diff --git a/CHANGELOG.md b/CHANGELOG.md index 16d9d6e09..d9ceabace 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,9 @@ # CHANGELOG +## v0.1.13 (beta) - Apr 3rd 2019 + +* Add support for configuring a specific vpc id (@nanzhong) + ## v0.1.12 (beta) - Mar 26th 2019 * Cache API results for DigitalOcean resources and manage them in ResourcesController (@nanzhong) diff --git a/README.md b/README.md index 081d2af33..126732b45 100644 --- a/README.md +++ b/README.md @@ -7,7 +7,7 @@ ## Releases Cloud Controller Manager follows [semantic versioning](https://semver.org/). -The current version is: **`v0.1.12`**. This means that the project is still +The current version is: **`v0.1.13`**. This means that the project is still under active development and may not be production ready. The plugin will be bumped to **`v1.0.0`** once the [DigitalOcean Kubernetes product](https://www.digitalocean.com/products/kubernetes/) is released and diff --git a/VERSION b/VERSION index 2b3a1ad52..faceed6be 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -v0.1.12 +v0.1.13 diff --git a/docs/example-manifests/cloud-controller-manager.yml b/docs/example-manifests/cloud-controller-manager.yml index 5d58cd04c..548be2a04 100644 --- a/docs/example-manifests/cloud-controller-manager.yml +++ b/docs/example-manifests/cloud-controller-manager.yml @@ -47,7 +47,7 @@ spec: operator: Exists tolerationSeconds: 300 containers: - - image: digitalocean/digitalocean-cloud-controller-manager:v0.1.12 + - image: digitalocean/digitalocean-cloud-controller-manager:v0.1.13 name: digitalocean-cloud-controller-manager command: - "/bin/digitalocean-cloud-controller-manager" diff --git a/docs/getting-started.md b/docs/getting-started.md index 43af94a11..9accc0792 100644 --- a/docs/getting-started.md +++ b/docs/getting-started.md @@ -116,7 +116,7 @@ digitalocean Opaque 1 18h Currently we only support alpha release of the `digitalocean-cloud-controller-manager` due to its active development. Run the first alpha release like so ```bash -kubectl apply -f releases/v0.1.12.yml +kubectl apply -f releases/v0.1.13.yml deployment "digitalocean-cloud-controller-manager" created ``` diff --git a/releases/v0.1.13.yml b/releases/v0.1.13.yml new file mode 100644 index 000000000..db9b9783c --- /dev/null +++ b/releases/v0.1.13.yml @@ -0,0 +1,139 @@ +--- +apiVersion: extensions/v1beta1 +kind: Deployment +metadata: + name: digitalocean-cloud-controller-manager + namespace: kube-system +spec: + replicas: 1 + revisionHistoryLimit: 2 + template: + metadata: + labels: + app: digitalocean-cloud-controller-manager + annotations: + scheduler.alpha.kubernetes.io/critical-pod: '' + spec: + dnsPolicy: Default + hostNetwork: true + serviceAccountName: cloud-controller-manager + tolerations: + # this taint is set by all kubelets running `--cloud-provider=external` + # so we should tolerate it to schedule the digitalocean ccm + - key: "node.cloudprovider.kubernetes.io/uninitialized" + value: "true" + effect: "NoSchedule" + - key: "CriticalAddonsOnly" + operator: "Exists" + # cloud controller manages should be able to run on masters + - key: "node-role.kubernetes.io/master" + effect: NoSchedule + containers: + - image: digitalocean/digitalocean-cloud-controller-manager:v0.1.13 + name: digitalocean-cloud-controller-manager + command: + - "/bin/digitalocean-cloud-controller-manager" + - "--cloud-provider=digitalocean" + - "--leader-elect=false" + resources: + requests: + cpu: 100m + memory: 50Mi + env: + - name: DO_ACCESS_TOKEN + valueFrom: + secretKeyRef: + name: digitalocean + key: access-token + +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: cloud-controller-manager + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + name: system:cloud-controller-manager +rules: +- apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - update +- apiGroups: + - "" + resources: + - nodes + verbs: + - '*' +- apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch +- apiGroups: + - "" + resources: + - services + verbs: + - list + - patch + - update + - watch +- apiGroups: + - "" + resources: + - services/status + verbs: + - list + - patch + - update + - watch +- apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - create +- apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - update + - watch +- apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - get + - list + - watch + - update +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: system:cloud-controller-manager +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:cloud-controller-manager +subjects: +- kind: ServiceAccount + name: cloud-controller-manager + namespace: kube-system +