Skip to content

Commit 2cb9b8e

Browse files
committed
add: longhorn storage (#125)
1 parent 2accc91 commit 2cb9b8e

28 files changed

+5656
-0
lines changed
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
# Notes longhorn
2+
3+
Dump `helm` to `yaml`
4+
5+
```sh
6+
# export helm into yaml
7+
helm template --output-dir './scratch' longhorn/longhorn -n longhorn-system -f values.yaml
8+
9+
# move yaml into base
10+
mv scratch/longhorn/templates/* base/
11+
mv base/uninstall-job.yaml overlays/uninstall
12+
```
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
---
2+
# Source: longhorn/templates/clusterrole.yaml
3+
apiVersion: rbac.authorization.k8s.io/v1
4+
kind: ClusterRole
5+
metadata:
6+
name: longhorn-role
7+
labels:
8+
app.kubernetes.io/name: longhorn
9+
helm.sh/chart: longhorn-1.8.1
10+
app.kubernetes.io/managed-by: Helm
11+
app.kubernetes.io/instance: release-name
12+
app.kubernetes.io/version: v1.8.1
13+
rules:
14+
- apiGroups:
15+
- apiextensions.k8s.io
16+
resources:
17+
- customresourcedefinitions
18+
verbs:
19+
- "*"
20+
- apiGroups: [""]
21+
resources: ["pods", "events", "persistentvolumes", "persistentvolumeclaims", "persistentvolumeclaims/status", "nodes", "proxy/nodes", "pods/log", "secrets", "services", "endpoints", "configmaps", "serviceaccounts"]
22+
verbs: ["*"]
23+
- apiGroups: [""]
24+
resources: ["namespaces"]
25+
verbs: ["get", "list"]
26+
- apiGroups: ["apps"]
27+
resources: ["daemonsets", "statefulsets", "deployments"]
28+
verbs: ["*"]
29+
- apiGroups: ["batch"]
30+
resources: ["jobs", "cronjobs"]
31+
verbs: ["*"]
32+
- apiGroups: ["policy"]
33+
resources: ["poddisruptionbudgets", "podsecuritypolicies"]
34+
verbs: ["*"]
35+
- apiGroups: ["scheduling.k8s.io"]
36+
resources: ["priorityclasses"]
37+
verbs: ["watch", "list"]
38+
- apiGroups: ["storage.k8s.io"]
39+
resources: ["storageclasses", "volumeattachments", "volumeattachments/status", "csinodes", "csidrivers"]
40+
verbs: ["*"]
41+
- apiGroups: ["snapshot.storage.k8s.io"]
42+
resources: ["volumesnapshotclasses", "volumesnapshots", "volumesnapshotcontents", "volumesnapshotcontents/status"]
43+
verbs: ["*"]
44+
- apiGroups: ["longhorn.io"]
45+
resources: ["volumes", "volumes/status", "engines", "engines/status", "replicas", "replicas/status", "settings", "settings/status",
46+
"engineimages", "engineimages/status", "nodes", "nodes/status", "instancemanagers", "instancemanagers/status",
47+
"engineimages/finalizers", "nodes/finalizers", "instancemanagers/finalizers",
48+
"sharemanagers", "sharemanagers/status", "backingimages", "backingimages/status",
49+
"backingimagemanagers", "backingimagemanagers/status", "backingimagedatasources", "backingimagedatasources/status",
50+
"backuptargets", "backuptargets/status", "backupvolumes", "backupvolumes/status", "backups", "backups/status",
51+
"recurringjobs", "recurringjobs/status", "orphans", "orphans/status", "snapshots", "snapshots/status",
52+
"supportbundles", "supportbundles/status", "systembackups", "systembackups/status", "systemrestores", "systemrestores/status",
53+
"volumeattachments", "volumeattachments/status", "backupbackingimages", "backupbackingimages/status"]
54+
verbs: ["*"]
55+
- apiGroups: ["coordination.k8s.io"]
