browserstack-node-sdk 1.34.36 → 1.34.37
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ats/src/CFTemplates/hub-ha.yaml +81 -0
- package/ats/src/cloudproviders/AWS.js +1 -1
- package/ats/src/cloudproviders/Azure.js +1 -1
- package/ats/src/cloudproviders/CloudProvider.js +1 -1
- package/ats/src/cloudproviders/GoogleCloudProvider.js +1 -1
- package/ats/src/cloudproviders/utils.js +1 -1
- package/ats/src/commands/configure.js +1 -1
- package/ats/src/commands/connect.js +1 -1
- package/ats/src/commands/connect_commands/grid.js +1 -1
- package/ats/src/commands/create.js +1 -1
- package/ats/src/commands/create_commands/grid.js +1 -1
- package/ats/src/commands/delete.js +1 -1
- package/ats/src/commands/delete_commands/grid.js +1 -1
- package/ats/src/commands/init.js +1 -1
- package/ats/src/commands/list.js +1 -1
- package/ats/src/commands/list_commands/grid_profiles.js +1 -1
- package/ats/src/commands/list_commands/grids.js +1 -1
- package/ats/src/commands/start.js +1 -1
- package/ats/src/commands/start_commands/grid.js +1 -1
- package/ats/src/commands/stop.js +1 -1
- package/ats/src/commands/stop_commands/grid.js +1 -1
- package/ats/src/config/constants.js +1 -1
- package/ats/src/config/logger.js +1 -1
- package/ats/src/index.js +1 -1
- package/ats/src/templates/browserstack-secret.yaml +10 -0
- package/ats/src/templates/hub-deployment.yaml +25 -3
- package/ats/src/templates/hubharesources/bitnami-kafka.yaml +711 -0
- package/ats/src/templates/hubharesources/bitnami-redis.yaml +1048 -0
- package/ats/src/templates/hubharesources/browserstack-secret.yaml +10 -0
- package/ats/src/templates/hubharesources/efs-csi-driver-aws.yaml +401 -0
- package/ats/src/templates/hubharesources/federatedidentityuploader.json +50 -0
- package/ats/src/templates/hubharesources/storage-class.yaml +12 -0
- package/ats/src/templates/hubharesources/turboscale-uploader.yaml +53 -0
- package/ats/src/templates/nginx/helper.yaml +1 -0
- package/ats/src/templates/nginx/private-pods-and-services.yaml +1 -0
- package/ats/src/templates/turboscale-agent.yaml +0 -8
- package/ats/src/utils/AWSUtils.js +1 -1
- package/ats/src/utils/createAutoscalerStack.js +1 -1
- package/ats/src/utils/createClusterStack.js +1 -1
- package/ats/src/utils/createHubHaStack.js +1 -0
- package/ats/src/utils/createk8sClient.js +1 -1
- package/ats/src/utils/deleteEFSMountTargets.js +1 -0
- package/ats/src/utils/deleteStack.js +1 -1
- package/ats/src/utils/describeStack.js +1 -0
- package/ats/src/utils/gridComponents.js +1 -1
- package/ats/src/utils/hstUtils.js +1 -1
- package/ats/src/utils/instrumentationUtils.js +1 -1
- package/ats/src/utils/userInput.js +1 -1
- package/ats/src/utils/utilityMethods.js +1 -1
- package/ats/src/utils/webSocketUtils.js +1 -1
- package/package.json +1 -1
- package/src/ai-sdk-node/bundle.js +1 -1
- package/src/bin/codeceptjs/BrowserStackPlugin.js +1 -1
- package/src/bin/codeceptjs/command.js +1 -1
- package/src/bin/codeceptjs/helper.js +1 -1
- package/src/bin/codeceptjs/o11yHelper.js +1 -1
- package/src/bin/cucumber-js/command.js +1 -1
- package/src/bin/cucumber-js/formatter/custom_formatter.js +1 -1
- package/src/bin/cucumber-js/formatter/custom_formatter_old_versions.js +1 -1
