From 7526f1ae9a81c4adc8e7da62282fd05321f8cc98 Mon Sep 17 00:00:00 2001 From: Anish Ramasekar Date: Mon, 11 Mar 2024 21:19:17 +0000 Subject: [PATCH] release: update manifest and helm charts for v1.4.2 Signed-off-by: Anish Ramasekar --- charts/secrets-store-csi-driver/Chart.yaml | 4 +-- charts/secrets-store-csi-driver/README.md | 26 +++++++++---------- .../secrets-store-csi-driver-windows.yaml | 8 ------ .../templates/secrets-store-csi-driver.yaml | 8 ------ charts/secrets-store-csi-driver/values.yaml | 14 +++++----- deploy/secrets-store-csi-driver-windows.yaml | 14 +++------- deploy/secrets-store-csi-driver.yaml | 14 +++------- .../secrets-store-csi-driver/Chart.yaml | 4 +-- .../charts/secrets-store-csi-driver/README.md | 6 ++--- .../secrets-store-csi-driver/values.yaml | 6 ++--- .../secrets-store-csi-driver-windows.yaml | 2 +- .../deploy/secrets-store-csi-driver.yaml | 2 +- 12 files changed, 38 insertions(+), 70 deletions(-) diff --git a/charts/secrets-store-csi-driver/Chart.yaml b/charts/secrets-store-csi-driver/Chart.yaml index f60c959ac..a26ed97ed 100644 --- a/charts/secrets-store-csi-driver/Chart.yaml +++ b/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.4.1 -appVersion: 1.4.1 +version: 1.4.2 +appVersion: 1.4.2 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/charts/secrets-store-csi-driver/README.md b/charts/secrets-store-csi-driver/README.md index 5d60e09b0..883d523a5 100644 --- a/charts/secrets-store-csi-driver/README.md +++ b/charts/secrets-store-csi-driver/README.md @@ -33,12 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.4.1` | -| `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | +| `linux.image.tag` | Linux image tag | `v1.4.2` | +| `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.4.1` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.4.2` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -52,14 +52,14 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `linux.registrarImage.repository` | Linux node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `linux.registrarImage.pullPolicy` | Linux node-driver-registrar image pull policy | `IfNotPresent` | -| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.8.0` | -| `linux.registrarImage.digest` | Linux node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | +| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.10.0` | +| `linux.registrarImage.digest` | Linux node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | | `linux.registrar.resources` | The resource request/limits for the linux node-driver-registrar container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `linux.livenessProbeImage.repository` | Linux liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `linux.livenessProbeImage.pullPolicy` | Linux liveness-probe image pull policy | `IfNotPresent` | -| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.10.0` | -| `linux.livenessProbeImage.digest` | Linux liveness-probe image digest, image pull from digest instead of tag if specified | `""` | +| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.12.0` | +| `linux.livenessProbeImage.digest` | Linux liveness-probe image digest, image pull from digest instead of tag if specified | `""` | | `linux.livenessProbe.resources` | The resource request/limits for the linux liveness-probe container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.env` | Environment variables to be passed for the daemonset on linux nodes | `[]` | | `linux.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | @@ -72,8 +72,8 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.4.1` | -| `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | +| `windows.image.tag` | Windows image tag | `v1.4.2` | +| `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | @@ -85,14 +85,14 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `windows.registrarImage.repository` | Windows node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `windows.registrarImage.pullPolicy` | Windows node-driver-registrar image pull policy | `IfNotPresent` | -| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.8.0` | -| `windows.registrarImage.digest` | Windows node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | +| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.10.0` | +| `windows.registrarImage.digest` | Windows node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | | `windows.registrar.resources` | The resource request/limits for the windows node-driver-registrar container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `windows.livenessProbeImage.repository` | Windows liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `windows.livenessProbeImage.pullPolicy` | Windows liveness-probe image pull policy | `IfNotPresent` | -| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.10.0` | -| `windows.livenessProbeImage.digest` | Windows liveness-probe image digest, image pull from digest instead of tag if specified | `""` | +| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.12.0` | +| `windows.livenessProbeImage.digest` | Windows liveness-probe image digest, image pull from digest instead of tag if specified | `""` | | `windows.livenessProbe.resources` | The resource request/limits for the windows liveness-probe container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.env` | Environment variables to be passed for the daemonset on windows nodes | `[]` | | `windows.