Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 9 additions & 0 deletions assets/csidriveroperators/vsphere/02_configmap.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
apiVersion: v1
kind: ConfigMap
metadata:
labels:
# This label ensures that the OpenShift Certificate Authority bundle
# is added to the ConfigMap.
config.openshift.io/inject-trusted-cabundle: "true"
name: vsphere-csi-driver-operator-trusted-ca-bundle
namespace: openshift-cluster-csi-drivers
10 changes: 10 additions & 0 deletions assets/csidriveroperators/vsphere/08_deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,9 @@ spec:
requests:
memory: 50Mi
cpu: 10m
volumeMounts:
- name: trusted-ca-bundle
mountPath: /etc/pki/ca-trust/extracted/pem
priorityClassName: system-cluster-critical
serviceAccountName: vmware-vsphere-csi-driver-operator
nodeSelector:
Expand All @@ -60,3 +63,10 @@ spec:
- key: node-role.kubernetes.io/master
operator: Exists
effect: "NoSchedule"
volumes:
- name: trusted-ca-bundle
configMap:
name: vsphere-csi-driver-operator-trusted-ca-bundle
items:
- key: ca-bundle.crt
path: tls-ca-bundle.pem
9 changes: 9 additions & 0 deletions assets/vsphere_problem_detector/06_configmap.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
apiVersion: v1
kind: ConfigMap
metadata:
labels:
# This label ensures that the OpenShift Certificate Authority bundle
# is added to the ConfigMap.
config.openshift.io/inject-trusted-cabundle: "true"
name: trusted-ca-bundle
namespace: openshift-cluster-storage-operator
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,9 @@ spec:
volumeMounts:
- mountPath: /var/run/secrets/serving-cert
name: vsphere-problem-detector-serving-cert
- name: trusted-ca-bundle
mountPath: /etc/pki/ca-trust/extracted/pem
readOnly: true
priorityClassName: system-cluster-critical
serviceAccountName: vsphere-problem-detector-operator
nodeSelector:
Expand All @@ -54,3 +57,9 @@ spec:
secret:
secretName: vsphere-problem-detector-serving-cert
optional: true
- name: trusted-ca-bundle
configMap:
name: trusted-ca-bundle
items:
- key: ca-bundle.crt
path: tls-ca-bundle.pem
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ func GetVMwareVSphereCSIOperatorConfig() CSIOperatorConfig {
ConditionPrefix: "VSphere",
Platform: configv1.VSpherePlatformType,
StaticAssets: []string{
"csidriveroperators/vsphere/02_configmap.yaml",
"csidriveroperators/vsphere/03_sa.yaml",
"csidriveroperators/vsphere/04_role.yaml",
"csidriveroperators/vsphere/05_rolebinding.yaml",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ func (c *VSphereProblemDetectorDeploymentController) sync(ctx context.Context, s
}

replacer := strings.NewReplacer(pairs...)
required, err := csoutils.GetRequiredDeployment("vsphere_problem_detector/06_deployment.yaml", opSpec, replacer)
required, err := csoutils.GetRequiredDeployment("vsphere_problem_detector/07_deployment.yaml", opSpec, replacer)
if err != nil {
return fmt.Errorf("failed to generate required Deployment: %s", err)
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,7 @@ func (c *VSphereProblemDetectorStarter) createVSphereProblemDetectorManager(
"vsphere_problem_detector/03_rolebinding.yaml",
"vsphere_problem_detector/04_clusterrole.yaml",
"vsphere_problem_detector/05_clusterrolebinding.yaml",
"vsphere_problem_detector/06_configmap.yaml",
"vsphere_problem_detector/10_service.yaml",
}

Expand Down