From 093828bd41d22de9514ed7a2566a83184842984e Mon Sep 17 00:00:00 2001 From: Anish Ramasekar Date: Tue, 20 Aug 2024 18:06:08 +0000 Subject: [PATCH] release: update manifest and helm charts for v1.4.5 Signed-off-by: Anish Ramasekar --- Makefile | 7 ++++--- charts/secrets-store-csi-driver/Chart.yaml | 4 ++-- charts/secrets-store-csi-driver/README.md | 14 +++++++------- .../secrets-store-csi-driver-windows.yaml | 12 ++++-------- .../templates/secrets-store-csi-driver.yaml | 12 ++++-------- charts/secrets-store-csi-driver/values.yaml | 14 +++++++------- deploy/secrets-store-csi-driver-windows.yaml | 6 +++--- deploy/secrets-store-csi-driver.yaml | 6 +++--- docker/Makefile | 2 +- .../charts/secrets-store-csi-driver/Chart.yaml | 4 ++-- .../charts/secrets-store-csi-driver/README.md | 6 +++--- .../charts/secrets-store-csi-driver/values.yaml | 6 +++--- .../deploy/secrets-store-csi-driver-windows.yaml | 2 +- .../deploy/secrets-store-csi-driver.yaml | 2 +- 14 files changed, 45 insertions(+), 52 deletions(-) diff --git a/Makefile b/Makefile index 8f87b1a95..6cdc589d8 100644 --- a/Makefile +++ b/Makefile @@ -29,8 +29,8 @@ E2E_PROVIDER_IMAGE_NAME ?= e2e-provider # Release version is the current supported release for the driver # Update this version when the helm chart is being updated for release -RELEASE_VERSION := v1.4.4 -IMAGE_VERSION ?= v1.4.4 +RELEASE_VERSION := v1.4.5 +IMAGE_VERSION ?= v1.4.5 # Use a custom version for E2E tests if we are testing in CI ifdef CI @@ -459,7 +459,8 @@ e2e-helm-deploy-release: --set linux.enabled=true \ --set syncSecret.enabled=true \ --set enableSecretRotation=true \ - --set rotationPollInterval=30s + --set rotationPollInterval=30s \ + --set tokenRequests[0].audience="api://AzureADTokenExchange" .PHONY: e2e-kind-cleanup e2e-kind-cleanup: diff --git a/charts/secrets-store-csi-driver/Chart.yaml b/charts/secrets-store-csi-driver/Chart.yaml index a2710ddfb..a0bba17fa 100644 --- a/charts/secrets-store-csi-driver/Chart.yaml +++ b/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.4.4 -appVersion: 1.4.4 +version: 1.4.5 +appVersion: 1.4.5 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/charts/secrets-store-csi-driver/README.md b/charts/secrets-store-csi-driver/README.md index 7573ff495..c94faec46 100644 --- a/charts/secrets-store-csi-driver/README.md +++ b/charts/secrets-store-csi-driver/README.md @@ -33,12 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.4.4` | +| `linux.image.tag` | Linux image tag | `v1.4.5` | | `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.4.4` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.4.5` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -52,13 +52,13 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `linux.registrarImage.repository` | Linux node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `linux.registrarImage.pullPolicy` | Linux node-driver-registrar image pull policy | `IfNotPresent` | -| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.10.0` | +| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.11.1` | | `linux.registrarImage.digest` | Linux node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | | `linux.registrar.resources` | The resource request/limits for the linux node-driver-registrar container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `linux.livenessProbeImage.repository` | Linux liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `linux.livenessProbeImage.pullPolicy` | Linux liveness-probe image pull policy | `IfNotPresent` | -| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.12.0` | +| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.13.1` | | `linux.livenessProbeImage.digest` | Linux liveness-probe image digest, image pull from digest instead of tag if specified | `""` | | `linux.livenessProbe.resources` | The resource request/limits for the linux liveness-probe container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.env` | Environment variables to be passed for the daemonset on linux nodes | `[]` | @@ -72,7 +72,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.4.4` | +| `windows.image.tag` | Windows image tag | `v1.4.5` | | `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | @@ -85,13 +85,13 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `windows.registrarImage.repository` | Windows node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `windows.registrarImage.pullPolicy` | Windows node-driver-registrar image pull policy | `IfNotPresent` | -| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.10.0` | +| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.11.1` | | `windows.registrarImage.digest` | Windows node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` | | `windows.registrar.resources` | The resource request/limits for the windows node-driver-registrar container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `windows.livenessProbeImage.repository` | Windows liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `windows.livenessProbeImage.pullPolicy` | Windows liveness-probe image pull policy | `IfNotPresent` | -| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.12.0` | +| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.13.1` | | `windows.livenessProbeImage.digest` | Windows