- package/src/bin/cucumber-js/test-observability.js +1 -1
- package/src/bin/cucumber-js/test.setup.js +1 -1
- package/src/bin/cucumber-js/test_old.setup.js +1 -1
- package/src/bin/cucumber-js/timeout.setup.js +1 -1
- package/src/bin/integrations/command.js +1 -1
- package/src/bin/integrations/constants.js +1 -1
- package/src/bin/jest/command.js +1 -1
- package/src/bin/jest/customImplements/customCircus.js +1 -1
- package/src/bin/jest/customImplements/customEnvironment.js +1 -1
- package/src/bin/jest/customImplements/customJestAdapterInit.js +1 -1
- package/src/bin/jest/customImplements/customTestRunnerTemplate.js +1 -1
- package/src/bin/jest/jest.setup.js +1 -1
- package/src/bin/jest/test-observability/data-hooks.js +1 -1
- package/src/bin/jest/test-observability/helper.js +1 -1
- package/src/bin/jest/test-observability/obsReporter.js +1 -1
- package/src/bin/jest/test-observability/test-details.js +1 -1
- package/src/bin/jest/test_before.setup.js +1 -1
- package/src/bin/launcher/launcher.js +1 -1
- package/src/bin/mocha/accessibility-automation/helper.js +1 -1
- package/src/bin/mocha/bstack-reporter/customReporter.js +1 -1
- package/src/bin/mocha/command.js +1 -1
- package/src/bin/mocha/test-observability/builderPatch.js +1 -1
- package/src/bin/mocha/test-observability/data-hooks.js +1 -1
- package/src/bin/mocha/test-observability/mochaUtils.js +1 -1
- package/src/bin/mocha/test.setup.js +1 -1
- package/src/bin/nightwatch/command.js +1 -1
- package/src/bin/playwright/accessibility-helper.js +1 -1
- package/src/bin/playwright/command.js +1 -1
- package/src/bin/playwright/globalSetup.js +1 -1
- package/src/bin/playwright/mock-process.js +1 -1
- package/src/bin/playwright/modifyPlaywrightConf.js +1 -1
- package/src/bin/playwright/patches.js +1 -1
- package/src/bin/playwright/reporter/pwUtils.js +1 -1
- package/src/bin/playwright/reporter/reporter.js +1 -1
- package/src/bin/playwright/reporter/test-details.js +1 -1
- package/src/bin/playwright/sessionDetails.js +1 -1
- package/src/bin/runner.js +1 -1
- package/src/bin/setup.js +1 -1
- package/src/bin/test-runner/index.js +1 -1
- package/src/bin/test-runner/runTest.js +1 -1
- package/src/bin/test-runner/testWorker.js +1 -1
- package/src/bin/utils/constants.js +1 -1
- package/src/bin/utils/log4jsAppender.js +1 -1
- package/src/bin/utils/logPatcher.js +1 -1
- package/src/bin/utils/logReportingAPI.js +1 -1
- package/src/bin/vanilla-js/command.js +1 -1
- package/src/browserStackSdk.js +1 -1
- package/src/helpers/BrowserStackSetup.js +1 -1
- package/src/helpers/accessibility-automation/constants.js +1 -1
- package/src/helpers/accessibility-automation/helper.js +1 -1
- package/src/helpers/accessibility-automation/scripts.js +1 -1
- package/src/helpers/ai-sdk/aiSdkWrapper.js +1 -1
- package/src/helpers/ai-sdk/autoHealHelper.js +1 -1
- package/src/helpers/ats/constants.js +1 -1
- package/src/helpers/ats/helper.js +1 -1
- package/src/helpers/capsMapping.js +1 -1
- package/src/helpers/central-scanner/constants.js +1 -1
- package/src/helpers/central-scanner/helpers.js +1 -1
- package/src/helpers/globals.js +1 -1
- package/src/helpers/helper.js +1 -1
- package/src/helpers/logger.js +1 -1
- package/src/helpers/patchHelper.js +1 -1