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml index 384d929c2..d68dc4f37 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml @@ -47,14 +47,6 @@ spec: - --v={{ .Values.windows.registrar.logVerbosity }} - "--csi-address=unix://C:\\csi\\csi.sock" - --kubelet-registration-path={{ .Values.windows.kubeletRootDir }}\plugins\csi-secrets-store\csi.sock - livenessProbe: - exec: - command: - - /csi-node-driver-registrar.exe - - --kubelet-registration-path={{ .Values.windows.kubeletRootDir }}\plugins\csi-secrets-store\csi.sock - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 imagePullPolicy: {{ .Values.windows.registrarImage.pullPolicy }} volumeMounts: - name: plugin-dir diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml index 98d167ff0..4f008569f 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml @@ -47,14 +47,6 @@ spec: - --v={{ .Values.linux.registrar.logVerbosity }} - --csi-address=/csi/csi.sock - --kubelet-registration-path={{ .Values.linux.kubeletRootDir }}/plugins/csi-secrets-store/csi.sock - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path={{ .Values.linux.kubeletRootDir }}/plugins/csi-secrets-store/csi.sock - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 imagePullPolicy: {{ .Values.linux.registrarImage.pullPolicy }} volumeMounts: - name: plugin-dir diff --git a/charts/secrets-store-csi-driver/values.yaml b/charts/secrets-store-csi-driver/values.yaml index 3fe6c278c..62d7d18ee 100644 --- a/charts/secrets-store-csi-driver/values.yaml +++ b/charts/secrets-store-csi-driver/values.yaml @@ -2,7 +2,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.1 + tag: v1.4.2 #digest: sha256: pullPolicy: IfNotPresent @@ -10,7 +10,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.4.1 + tag: v1.4.2 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -45,7 +45,7 @@ linux: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.8.0 + tag: v2.10.0 #digest: sha256: pullPolicy: IfNotPresent @@ -61,7 +61,7 @@ linux: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.10.0 + tag: v2.12.0 #digest: sha256: pullPolicy: IfNotPresent @@ -110,7 +110,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.1 + tag: v1.4.2 #digest: sha256: pullPolicy: IfNotPresent @@ -136,7 +136,7 @@ windows: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.8.0 + tag: v2.10.0 #digest: sha256: pullPolicy: IfNotPresent @@ -152,7 +152,7 @@ windows: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.10.0 + tag: v2.12.0 #digest: sha256: pullPolicy: IfNotPresent diff --git a/deploy/secrets-store-csi-driver-windows.yaml b/deploy/secrets-store-csi-driver-windows.yaml index 402613a76..c2d2041e3 100644 --- a/deploy/secrets-store-csi-driver-windows.yaml +++ b/deploy/secrets-store-csi-driver-windows.yaml @@ -17,19 +17,11 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0 args: - --v=5 - "--csi-address=unix://C:\\csi\\csi.sock" - "--kubelet-registration-path=C:\\var\\lib\\kubelet\\plugins\\csi-secrets-store\\csi.sock" - livenessProbe: - exec: - command: - - /csi-node-driver-registrar.exe - - --kubelet-registration-path=C:\var\lib\kubelet\plugins\csi-secrets-store\csi.sock - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 imagePullPolicy: IfNotPresent volumeMounts: - name: plugin-dir @@ -44,7 +36,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.1 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.2 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -93,7 +85,7 @@ spec: - name: providers-dir mountPath: C:\k\secrets-store-csi-providers - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.10.0 + image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 imagePullPolicy: IfNotPresent args: - "--csi-address=unix://C:\\csi\\csi.sock" diff --git a/deploy/secrets-store-csi-driver.yaml b/deploy/secrets-store-csi-driver.yaml index eca8cdb6d..84c7492f4 100644 --- a/deploy/secrets-store-csi-driver.yaml +++ b/deploy/secrets-store-csi-driver.yaml @@ -17,19 +17,11 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0 args: - --v=5 - --csi-address=/csi/csi.sock - --kubelet-registration-path=/var/lib/kubelet/plugins/csi-secrets-store/csi.sock - livenessProbe: - exec: - command: - - /csi-node-driver-registrar - - --kubelet-registration-path=/var/lib/kubelet/plugins/csi-secrets-store/csi.sock - - --mode=kubelet-registration-probe - initialDelaySeconds: 30 - timeoutSeconds: 15 imagePullPolicy: IfNotPresent volumeMounts: - name: plugin-dir @@ -44,7 +36,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.1 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.2 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -99,7 +91,7 @@ spec: cpu: 50m memory: 100Mi - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.10.0 + image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 imagePullPolicy: IfNotPresent args: - --csi-address=/csi/csi.sock diff --git a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml index f60c959ac..a26ed97ed 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.4.1 -appVersion: 1.4.1 +version: 1.4.2 +appVersion: 1.4.2 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/manifest_staging/charts/secrets-store-csi-driver/README.md b/manifest_staging/charts/secrets-store-csi-driver/README.md index 3fa1cc883..883d523a5 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/README.md +++ b/manifest_staging/charts/secrets-store-csi-driver/README.md @@ -33,12 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.4.1` | +| `linux.image.tag` | Linux image tag | `v1.4.2` | | `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.4.1` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.4.2` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -72,7 +72,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.4.1` | +| `windows.image.tag` | Windows image tag | `v1.4.2` | | `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | diff --git a/manifest_staging/charts/secrets-store-csi-driver/values.yaml b/manifest_staging/charts/secrets-store-csi-driver/values.yaml index b61af6864..62d7d18ee 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/values.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/values.yaml @@ -2,7 +2,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.1 + tag: v1.4.2 #digest: sha256: pullPolicy: IfNotPresent @@ -10,7 +10,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.4.1 + tag: v1.4.2 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -110,7 +110,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.1 + tag: v1.4.2 #digest: sha256: pullPolicy: IfNotPresent diff --git a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml index c49c1153f..c2d2041e3 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml @@ -36,7 +36,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.1 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.2 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/deploy/secrets-store-csi-driver.yaml b/manifest_staging/deploy/secrets-store-csi-driver.yaml index a55d9b5ce..84c7492f4 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver.yaml @@ -36,7 +36,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.1 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.2 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)"