liveness-probe image digest, image pull from digest instead of tag if specified | `""` | | `windows.livenessProbe.resources` | The resource request/limits for the windows liveness-probe container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.env` | Environment variables to be passed for the daemonset on windows nodes | `[]` | diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml index d68dc4f37..b7e4f0623 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml @@ -74,17 +74,17 @@ spec: - "--nodeid=$(KUBE_NODE_NAME)" - "--provider-volume={{ .Values.windows.providersDir }}" - "--additional-provider-volume-paths={{ join "," .Values.windows.additionalProvidersDirs }}" - {{- if and (semverCompare ">= v0.0.15-0" .Values.windows.image.tag) .Values.enableSecretRotation }} + {{- if .Values.enableSecretRotation }} - "--enable-secret-rotation={{ .Values.enableSecretRotation }}" {{- end }} - {{- if and (semverCompare ">= v0.0.15-0" .Values.windows.image.tag) .Values.rotationPollInterval }} + {{- if .Values.rotationPollInterval }} - "--rotation-poll-interval={{ .Values.rotationPollInterval }}" {{- end }} - "--metrics-addr={{ .Values.windows.metricsAddr }}" - {{- if and (semverCompare ">= v0.0.22-0" .Values.windows.image.tag) .Values.providerHealthCheck }} + {{- if .Values.providerHealthCheck }} - "--provider-health-check={{ .Values.providerHealthCheck }}" {{- end }} - {{- if and (semverCompare ">= v0.0.22-0" .Values.windows.image.tag) .Values.providerHealthCheckInterval }} + {{- if .Values.providerHealthCheckInterval }} - "--provider-health-check-interval={{ .Values.providerHealthCheckInterval }}" {{- end }} {{- if .Values.maxCallRecvMsgSize }} @@ -102,7 +102,6 @@ spec: apiVersion: v1 fieldPath: spec.nodeName imagePullPolicy: {{ .Values.windows.image.pullPolicy }} - {{- if semverCompare ">= v0.0.9-0" .Values.windows.image.tag }} ports: - containerPort: {{ .Values.livenessProbe.port }} name: healthz @@ -118,7 +117,6 @@ spec: initialDelaySeconds: 30 timeoutSeconds: 10 periodSeconds: 15 - {{- end }} volumeMounts: - name: plugin-dir mountPath: C:\csi @@ -140,7 +138,6 @@ spec: resources: {{ toYaml . | indent 12 }} {{- end }} - {{- if semverCompare ">= v0.0.9-0" .Values.windows.image.tag }} - name: liveness-probe {{- if .Values.windows.livenessProbeImage.digest }} image: "{{ .Values.windows.livenessProbeImage.repository }}@{{ .Values.windows.livenessProbeImage.digest }}" @@ -160,7 +157,6 @@ spec: resources: {{ toYaml . | indent 12 }} {{- end }} - {{- end }} {{- if .Values.windows.priorityClassName }} priorityClassName: {{ .Values.windows.priorityClassName | quote }} {{- end }} diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml index 4f008569f..60566d941 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml @@ -74,17 +74,17 @@ spec: - "--nodeid=$(KUBE_NODE_NAME)" - "--provider-volume={{ .Values.linux.providersDir }}" - "--additional-provider-volume-paths={{ join "," .Values.linux.additionalProvidersDirs }}" - {{- if and (semverCompare ">= v0.0.15-0" .Values.linux.image.tag) .Values.enableSecretRotation }} + {{- if .Values.enableSecretRotation }} - "--enable-secret-rotation={{ .Values.enableSecretRotation }}" {{- end }} - {{- if and (semverCompare ">= v0.0.15-0" .Values.linux.image.tag) .Values.rotationPollInterval }} + {{- if .Values.rotationPollInterval }} - "--rotation-poll-interval={{ .Values.rotationPollInterval }}" {{- end }} - "--metrics-addr={{ .Values.linux.metricsAddr }}" - {{- if and (semverCompare ">= v0.0.22-0" .Values.linux.image.tag) .Values.providerHealthCheck }} + {{- if .Values.providerHealthCheck }} - "--provider-health-check={{ .Values.providerHealthCheck }}" {{- end }} - {{- if and (semverCompare ">= v0.0.22-0" .Values.linux.image.tag) .Values.providerHealthCheckInterval }} + {{- if .Values.providerHealthCheckInterval }} - "--provider-health-check-interval={{ .Values.providerHealthCheckInterval }}" {{- end }} {{- if .Values.maxCallRecvMsgSize }} @@ -104,7 +104,6 @@ spec: imagePullPolicy: {{ .Values.linux.image.pullPolicy }} securityContext: privileged: true - {{- if semverCompare ">= v0.0.8-0" .Values.linux.image.tag }} ports: - containerPort: {{ .Values.livenessProbe.port }} name: healthz @@ -120,7 +119,6 @@ spec: initialDelaySeconds: 30 timeoutSeconds: 10 periodSeconds: 15 - {{- end }} volumeMounts: - name: plugin-dir mountPath: /csi @@ -143,7 +141,6 @@ spec: resources: {{ toYaml . | indent 12 }} {{- end }} - {{- if semverCompare ">= v0.0.8-0" .Values.linux.image.tag }} - name: liveness-probe {{- if .Values.linux.livenessProbeImage.digest }} image: "{{ .Values.linux.livenessProbeImage.repository }}@{{ .Values.linux.livenessProbeImage.digest }}" @@ -163,7 +160,6 @@ spec: resources: {{ toYaml . | indent 12 }} {{- end }} - {{- end }} {{- if .Values.linux.priorityClassName }} priorityClassName: {{ .Values.linux.priorityClassName | quote }} {{- end }} diff --git a/charts/secrets-store-csi-driver/values.yaml b/charts/secrets-store-csi-driver/values.yaml index 59d5c1a21..df81dddac 100644 --- a/charts/secrets-store-csi-driver/values.yaml +++ b/charts/secrets-store-csi-driver/values.yaml @@ -2,7 +2,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.4 + tag: v1.4.5 #digest: sha256: pullPolicy: IfNotPresent @@ -10,7 +10,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.4.4 + tag: v1.4.5 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -45,7 +45,7 @@ linux: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.10.0 + tag: v2.11.1 #digest: sha256: pullPolicy: IfNotPresent @@ -61,7 +61,7 @@ linux: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.12.0 + tag: v2.13.1 #digest: sha256: pullPolicy: IfNotPresent @@ -110,7 +110,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.4 + tag: v1.4.5 #digest: sha256: pullPolicy: IfNotPresent @@ -136,7 +136,7 @@ windows: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.10.0 + tag: v2.11.1 #digest: sha256: pullPolicy: IfNotPresent @@ -152,7 +152,7 @@ windows: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.12.0 + tag: v2.13.1 #digest: sha256: pullPolicy: IfNotPresent diff --git a/deploy/secrets-store-csi-driver-windows.yaml b/deploy/secrets-store-csi-driver-windows.yaml index 451a2e424..9b42febd0 100644 --- a/deploy/secrets-store-csi-driver-windows.yaml +++ b/deploy/secrets-store-csi-driver-windows.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0 + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.11.1 args: - --v=5 - "--csi-address=unix://C:\\csi\\csi.sock" @@ -36,7 +36,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.5 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -85,7 +85,7 @@ spec: - name: providers-dir mountPath: C:\k\secrets-store-csi-providers - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 + image: registry.k8s.io/sig-storage/livenessprobe:v2.13.1 imagePullPolicy: IfNotPresent args: - "--csi-address=unix://C:\\csi\\csi.sock" diff --git a/deploy/secrets-store-csi-driver.yaml b/deploy/secrets-store-csi-driver.yaml index cbdae38ad..20ee10da6 100644 --- a/deploy/secrets-store-csi-driver.yaml +++ b/deploy/secrets-store-csi-driver.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0 + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.11.1 args: - --v=5 - --csi-address=/csi/csi.sock @@ -36,7 +36,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.5 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -91,7 +91,7 @@ spec: cpu: 50m memory: 100Mi - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.12.0 + image: registry.k8s.io/sig-storage/livenessprobe:v2.13.1 imagePullPolicy: IfNotPresent args: - --csi-address=/csi/csi.sock diff --git a/docker/Makefile b/docker/Makefile index 5dfd12823..1a27878c1 100644 --- a/docker/Makefile +++ b/docker/Makefile @@ -15,7 +15,7 @@ REGISTRY?=docker.io/deislabs IMAGE_NAME=driver CRD_IMAGE_NAME=driver-crds -IMAGE_VERSION?=v1.4.4 +IMAGE_VERSION?=v1.4.5 BUILD_TIMESTAMP := $(shell date +%Y-%m-%d-%H:%M) BUILD_COMMIT := $(shell git rev-parse --short HEAD) IMAGE_TAG=$(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION) diff --git a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml index a2710ddfb..a0bba17fa 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.4.4 -appVersion: 1.4.4 +version: 1.4.5 +appVersion: 1.4.5 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/manifest_staging/charts/secrets-store-csi-driver/README.md b/manifest_staging/charts/secrets-store-csi-driver/README.md index e2283a598..c94faec46 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/README.md +++ b/manifest_staging/charts/secrets-store-csi-driver/README.md @@ -33,12 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.4.4` | +| `linux.image.tag` | Linux image tag | `v1.4.5` | | `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.4.4` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.4.5` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -72,7 +72,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.4.4` | +| `windows.image.tag` | Windows image tag | `v1.4.5` | | `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | diff --git a/manifest_staging/charts/secrets-store-csi-driver/values.yaml b/manifest_staging/charts/secrets-store-csi-driver/values.yaml index 49f07147d..df81dddac 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/values.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/values.yaml @@ -2,7 +2,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.4 + tag: v1.4.5 #digest: sha256: pullPolicy: IfNotPresent @@ -10,7 +10,7 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.4.4 + tag: v1.4.5 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -110,7 +110,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.4.4 + tag: v1.4.5 #digest: sha256: pullPolicy: IfNotPresent diff --git a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml index 980d73671..9b42febd0 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml @@ -36,7 +36,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.5 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/deploy/secrets-store-csi-driver.yaml b/manifest_staging/deploy/secrets-store-csi-driver.yaml index 9264a4453..20ee10da6 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver.yaml @@ -36,7 +36,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.4.4 + image: registry.k8s.io/csi-secrets-store/driver:v1.4.5 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)"