da0d7130b562b2a75b9cb7088083ef85a2794456c3aa412 + home: https://github.com/k8snetworkplumbingwg/sriov-network-operator + keywords: + - sr-iov + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-sriov + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-sriov/rke2-sriov-v1.0.0-build2021042901.tgz + version: v1.0.0-build2021042901 + rke2-sriov-crd: + - apiVersion: v1 + created: "2021-05-04T08:26:16.875081035Z" + description: Installs the CRDs for rke2-sriov. + digest: 41a0c02442cd6e8758081ec37a47cf3755565f5a6156553b21d5dd2e4d0c7849 + name: rke2-sriov-crd + type: application + urls: + - assets/rke2-sriov/rke2-sriov-crd-v1.0.001.tgz + version: v1.0.001 generated: "2021-02-25T17:59:12.927381-08:00"