Skip to content

Commit b961b3e

Browse files
committed
release: update manifest and helm charts for v1.4.0
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
1 parent 0d24da7 commit b961b3e

18 files changed

+96
-52
lines changed

charts/secrets-store-csi-driver/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
apiVersion: v2
22
name: secrets-store-csi-driver
3-
version: 1.3.4
4-
appVersion: 1.3.4
3+
version: 1.4.0
4+
appVersion: 1.4.0
55
kubeVersion: ">=1.16.0-0"
66
description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster.
77
icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png

charts/secrets-store-csi-driver/README.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p
3333
| `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` |
3434
| `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` |
3535
| `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` |
36-
| `linux.image.tag` | Linux image tag | `v1.3.4` |
36+
| `linux.image.tag` | Linux image tag | `v1.4.0` |
37+
| `linux.image.digest` | Linux image digest, image pull from digest instead of tag if specified | `""` |
3738
| `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` |
3839
| `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` |
3940
| `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` |
40-
| `linux.crds.image.tag` | Linux crds image tag | `v1.3.4` |
41+
| `linux.crds.image.tag` | Linux crds image tag | `v1.4.0` |
4142
| `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` |
4243
| `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` |
4344
| `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` |
@@ -52,11 +53,13 @@ The following table lists the configurable parameters of the csi-secrets-store-p
5253
| `linux.registrarImage.repository` | Linux node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` |
5354
| `linux.registrarImage.pullPolicy` | Linux node-driver-registrar image pull policy | `IfNotPresent` |
5455
| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.8.0` |
56+
| `linux.registrarImage.digest` | Linux node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` |
5557
| `linux.registrar.resources` | The resource request/limits for the linux node-driver-registrar container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` |
5658
| `linux.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` |
5759
| `linux.livenessProbeImage.repository` | Linux liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` |
5860
| `linux.livenessProbeImage.pullPolicy` | Linux liveness-probe image pull policy | `IfNotPresent` |
5961
| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.10.0` |
62+
| `linux.livenessProbeImage.digest` | Linux liveness-probe image digest, image pull from digest instead of tag if specified | `""` |
6063
| `linux.livenessProbe.resources` | The resource request/limits for the linux liveness-probe container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` |
6164
| `linux.env` | Environment variables to be passed for the daemonset on linux nodes | `[]` |
6265
| `linux.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` |
@@ -69,7 +72,8 @@ The following table lists the configurable parameters of the csi-secrets-store-p
6972
| `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` |
7073
| `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` |
7174
| `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` |
72-
| `windows.image.tag` | Windows image tag | `v1.3.4` |
75+
| `windows.image.tag` | Windows image tag | `v1.4.0` |
76+
| `windows.image.digest` | Windows image digest, image pull from digest instead of tag if specified | `""` |
7377
| `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` |
7478
| `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` |
7579
| `windows.enabled` | Install secrets store csi driver on windows nodes | false |
@@ -82,11 +86,13 @@ The following table lists the configurable parameters of the csi-secrets-store-p
8286
| `windows.registrarImage.repository` | Windows node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` |
8387
| `windows.registrarImage.pullPolicy` | Windows node-driver-registrar image pull policy | `IfNotPresent` |
8488
| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.8.0` |
89+
| `windows.registrarImage.digest` | Windows node-driver-registrar image digest, image pull from digest instead of tag if specified | `""` |
8590
| `windows.registrar.resources` | The resource request/limits for the windows node-driver-registrar container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` |
8691
| `windows.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` |
8792
| `windows.livenessProbeImage.repository` | Windows liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` |
8893
| `windows.livenessProbeImage.pullPolicy` | Windows liveness-probe image pull policy | `IfNotPresent` |
8994
| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.10.0` |
95+
| `windows.livenessProbeImage.digest` | Windows liveness-probe image digest, image pull from digest instead of tag if specified | `""` |
9096
| `windows.livenessProbe.resources` | The resource request/limits for the windows liveness-probe container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` |
9197
| `windows.env` | Environment variables to be passed for the daemonset on windows nodes | `[]` |
9298
| `windows.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` |

charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
33
kind: CustomResourceDefinition
44
metadata:
55
annotations:
6-
controller-gen.kubebuilder.io/version: v0.11.4
6+
controller-gen.kubebuilder.io/version: v0.12.1
77
name: secretproviderclasses.secrets-store.csi.x-k8s.io
88
spec:
99
group: secrets-store.csi.x-k8s.io
@@ -82,20 +82,6 @@ spec:
8282
type: object
8383
status:
8484
description: SecretProviderClassStatus defines the observed state of SecretProviderClass
85-
properties:
86-
byPod:
87-
items:
88-
description: ByPodStatus defines the state of SecretProviderClass
89-
as seen by an individual controller
90-
properties:
91-
id:
92-
description: id of the pod that wrote the status
93-
type: string
94-
namespace:
95-
description: namespace of the pod that wrote the status
96-
type: string
97-
type: object
98-
type: array
9985
type: object
10086
type: object
10187
served: true

charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
33
kind: CustomResourceDefinition
44
metadata:
55
annotations:
6-
controller-gen.kubebuilder.io/version: v0.11.4
6+
controller-gen.kubebuilder.io/version: v0.12.1
77
name: secretproviderclasspodstatuses.secrets-store.csi.x-k8s.io
88
spec:
99
group: secrets-store.csi.x-k8s.io
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
{{ if .Values.rbac.install }}
2+
3+
---
4+
apiVersion: rbac.authorization.k8s.io/v1
5+
kind: ClusterRole
6+
metadata:
7+
creationTimestamp: null
8+
labels:
9+
{{ include "sscd.labels" . | indent 4 }}
10+
rbac.authorization.k8s.io/aggregate-to-view: "true"
11+
name: secretproviderclasspodstatuses-viewer-role
12+
rules:
13+
- apiGroups:
14+
- secrets-store.csi.x-k8s.io
15+
resources:
16+
- secretproviderclasspodstatuses
17+
verbs:
18+
- get
19+
- list
20+
- watch
21+
{{ end }}

charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,11 @@ spec:
3838
{{ toYaml .Values.windows.affinity | indent 8 }}
3939
containers:
4040
- name: node-driver-registrar
41+
{{- if .Values.windows.registrarImage.digest }}
42+
image: "{{ .Values.windows.registrarImage.repository }}@{{ .Values.windows.registrarImage.digest }}"
43+
{{- else }}
4144
image: "{{ .Values.windows.registrarImage.repository }}:{{ .Values.windows.registrarImage.tag }}"
45+
{{- end }}
4246
args:
4347
- --v={{ .Values.windows.registrar.logVerbosity }}
4448
- "--csi-address=unix://C:\\csi\\csi.sock"
@@ -62,7 +66,11 @@ spec:
6266
{{ toYaml . | indent 12 }}
6367
{{- end }}
6468
- name: secrets-store
69+
{{- if .Values.windows.image.digest }}
70+
image: "{{ .Values.windows.image.repository }}@{{ .Values.windows.image.digest }}"
71+
{{- else }}
6572
image: "{{ .Values.windows.image.repository }}:{{ .Values.windows.image.tag }}"
73+
{{- end }}
6674
args:
6775
{{- if .Values.logVerbosity }}
6876
- -v={{ .Values.logVerbosity }}
@@ -142,7 +150,11 @@ spec:
142150
{{- end }}
143151
{{- if semverCompare ">= v0.0.9-0" .Values.windows.image.tag }}
144152
- name: liveness-probe
153+
{{- if .Values.windows.livenessProbeImage.digest }}
154+
image: "{{ .Values.windows.livenessProbeImage.repository }}@{{ .Values.windows.livenessProbeImage.digest }}"
155+
{{- else }}
145156
image: "{{ .Values.windows.livenessProbeImage.repository }}:{{ .Values.windows.livenessProbeImage.tag }}"
157+
{{- end }}
146158
imagePullPolicy: {{ .Values.windows.livenessProbeImage.pullPolicy }}
147159
args:
148160
- "--csi-address=unix://C:\\csi\\csi.sock"

charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,11 @@ spec:
3838
{{ toYaml .Values.linux.affinity | indent 8 }}
3939
containers:
4040
- name: node-driver-registrar
41+
{{- if .Values.linux.registrarImage.digest }}
42+
image: "{{ .Values.linux.registrarImage.repository }}@{{ .Values.linux.registrarImage.digest }}"
43+
{{- else }}
4144
image: "{{ .Values.linux.registrarImage.repository }}:{{ .Values.linux.registrarImage.tag }}"
45+
{{- end }}
4246
args:
4347
- --v={{ .Values.linux.registrar.logVerbosity }}
4448
- --csi-address=/csi/csi.sock
@@ -62,7 +66,11 @@ spec:
6266
{{ toYaml . | indent 12 }}
6367
{{- end }}
6468
- name: secrets-store
69+
{{- if .Values.linux.image.digest }}
70+
image: "{{ .Values.linux.image.repository }}@{{ .Values.linux.image.digest }}"
71+
{{- else }}
6572
image: "{{ .Values.linux.image.repository }}:{{ .Values.linux.image.tag }}"
73+
{{- end }}
6674
args:
6775
{{- if .Values.logVerbosity }}
6876
- -v={{ .Values.logVerbosity }}
@@ -145,7 +153,11 @@ spec:
145153
{{- end }}
146154
{{- if semverCompare ">= v0.0.8-0" .Values.linux.image.tag }}
147155
- name: liveness-probe
156+
{{- if .Values.linux.livenessProbeImage.digest }}
157+
image: "{{ .Values.linux.livenessProbeImage.repository }}@{{ .Values.linux.livenessProbeImage.digest }}"
158+
{{- else }}
148159
image: "{{ .Values.linux.livenessProbeImage.repository }}:{{ .Values.linux.livenessProbeImage.tag }}"
160+
{{- end }}
149161
imagePullPolicy: {{ .Values.linux.livenessProbeImage.pullPolicy }}
150162
args:
151163
- --csi-address=/csi/csi.sock

0 commit comments

Comments
 (0)