diff --git a/Makefile b/Makefile index 1b9f46c4c..0e141ad4e 100644 --- a/Makefile +++ b/Makefile @@ -29,12 +29,12 @@ E2E_PROVIDER_IMAGE_NAME ?= e2e-provider # Release version is the current supported release for the driver # Update this version when the helm chart is being updated for release -RELEASE_VERSION := v1.3.4 -IMAGE_VERSION ?= v1.3.4 +RELEASE_VERSION := v1.4.0 +IMAGE_VERSION ?= v1.4.0 # Use a custom version for E2E tests if we are testing in CI ifdef CI -override IMAGE_VERSION := v1.3.0-e2e-$(BUILD_COMMIT) +override IMAGE_VERSION := v1.4.0-e2e-$(BUILD_COMMIT) endif IMAGE_TAG=$(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION) diff --git a/charts/secrets-store-csi-driver/Chart.yaml b/charts/secrets-store-csi-driver/Chart.yaml index e69aa5607..64b94128b 100644 --- a/charts/secrets-store-csi-driver/Chart.yaml +++ b/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.3.4 -appVersion: 1.3.4 +version: 1.4.0 +appVersion: 1.4.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/charts/secrets-store-csi-driver/README.md b/charts/secrets-store-csi-driver/README.md index 15cbf350e..5ce1cce40 100644 --- a/charts/secrets-store-csi-driver/README.md +++ b/charts/secrets-store-csi-driver/README.md @@ -33,11 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.3.4` | +| `linux.image.tag` | Linux image tag | `v1.4.0` | +| `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.3.4` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.4.0` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -52,11 +53,13 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.registrarImage.repository` | Linux node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `linux.registrarImage.pullPolicy` | Linux node-driver-registrar image pull policy | `IfNotPresent` | | `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.8.0` | +| `linux.registrarImage.digest` | Linux node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | | `linux.registrar.resources` | The resource request/limits for the linux node-driver-registrar container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `linux.livenessProbeImage.repository` | Linux liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `linux.livenessProbeImage.pullPolicy` | Linux liveness-probe image pull policy | `IfNotPresent` | | `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.10.0` | +| `linux.livenessProbeImage.digest` | Linux liveness-probe image digest, image pull from digest instead of tag if specified | `""` | | `linux.livenessProbe.resources` | The resource request/limits for the linux liveness-probe container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.env` | Environment variables to be passed for the daemonset on linux nodes | `[]` | | `linux.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | @@ -69,7 +72,8 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.3.4` | +| `windows.image.tag` | Windows image tag | `v1.4.0` | +| `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | @@ -82,11 +86,13 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.registrarImage.repository` | Windows node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `windows.registrarImage.pullPolicy` | Windows node-driver-registrar image pull policy | `IfNotPresent` | | `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.8.0` | +| `windows.registrarImage.digest` | Windows node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | | `windows.registrar.resources` | The resource request/limits for the windows node-driver-registrar container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `windows.livenessProbeImage.repository` | Windows liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `windows.livenessProbeImage.pullPolicy` | Windows liveness-probe image pull policy | `IfNotPresent` | | `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.10.0` | +| `windows.livenessProbeImage.digest` | Windows liveness-probe image digest, image pull from digest instead of tag if specified | `""` | | `windows.livenessProbe.resources` | The resource request/limits for the windows liveness-probe container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.env` | Environment variables to be passed for the daemonset on windows nodes | `[]` | | `windows.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | diff --git a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml index aa177b495..fcf63c668 100644 --- a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml +++ b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.11.4 + controller-gen.kubebuilder.io/version: v0.12.1 name: secretproviderclasses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io @@ -82,20 +82,6 @@ spec: type: object status: description: SecretProviderClassStatus defines the observed state of SecretProviderClass - properties: - byPod: - items: - description: ByPodStatus defines the state of SecretProviderClass - as seen by an individual controller - properties: - id: - description: id of the pod that wrote the status - type: string - namespace: - description: namespace of the pod that wrote the status - type: string - type: object - type: array type: object type: object served: true