- package/src/helpers/patchHelpers.js +1 -1
- package/src/helpers/percy/Percy.js +1 -1
- package/src/helpers/percy/PercyBinary.js +1 -1
- package/src/helpers/percy/PercyCaptureMap.js +1 -1
- package/src/helpers/percy/PercyCaptureModes.js +1 -1
- package/src/helpers/percy/PercySDK.js +1 -1
- package/src/helpers/percy/index.js +1 -1
- package/src/helpers/percy/utils.js +1 -1
- package/src/helpers/performance/constants.js +1 -1
- package/src/helpers/performance/performance-tester.js +1 -1
- package/src/helpers/processHelper.js +1 -1
- package/src/helpers/request-spy.js +1 -1
- package/src/helpers/setKeepAlive.js +1 -1
- package/src/helpers/test-observability/constants.js +1 -1
- package/src/helpers/test-observability/error-handler.js +1 -1
- package/src/helpers/test-observability/requestQueueHandler.js +1 -1
- package/src/helpers/test-observability/sessionHandler.js +1 -1
- package/src/helpers/test-observability/utils.js +1 -1
- package/src/helpers/testhub/constants.js +1 -1
- package/src/helpers/testhub/testhubHandler.js +1 -1
- package/src/helpers/testhub/utils.js +1 -1
- package/src/helpers/timeoutPromise.js +1 -1
- package/src/helpers/utilities.js +1 -1
- package/src/helpers/w3cMapping.js +1 -1
- package/src/hubAllocationMethods.js +1 -1
- package/src/index.js +1 -1
|
@@ -0,0 +1,401 @@
|
|
|
1
|
+
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
2
|
+
apiVersion: v1
|
|
3
|
+
kind: ServiceAccount
|
|
4
|
+
metadata:
|
|
5
|
+
name: efs-csi-controller-sa
|
|
6
|
+
namespace: kube-system
|
|
7
|
+
labels:
|
|
8
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
9
|
+
annotations:
|
|
10
|
+
eks.amazonaws.com/role-arn: <EfsCSIControllerARN>
|
|
11
|
+
---
|
|
12
|
+
# Source: aws-efs-csi-driver/templates/node-serviceaccount.yaml
|
|
13
|
+
apiVersion: v1
|
|
14
|
+
kind: ServiceAccount
|
|
15
|
+
metadata:
|
|
16
|
+
name: efs-csi-node-sa
|
|
17
|
+
namespace: kube-system
|
|
18
|
+
labels:
|
|
19
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
20
|
+
---
|
|
21
|
+
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
22
|
+
kind: ClusterRole
|
|
23
|
+
apiVersion: rbac.authorization.k8s.io/v1
|
|
24
|
+
metadata:
|
|
25
|
+
name: efs-csi-external-provisioner-role
|
|
26
|
+
labels:
|
|
27
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
28
|
+
rules:
|
|
29
|
+
- apiGroups: [""]
|
|
30
|
+
resources: ["persistentvolumes"]
|
|
31
|
+
verbs: ["get", "list", "watch", "create", "patch", "delete"]
|
|
32
|
+
- apiGroups: [""]
|
|
33
|
+
resources: ["persistentvolumeclaims"]
|
|
34
|
+
verbs: ["get", "list", "watch", "update"]
|
|
35
|
+
- apiGroups: ["storage.k8s.io"]
|
|
36
|
+
resources: ["storageclasses"]
|
|
37
|
+
verbs: ["get", "list", "watch"]
|
|
38
|
+
- apiGroups: [""]
|
|
39
|
+
resources: ["events"]
|
|
40
|
+
verbs: ["list", "watch", "create", "patch"]
|
|
41
|
+
- apiGroups: ["storage.k8s.io"]
|
|
42
|
+
resources: ["csinodes"]
|
|
43
|
+
verbs: ["get", "list", "watch"]
|
|
44
|
+
- apiGroups: [""]
|
|
45
|
+
resources: ["nodes"]
|
|
46
|
+
verbs: ["get", "list", "watch"]
|
|
47
|
+
- apiGroups: ["coordination.k8s.io"]
|
|
48
|
+
resources: ["leases"]
|
|
49
|
+
verbs: ["get", "watch", "list", "delete", "update", "create"]
