diff --git a/Makefile b/Makefile
index 81aba49d1..e6baa2b58 100644
--- a/Makefile
+++ b/Makefile
@@ -8,7 +8,7 @@ REPO_PATH="$(ORG_PATH)/$(PROJECT_NAME)"
REGISTRY_NAME ?= upstreamk8sci
REPO_PREFIX ?= k8s/csi/secrets-store
REGISTRY ?= $(REGISTRY_NAME).azurecr.io/$(REPO_PREFIX)
-IMAGE_VERSION ?= v1.1.0-rc.0
+IMAGE_VERSION ?= v1.1.0
IMAGE_NAME ?= provider-azure
CONFORMANCE_IMAGE_NAME ?= provider-azure-arc-conformance
IMAGE_TAG := $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION)
diff --git a/charts/csi-secrets-store-provider-azure/Chart.yaml b/charts/csi-secrets-store-provider-azure/Chart.yaml
index e337231b1..46535fcc1 100644
--- a/charts/csi-secrets-store-provider-azure/Chart.yaml
+++ b/charts/csi-secrets-store-provider-azure/Chart.yaml
@@ -1,7 +1,7 @@
apiVersion: v2
name: csi-secrets-store-provider-azure
-version: 1.1.0-rc.0
-appVersion: 1.1.0-rc.0
+version: 1.1.0
+appVersion: 1.1.0
kubeVersion: ">=1.16.0-0"
description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster.
sources:
diff --git a/charts/csi-secrets-store-provider-azure/README.md b/charts/csi-secrets-store-provider-azure/README.md
index 2802d2fd2..d1e6e91bd 100644
--- a/charts/csi-secrets-store-provider-azure/README.md
+++ b/charts/csi-secrets-store-provider-azure/README.md
@@ -29,6 +29,7 @@ Azure Key Vault provider for Secrets Store CSI driver allows you to get secret c
| `1.0.0` | `1.0.0` | `1.0.0` |
| `1.0.1` | `1.0.1` | `1.0.1` |
| `1.1.0-rc.0` | `1.1.0` | `1.1.0-rc.0` |
+| `1.1.0` | `1.1.0` | `1.1.0` |
## Installation
@@ -76,7 +77,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p
| `linux.enabled` | Install azure keyvault provider on linux nodes | true |
| `linux.image.repository` | Linux image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` |
| `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` |
-| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0-rc.0` |
+| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0` |
| `linux.nodeSelector` | Node Selector for the daemonset on linux nodes | `{}` |
| `linux.tolerations` | Tolerations for the daemonset on linux nodes | `{}` |
| `linux.resources` | Resource limit for provider pods on linux nodes | `requests.cpu: 50m`
`requests.memory: 100Mi`
`limits.cpu: 50m`
`limits.memory: 100Mi` |
@@ -97,7 +98,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p
| `windows.enabled` | Install azure keyvault provider on windows nodes | false |
| `windows.image.repository` | Windows image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` |
| `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` |
-| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0-rc.0` |
+| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0` |
| `windows.nodeSelector` | Node Selector for the daemonset on windows nodes | `{}` |
| `windows.tolerations` | Tolerations for the daemonset on windows nodes | `{}` |
| `windows.resources` | Resource limit for provider pods on windows nodes | `requests.cpu: 100m`
`requests.memory: 200Mi`
`limits.cpu: 100m`
`limits.memory: 200Mi` |
diff --git a/charts/csi-secrets-store-provider-azure/values.yaml b/charts/csi-secrets-store-provider-azure/values.yaml
index 6be315a44..027a2fe91 100644
--- a/charts/csi-secrets-store-provider-azure/values.yaml
+++ b/charts/csi-secrets-store-provider-azure/values.yaml
@@ -24,7 +24,7 @@ logVerbosity: 0
linux:
image:
repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure
- tag: v1.1.0-rc.0
+ tag: v1.1.0
pullPolicy: IfNotPresent
nodeSelector: {}
tolerations: []
@@ -67,7 +67,7 @@ linux:
windows:
image:
repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure
- tag: v1.1.0-rc.0
+ tag: v1.1.0
pullPolicy: IfNotPresent
nodeSelector: {}
tolerations: []
diff --git a/deployment/provider-azure-installer-windows.yaml b/deployment/provider-azure-installer-windows.yaml
index c30981009..75a23aefc 100644
--- a/deployment/provider-azure-installer-windows.yaml
+++ b/deployment/provider-azure-installer-windows.yaml
@@ -23,7 +23,7 @@ spec:
serviceAccountName: csi-secrets-store-provider-azure
containers:
- name: provider-azure-installer
- image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0
+ image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0
imagePullPolicy: IfNotPresent
args:
- --endpoint=unix://C:\\provider\\azure.sock
diff --git a/deployment/provider-azure-installer.yaml b/deployment/provider-azure-installer.yaml
index e2c02eb3d..50f40eb0c 100644
--- a/deployment/provider-azure-installer.yaml
+++ b/deployment/provider-azure-installer.yaml
@@ -24,7 +24,7 @@ spec:
hostNetwork: true
containers:
- name: provider-azure-installer
- image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0
+ image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0
imagePullPolicy: IfNotPresent
args:
- --endpoint=unix:///provider/azure.sock
diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml
index e337231b1..46535fcc1 100644
--- a/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml
+++ b/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml
@@ -1,7 +1,7 @@
apiVersion: v2
name: csi-secrets-store-provider-azure
-version: 1.1.0-rc.0
-appVersion: 1.1.0-rc.0
+version: 1.1.0
+appVersion: 1.1.0
kubeVersion: ">=1.16.0-0"
description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster.
