From 8e543485e9101fad1a8d8e17b3b0b87af30f7152 Mon Sep 17 00:00:00 2001 From: Anish Ramasekar Date: Thu, 14 Oct 2021 10:07:36 -0700 Subject: [PATCH] release: update manifest and helm charts for v1.0.0 Signed-off-by: Anish Ramasekar --- charts/secrets-store-csi-driver/Chart.yaml | 4 ++-- charts/secrets-store-csi-driver/README.md | 4 ++-- .../templates/crds-upgrade-hook.yaml | 4 ++++ .../templates/keep-crds-upgrade-hook.yaml | 4 ++++ charts/secrets-store-csi-driver/values.yaml | 6 +++--- deploy/secrets-store-csi-driver-windows.yaml | 2 +- deploy/secrets-store-csi-driver.yaml | 2 +- manifest_staging/charts/secrets-store-csi-driver/Chart.yaml | 4 ++-- manifest_staging/charts/secrets-store-csi-driver/README.md | 4 ++-- .../charts/secrets-store-csi-driver/values.yaml | 6 +++--- .../deploy/secrets-store-csi-driver-windows.yaml | 2 +- manifest_staging/deploy/secrets-store-csi-driver.yaml | 2 +- 12 files changed, 26 insertions(+), 18 deletions(-) diff --git a/charts/secrets-store-csi-driver/Chart.yaml b/charts/secrets-store-csi-driver/Chart.yaml index 19ed772f3..88c8ab696 100644 --- a/charts/secrets-store-csi-driver/Chart.yaml +++ b/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.0.0-rc.1 -appVersion: 1.0.0-rc.1 +version: 1.0.0 +appVersion: 1.0.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/charts/secrets-store-csi-driver/README.md b/charts/secrets-store-csi-driver/README.md index 740f73c69..8d816930e 100644 --- a/charts/secrets-store-csi-driver/README.md +++ b/charts/secrets-store-csi-driver/README.md @@ -47,7 +47,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.0.0-rc.1` | +| `linux.image.tag` | Linux image tag | `v1.0.0` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `linux.driver.resources` | The resource request/limits for the linux secrets-store container image | `limits: 200m CPU, 200Mi; requests: 50m CPU, 100Mi` | | `linux.enabled` | Install secrets store csi driver on linux nodes | true | @@ -76,7 +76,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.0.0-rc.1` | +| `windows.image.tag` | Windows image tag | `v1.0.0` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | diff --git a/charts/secrets-store-csi-driver/templates/crds-upgrade-hook.yaml b/charts/secrets-store-csi-driver/templates/crds-upgrade-hook.yaml index 10a1c64ab..c040104dc 100644 --- a/charts/secrets-store-csi-driver/templates/crds-upgrade-hook.yaml +++ b/charts/secrets-store-csi-driver/templates/crds-upgrade-hook.yaml @@ -91,6 +91,10 @@ spec: {{- end }} spec: serviceAccountName: {{ template "sscd.fullname" . }}-upgrade-crds + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 6 }} + {{- end }} restartPolicy: Never containers: - name: crds-upgrade diff --git a/charts/secrets-store-csi-driver/templates/keep-crds-upgrade-hook.yaml b/charts/secrets-store-csi-driver/templates/keep-crds-upgrade-hook.yaml index aed037e47..ba23d918b 100644 --- a/charts/secrets-store-csi-driver/templates/keep-crds-upgrade-hook.yaml +++ b/charts/secrets-store-csi-driver/templates/keep-crds-upgrade-hook.yaml @@ -89,6 +89,10 @@ spec: {{- end }} spec: serviceAccountName: {{ template "sscd.fullname" . }}-keep-crds + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 6 }} + {{- end }} restartPolicy: Never containers: - name: crds-keep diff --git a/charts/secrets-store-csi-driver/values.yaml b/charts/secrets-store-csi-driver/values.yaml index 34adc525e..e7fa266da 100644 --- a/charts/secrets-store-csi-driver/values.yaml +++ b/charts/secrets-store-csi-driver/values.yaml @@ -2,13 +2,13 @@ linux: enabled: true image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.0.0-rc.1 + tag: v1.0.0 pullPolicy: IfNotPresent crds: image: repository: k8s.gcr.io/csi-secrets-store/driver-crds - tag: v1.0.0-rc.1 + tag: v1.0.0 pullPolicy: IfNotPresent annotations: {} @@ -93,7 +93,7 @@ windows: enabled: false image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.0.0-rc.1 + tag: v1.0.0 pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes diff --git a/deploy/secrets-store-csi-driver-windows.yaml b/deploy/secrets-store-csi-driver-windows.yaml index 25a7deeef..6a0176285 100644 --- a/deploy/secrets-store-csi-driver-windows.yaml +++ b/deploy/secrets-store-csi-driver-windows.yaml @@ -50,7 +50,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0-rc.1 + image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/deploy/secrets-store-csi-driver.yaml b/deploy/secrets-store-csi-driver.yaml index cd9895bfd..8efd61f48 100644 --- a/deploy/secrets-store-csi-driver.yaml +++ b/deploy/secrets-store-csi-driver.yaml @@ -50,7 +50,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0-rc.1 + image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml index 19ed772f3..88c8ab696 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.0.0-rc.1 -appVersion: 1.0.0-rc.1 +version: 1.0.0 +appVersion: 1.0.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/manifest_staging/charts/secrets-store-csi-driver/README.md b/manifest_staging/charts/secrets-store-csi-driver/README.md index 740f73c69..8d816930e 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/README.md +++ b/manifest_staging/charts/secrets-store-csi-driver/README.md @@ -47,7 +47,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.0.0-rc.1` | +| `linux.image.tag` | Linux image tag | `v1.0.0` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `linux.driver.resources` | The resource request/limits for the linux secrets-store container image | `limits: 200m CPU, 200Mi; requests: 50m CPU, 100Mi` | | `linux.enabled` | Install secrets store csi driver on linux nodes | true | @@ -76,7 +76,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.0.0-rc.1` | +| `windows.image.tag` | Windows image tag | `v1.0.0` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | diff --git a/manifest_staging/charts/secrets-store-csi-driver/values.yaml b/manifest_staging/charts/secrets-store-csi-driver/values.yaml index 34adc525e..e7fa266da 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/values.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/values.yaml @@ -2,13 +2,13 @@ linux: enabled: true image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.0.0-rc.1 + tag: v1.0.0 pullPolicy: IfNotPresent crds: image: repository: k8s.gcr.io/csi-secrets-store/driver-crds - tag: v1.0.0-rc.1 + tag: v1.0.0 pullPolicy: IfNotPresent annotations: {} @@ -93,7 +93,7 @@ windows: enabled: false image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.0.0-rc.1 + tag: v1.0.0 pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes diff --git a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml index 25a7deeef..6a0176285 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml @@ -50,7 +50,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0-rc.1 + image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/deploy/secrets-store-csi-driver.yaml b/manifest_staging/deploy/secrets-store-csi-driver.yaml index cd9895bfd..8efd61f48 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver.yaml @@ -50,7 +50,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0-rc.1 + image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)"