|
|
50
|
+
---
|
|
51
|
+
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
52
|
+
kind: ClusterRole
|
|
53
|
+
apiVersion: rbac.authorization.k8s.io/v1
|
|
54
|
+
metadata:
|
|
55
|
+
name: efs-csi-external-provisioner-role-describe-secrets
|
|
56
|
+
labels:
|
|
57
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
58
|
+
rules:
|
|
59
|
+
- apiGroups: [ "" ]
|
|
60
|
+
resources: [ "secrets" ]
|
|
61
|
+
resourceNames: ["x-account"]
|
|
62
|
+
verbs: [ "get", "watch", "list" ]
|
|
63
|
+
---
|
|
64
|
+
# Source: aws-efs-csi-driver/templates/node-serviceaccount.yaml
|
|
65
|
+
kind: ClusterRole
|
|
66
|
+
apiVersion: rbac.authorization.k8s.io/v1
|
|
67
|
+
metadata:
|
|
68
|
+
name: efs-csi-node-role
|
|
69
|
+
labels:
|
|
70
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
71
|
+
rules:
|
|
72
|
+
- apiGroups: [""]
|
|
73
|
+
resources: ["nodes"]
|
|
74
|
+
verbs: ["get", "list", "watch", "patch"]
|
|
75
|
+
---
|
|
76
|
+
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
77
|
+
kind: ClusterRoleBinding
|
|
78
|
+
apiVersion: rbac.authorization.k8s.io/v1
|
|
79
|
+
metadata:
|
|
80
|
+
name: efs-csi-provisioner-binding
|
|
81
|
+
labels:
|
|
82
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
83
|
+
subjects:
|
|
84
|
+
- kind: ServiceAccount
|
|
85
|
+
name: efs-csi-controller-sa
|
|
86
|
+
namespace: kube-system
|
|
87
|
+
roleRef:
|
|
88
|
+
kind: ClusterRole
|
|
89
|
+
name: efs-csi-external-provisioner-role
|
|
90
|
+
apiGroup: rbac.authorization.k8s.io
|
|
91
|
+
---
|
|
92
|
+
# Source: aws-efs-csi-driver/templates/node-serviceaccount.yaml
|
|
93
|
+
kind: ClusterRoleBinding
|
|
94
|
+
apiVersion: rbac.authorization.k8s.io/v1
|
|
95
|
+
metadata:
|
|
96
|
+
name: efs-csi-node-binding
|
|
97
|
+
labels:
|
|
98
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
99
|
+
subjects:
|
|
100
|
+
- kind: ServiceAccount
|
|
101
|
+
name: efs-csi-node-sa
|
|
102
|
+
namespace: kube-system
|
|
103
|
+
roleRef:
|
|
104
|
+
kind: ClusterRole
|
|
105
|
+
name: efs-csi-node-role
|
|
106
|
+
apiGroup: rbac.authorization.k8s.io
|
|
107
|
+
---
|
|
108
|
+
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
109
|
+
# We use a RoleBinding to restrict Secret access to the namespace that the
|
|
110
|
+
# RoleBinding is created in (typically kube-system)
|
|
111
|
+
kind: RoleBinding
|
|
112
|
+
apiVersion: rbac.authorization.k8s.io/v1
|
|
113
|
+
metadata:
|
|
114
|
+
name: efs-csi-provisioner-binding-describe-secrets
|
|
115
|
+
namespace: kube-system
|
|
116
|
+
labels:
|
|
117
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
118
|
+
subjects:
|
|
119
|
+
- kind: ServiceAccount
|
|
120
|
+
name: efs-csi-controller-sa
|
|
121
|
+
namespace: kube-system
|
|
122
|
+
roleRef:
|
|
123
|
+
kind: ClusterRole
|
|
124
|
+
name: efs-csi-external-provisioner-role-describe-secrets
|
|
125
|
+
apiGroup: rbac.authorization.k8s.io
|
|
126
|
+
---
|
|
127
|
+
# Source: aws-efs-csi-driver/templates/node-daemonset.yaml
|
|
128
|
+
# Node Service
|
|
129
|
+
kind: DaemonSet
|
|
130
|
+
apiVersion: apps/v1
|
|
131
|
+
metadata:
|
|
132
|
+
name: efs-csi-node
|
|
133
|
+
namespace: kube-system
|
|
134
|
+
labels:
|
