From a7fbc6ff41d1900653ca21b47aa305e0e880ef48 Mon Sep 17 00:00:00 2001 From: Anish Ramasekar Date: Fri, 19 Feb 2021 11:09:20 -0800 Subject: [PATCH] release: update manifest and helm charts for 0.0.13 (#409) Signed-off-by: Anish Ramasekar --- ...si-secrets-store-provider-azure-0.0.17.tgz | Bin 0 -> 11549 bytes .../Chart.yaml | 4 +-- .../README.md | 25 +++++++++++----- .../requirements.lock | 6 ++-- .../requirements.yaml | 2 +- .../provider-azure-installer-windows.yaml | 10 +++++-- .../templates/provider-azure-installer.yaml | 14 +++++++-- .../values.yaml | 28 ++++++++++++++---- charts/index.yaml | 23 +++++++++++++- .../provider-azure-installer-windows.yaml | 2 +- deployment/provider-azure-installer.yaml | 2 +- .../Chart.yaml | 4 +-- .../README.md | 9 +++--- .../requirements.lock | 6 ++-- .../requirements.yaml | 2 +- .../values.yaml | 8 ++--- .../provider-azure-installer-windows.yaml | 2 +- .../deployment/provider-azure-installer.yaml | 2 +- test/e2e/framework/config.go | 2 +- 19 files changed, 109 insertions(+), 42 deletions(-) create mode 100644 charts/csi-secrets-store-provider-azure-0.0.17.tgz diff --git a/charts/csi-secrets-store-provider-azure-0.0.17.tgz b/charts/csi-secrets-store-provider-azure-0.0.17.tgz new file mode 100644 index 0000000000000000000000000000000000000000..dabeb9e21f488f3c0a5a4e1e948d382f8838f1ae GIT binary patch literal 11549 zcmV+&E#lH2iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBvciT9U`25XJQBR(Eon)H2d`A7ty!F`Loowgu+UcIRzc?>~ zNJzqjB-jL`L=)w^?*qV_;GxrTxA8}}L*c3ds!#_|WiethYz3GzlW`hg(+}vJ*f=oJ zzh?pNTuf2G+Y976e_FS6yWQ@|(UJUrx7*GCzkAv{{!{O$+dDkz_YaRx|J3cB9v}Ap z1l_eqT%pVuN5P-E8;_L-?tv8KlV5Sb2=xXq?-|JV<9~MB-FENLurad&;&b`!9R7hF z7c8+UfKwnI=#|$iI#yAez#+15v08`F=Ht2LFgimLqwng2J?5&gCyJ9!na?sp1Ha^Wp zIEL(pzrEz$eCfb5d)~9|KrpCNuK^sPfs4{ ze;?%l-d|o_-&|dszq`8p05gWcA>Qmuo49C#CFy=9o=rcq@Qa{$jO?}{|2Z%K0_;;p zI1Ls9XtfLgjwaz>{>*W%sY5LFlW_oVJq$DeSFnh1-w8f4!eVF}K2NbHTM=&pas;LZ zx}G^s$Y2KW{)2Ga@_5r=;<>KO-ciN})v z5C$B7;cdgAlmC=8{`>arn*ofG!=mQk;5l~M@C(BXeidIBJo)6%$y3qlR~(E4=!*e# z4MXBhASA|27B{XHv|VBal+iJl)J_@epd!V0a%3(#k~j@HviNrzvoFVQD8CLc!yXsx ziQ4!UJJ{kh7{J$WVnwKf10-0u!X5zj(8$5|0C+INauH+3q~`tG3^N}73&8Sc132!w z;XhsMN|1Wp?rS2yIm9K6tNYY`g+|z6;q?4~(17s8g@YJ-BUe>!pP6qXj&FH@IG!w2 z=X~Mg0o+izMShVL)Qr<#qItOJ%P$_9BjN~X2hdZ4&54620(iC500;1L3?bI-ALU^+ zV>mdUV2=aif!IW!iQ|ZUihLh?HnzpKr>L`5qh**&-o72&kWj_P#_d!%2rr7G&*>z?`^_s_urTu^UJCNs5A zpiXkxrI=uukO4N96ZEV_TXYiOu~z>26box6BNJ9Cv~+lYamPhMoa;!zv7+wH)%oS? ztF~(!2M0!3ElCne@QnFa%zTTi4M0rQ!Tg3&eo2A>bml1NIAqibe=yXB;sLSPxormn zXbsM~XWf?kAw_*n=r4sAi;)~5DgeU1Bni$14fea?rwS?*W6N_61ur+6kwBy%=}4%I zyUk3i-|n>=&B`Hj>|w^P13JQ+%`EE57hUCM)32Y60gz&v8kSVt2^WLAISTF^GP--* z3%|3yFbRC?cINvu;Mk6oO*Vk&3{=}gNsKp?BcOMYywo09({!JeXNr@?#%My_$GHJo$kJ zHVy`Gdv){c)y`^ zQ#^oYop0X^QOmgc;zyPop?Luv%fIE3-ZsK|rl1MpVQ4XC**#Ky1`B;#3dawz{K?(J+mCSRasCY@o=mVc}1T?80$3@9FBJae1{ z{5C@l853*^!AnlOZTu6f-er9*#t=X-7-0(u4VY0Er;Sk(+%dt9%>V^hNv4qmM;JUA zEhH)~-`tA2LfT_Kww|_)mtzR9gAogHW>INtVxa|1ej_}V4W$l@7$7 z{j=>o3gw3v1?+&Cw#)>NY$$${H#YhiDS<;T&PLOPj{VK{=q>2fQ~I7;LktlHM~N zhESWym#F`xIPx82VQBre1+9-QIbwRn?wj>JmetPx>A41{Gi;yU~9(P1}t z{-5^xkM`fal#uyHheNcKq3ZPQn~`=9A>U`6dC&MnJbM6_2)op~#oTZ)M>gVU5IaY7 zEG0Rw1Y3!AP1uC_$WrYx994b>$*_TVmNT=947&|WAfAmq4t-Ho9K8dLrAN$({x5Q! z0<_thNq0wz{jtdQrF28Yt?8@yfDok_7ma=$L@H*8vu2>3Kyp;)=O5d?qBL8W#1c)#wN^Z!!F+OS%s>W$Ey$0ch)-iZzNk_TKK%`xrE9L4OJMlVL3Rvwfq3za_VP40^lzRD@uw*T^D(F z@dtqSns1`CEZ1)RSoUMbD*w&K4s^y)w$HTM(_ zzyew3INF>#xkDI-P#gY z7lXS`cSV;*)Dz1zQ68yF5=g;g@itJ_jlw)i7pi6^Iit5+u)DBo#@!b;&nlOc4I*26 znNX7MrbaHwR4o@x#GjuDpBCDuyphS;rCpS1!pq4Vx&HrX%IOyLzuLP&HTvI4_cX8n z9UmQ@KI(t_D0#_9-u>CV_IICJpMvqB>U?VUbsAs3)*nUR6UW{g%swxLbH`4&)lcDpd{e92cpIY%vb-zZv+=u38LMw1Vw;5X*Z4B8YzN3)s zM>k|NAiQsNM#Sq(0^j;L#mM2)kMeFp>qlsr$hLzja%g?XbW1$K334v6gBG{gqMpqL zaF{_=>LSJWG|A(pimlov4b)ow`4(T&%vNUDnn@*&dK`b@`Hhs^>`d`~DBF+QQmA8G zZlp`+FQs*aPPQE#I>zaG8gyCn{p!!H4(3+smXPKWVXRBHwxcMwv}@8@QBRiW(~EHp zbYxA%6*Oek`cXfAEG1;H#Gr-zUF|2~RPL=&zQjF8oi z-t^_v|5)?C&8TM@^}m6xwq@o2>(_`!-8ViTTB)V~_(uNvV^q`saj)0!=imQzPafa@ z?xh^mQ>zib+l61H1tET^GNys%)o=KW1UU}<%wR!hz$r{H4_}-}Ta0|%B1f}Ag_Sx#)OB957gp;0NY{DAay20ZLyLjvW5sec*{y~a1JTC{pquPgLyLj% zW51sKD|c)9@r_hn4dZ`i#QFr{5Ld@WFte1Ro4j-6GhZ@uEAt$Zj?14wirVtVzybbkMi}9k8HNe(#gB&{o zZHj77RhJ=%Vjuy6JYhu7@1`VrIuN#Evcmf^NRmmc@pAKN9J!+m7ZHxbr)IAl}o zI7WEq-lu?UyH>=ApO*&cb6ZVx#&8e{3abak$i6mJlZmvNT7kEAvZgt~9u5%4rch%9 z&}!8(&utCk-4w%^3MojgBN{mv9KyI-vUoF!