diff --git a/.travis.yml b/.travis.yml index d0ccbc1a..867073c0 100644 --- a/.travis.yml +++ b/.travis.yml @@ -15,5 +15,6 @@ script: - make - ./hack/verify-all - make test + - make test-sanity - go test -covermode=count -coverprofile=profile.cov ./pkg/... - $GOPATH/bin/goveralls -coverprofile=profile.cov -service=travis-ci diff --git a/deploy/kubernetes/secret.yaml b/deploy/kubernetes/secret.yaml new file mode 100644 index 00000000..aa427527 --- /dev/null +++ b/deploy/kubernetes/secret.yaml @@ -0,0 +1,8 @@ +apiVersion: v1 +kind: Secret +metadata: + name: aws-secret + namespace: kube-system +stringData: + key_id: "[aws_access_key_id]" + access_key: "[aws_secret_access_key]" diff --git a/docs/README.md b/docs/README.md index 59097e36..c8da51e8 100644 --- a/docs/README.md +++ b/docs/README.md @@ -33,11 +33,23 @@ Following sections are Kubernetes specific. If you are Kubernetes user, use foll * Dynamic provisioning - uses persistence volume claim (PVC) to let the Kuberenetes to create the FSx for Lustre filesystem for you and consumes the volume from inside container. ### Installation -Deploy the driver using followings step: +Checkout the project: +```sh +>> git clone https://github.com/aws/aws-fsx-csi-driver.git +>> cd aws-fsx-csi-driver +``` + +Edit the [secret manifest](../deploy/kubernetes/secret.yaml) using your favorite text editor. The secret should have enough permission to create FSx for Lustre filesystem. Then deploy the secret: +```sh +>> kubectl apply -f deploy/kubernetes/secret.yaml ``` -kubectl apply -f https://raw.githubusercontent.com/aws/aws-fsx-csi-driver/master/deploy/kubernetes/controller.yaml -kubectl apply -f https://raw.githubusercontent.com/aws/aws-fsx-csi-driver/master/deploy/kubernetes/node.yaml + +Deploy the driver: + +```sh +>> kubectl apply -f deploy/kubernetes/controller.yaml +>> kubectl apply -f deploy/kubernetes/node.yaml ``` ### Examples