sources:
diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/README.md b/manifest_staging/charts/csi-secrets-store-provider-azure/README.md
index 2802d2fd2..d1e6e91bd 100644
--- a/manifest_staging/charts/csi-secrets-store-provider-azure/README.md
+++ b/manifest_staging/charts/csi-secrets-store-provider-azure/README.md
@@ -29,6 +29,7 @@ Azure Key Vault provider for Secrets Store CSI driver allows you to get secret c
| `1.0.0` | `1.0.0` | `1.0.0` |
| `1.0.1` | `1.0.1` | `1.0.1` |
| `1.1.0-rc.0` | `1.1.0` | `1.1.0-rc.0` |
+| `1.1.0` | `1.1.0` | `1.1.0` |
## Installation
@@ -76,7 +77,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p
| `linux.enabled` | Install azure keyvault provider on linux nodes | true |
| `linux.image.repository` | Linux image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` |
| `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` |
-| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0-rc.0` |
+| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0` |
| `linux.nodeSelector` | Node Selector for the daemonset on linux nodes | `{}` |
| `linux.tolerations` | Tolerations for the daemonset on linux nodes | `{}` |
| `linux.resources` | Resource limit for provider pods on linux nodes | `requests.cpu: 50m`
`requests.memory: 100Mi`
`limits.cpu: 50m`
`limits.memory: 100Mi` |
@@ -97,7 +98,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p
| `windows.enabled` | Install azure keyvault provider on windows nodes | false |
| `windows.image.repository` | Windows image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` |
| `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` |
-| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0-rc.0` |
+| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0` |
| `windows.nodeSelector` | Node Selector for the daemonset on windows nodes | `{}` |
| `windows.tolerations` | Tolerations for the daemonset on windows nodes | `{}` |
| `windows.resources` | Resource limit for provider pods on windows nodes | `requests.cpu: 100m`
`requests.memory: 200Mi`
`limits.cpu: 100m`
`limits.memory: 200Mi` |
diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml
index 6be315a44..027a2fe91 100644
--- a/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml
+++ b/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml
@@ -24,7 +24,7 @@ logVerbosity: 0
linux:
image:
repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure
- tag: v1.1.0-rc.0
+ tag: v1.1.0
pullPolicy: IfNotPresent
nodeSelector: {}
tolerations: []
@@ -67,7 +67,7 @@ linux:
windows:
image:
repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure
- tag: v1.1.0-rc.0
+ tag: v1.1.0
pullPolicy: IfNotPresent
nodeSelector: {}
tolerations: []
diff --git a/manifest_staging/deployment/provider-azure-installer-windows.yaml b/manifest_staging/deployment/provider-azure-installer-windows.yaml
index c30981009..75a23aefc 100644
--- a/manifest_staging/deployment/provider-azure-installer-windows.yaml
+++ b/manifest_staging/deployment/provider-azure-installer-windows.yaml
@@ -23,7 +23,7 @@ spec:
serviceAccountName: csi-secrets-store-provider-azure
containers:
- name: provider-azure-installer
- image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0
+ image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0
imagePullPolicy: IfNotPresent
args:
- --endpoint=unix://C:\\provider\\azure.sock
diff --git a/manifest_staging/deployment/provider-azure-installer.yaml b/manifest_staging/deployment/provider-azure-installer.yaml
index e2c02eb3d..50f40eb0c 100644
--- a/manifest_staging/deployment/provider-azure-installer.yaml
+++ b/manifest_staging/deployment/provider-azure-installer.yaml
@@ -24,7 +24,7 @@ spec:
hostNetwork: true
containers:
- name: provider-azure-installer
- image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0
+ image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0
imagePullPolicy: IfNotPresent
args:
- --endpoint=unix:///provider/azure.sock