|
135
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
136
|
+
spec:
|
|
137
|
+
selector:
|
|
138
|
+
matchLabels:
|
|
139
|
+
app: efs-csi-node
|
|
140
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
141
|
+
app.kubernetes.io/instance: release-name
|
|
142
|
+
template:
|
|
143
|
+
metadata:
|
|
144
|
+
labels:
|
|
145
|
+
app: efs-csi-node
|
|
146
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
147
|
+
app.kubernetes.io/instance: release-name
|
|
148
|
+
spec:
|
|
149
|
+
nodeSelector:
|
|
150
|
+
kubernetes.io/os: linux
|
|
151
|
+
affinity:
|
|
152
|
+
nodeAffinity:
|
|
153
|
+
requiredDuringSchedulingIgnoredDuringExecution:
|
|
154
|
+
nodeSelectorTerms:
|
|
155
|
+
- matchExpressions:
|
|
156
|
+
- key: eks.amazonaws.com/compute-type
|
|
157
|
+
operator: NotIn
|
|
158
|
+
values:
|
|
159
|
+
- fargate
|
|
160
|
+
- hybrid
|
|
161
|
+
hostNetwork: true
|
|
162
|
+
dnsPolicy: ClusterFirst
|
|
163
|
+
serviceAccountName: efs-csi-node-sa
|
|
164
|
+
priorityClassName: system-node-critical
|
|
165
|
+
tolerations:
|
|
166
|
+
- operator: Exists
|
|
167
|
+
securityContext:
|
|
168
|
+
fsGroup: 0
|
|
169
|
+
runAsGroup: 0
|
|
170
|
+
runAsNonRoot: false
|
|
171
|
+
runAsUser: 0
|
|
172
|
+
containers:
|
|
173
|
+
- name: efs-plugin
|
|
174
|
+
securityContext:
|
|
175
|
+
privileged: true
|
|
176
|
+
image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efs-csi-driver:latest
|
|
177
|
+
imagePullPolicy: IfNotPresent
|
|
178
|
+
args:
|
|
179
|
+
- --endpoint=$(CSI_ENDPOINT)
|
|
180
|
+
- --logtostderr
|
|
181
|
+
- --v=2
|
|
182
|
+
- --vol-metrics-opt-in=false
|
|
183
|
+
- --vol-metrics-refresh-period=240
|
|
184
|
+
- --vol-metrics-fs-rate-limit=5
|
|
185
|
+
env:
|
|
186
|
+
- name: CSI_ENDPOINT
|
|
187
|
+
value: unix:/csi/csi.sock
|
|
188
|
+
- name: CSI_NODE_NAME
|
|
189
|
+
valueFrom:
|
|
190
|
+
fieldRef:
|
|
191
|
+
fieldPath: spec.nodeName
|
|
192
|
+
- name: PORT_RANGE_UPPER_BOUND
|
|
193
|
+
value: "21049"
|
|
194
|
+
volumeMounts:
|
|
195
|
+
- name: kubelet-dir
|
|
196
|
+
mountPath: /var/lib/kubelet
|
|
197
|
+
mountPropagation: "Bidirectional"
|
|
198
|
+
- name: plugin-dir
|
|
199
|
+
mountPath: /csi
|
|
200
|
+
- name: efs-state-dir
|
|
201
|
+
mountPath: /var/run/efs
|
|
202
|
+
- name: efs-utils-config
|
|
203
|
+
mountPath: /var/amazon/efs
|
|
204
|
+
- name: efs-utils-config-legacy
|
|
205
|
+
mountPath: /etc/amazon/efs-legacy
|
|
206
|
+
ports:
|
|
207
|
+
- name: healthz
|
|
208
|
+
containerPort: 9809
|
|
209
|
+
protocol: TCP
|
|
210
|
+
livenessProbe:
|
|
211
|
+
httpGet:
|
|
212
|
+
path: /healthz
|
|
213
|
+
port: healthz
|
|
214
|
+
initialDelaySeconds: 10
|
|
215
|
+
timeoutSeconds: 3
|
|
216
|
+
periodSeconds: 2
|
|
217
|
+
failureThreshold: 5
|
|
218
|
+
- name: csi-driver-registrar
|
|
219
|
+
image: public.ecr.aws/eks-distro/kubernetes-csi/node-driver-registrar:v2.12.0-eks-1-31-5
|
|
220
|
+
imagePullPolicy: IfNotPresent
|
|
221
|
+
args:
|
|
222
|
+
- --csi-address=$(ADDRESS)
|
|
223
|
+
- --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)
|
|
224
|
+
- --v=2
|
|
225
|
+
env:
|
|
226
|
+
- name: ADDRESS
|
|
227
|
+
value: /csi/csi.sock
|
|
228
|
+
- name: DRIVER_REG_SOCK_PATH
|