&prx}i#ZNh{HmsI7HSuS3q*q0y%Wak zFpR&!4Ibk_$VBgLYHhR=)_cSIRPK)&Kuc*bd{<;F;W}zm${1?O5-yVL0QHz zCw4c4R$yGMG>{#4TJ|u$I-k-{pel~|a%97;dehIT*wLII$5{Z49#z%RZhRLaxjZ0^ zwkQe}@I<}`^8@)1Us6f>5!q95RJK~{One0p1)idLu8XTQp44l+?cu1|`1`?A-o?K< zp5$BU)FWwl|Lj>3m*?5D4>AM|4E0wEhVmR3mfbra#zA{Z$KNNOlFJ6`;z{%XzPhi_ z08!}yHHb?8T#cyx;)$clnqw`?L#;{tHNcr1T!Sq6y=FV@7f-3{MQiYqZo;-I zbc{q*eAfBYX1hhz5{7ZOz$i55@c)g1za^hDAv)D>D*j@wLHIFSJ&ULK)xkRa$+n5u zO-OL?IEu@@%6|7#;X-BOk%jzZ6AN*yY{|s+X`meDbPNctsSN>k5GQl#6Q_KN1M!uW zs%)zPu_ygb_flt-VVAK<9s>%aWQGrffJHBVcF4AtFw6uMRVJ)nE`;bth|KP%@cQ%W zdhnH}%=5{$Yge3r0yj!Dc=jyD&$DNnOjtkue)PLsbdxpsQv@p7yP|>`QOam=IT-XPMrT#ow+pmwo9iy7%y_ zop%lNmYwpa{m4(6cmFGm+CXpFA(r-!r*$=#W_ru+P*u=ddfigRrLR|9k`_75Mb*#Z zXJj^B9E8eB9b%b$+fwy zmVNmVO7Yat5z_!qJGMW47kJ7B|JR@^O?QH{!Uhmf%E2aU-#=>%1Pt>pPPfgin&2sw z{Xjqb65dTQAlnWwQ=D8ifhaNrjEHATuli2P5{5D-!>;WGHF&C3kC)NQk9%_CmFmF_ z@=`QC(i`KcLOs^vX^+bAzVzTmc&bp3wRqZ{yG}Fya9($ff72lv;3=E?L_>f%JZTf0 z?2;Or(p_oxm3s89fu|w?u7IbVP~&$(cR4&232+5G?SvWy-N_t0JGMX7;HjA1Cr5iZ zJVo_Q8G>dH$6r&r%j6bX@oK<&c*@dV6Flwm`1?-iPJ^c`?KQ#EE{{J&cm4aLyM_*{ zX8PSO?R5L`OV#43M#K9K^t)p0-RlRkPNA7v5tH zBaKBloMDU+7fRpyC};-6p6;=h;z^gZT8pRK9D;o6I4X|X964Y|F>-bV1PuG`9`0eJ z!&$EPp0g&=_YNkW9e+Q5^Fn<2mG3`YZ8NX=>Oky??s7rz*SJ4^5#HrtH~<-0AGivU zB>#sT`Q$#nRvuk)+Zqu2xc_wD5iK9fDy23YmJDqcU>AFwwH<1GT78VV_|Hd2C%O2~ zy?(d<82@!2#g;LKuxAm>21XPuzf8a|Af??68iZ|Y9AGRPu?-;3Uass>hD|1z@d2K~sBdMBqxWBmN+xji0@k58W;pPlr(BRoFCN8RH?+j@R-a)OS=r`^%1)yL!h2|hkO zK78Ik8uw1@?(>lmg>bV6(CT;lJ+s?4duQ)@XM@AzLBHERJvu%+Ix@RwgKoF=JLYMt z(SP%p@99z>|Gh~6y~p^^dnpfv{$&a;b;rJZdXcREJEqrdm-=v+HPIerY|?7RP)GkK z{nLE@$CH!C{Qr9?xeO1;_kYcwyh-TH0i35orwg4WimIB5&t3?7PCQ0z3@9Cn-EwAv z-rEMTM7NcpNz;Fh96E}4g+nJ){-^DG6GK#rr~bp=Ui8|%lXlna{$RL>B+36wz%C-r z00P3%zo-9^u_ebDEN%!#@c*aCn;10=G0uQxRs&JZ{){}k+uQnYO#flL*(wH5L;uI8 zr+NB6={@Fu-A|D>u?7Y}c*Q8roTgG<%3M+DBmdJGYfr48O=vMtawirN063ZqU>+ad z0DdY_<+<}2Etp|IXrqpXiHS+s64Z;mB(;`&(AV#F-S|u9F<&q+p`;~*b~{^M1^D^w zHV$>n7M?}CNgFPNeuL%XXwf03;Vo`7<~UG{w0C5P>Z)l`N)*lBCy}H-z-!_WcjgxI zSuuD*eH9ql;BcifIxM8P$Ap_UJ0pRwe9skmMA-VsL(ZBoh z--kxnLo};sQUeLV7Oz$q`uiLMm{|T#Ql0uqI`)2&12?;?VCe2X#Jld`prI?@&|M7} z7@O;VNq*2bZ{JS7@ItHg;1z5}hh0sT&FAuO-bof!_l?rj`VvmQ(q!Q~{reS*zW}q$7 z|HmnId>pVg_p_#;8v5^_baV87D847NX?~SD?k3;sHGC z$o#sUXU5eRKgtIt6SG8_s#Kn)u$~Dv9uqH1j%Munoxf<+R(zKe6gv*5_gj0Rn>& zw$My42kPRqty%&*CfKnVpdbu|r8uDsEc0ZvkchZ^b1Ui!f@VIpp0{x^5Jatc#X2-B}~L(Ig+E6WSmS)^^)PfalP!<+`Ks-K%)?b+U7uL%4rp8@m*^67?mLtzbK^%Qc2x?&-x=?j1L1vUyT6CrU7NRcl z{dP8)f0UJW0ImEHCC?jO8y9(Kf^BoO$h8WyXqPrreuq}|38!lqyAtGZY7?BtZk?o= z%)DLNw*e5PEtH!z(_IL$nS4o7+XmQo#BtsFYYSQ*TXMYOTHRni3)FQ$H@7jtAIjs~&+G_zaU79$}w7~)`5#u59aH>PjB*L3Fb*y)70 zkUDNc(?z7^RuJ?_V}b@afOFec`NmVHyXZtkiHiN;Nk!|VJ0btdD{S(Q)lMlS7eN>h2`Ma)W&Q827oD>$QH)euaXbk4;$Db z{Rh;+CR=!xs+(|uI{H64?dIsecY5?F|L>)I{VGT+k`EJOUlejeY)iv5O(V@HGHef99usBwS1$7{(Fa~y}bSZ_~h~a_g+et{?iX8@Au@l9K;xAtDpRMj=hS5Umfm^ zdh)5A>!%T9WW3Bvme3aM!`VU_IdmyEn|Lh9w~1XM*~RL|$|)B_7K*eESw{ujVvF zJj=q?T_qcBQc8Wh8D`oG9^nspEleFQ0g&bM!|m77I3 zAq{m6lUvhQv42sNCT_U=_0RH2W^3lA2k{``Y*K3mP=dGYtxDC6oOc>)(Y@91Do@TG z8Cum%hfbIo`k8T%y`I^}Z;>n*`c&nGn(F|}wP z$iFj(%bU8BMcxdi$-A`($djO_H9sKpQB0WM2-pyCaD>! zS(@hjMO9zz^kv&*V@1tdrbI^=g7(GCBVPuc&c)#F&SFIVr_HGKsZ|&?yt^FZMC=;V zM|`TAP4*5neEW9iJF^M#*j<5p$3vz@#NIp&cC<7<|MK^%k8j>yUVVIX{`x92LwU3H zKLhG!(FN*yNhtGVOYVVY{%6_n8u95s?lze^P;9RJR=7^xcCTOK(rs|4DYN8hdflY1m%(B&WlCCUCPrC8Sw_L1OW`Rnnn<+MwaExAGL)z&{ zXIWVe@p>A}2No_NJ<^!savZIiy0WxcRaXPGezfF9yk4zUcI@ze*5yxyQg`c&@$yy8DhWq^OG!T>Z-;*1QdH6OspFW@ z>w`2%C0#WFNo{fUYDmfiy2Cv6swmfQ?wl??DX=%!Av1L%M8aOLo2{swcXT|Yxl>UZ z7(khD^E(kO^0DEwNMhKU$){e_I#XF<6=6Y0QHj2u4wckVYopqyIN8Nj=X>(p<>E09)z_oF1g;=&FUP`VD3& zcZ)*AZdnN479mD>$cBJ!CQVm{EiVzR^`WVACr1|!%#K9w1Y@(+}g7Mi!qnoU#e zUR(urM?2F5K3fG=`(K&{uXEtT@l~`~AF_QazQ-L;j43H!JE6=xs;H646F&kJ<@-~Y3Wy_M3puUotTTIc`kpXBdgh_!uw70tgFkDr?2_WXUSzkBrdX(zA~Utc^@rKc}n>mm91YLaB< z^r5m8$gBJKay`}gATo+iCrp=?H+-$&)KkM3B(qK^nQ3B&{XSiKHMzfcp|o{2cjtAg zoq74a^&PnK(mDHUsO!;Iel>+s!eR-u|JycI#DL@aw zkEbTTz85c2UGCF|S0=_hTsh)CymwU$_0e~ih5q;HyDJqa*YMnx>IHlC+pQA9xrDXd zivzDIEw1CfQ{AoNyen<7n(MB#o92$YX6ozj+gI1odg?UD-MgPIG~cZ2r7LTGk3PD_ zTx@?1x*CH^?4IlF%{{le3FtnYbJ6bFwQEj}qc?vxaLZ{buHckYtsh---+d{6i2YIf zc5)rRV9opA)6?Tz{-2|6zjyfP|J#TEuMpt@`2>IA*pn8e;tOAyzxXCRw=eNn>KW9_ zH~|a(BB7B5)NycNPOv8#^k_yL8wZ(ymGf@m(_Tsq9TAe&jRF>%vpJlh&P!zDA3k10GLI^aS*#k?Ib;7816t} zW!{q!jAon$tYZryUS>E!fi)!@TU;;^2GV;rbO90$~ueMVZ53N!5x?B&tVW+RtymLy8&v<(-M|Hy#K(m`&w;iU%` z$i>bDVtD5ZATZ5Lf!JnCkoC-GD=Vy}Ep91Svu3?CBz)^*D?>dtW->7dZmt_nt zDtZc*zn}oQm}flKQ9-s!*NU9$()JZt(ExWry)l`D2`wZq64)SPV#OkPp@R}MhG5Ay z#YxqS8mIm6vewjEcof@w8^xW-wM2~}yAkb*Z0o1AEAyE-UU`Ggl$Kj$D411kHwI6Zvo&z!U(sVkLa zkQ4=xv{*EsPC8tFh!RdEx;CFu1%YL&pddgCZ4D=LLn>dI@{z`K&Y&iY6;H>-ZBq$N zMHSUa)e@C1&T4b0fKpayGPCHZculV{z8lh~mokY%EHSw-u~L>B&ds(R}o1K6*4C?ZkYvhD;rkb**q+ zq?lTk8I^MBRC>;_MmSX-#!