56+
resources: ["leases"]
57+
verbs: ["*"]
58+
- apiGroups: ["metrics.k8s.io"]
59+
resources: ["pods", "nodes"]
60+
verbs: ["get", "list"]
61+
- apiGroups: ["apiregistration.k8s.io"]
62+
resources: ["apiservices"]
63+
verbs: ["list", "watch"]
64+
- apiGroups: ["admissionregistration.k8s.io"]
65+
resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"]
66+
verbs: ["get", "list", "create", "patch", "delete"]
67+
- apiGroups: ["rbac.authorization.k8s.io"]
68+
resources: ["roles", "rolebindings", "clusterrolebindings", "clusterroles"]
69+
verbs: ["*"]
70+
---
71+
# Source: longhorn/templates/clusterrole.yaml
72+
apiVersion: rbac.authorization.k8s.io/v1
73+
kind: ClusterRole
74+
metadata:
75+
name: longhorn-ocp-privileged-role
76+
labels:
77+
app.kubernetes.io/name: longhorn
78+
helm.sh/chart: longhorn-1.8.1
79+
app.kubernetes.io/managed-by: Helm
80+
app.kubernetes.io/instance: release-name
81+
app.kubernetes.io/version: v1.8.1
82+
rules:
83+
- apiGroups: ["security.openshift.io"]
84+
resources: ["securitycontextconstraints"]
85+
resourceNames: ["anyuid", "privileged"]
86+
verbs: ["use"]
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
# Source: longhorn/templates/clusterrolebinding.yaml
3+
apiVersion: rbac.authorization.k8s.io/v1
4+
kind: ClusterRoleBinding
5+
metadata:
6+
name: longhorn-bind
7+
labels:
8+
app.kubernetes.io/name: longhorn
9+
helm.sh/chart: longhorn-1.8.1
10+
app.kubernetes.io/managed-by: Helm
11+
app.kubernetes.io/instance: release-name
12+
app.kubernetes.io/version: v1.8.1
13+
roleRef:
14+
apiGroup: rbac.authorization.k8s.io
15+
kind: ClusterRole
16+
name: longhorn-role
17+
subjects:
18+
- kind: ServiceAccount
19+
name: longhorn-service-account
20+
namespace: longhorn-system
21+
---
22+
# Source: longhorn/templates/clusterrolebinding.yaml
23+
apiVersion: rbac.authorization.k8s.io/v1
24+
kind: ClusterRoleBinding
25+
metadata:
26+
name: longhorn-support-bundle
27+
labels:
28+
app.kubernetes.io/name: longhorn
29+
helm.sh/chart: longhorn-1.8.1
30+
app.kubernetes.io/managed-by: Helm
31+
app.kubernetes.io/instance: release-name
32+
app.kubernetes.io/version: v1.8.1
33+
roleRef:
34+
apiGroup: rbac.authorization.k8s.io
35+
kind: ClusterRole
36+
name: cluster-admin
37+
subjects:
38+
- kind: ServiceAccount
39+
name: longhorn-support-bundle
40+
namespace: longhorn-system
41+
---
42+
# Source: longhorn/templates/clusterrolebinding.yaml
43+
apiVersion: rbac.authorization.k8s.io/v1
44+
kind: ClusterRoleBinding
45+
metadata:
46+
name: longhorn-ocp-privileged-bind
47+
labels:
48+
app.kubernetes.io/name: longhorn
49+
helm.sh/chart: longhorn-1.8.1
50+
app.kubernetes.io/managed-by: Helm
51+
app.kubernetes.io/instance: release-name
52+
app.kubernetes.io/version: v1.8.1
53+
roleRef:
54+
apiGroup: rbac.authorization.k8s.io
55+
kind: ClusterRole
56+
name: longhorn-ocp-privileged-role
57+
subjects:
58+
- kind: ServiceAccount
59+
name: longhorn-service-account
60+
namespace: longhorn-system
61+
- kind: ServiceAccount
62+
name: longhorn-ui-service-account
63+
namespace: longhorn-system
64+
- kind: ServiceAccount
65+
name: default # supportbundle-agent-support-bundle uses default sa
66+
namespace: longhorn-system

0 commit comments

Comments
 (0)