|
229
|
+
value: /var/lib/kubelet/plugins/efs.csi.aws.com/csi.sock
|
|
230
|
+
- name: KUBE_NODE_NAME
|
|
231
|
+
valueFrom:
|
|
232
|
+
fieldRef:
|
|
233
|
+
fieldPath: spec.nodeName
|
|
234
|
+
volumeMounts:
|
|
235
|
+
- name: plugin-dir
|
|
236
|
+
mountPath: /csi
|
|
237
|
+
- name: registration-dir
|
|
238
|
+
mountPath: /registration
|
|
239
|
+
securityContext:
|
|
240
|
+
allowPrivilegeEscalation: false
|
|
241
|
+
readOnlyRootFilesystem: true
|
|
242
|
+
- name: liveness-probe
|
|
243
|
+
image: public.ecr.aws/eks-distro/kubernetes-csi/livenessprobe:v2.14.0-eks-1-31-5
|
|
244
|
+
imagePullPolicy: IfNotPresent
|
|
245
|
+
args:
|
|
246
|
+
- --csi-address=/csi/csi.sock
|
|
247
|
+
- --health-port=9809
|
|
248
|
+
- --v=2
|
|
249
|
+
volumeMounts:
|
|
250
|
+
- name: plugin-dir
|
|
251
|
+
mountPath: /csi
|
|
252
|
+
securityContext:
|
|
253
|
+
allowPrivilegeEscalation: false
|
|
254
|
+
readOnlyRootFilesystem: true
|
|
255
|
+
volumes:
|
|
256
|
+
- name: kubelet-dir
|
|
257
|
+
hostPath:
|
|
258
|
+
path: /var/lib/kubelet
|
|
259
|
+
type: Directory
|
|
260
|
+
- name: plugin-dir
|
|
261
|
+
hostPath:
|
|
262
|
+
path: /var/lib/kubelet/plugins/efs.csi.aws.com/
|
|
263
|
+
type: DirectoryOrCreate
|
|
264
|
+
- name: registration-dir
|
|
265
|
+
hostPath:
|
|
266
|
+
path: /var/lib/kubelet/plugins_registry/
|
|
267
|
+
type: Directory
|
|
268
|
+
- name: efs-state-dir
|
|
269
|
+
hostPath:
|
|
270
|
+
path: /var/run/efs
|
|
271
|
+
type: DirectoryOrCreate
|
|
272
|
+
- name: efs-utils-config
|
|
273
|
+
hostPath:
|
|
274
|
+
path: /var/amazon/efs
|
|
275
|
+
type: DirectoryOrCreate
|
|
276
|
+
- name: efs-utils-config-legacy
|
|
277
|
+
hostPath:
|
|
278
|
+
path: /etc/amazon/efs
|
|
279
|
+
type: DirectoryOrCreate
|
|
280
|
+
---
|
|
281
|
+
# Source: aws-efs-csi-driver/templates/controller-deployment.yaml
|
|
282
|
+
# Controller Service
|
|
283
|
+
kind: Deployment
|
|
284
|
+
apiVersion: apps/v1
|
|
285
|
+
metadata:
|
|
286
|
+
name: efs-csi-controller
|
|
287
|
+
namespace: kube-system
|
|
288
|
+
labels:
|
|
289
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
290
|
+
spec:
|
|
291
|
+
replicas: 2
|
|
292
|
+
selector:
|
|
293
|
+
matchLabels:
|
|
294
|
+
app: efs-csi-controller
|
|
295
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
296
|
+
app.kubernetes.io/instance: release-name
|
|
297
|
+
template:
|
|
298
|
+
metadata:
|
|
299
|
+
labels:
|
|
300
|
+
app: efs-csi-controller
|
|
301
|
+
app.kubernetes.io/name: aws-efs-csi-driver
|
|
302
|
+
app.kubernetes.io/instance: release-name
|
|
303
|
+
spec:
|
|
304
|
+
hostNetwork: false
|
|
305
|
+
nodeSelector:
|
|
306
|
+
kubernetes.io/os: linux
|
|
307
|
+
serviceAccountName: efs-csi-controller-sa
|
|
308
|
+
priorityClassName: system-cluster-critical
|
|
309
|
+
tolerations:
|
|
310
|
+
- key: CriticalAddonsOnly
|
|
311
|
+
operator: Exists
|
|
312
|
+
- key: efs.csi.aws.com/agent-not-ready
|
|
313
|
+
operator: Exists
|
|
314
|
+
securityContext:
|
|
315
|
+
fsGroup: 0
|
|
316
|
+
runAsGroup: 0
|
|
317
|
+
runAsNonRoot: false
|
|
318
|
+
runAsUser: 0
|
|
319
|
+
dnsPolicy: ClusterFirst
|
|
320
|
+
containers:
|
|
321
|
+
- name: efs-plugin
|
|
322
|
+
securityContext:
|
|
323
|
+
privileged: true
|
|
324
|
+
image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efs-csi-driver:v2.1.4
|
|
325
|
+
imagePullPolicy: IfNotPresent
|
|
326
|
+
args:
|
|
327
|
+
- --endpoint=$(CSI_ENDPOINT)
|
|
328
|
+
- --logtostderr
|
|
329
|
+
- --v=2
|
|
330
|
+
- --delete-access-point-root-dir=false
|
|
331
|
+
env:
|
|
332
|
+
- name: CSI_ENDPOINT
|
|
333
|
+
value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock
|
|
334
|
+
- name: CSI_NODE_NAME
|
|
335
|
+
valueFrom:
|
|
336
|
+
fieldRef:
|
|
337
|
+
fieldPath: spec.nodeName
|
|
338
|
+
- name: PORT_RANGE_UPPER_BOUND
|
|
339
|
+
value: "21049"
|
|
340
|
+
volumeMounts:
|
|
341
|
+
- name: socket-dir
|
|
342
|
+
mountPath: /var/lib/csi/sockets/pluginproxy/
|
|
343
|
+
ports:
|
|
344
|
+
- name: healthz
|
|
345
|
+
containerPort: 9909
|
|
346
|
+
protocol: TCP
|
|
347
|
+
livenessProbe:
|
|
348
|
+
httpGet:
|
|
349
|
+
path: /healthz
|
|
350
|
+
port: healthz
|
|
351
|
+
initialDelaySeconds: 10
|
|
352
|
+
timeoutSeconds: 3
|
|
353
|
+
periodSeconds: 10
|
|
354
|
+
failureThreshold: 5
|
|
355
|
+
- name: csi-provisioner
|
|
356
|
+
image: public.ecr.aws/eks-distro/kubernetes-csi/external-provisioner:v5.1.0-eks-1-31-5
|
|
357
|
+
imagePullPolicy: IfNotPresent
|
|
358
|
+
args:
|
|
359
|
+
- --csi-address=$(ADDRESS)
|
|
360
|
+
- --v=2
|
|
361
|
+
- --feature-gates=Topology=true
|
|
362
|
+
- --extra-create-metadata
|
|
363
|
+
- --leader-election
|
|
364
|
+
- --leader-election-renew-deadline=10s
|
|
365
|
+
- --leader-election-lease-duration=15s
|
|
366
|
+
env:
|
|
367
|
+
- name: ADDRESS
|
|
368
|
+
value: /var/lib/csi/sockets/pluginproxy/csi.sock
|
|
369
|
+
volumeMounts:
|
|
370
|
+
- name: socket-dir
|
|
371
|
+
mountPath: /var/lib/csi/sockets/pluginproxy/
|
|
372
|
+
securityContext:
|
|
373
|
+
allowPrivilegeEscalation: false
|
|
374
|
+
readOnlyRootFilesystem: true
|
|
375
|
+
- name: liveness-probe
|
|
376
|
+
image: public.ecr.aws/eks-distro/kubernetes-csi/livenessprobe:v2.14.0-eks-1-31-5
|
|
377
|
+
imagePullPolicy: IfNotPresent
|
|
378
|
+
args:
|
|
379
|
+
- --csi-address=/csi/csi.sock
|
|
380
|
+
- --health-port=9909
|
|
381
|
+
volumeMounts:
|
|
382
|
+
- name: socket-dir
|
|
383
|
+
mountPath: /csi
|
|
384
|
+
securityContext:
|
|
385
|
+
allowPrivilegeEscalation: false
|
|
386
|
+
readOnlyRootFilesystem: true
|
|
387
|
+
volumes:
|
|
388
|
+
- name: socket-dir
|
|
389
|
+
emptyDir: {}
|
|
390
|
+
---
|
|
391
|
+
# Source: aws-efs-csi-driver/templates/csidriver.yaml
|
|
392
|
+
apiVersion: storage.k8s.io/v1
|
|
393
|
+
kind: CSIDriver
|
|
394
|
+
metadata:
|
|
395
|
+
name: efs.csi.aws.com
|
|
396
|
+
annotations:
|
|
397
|
+
"helm.sh/hook": pre-install, pre-upgrade
|
|
398
|
+
"helm.sh/hook-delete-policy": before-hook-creation
|
|
399
|
+
"helm.sh/resource-policy": keep
|
|
400
|
+
spec:
|
|
401
|
+
attachRequired: false
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
{
|
|
2
|
+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
|
|
3
|
+
"contentVersion": "1.0.0.0",
|
|
4
|
+
"parameters": {
|
|
5
|
+
"clusterName": {
|
|
6
|
+
"type": "string",
|
|
7
|
+
"metadata": {
|
|
8
|
+
"description": "The name of the Managed Cluster resource."