*|_~$varnZqgR7#ZDbkLuiOVm!31ku@s-UUoanxlvc>q%;maqaUOuJt zgSz<7hlTu~y_3Vo{9k)1&Er4EIzTQ=a!vNHwE`wLefIf1M^=6qWn=okxjMgmebsjD z@-eFE|M2+qBp3g=f80NO==VP!NI58{R^#9RUMgOo^daMaX2klWa(IK_62Z(;m%9=T zkI#Im#aJ1y86B4n6Q;oa2X@@H81ewF11tn`!U)IAFidzaeuVj9yZhG=`GfVZ58- zFd@3c1{yh78ZVSw8?T-CoVa-7gwHiBBg}3b=87gkoLDi`U=3pl*HN!USu<0XaGA*E zHFbAY#2gd=E44C~U^XkzxaRK4dUKFa4%1nshgEpIRW<-l#jfH6InDxTl#aSI5=j(0 zB8izGubRdtg(ot9wjW?0hv~`FNw=To<}hrvD&|LGf^*UsKWeLM` z=QCQcmDaNWB}bF84zf^kwEBMAyewfTpBweNtALq;GXFSAvzG59X9!JXzuR@;;`)~##b2+VN?F3NGe<$k zA)`(>euJ%>f-?O8MB6eCW!zwoa0)1!zg!#^p-ev@DS`40wK2qxOd?8*<1g)g!wM+B ze%s`{OucE*ce8|dskboq0i%TS{fAAUOufx7g>s4^d=x1mR810B%!qilbcyY(EMYh} z>pnkT4bT*nrGb;;-5s8n+R#jUl8Cah4kX_5l*YLyCj?F%_->)K8 z&V8a;$w}pDtrE&C2dac}Pm0*a+(#d$AiHDBq1=-qrnpakeeP58(tns5p*i=-VPb2l z*T&ojd-G}pE#b92OL&El2L7r`~PA;1peWR3;sluvOWzOwd)uw|g!%(|ru?K;ekpy={h9QgKG`cmW8 zAgP@1raDPBn5tHb4xzlJ_Wt3E=CC=GDnx6YbxT1RKKIyj*%-=fq~98g2m(vq(hcvg z0gD0z@1FbIQ0ZU$MGY*C*gbI3mtQK*8iz0-lN@l1FLgcMx+`j z@5AoAgyGBa8_KWMZOevxR|93K-8m2Ceb}8husWAz)hVoH6WJ&1Y)5wIle{V${M@#cVczE7~IWKaOaTGT~oVr2Fe<{^LJu( zuFG?!n|T__8oP5NtMhI*>?TryCg+K+qXt&z9mBYhPNK=|SOVokwmR3Qb46zDVP=F?WS`yGott^wwRWHC zl=Z`8ga>VPZj?fCnA)-TXLsJf>f9(-V=a_>QN*^ueQNB^HBjzF5!=A(T$2eh@n5dO zeRgAa-U9cju{*DCb>5!fw*?8W#_s&UtXw-dcCJ@=@|jZX3P|D}p-dWjy`;mL&|IpLNexTuu#? zQEY$hz4Z)~i98dn?L1Burc{@$mn97QYwp(RGfiI^SY4m%{GR{9yaTOKLD|A@dTrcVKBys3sK>{ z3_bK=10ZV41}BLw!I>7y+Z=d4bsUINrhy&3ecfRZYuW2}*=oCX`S@J^u{@T?BFg^- P00960z0AE*0BQjMTzTLO literal 0 HcmV?d00001 diff --git a/charts/csi-secrets-store-provider-azure/Chart.yaml b/charts/csi-secrets-store-provider-azure/Chart.yaml index 86ab987ea..7fef242be 100644 --- a/charts/csi-secrets-store-provider-azure/Chart.yaml +++ b/charts/csi-secrets-store-provider-azure/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v1 name: csi-secrets-store-provider-azure -version: 0.0.16 -appVersion: 0.0.12 +version: 0.0.17 +appVersion: 0.0.13 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster. sources: diff --git a/charts/csi-secrets-store-provider-azure/README.md b/charts/csi-secrets-store-provider-azure/README.md index 7a5897b87..ea3930be6 100644 --- a/charts/csi-secrets-store-provider-azure/README.md +++ b/charts/csi-secrets-store-provider-azure/README.md @@ -18,6 +18,7 @@ Azure Key Vault provider for Secrets Store CSI driver allows you to get secret c | `0.0.14` | `0.0.17` | `0.0.10` | | `0.0.15` | `0.0.18` | `0.0.11` | | `0.0.16` | `0.0.19` | `0.0.12` | +| `0.0.17` | `0.0.20` | `0.0.13` | ## Installation @@ -32,8 +33,8 @@ Quick start instructions for the setup and configuration of secrets-store-csi-dr - This chart installs the [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) and the azure keyvault provider for the driver ```shell -$ helm repo add csi-secrets-store-provider-azure https://raw.githubusercontent.com/Azure/secrets-store-csi-driver-provider-azure/master/charts -$ helm install csi-secrets-store-provider-azure/csi-secrets-store-provider-azure --generate-name +helm repo add csi-secrets-store-provider-azure https://raw.githubusercontent.com/Azure/secrets-store-csi-driver-provider-azure/master/charts +helm install csi-secrets-store-provider-azure/csi-secrets-store-provider-azure --generate-name ``` ### Configuration @@ -46,22 +47,31 @@ The following table lists the configurable parameters of the csi-secrets-store-p | ---------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------ | | `nameOverride` | String to partially override csi-secrets-store-provider-azure.fullname template with a string (will prepend the release name) | `""` | | `fullnameOverride` | String to fully override csi-secrets-store-provider-azure.fullname template with a string | `""` | -| `image.repository` | Image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | -| `image.pullPolicy` | Image pull policy | `IfNotPresent` | -| `image.tag` | Azure Keyvault Provider image | `0.0.12` | +| `image.repository` | Image repository [**DEPRECATED**]. Use `linux.image.repository` and `windows.image.repository` instead. | `""` | +| `image.pullPolicy` | Image pull policy [**DEPRECATED**]. Use `linux.image.pullPolicy` and `windows.image.pullPolicy` instead. | `""` | +| `image.tag` | Azure Keyvault Provider image [**DEPRECATED**]. Use `linux.image.tag` and `windows.image.tag` instead. | `""` | | `imagePullSecrets` | Secrets