From 67ab934e3176f165610fb9d4e6525f6b2e0f7647 Mon Sep 17 00:00:00 2001 From: Anish Ramasekar Date: Wed, 2 Mar 2022 12:56:49 -0800 Subject: [PATCH] release: update manifest and helm charts for v1.1.0 (#817) Signed-off-by: Anish Ramasekar --- Makefile | 2 +- charts/csi-secrets-store-provider-azure/Chart.yaml | 4 ++-- charts/csi-secrets-store-provider-azure/README.md | 5 +++-- charts/csi-secrets-store-provider-azure/values.yaml | 4 ++-- deployment/provider-azure-installer-windows.yaml | 2 +- deployment/provider-azure-installer.yaml | 2 +- .../charts/csi-secrets-store-provider-azure/Chart.yaml | 4 ++-- .../charts/csi-secrets-store-provider-azure/README.md | 5 +++-- .../charts/csi-secrets-store-provider-azure/values.yaml | 4 ++-- .../deployment/provider-azure-installer-windows.yaml | 2 +- manifest_staging/deployment/provider-azure-installer.yaml | 2 +- 11 files changed, 19 insertions(+), 17 deletions(-) diff --git a/Makefile b/Makefile index 81aba49d1..e6baa2b58 100644 --- a/Makefile +++ b/Makefile @@ -8,7 +8,7 @@ REPO_PATH="$(ORG_PATH)/$(PROJECT_NAME)" REGISTRY_NAME ?= upstreamk8sci REPO_PREFIX ?= k8s/csi/secrets-store REGISTRY ?= $(REGISTRY_NAME).azurecr.io/$(REPO_PREFIX) -IMAGE_VERSION ?= v1.1.0-rc.0 +IMAGE_VERSION ?= v1.1.0 IMAGE_NAME ?= provider-azure CONFORMANCE_IMAGE_NAME ?= provider-azure-arc-conformance IMAGE_TAG := $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION) diff --git a/charts/csi-secrets-store-provider-azure/Chart.yaml b/charts/csi-secrets-store-provider-azure/Chart.yaml index e337231b1..46535fcc1 100644 --- a/charts/csi-secrets-store-provider-azure/Chart.yaml +++ b/charts/csi-secrets-store-provider-azure/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: csi-secrets-store-provider-azure -version: 1.1.0-rc.0 -appVersion: 1.1.0-rc.0 +version: 1.1.0 +appVersion: 1.1.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster. sources: diff --git a/charts/csi-secrets-store-provider-azure/README.md b/charts/csi-secrets-store-provider-azure/README.md index 2802d2fd2..d1e6e91bd 100644 --- a/charts/csi-secrets-store-provider-azure/README.md +++ b/charts/csi-secrets-store-provider-azure/README.md @@ -29,6 +29,7 @@ Azure Key Vault provider for Secrets Store CSI driver allows you to get secret c | `1.0.0` | `1.0.0` | `1.0.0` | | `1.0.1` | `1.0.1` | `1.0.1` | | `1.1.0-rc.0` | `1.1.0` | `1.1.0-rc.0` | +| `1.1.0` | `1.1.0` | `1.1.0` | ## Installation @@ -76,7 +77,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.enabled` | Install azure keyvault provider on linux nodes | true | | `linux.image.repository` | Linux image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0-rc.0` | +| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0` | | `linux.nodeSelector` | Node Selector for the daemonset on linux nodes | `{}` | | `linux.tolerations` | Tolerations for the daemonset on linux nodes | `{}` | | `linux.resources` | Resource limit for provider pods on linux nodes | `requests.cpu: 50m`
`requests.memory: 100Mi`
`limits.cpu: 50m`
`limits.memory: 100Mi` | @@ -97,7 +98,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.enabled` | Install azure keyvault provider on windows nodes | false | | `windows.image.repository` | Windows image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0-rc.0` | +| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0` | | `windows.nodeSelector` | Node Selector for the daemonset on windows nodes | `{}` | | `windows.tolerations` | Tolerations for the daemonset on windows nodes | `{}` | | `windows.resources` | Resource limit for provider pods on windows nodes | `requests.cpu: 100m`
`requests.memory: 200Mi`
`limits.cpu: 100m`
`limits.memory: 200Mi` | diff --git a/charts/csi-secrets-store-provider-azure/values.yaml b/charts/csi-secrets-store-provider-azure/values.yaml index 6be315a44..027a2fe91 100644 --- a/charts/csi-secrets-store-provider-azure/values.yaml +++ b/charts/csi-secrets-store-provider-azure/values.yaml @@ -24,7 +24,7 @@ logVerbosity: 0 linux: image: repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] @@ -67,7 +67,7 @@ linux: windows: image: repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] diff --git a/deployment/provider-azure-installer-windows.yaml b/deployment/provider-azure-installer-windows.yaml index c30981009..75a23aefc 100644 --- a/deployment/provider-azure-installer-windows.yaml +++ b/deployment/provider-azure-installer-windows.yaml @@ -23,7 +23,7 @@ spec: serviceAccountName: csi-secrets-store-provider-azure containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0 imagePullPolicy: IfNotPresent args: - --endpoint=unix://C:\\provider\\azure.sock diff --git a/deployment/provider-azure-installer.yaml b/deployment/provider-azure-installer.yaml index e2c02eb3d..50f40eb0c 100644 --- a/deployment/provider-azure-installer.yaml +++ b/deployment/provider-azure-installer.yaml @@ -24,7 +24,7 @@ spec: hostNetwork: true containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0 imagePullPolicy: IfNotPresent args: - --endpoint=unix:///provider/azure.sock diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml index e337231b1..46535fcc1 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: csi-secrets-store-provider-azure -version: 1.1.0-rc.0 -appVersion: 1.1.0-rc.0 +version: 1.1.0 +appVersion: 1.1.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster. sources: diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/README.md b/manifest_staging/charts/csi-secrets-store-provider-azure/README.md index 2802d2fd2..d1e6e91bd 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/README.md +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/README.md @@ -29,6 +29,7 @@ Azure Key Vault provider for Secrets Store CSI driver allows you to get secret c | `1.0.0` | `1.0.0` | `1.0.0` | | `1.0.1` | `1.0.1` | `1.0.1` | | `1.1.0-rc.0` | `1.1.0` | `1.1.0-rc.0` | +| `1.1.0` | `1.1.0` | `1.1.0` | ## Installation @@ -76,7 +77,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.enabled` | Install azure keyvault provider on linux nodes | true | | `linux.image.repository` | Linux image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0-rc.0` | +| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `v1.1.0` | | `linux.nodeSelector` | Node Selector for the daemonset on linux nodes | `{}` | | `linux.tolerations` | Tolerations for the daemonset on linux nodes | `{}` | | `linux.resources` | Resource limit for provider pods on linux nodes | `requests.cpu: 50m`
`requests.memory: 100Mi`
`limits.cpu: 50m`
`limits.memory: 100Mi` | @@ -97,7 +98,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.enabled` | Install azure keyvault provider on windows nodes | false | | `windows.image.repository` | Windows image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0-rc.0` | +| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `v1.1.0` | | `windows.nodeSelector` | Node Selector for the daemonset on windows nodes | `{}` | | `windows.tolerations` | Tolerations for the daemonset on windows nodes | `{}` | | `windows.resources` | Resource limit for provider pods on windows nodes | `requests.cpu: 100m`
`requests.memory: 200Mi`
`limits.cpu: 100m`
`limits.memory: 200Mi` | diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml index 6be315a44..027a2fe91 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml @@ -24,7 +24,7 @@ logVerbosity: 0 linux: image: repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] @@ -67,7 +67,7 @@ linux: windows: image: repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] diff --git a/manifest_staging/deployment/provider-azure-installer-windows.yaml b/manifest_staging/deployment/provider-azure-installer-windows.yaml index c30981009..75a23aefc 100644 --- a/manifest_staging/deployment/provider-azure-installer-windows.yaml +++ b/manifest_staging/deployment/provider-azure-installer-windows.yaml @@ -23,7 +23,7 @@ spec: serviceAccountName: csi-secrets-store-provider-azure containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0 imagePullPolicy: IfNotPresent args: - --endpoint=unix://C:\\provider\\azure.sock diff --git a/manifest_staging/deployment/provider-azure-installer.yaml b/manifest_staging/deployment/provider-azure-installer.yaml index e2c02eb3d..50f40eb0c 100644 --- a/manifest_staging/deployment/provider-azure-installer.yaml +++ b/manifest_staging/deployment/provider-azure-installer.yaml @@ -24,7 +24,7 @@ spec: hostNetwork: true containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0-rc.0 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.1.0 imagePullPolicy: IfNotPresent args: - --endpoint=unix:///provider/azure.sock