diff --git a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml index 0a0121b33..0ed12b6d7 100644 --- a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml +++ b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.11.4 + controller-gen.kubebuilder.io/version: v0.12.1 name: secretproviderclasspodstatuses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io diff --git a/charts/secrets-store-csi-driver/templates/role-secretproviderclasspodstatuses-viewer.yaml b/charts/secrets-store-csi-driver/templates/role-secretproviderclasspodstatuses-viewer.yaml new file mode 100644 index 000000000..083f4cded --- /dev/null +++ b/charts/secrets-store-csi-driver/templates/role-secretproviderclasspodstatuses-viewer.yaml @@ -0,0 +1,21 @@ +{{ if .Values.rbac.install }} + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + creationTimestamp: null + labels: +{{ include "sscd.labels" . | indent 4 }} + rbac.authorization.k8s.io/aggregate-to-view: "true" + name: secretproviderclasspodstatuses-viewer-role +rules: +- apiGroups: + - secrets-store.csi.x-k8s.io + resources: + - secretproviderclasspodstatuses + verbs: + - get + - list + - watch +{{ end }} diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml index 2104a69c6..384d929c2 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml @@ -38,7 +38,11 @@ spec: {{ toYaml .Values.windows.affinity | indent 8 }} containers: - name: node-driver-registrar + {{- if .Values.windows.registrarImage.digest }} + image: "{{ .Values.windows.registrarImage.repository }}@{{ .Values.windows.registrarImage.digest }}" + {{- else }} image: "{{ .Values.windows.registrarImage.repository }}:{{ .Values.windows.registrarImage.tag }}" + {{- end }} args: - --v={{ .Values.windows.registrar.logVerbosity }} - "--csi-address=unix://C:\\csi\\csi.sock" @@ -62,7 +66,11 @@ spec: {{ toYaml . | indent 12 }} {{- end }} - name: secrets-store + {{- if .Values.windows.image.digest }} + image: "{{ .Values.windows.image.repository }}@{{ .Values.windows.image.digest }}" + {{- else }} image: "{{ .Values.windows.image.repository }}:{{ .Values.windows.image.tag }}" + {{- end }} args: {{- if .Values.logVerbosity }} - -v={{ .Values.logVerbosity }} @@ -142,7 +150,11 @@ spec: {{- end }} {{- if semverCompare ">= v0.0.9-0" .Values.windows.image.tag }} - name: liveness-probe + {{- if .Values.windows.livenessProbeImage.digest }} + image: "{{ .Values.windows.livenessProbeImage.repository }}@{{ .Values.windows.livenessProbeImage.digest }}" + {{- else }} image: "{{ .Values.windows.livenessProbeImage.repository }}:{{ .Values.windows.livenessProbeImage.tag }}" + {{- end }} imagePullPolicy: {{ .Values.windows.livenessProbeImage.pullPolicy }} args: - "--csi-address=unix://C:\\csi\\csi.sock" diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml index a71789a48..98d167ff0 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml @@ -38,7 +38,11 @@ spec: {{ toYaml .Values.linux.affinity | indent 8 }} containers: - name: node-driver-registrar + {{- if .Values.linux.registrarImage.digest }} + image: "{{ .Values.linux.registrarImage.repository }}@{{ .Values.linux.registrarImage.digest }}" + {{- else }} image: "{{ .Values.linux.registrarImage.repository }}:{{ .Values.linux.registrarImage.tag }}" + {{- end }} args: - --v={{ .Values.linux.registrar.logVerbosity }} - --csi-address=/csi/csi.sock @@ -62,7 +66,11 @@ spec: {{ toYaml . | indent 12 }} {{- end }} - name: secrets-store + {{- if .Values.linux.image.digest }} + image: "{{ .Values.linux.image.repository }}@{{ .Values.linux.image.digest }}" + {{- else }} image: "{{ .Values.linux.image.repository }}:{{ .Values.linux.image.tag }}" + {{- end }} args: {{- if .Values.logVerbosity }} - -v={{ .Values.logVerbosity }} @@ -145,7 +153,11 @@ spec: {{- end }} {{- if semverCompare ">= v0.0.8-0" .Values.linux.image.tag }} - name: liveness-probe + {{- if .Values.linux.livenessProbeImage.digest }} + image: "{{ .Values.linux.livenessProbeImage.repository }}@{{ .Values.linux.livenessProbeImage.digest }}" + {{- else }} image: "{{ .Values.linux.livenessProbeImage.repository }}:{{ .Values.linux.livenessProbeImage.tag }}" + {{- end }} imagePullPolicy: {{ .Values.linux.livenessProbeImage.pullPolicy }} args: - --csi-address=/csi/csi.sock diff --git a/charts/secrets-store-csi-driver/values.yaml b/charts/secrets-store-csi-driver/values.yaml index 572038d05..4a348657a 100644 --- a/charts/secrets-store-csi-driver/values.yaml +++ b/charts/secrets-store-csi-driver/values.yaml @@ -2,14 +2,15 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.4 + tag: v1.4.0 + #digest: sha256: pullPolicy: IfNotPresent crds: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.3.4 + tag: v1.4.0 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -45,6 +46,7 @@ linux: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar tag: v2.8.0 + #digest: sha256: pullPolicy: IfNotPresent registrar: @@ -60,6 +62,7 @@ linux: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe tag: v2.10.0 + #digest: sha256: pullPolicy: IfNotPresent livenessProbe: @@ -107,7 +110,8 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.4 + tag: v1.4.0 + #digest: sha256: pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes @@ -133,6 +137,7 @@ windows: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar tag: v2.8.0 + #digest: sha256: pullPolicy: IfNotPresent registrar: @@ -148,6 +153,7 @@ windows: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe tag: v2.10.0 + #digest: sha256: pullPolicy: IfNotPresent livenessProbe: diff --git a/deploy/role-secretproviderclasspodstatuses-viewer.yaml b/deploy/role-secretproviderclasspodstatuses-viewer.yaml new file mode 100644 index 000000000..795f7757e --- /dev/null +++ b/deploy/role-secretproviderclasspodstatuses-viewer.yaml @@ -0,0 +1,15 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + rbac.authorization.k8s.io/aggregate-to-view: "true" + name: secretproviderclasspodstatuses-viewer-role +rules: +- apiGroups: + - secrets-store.csi.x-k8s.io + resources: + - secretproviderclasspodstatuses + verbs: + - get + - list + - watch diff --git a/deploy/secrets-store-csi-driver-windows.yaml b/deploy/secrets-store-csi-driver-windows.yaml index 8a37fcc98..c4ce2f8f3 100644 --- a/deploy/secrets-store-csi-driver-windows.yaml +++ b/deploy/secrets-store-csi-driver-windows.yaml @@ -44,7 +44,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/deploy/secrets-store-csi-driver.yaml b/deploy/secrets-store-csi-driver.yaml index 7ca1b7c3d..aeec0f267 100644 --- a/deploy/secrets-store-csi-driver.yaml +++ b/deploy/secrets-store-csi-driver.yaml @@ -44,7 +44,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml index aa177b495..fcf63c668 100644 --- a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml +++ b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.11.4 + controller-gen.kubebuilder.io/version: v0.12.1 name: secretproviderclasses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io @@ -82,20 +82,6 @@ spec: type: object status: description: SecretProviderClassStatus defines the observed state of SecretProviderClass - properties: - byPod: - items: - description: ByPodStatus defines the state of SecretProviderClass - as seen by an individual controller - properties: - id: - description: id of the pod that wrote the status - type: string - namespace: - description: namespace of the pod that wrote the status - type: string - type: object - type: array type: object type: object served: true diff --git a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml index 0a0121b33..0ed12b6d7 100644 --- a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml +++ b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.11.4 + controller-gen.kubebuilder.io/version: v0.12.1 name: secretproviderclasspodstatuses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io diff --git a/docker/Makefile b/docker/Makefile index 981bdcc04..4f08a0cb4 100644 --- a/docker/Makefile +++ b/docker/Makefile @@ -15,7 +15,7 @@ REGISTRY?=docker.io/deislabs IMAGE_NAME=driver CRD_IMAGE_NAME=driver-crds -IMAGE_VERSION?=v1.3.4 +IMAGE_VERSION?=v1.4.0 BUILD_TIMESTAMP := $(shell date +%Y-%m-%d-%H:%M) BUILD_COMMIT := $(shell git rev-parse --short HEAD) IMAGE_TAG=$(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION) diff --git a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml index e69aa5607..64b94128b 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.3.4 -appVersion: 1.3.4 +version: 1.4.0 +appVersion: 1.4.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/manifest_staging/charts/secrets-store-csi-driver/README.md b/manifest_staging/charts/secrets-store-csi-driver/README.md index 6e941e2e9..5ce1cce40 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/README.md +++ b/manifest_staging/charts/secrets-store-csi-driver/README.md @@ -33,12 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.3.4` | +| `linux.image.tag` | Linux image tag | `v1.4.0` | | `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.3.4` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.4.0` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -72,7 +72,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.3.4` | +| `windows.image.tag` | Windows image tag | `v1.4.0` | | `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | diff --git a/manifest_staging/charts/secrets-store-csi-driver/values.yaml b/manifest_staging/charts/secrets-store-csi-driver/values.yaml index ac6a5ea39..4a348657a 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/values.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/values.yaml @@ -2,7 +2,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.4 + tag: v1.4.0 #digest: sha256: pullPolicy: IfNotPresent @@ -10,7 +10,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.3.4 + tag: v1.4.0 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -110,7 +110,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.4 + tag: v1.4.0 #digest: sha256: pullPolicy: IfNotPresent diff --git a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml index 8a37fcc98..c4ce2f8f3 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml @@ -44,7 +44,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/deploy/secrets-store-csi-driver.yaml b/manifest_staging/deploy/secrets-store-csi-driver.yaml index 7ca1b7c3d..aeec0f267 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver.yaml @@ -44,7 +44,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)"