to be used when pulling images | `[]` | | `logFormatJSON` | Use JSON logging format | `false` | | `logVerbosity` | Log level. Uses V logs (klog) | `0` | | `linux.enabled` | Install azure keyvault provider on linux nodes | true | +| `linux.image.repository` | Linux image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | +| `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | +| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `0.0.13` | | `linux.nodeSelector` | Node Selector for the daemonset on linux nodes | `{}` | | `linux.tolerations` | Tolerations for the daemonset on linux nodes | `{}` | | `linux.resources` | Resource limit for provider pods on linux nodes | `requests.cpu: 50m`
`requests.memory: 100Mi`
`limits.cpu: 50m`
`limits.memory: 100Mi` | +| `linux.podLabels` | Additional pod labels | `{}` | | `linux.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | +| `linux.privileged` | Enable privileged mode for Linux **daemonset** | `false` | | `windows.enabled` | Install azure keyvault provider on windows nodes | false | +| `windows.image.repository` | Windows image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | +| `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | +| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `0.0.13` | | `windows.nodeSelector` | Node Selector for the daemonset on windows nodes | `{}` | | `windows.tolerations` | Tolerations for the daemonset on windows nodes | `{}` | | `windows.resources` | Resource limit for provider pods on windows nodes | `requests.cpu: 100m`
`requests.memory: 200Mi`
`limits.cpu: 100m`
`limits.memory: 200Mi` | +| `windows.podLabels` | Additional pod labels | `{}` | | `windows.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | | `windows.updateStrategy` | Configure a custom update strategy for the daemonset on windows nodes | `RollingUpdate with 1 maxUnavailable` | | `secrets-store-csi-driver.install` | Install secrets-store-csi-driver with this chart | true | @@ -70,7 +80,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `secrets-store-csi-driver.linux.metricsAddr` | The address the metric endpoint binds to | `:8080` | | `secrets-store-csi-driver.linux.image.repository` | Driver Linux image repository | `mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver` | | `secrets-store-csi-driver.linux.image.pullPolicy` | Driver Linux image pull policy | `IfNotPresent` | -| `secrets-store-csi-driver.linux.image.tag` | Driver Linux image tag | `v0.0.19` | +| `secrets-store-csi-driver.linux.image.tag` | Driver Linux image tag | `v0.0.20` | | `secrets-store-csi-driver.linux.registrarImage.repository` | Driver Linux node-driver-registrar image repository | `mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar` | | `secrets-store-csi-driver.linux.registrarImage.pullPolicy` | Driver Linux node-driver-registrar image pull policy | `IfNotPresent` | | `secrets-store-csi-driver.linux.registrarImage.tag` | Driver Linux node-driver-registrar image tag | `v2.1.0` | @@ -82,7 +92,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `secrets-store-csi-driver.windows.metricsAddr` | The address the metric endpoint binds to | `:8080` | | `secrets-store-csi-driver.windows.image.repository` | Driver Windows image repository | `mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver` | | `secrets-store-csi-driver.windows.image.pullPolicy` | Driver Windows image pull policy | `IfNotPresent` | -| `secrets-store-csi-driver.windows.image.tag` | Driver Windows image tag | `v0.0.19` | +| `secrets-store-csi-driver.windows.image.tag` | Driver Windows image tag | `v0.0.20` | | `secrets-store-csi-driver.windows.registrarImage.repository` | Driver Windows node-driver-registrar image repository | `mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar` | | `secrets-store-csi-driver.windows.registrarImage.pullPolicy` | Driver Windows node-driver-registrar image pull policy | `IfNotPresent` | | `secrets-store-csi-driver.windows.registrarImage.tag` | Driver Windows node-driver-registrar image tag | `v2.1.0` | @@ -94,3 +104,4 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `secrets-store-csi-driver.rotationPollInterval` | Secret rotation poll interval duration | `2m` | | `rbac.install` | Install default service account | true | | `constructPEMChain` | Explicitly reconstruct the pem chain in the order: SERVER, INTERMEDIATE, ROOT | `false` | +| `customUserAgent` | Custom user agent to add to adal and keyvault