Commit df04f577 authored by Cyrill Troxler's avatar Cyrill Troxler
Browse files

Rename to just csi-s3

parent 165b9d79
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -13,9 +13,9 @@
# limitations under the License.
.PHONY: test build container push clean

PROJECT_DIR=/go/src/github.com/ctrox/csi-s3-driver
PROJECT_DIR=/go/src/github.com/ctrox/csi-s3
REGISTRY_NAME=ctrox
IMAGE_NAME=csi-s3-driver
IMAGE_NAME=csi-s3
IMAGE_VERSION=0.2.0
IMAGE_TAG=$(REGISTRY_NAME)/$(IMAGE_NAME):$(IMAGE_VERSION)
TEST_IMAGE_TAG=$(REGISTRY_NAME)/$(IMAGE_NAME):test
+3 −3
Original line number Diff line number Diff line
@@ -35,7 +35,7 @@ stringData:
cd deploy/kubernetes
$ kubectl create -f provisioner.yaml
$ kubectl create -f attacher.yaml
$ kubectl create -f csi-s3-driver.yaml
$ kubectl create -f csi-s3.yaml
```

## 3. Create the storage class
@@ -121,13 +121,13 @@ $ kubectl logs -l app=csi-provisioner-s3 -c s3-csi-driver
* Ensure feature gate `MountPropagation` is not set to `false`
* Check the logs of the s3-driver:
```
$ kubectl logs -l app=csi-s3-driver -c csi-s3-driver
$ kubectl logs -l app=csi-s3 -c csi-s3
```

# Development
This project can be built like any other go application.
```bash
$ go get -u github.com/ctrox/csi-s3-driver
$ go get -u github.com/ctrox/csi-s3
```
## Build
```bash
+1 −1
Original line number Diff line number Diff line
@@ -39,7 +39,7 @@ RUN ./autogen.sh && \

FROM python:3.6-slim
LABEL maintainers="Cyrill Troxler <cyrilltroxler@gmail.com>"
LABEL description="csi-s3-driver production image"
LABEL description="csi-s3 production image"

RUN apt-get update && \
    apt-get install -y \
+1 −1
Original line number Diff line number Diff line
@@ -21,7 +21,7 @@ import (
	"log"
	"os"

	"github.com/ctrox/csi-s3-driver/pkg/s3"
	"github.com/ctrox/csi-s3/pkg/s3"
)

func init() {
+11 −11
Original line number Diff line number Diff line
@@ -2,12 +2,12 @@
apiVersion: v1
kind: ServiceAccount
metadata:
  name: csi-s3-driver
  name: csi-s3
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: csi-s3-driver
  name: csi-s3
rules:
  - apiGroups: [""]
    resources: ["secrets"]
@@ -28,30 +28,30 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: csi-s3-driver
  name: csi-s3
subjects:
  - kind: ServiceAccount
    name: csi-s3-driver
    name: csi-s3
    namespace: default
roleRef:
  kind: ClusterRole
  name: csi-s3-driver
  name: csi-s3
  apiGroup: rbac.authorization.k8s.io
---
kind: DaemonSet
apiVersion: apps/v1beta2
metadata:
  name: csi-s3-driver
  name: csi-s3
spec:
  selector:
    matchLabels:
      app: csi-s3-driver
      app: csi-s3
  template:
    metadata:
      labels:
        app: csi-s3-driver
        app: csi-s3
    spec:
      serviceAccount: csi-s3-driver
      serviceAccount: csi-s3
      hostNetwork: true
      containers:
        - name: driver-registrar
@@ -69,13 +69,13 @@ spec:
          volumeMounts:
            - name: plugin-dir
              mountPath: /csi
        - name: csi-s3-driver
        - name: csi-s3
          securityContext:
            privileged: true
            capabilities:
              add: ["SYS_ADMIN"]
            allowPrivilegeEscalation: true
          image: ctrox/csi-s3-driver:0.2.0
          image: ctrox/csi-s3:0.2.0
          args:
            - "--endpoint=$(CSI_ENDPOINT)"
            - "--nodeid=$(NODE_ID)"
Loading