|
|
9
|
+
}
|
|
10
|
+
},
|
|
11
|
+
"oidcIssuer": {
|
|
12
|
+
"type": "string",
|
|
13
|
+
"metadata": {
|
|
14
|
+
"description": "OIDC Issuer of AKS Cluster"
|
|
15
|
+
}
|
|
16
|
+
},
|
|
17
|
+
"namespace": {
|
|
18
|
+
"type": "string",
|
|
19
|
+
"metadata": {
|
|
20
|
+
"description": "NameSpace"
|
|
21
|
+
}
|
|
22
|
+
}
|
|
23
|
+
},
|
|
24
|
+
"variables": {
|
|
25
|
+
"managedIdentityName": "[concat('turboscale-managed-identity-', parameters('clusterName'))]"
|
|
26
|
+
},
|
|
27
|
+
"resources": [
|
|
28
|
+
{
|
|
29
|
+
"type": "Microsoft.ManagedIdentity/userAssignedIdentities",
|
|
30
|
+
"apiVersion": "2022-01-31-preview",
|
|
31
|
+
"name": "[variables('managedIdentityName')]",
|
|
32
|
+
"location": "[resourceGroup().location]"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"type": "Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials",
|
|
36
|
+
"apiVersion": "2022-01-31-preview",
|
|
37
|
+
"name": "[concat(variables('managedIdentityName'), '/turboscale-federated-identity-hub-', parameters('namespace'))]",
|
|
38
|
+
"dependsOn": [
|
|
39
|
+
"[resourceId('Microsoft.ManagedIdentity/userAssignedIdentities', variables('managedIdentityName'))]"
|
|
40
|
+
],
|
|
41
|
+
"properties": {
|
|
42
|
+
"issuer": "[parameters('oidcIssuer')]",
|
|
43
|
+
"subject": "[concat('system:serviceaccount:', parameters('namespace'), ':uploader')]",
|
|
44
|
+
"audiences": [
|
|
45
|
+
"api://AzureADTokenExchange"
|
|
46
|
+
]
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
]
|
|
50
|
+
}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
apiVersion: storage.k8s.io/v1
|
|
2
|
+
kind: StorageClass
|
|
3
|
+
metadata:
|
|
4
|
+
name: efs-csi
|
|
5
|
+
# Below mode will not create pv even after creating pvc until some pod is associated with that pvc
|
|
6
|
+
parameters:
|
|
7
|
+
# Other params will be added dynamically based on cloud provider
|
|
8
|
+
provisioningMode: efs-ap
|
|
9
|
+
directoryPerms: "777"
|
|
10
|
+
provisioner: efs.csi.aws.com
|
|
11
|
+
reclaimPolicy: Delete
|
|
12
|
+
volumeBindingMode: Immediate
|
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
apiVersion: apps/v1
|
|
2
|
+
kind: Deployment
|
|
3
|
+
metadata:
|
|
4
|
+
name: turboscale-uploader
|
|
5
|
+
namespace: <HubHaNameSpace>
|
|
6
|
+
labels:
|
|
7
|
+
name: turboscale-uploader
|
|
8
|
+
annotations:
|
|
9
|
+
"helm.sh/hook": post-install
|
|
10
|
+
"helm.sh/hook-delete-policy": hook-failed
|
|
11
|
+
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
|
|
12
|
+
spec:
|
|
13
|
+
replicas: 1
|
|
14
|
+
selector:
|
|
15
|
+
matchLabels:
|
|
16
|
+
name: turboscale-uploader
|
|
17
|
+
template:
|
|
18
|
+
metadata:
|
|
19
|
+
labels:
|
|
20
|
+
name: turboscale-uploader
|
|
21
|
+
spec:
|
|
22
|
+
containers:
|
|
23
|
+
- name: turboscale-uploader
|
|
24
|
+
image: public.ecr.aws/v4a1k5d3/browserstack/turboscale-kafka-uploader:<UploaderImageVersion>
|
|
25
|
+
imagePullPolicy: Always
|
|
26
|
+
securityContext:
|
|
27
|
+
allowPrivilegeEscalation: false
|
|
28
|
+
env:
|
|
29
|
+
- name: BSTACK_ENV
|
|
30
|
+
value: "production"
|
|
31
|
+
- name: REDIS_NAMESPACE
|
|
32
|
+
value: <HubHaNameSpace>
|
|
33
|
+
- name: KAFKA_NAMESPACE
|
|
34
|
+
value: <HubHaNameSpace>
|
|
35
|
+
- name: REDIS_PASSWORD
|
|
36
|
+
valueFrom:
|
|
37
|
+
secretKeyRef:
|
|
38
|
+
name: browserstack-secret
|
|
39
|
+
key: redis-password
|
|
40
|
+
- name: KAFKA_PASSWORD
|
|
41
|
+
valueFrom:
|
|
42
|
+
secretKeyRef:
|
|
43
|
+
name: browserstack-secret
|
|
44
|
+
key: kafka-password
|
|
45
|
+
resources:
|
|
46
|
+
limits:
|
|
47
|
+
cpu: "0.5"
|
|
48
|
+
memory: 1Gi
|
|
49
|
+
requests:
|
|
50
|
+
cpu: "0.5"
|
|
51
|
+
memory: 1Gi
|
|
52
|
+
nodeSelector:
|
|
53
|
+
kubernetes.io/os: linux
|