requests | `""` | diff --git a/charts/csi-secrets-store-provider-azure/requirements.lock b/charts/csi-secrets-store-provider-azure/requirements.lock index 86883baee..03642088a 100644 --- a/charts/csi-secrets-store-provider-azure/requirements.lock +++ b/charts/csi-secrets-store-provider-azure/requirements.lock @@ -1,6 +1,6 @@ dependencies: - name: secrets-store-csi-driver repository: https://raw.githubusercontent.com/kubernetes-sigs/secrets-store-csi-driver/master/charts - version: 0.0.19 -digest: sha256:80e87a19cd0d02a8aee662e6f38fefa9b7a1d8c499000e6b170da7b7d78eba2e -generated: "2021-01-19T17:52:12.701524-08:00" + version: 0.0.20 +digest: sha256:1674fe949dfbf57958620bef8e4053dc9666a4f70b7c2ef26e5753924f16d09b +generated: "2021-02-18T18:35:20.745844-08:00" diff --git a/charts/csi-secrets-store-provider-azure/requirements.yaml b/charts/csi-secrets-store-provider-azure/requirements.yaml index f854dc41b..5f06987e0 100644 --- a/charts/csi-secrets-store-provider-azure/requirements.yaml +++ b/charts/csi-secrets-store-provider-azure/requirements.yaml @@ -1,5 +1,5 @@ dependencies: - name: secrets-store-csi-driver repository: https://raw.githubusercontent.com/kubernetes-sigs/secrets-store-csi-driver/master/charts - version: 0.0.19 + version: 0.0.20 condition: secrets-store-csi-driver.install diff --git a/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer-windows.yaml b/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer-windows.yaml index 792f4292d..542662417 100644 --- a/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer-windows.yaml +++ b/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer-windows.yaml @@ -14,6 +14,9 @@ spec: template: metadata: {{ include "sscdpa.labels" . | indent 6 }} +{{- if .Values.windows.podLabels }} +{{- toYaml .Values.windows.podLabels | nindent 8 }} +{{- end }} spec: {{- if .Values.imagePullSecrets }} imagePullSecrets: @@ -22,8 +25,8 @@ spec: serviceAccountName: csi-secrets-store-provider-azure containers: - name: provider-azure-installer - image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" - imagePullPolicy: {{ .Values.image.pullPolicy }} + image: "{{ .Values.image.repository | default .Values.windows.image.repository }}:{{ .Values.image.tag | default .Values.windows.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | default .Values.windows.image.pullPolicy }} args: - --endpoint=unix://C:\\provider\\azure.sock {{- if .Values.logFormatJSON }} @@ -35,6 +38,9 @@ spec: {{- if .Values.constructPEMChain }} - --construct-pem-chain={{ .Values.constructPEMChain }} {{- end }} + {{- if .Values.windows.customUserAgent }} + - --custom-user-agent={{ .Values.windows.customUserAgent }} + {{- end }} lifecycle: preStop: exec: diff --git a/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer.yaml b/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer.yaml index 0ae89bbfe..695639263 100644 --- a/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer.yaml +++ b/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer.yaml @@ -14,6 +14,9 @@ spec: template: metadata: {{ include "sscdpa.labels" . | indent 6 }} +{{- if .Values.linux.podLabels }} +{{- toYaml .Values.linux.podLabels | nindent 8 }} +{{- end }} spec: {{- if .Values.imagePullSecrets }} imagePullSecrets: @@ -23,8 +26,8 @@ spec: hostNetwork: true containers: - name: provider-azure-installer - image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" - imagePullPolicy: {{ .Values.image.pullPolicy }} + image: "{{ .Values.image.repository | default .Values.linux.image.repository }}:{{ .Values.image.tag | default .Values.linux.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | default .Values.linux.image.pullPolicy }} args: - --endpoint=unix:///provider/azure.sock {{- if .Values.logFormatJSON }} @@ -36,6 +39,9 @@ spec: {{- if .Values.constructPEMChain }} - --construct-pem-chain={{ .Values.constructPEMChain }} {{- end }} + {{- if .Values.linux.customUserAgent }} + - --custom-user-agent={{ .Values.linux.customUserAgent }} + {{- end }} lifecycle: preStop: exec: @@ -51,6 +57,10 @@ spec: initialDelaySeconds: 5 resources: {{ toYaml .Values.linux.resources | indent 12 }} + {{- if .Values.linux.privileged }} + securityContext: + privileged: true + {{- end }} volumeMounts: - name: provider-vol mountPath: /provider diff --git a/charts/csi-secrets-store-provider-azure/values.yaml b/charts/csi-secrets-store-provider-azure/values.yaml index 6042c345a..21d60d0b0 100644 --- a/charts/csi-secrets-store-provider-azure/values.yaml +++ b/charts/csi-secrets-store-provider-azure/values.yaml @@ -1,7 +1,8 @@ +# [DEPRECATED] use linux.image and windows.image instead. image: - repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: 0.0.12 - pullPolicy: IfNotPresent + repository: "" + tag: "" + pullPolicy: "" # One or more secrets to be used when pulling images imagePullSecrets: [] @@ -15,6 +16,10 @@ logFormatJSON: false logVerbosity: 0 linux: + image: + repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure + tag: 0.0.13 + pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] enabled: true @@ -25,13 +30,22 @@ linux: limits: cpu: 50m memory: 100Mi + podLabels: {} priorityClassName: "" updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 + privileged: false + # If provided, the userAgent string will be appended to the + # AKV provider user agents for all adal and keyvault requests. + customUserAgent: "" windows: + image: + repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure + tag: 0.0.13 + pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] enabled: false @@ -42,11 +56,15 @@ windows: limits: cpu: 100m memory: 200Mi + podLabels: {} priorityClassName: "" updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 + # If provided, the userAgent string will be appended to the + # AKV provider user agents for all adal and keyvault requests. + customUserAgent: "" ## Configuration values for the secrets-store-csi-driver dependency. ## ref: https://github.com/kubernetes-sigs/secrets-store-csi-driver/tree/master/charts/secrets-store-csi-driver/README.md @@ -59,7 +77,7 @@ secrets-store-csi-driver: metricsAddr: ":8080" image: repository: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver - tag: v0.0.19 + tag: v0.0.20 pullPolicy: IfNotPresent registrarImage: repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar @@ -76,7 +94,7 @@ secrets-store-csi-driver: metricsAddr: ":8080" image: repository: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver - tag: v0.0.19 + tag: v0.0.20 pullPolicy: IfNotPresent registrarImage: repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar diff --git a/charts/index.yaml b/charts/index.yaml index 07f2011be..0a624ea4e 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -1,6 +1,27 @@ apiVersion: v1 entries: csi-secrets-store-provider-azure: + - apiVersion: v1 + appVersion: 0.0.13 + created: "2021-02-18T18:39:56.811398-08:00" + dependencies: + - condition: secrets-store-csi-driver.install + name: secrets-store-csi-driver + repository: https://raw.githubusercontent.com/kubernetes-sigs/secrets-store-csi-driver/master/charts + version: 0.0.20 + description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster. + digest: 17d7e6e7aa52cae1e26adc5395190a1e142fa47369f788be7380c84d015783ec + home: https://github.com/Azure/secrets-store-csi-driver-provider-azure + kubeVersion: '>=1.16.0-0' + maintainers: + - email: anish.ramasekar@gmail.com + name: Anish Ramasekar + name: csi-secrets-store-provider-azure + sources: + - https://github.com/Azure/secrets-store-csi-driver-provider-azure + urls: + - //raw.githubusercontent.com/Azure/secrets-store-csi-driver-provider-azure/master/charts/csi-secrets-store-provider-azure-0.0.17.tgz + version: 0.0.17 - apiVersion: v1 appVersion: 0.0.12 created: "2021-01-19T17:56:13.764533-08:00" @@ -253,4 +274,4 @@ entries: urls: - https://raw.githubusercontent.com/Azure/secrets-store-csi-driver-provider-azure/master/charts/csi-secrets-store-provider-azure-0.0.5.tgz version: 0.0.5 -generated: "2021-01-19T17:56:13.76287-08:00" +generated: "2021-02-18T18:39:56.808755-08:00" diff --git a/deployment/provider-azure-installer-windows.yaml b/deployment/provider-azure-installer-windows.yaml index a1b0dc190..d0f98a2db 100644 --- a/deployment/provider-azure-installer-windows.yaml +++ b/deployment/provider-azure-installer-windows.yaml @@ -23,7 +23,7 @@ spec: serviceAccountName: csi-secrets-store-provider-azure containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.12 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.13 imagePullPolicy: IfNotPresent args: - --endpoint=unix://C:\\provider\\azure.sock diff --git a/deployment/provider-azure-installer.yaml b/deployment/provider-azure-installer.yaml index c7cdfef2f..d12bfeae4 100644 --- a/deployment/provider-azure-installer.yaml +++ b/deployment/provider-azure-installer.yaml @@ -24,7 +24,7 @@ spec: hostNetwork: true containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.12 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.13 imagePullPolicy: IfNotPresent args: - --endpoint=unix:///provider/azure.sock diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml index 86ab987ea..7fef242be 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v1 name: csi-secrets-store-provider-azure -version: 0.0.16 -appVersion: 0.0.12 +version: 0.0.17 +appVersion: 0.0.13 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the Secrets Store CSI Driver and the Azure Keyvault Provider inside a Kubernetes cluster. sources: diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/README.md b/manifest_staging/charts/csi-secrets-store-provider-azure/README.md index fa40bd721..ea3930be6 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/README.md +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/README.md @@ -18,6 +18,7 @@ Azure Key Vault provider for Secrets Store CSI driver allows you to get secret c | `0.0.14` | `0.0.17` | `0.0.10` | | `0.0.15` | `0.0.18` | `0.0.11` | | `0.0.16` | `0.0.19` | `0.0.12` | +| `0.0.17` | `0.0.20` | `0.0.13` | ## Installation @@ -55,7 +56,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.enabled` | Install azure keyvault provider on linux nodes | true | | `linux.image.repository` | Linux image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `0.0.12` | +| `linux.image.tag` | Azure Keyvault Provider Linux image tag | `0.0.13` | | `linux.nodeSelector` | Node Selector for the daemonset on linux nodes | `{}` | | `linux.tolerations` | Tolerations for the daemonset on linux nodes | `{}` | | `linux.resources` | Resource limit for provider pods on linux nodes | `requests.cpu: 50m`
`requests.memory: 100Mi`
`limits.cpu: 50m`
`limits.memory: 100Mi` | @@ -66,7 +67,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.enabled` | Install azure keyvault provider on windows nodes | false | | `windows.image.repository` | Windows image repository | `mcr.microsoft.com/oss/azure/secrets-store/provider-azure` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `0.0.12` | +| `windows.image.tag` | Azure Keyvault Provider Windows image tag | `0.0.13` | | `windows.nodeSelector` | Node Selector for the daemonset on windows nodes | `{}` | | `windows.tolerations` | Tolerations for the daemonset on windows nodes | `{}` | | `windows.resources` | Resource limit for provider pods on windows nodes | `requests.cpu: 100m`
`requests.memory: 200Mi`
`limits.cpu: 100m`
`limits.memory: 200Mi` | @@ -79,7 +80,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `secrets-store-csi-driver.linux.metricsAddr` | The address the metric endpoint binds to | `:8080` | | `secrets-store-csi-driver.linux.image.repository` | Driver Linux image repository | `mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver` | | `secrets-store-csi-driver.linux.image.pullPolicy` | Driver Linux image pull policy | `IfNotPresent` | -| `secrets-store-csi-driver.linux.image.tag` | Driver Linux image tag | `v0.0.19` | +| `secrets-store-csi-driver.linux.image.tag` | Driver Linux image tag | `v0.0.20` | | `secrets-store-csi-driver.linux.registrarImage.repository` | Driver Linux node-driver-registrar image repository | `mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar` | | `secrets-store-csi-driver.linux.registrarImage.pullPolicy` | Driver Linux node-driver-registrar image pull policy | `IfNotPresent` | | `secrets-store-csi-driver.linux.registrarImage.tag` | Driver Linux node-driver-registrar image tag | `v2.1.0` | @@ -91,7 +92,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `secrets-store-csi-driver.windows.metricsAddr` | The address the metric endpoint binds to | `:8080` | | `secrets-store-csi-driver.windows.image.repository` | Driver Windows image repository | `mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver` | | `secrets-store-csi-driver.windows.image.pullPolicy` | Driver Windows image pull policy | `IfNotPresent` | -| `secrets-store-csi-driver.windows.image.tag` | Driver Windows image tag | `v0.0.19` | +| `secrets-store-csi-driver.windows.image.tag` | Driver Windows image tag | `v0.0.20` | | `secrets-store-csi-driver.windows.registrarImage.repository` | Driver Windows node-driver-registrar image repository | `mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar` | | `secrets-store-csi-driver.windows.registrarImage.pullPolicy` | Driver Windows node-driver-registrar image pull policy | `IfNotPresent` | | `secrets-store-csi-driver.windows.registrarImage.tag` | Driver Windows node-driver-registrar image tag | `v2.1.0` | diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.lock b/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.lock index 86883baee..03642088a 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.lock +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.lock @@ -1,6 +1,6 @@ dependencies: - name: secrets-store-csi-driver repository: https://raw.githubusercontent.com/kubernetes-sigs/secrets-store-csi-driver/master/charts - version: 0.0.19 -digest: sha256:80e87a19cd0d02a8aee662e6f38fefa9b7a1d8c499000e6b170da7b7d78eba2e -generated: "2021-01-19T17:52:12.701524-08:00" + version: 0.0.20 +digest: sha256:1674fe949dfbf57958620bef8e4053dc9666a4f70b7c2ef26e5753924f16d09b +generated: "2021-02-18T18:35:20.745844-08:00" diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.yaml index f854dc41b..5f06987e0 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.yaml +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/requirements.yaml @@ -1,5 +1,5 @@ dependencies: - name: secrets-store-csi-driver repository: https://raw.githubusercontent.com/kubernetes-sigs/secrets-store-csi-driver/master/charts - version: 0.0.19 + version: 0.0.20 condition: secrets-store-csi-driver.install diff --git a/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml b/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml index 8120fc6b8..21d60d0b0 100644 --- a/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml +++ b/manifest_staging/charts/csi-secrets-store-provider-azure/values.yaml @@ -18,7 +18,7 @@ logVerbosity: 0 linux: image: repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: 0.0.12 + tag: 0.0.13 pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] @@ -44,7 +44,7 @@ linux: windows: image: repository: mcr.microsoft.com/oss/azure/secrets-store/provider-azure - tag: 0.0.12 + tag: 0.0.13 pullPolicy: IfNotPresent nodeSelector: {} tolerations: [] @@ -77,7 +77,7 @@ secrets-store-csi-driver: metricsAddr: ":8080" image: repository: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver - tag: v0.0.19 + tag: v0.0.20 pullPolicy: IfNotPresent registrarImage: repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar @@ -94,7 +94,7 @@ secrets-store-csi-driver: metricsAddr: ":8080" image: repository: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver - tag: v0.0.19 + tag: v0.0.20 pullPolicy: IfNotPresent registrarImage: repository: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar diff --git a/manifest_staging/deployment/provider-azure-installer-windows.yaml b/manifest_staging/deployment/provider-azure-installer-windows.yaml index a1b0dc190..d0f98a2db 100644 --- a/manifest_staging/deployment/provider-azure-installer-windows.yaml +++ b/manifest_staging/deployment/provider-azure-installer-windows.yaml @@ -23,7 +23,7 @@ spec: serviceAccountName: csi-secrets-store-provider-azure containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.12 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.13 imagePullPolicy: IfNotPresent args: - --endpoint=unix://C:\\provider\\azure.sock diff --git a/manifest_staging/deployment/provider-azure-installer.yaml b/manifest_staging/deployment/provider-azure-installer.yaml index c7cdfef2f..d12bfeae4 100644 --- a/manifest_staging/deployment/provider-azure-installer.yaml +++ b/manifest_staging/deployment/provider-azure-installer.yaml @@ -24,7 +24,7 @@ spec: hostNetwork: true containers: - name: provider-azure-installer - image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.12 + image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.13 imagePullPolicy: IfNotPresent args: - --endpoint=unix:///provider/azure.sock diff --git a/test/e2e/framework/config.go b/test/e2e/framework/config.go index f59855545..c9678efdb 100644 --- a/test/e2e/framework/config.go +++ b/test/e2e/framework/config.go @@ -15,7 +15,7 @@ type Config struct { KeyvaultName string `envconfig:"KEYVAULT_NAME"` Registry string `envconfig:"REGISTRY" default:"mcr.microsoft.com/oss/azure/secrets-store"` ImageName string `envconfig:"IMAGE_NAME" default:"provider-azure"` - ImageVersion string `envconfig:"IMAGE_VERSION" default:"0.0.12"` + ImageVersion string `envconfig:"IMAGE_VERSION" default:"0.0.13"` IsSoakTest bool `envconfig:"IS_SOAK_TEST" default:"false"` IsWindowsTest bool `envconfig:"TEST_WINDOWS" default:"false"` IsKindCluster bool `envconfig:"CI_KIND_CLUSTER" default:"false"`