diff --git a/charts/secrets-store-csi-driver/Chart.yaml b/charts/secrets-store-csi-driver/Chart.yaml index 043ebf099..05f4c78ac 100644 --- a/charts/secrets-store-csi-driver/Chart.yaml +++ b/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.1.0-rc.0 -appVersion: 1.1.0-rc.0 +version: 1.1.0 +appVersion: 1.1.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/charts/secrets-store-csi-driver/README.md b/charts/secrets-store-csi-driver/README.md index cad415571..648376fea 100644 --- a/charts/secrets-store-csi-driver/README.md +++ b/charts/secrets-store-csi-driver/README.md @@ -32,10 +32,10 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.1.0-rc.0` | +| `linux.image.tag` | Linux image tag | `v1.1.0` | | `linux.crds.image.repository` | Linux crds image repository | `k8s.gcr.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.1.0-rc.0` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.1.0` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `linux.driver.resources` | The resource request/limits for the linux secrets-store container image | `limits: 200m CPU, 200Mi; requests: 50m CPU, 100Mi` | | `linux.enabled` | Install secrets store csi driver on linux nodes | true | @@ -46,12 +46,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `linux.registrarImage.repository` | Linux node-driver-registrar image repository | `k8s.gcr.io/sig-storage/csi-node-driver-registrar` | | `linux.registrarImage.pullPolicy` | Linux node-driver-registrar image pull policy | `IfNotPresent` | -| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.4.0` | +| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.5.0` | | `linux.registrar.resources` | The resource request/limits for the linux node-driver-registrar container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `linux.livenessProbeImage.repository` | Linux liveness-probe image repository | `k8s.gcr.io/sig-storage/livenessprobe` | | `linux.livenessProbeImage.pullPolicy` | Linux liveness-probe image pull policy | `IfNotPresent` | -| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.5.0` | +| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.6.0` | | `linux.livenessProbe.resources` | The resource request/limits for the linux liveness-probe container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.env` | Environment variables to be passed for the daemonset on linux nodes | `[]` | | `linux.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | @@ -64,7 +64,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.1.0-rc.0` | +| `windows.image.tag` | Windows image tag | `v1.1.0` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | @@ -75,12 +75,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `windows.registrarImage.repository` | Windows node-driver-registrar image repository | `k8s.gcr.io/sig-storage/csi-node-driver-registrar` | | `windows.registrarImage.pullPolicy` | Windows node-driver-registrar image pull policy | `IfNotPresent` | -| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.4.0` | +| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.5.0` | | `windows.registrar.resources` | The resource request/limits for the windows node-driver-registrar container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `windows.livenessProbeImage.repository` | Windows liveness-probe image repository | `k8s.gcr.io/sig-storage/livenessprobe` | | `windows.livenessProbeImage.pullPolicy` | Windows liveness-probe image pull policy | `IfNotPresent` | -| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.5.0` | +| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.6.0` | | `windows.livenessProbe.resources` | The resource request/limits for the windows liveness-probe container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.env` | Environment variables to be passed for the daemonset on windows nodes | `[]` | | `windows.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | @@ -103,4 +103,4 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `providerHealthCheck` | Enable health check for configured providers | `false` | | `providerHealthCheckInterval` | Provider healthcheck interval duration | `2m` | | `imagePullSecrets` | One or more secrets to be used when pulling images | `""` | -| `tokenRequests` | Token requests configuration for the csi driver. Refer to [doc](https://kubernetes-csi.github.io/docs/token-requests.html) for more info. | `""` | +| `tokenRequests` | Token requests configuration for the csi driver. Refer to [doc](https://kubernetes-csi.github.io/docs/token-requests.html) for more info. Supported only for Kubernetes v1.20+ | `""` | diff --git a/charts/secrets-store-csi-driver/templates/csidriver.yaml b/charts/secrets-store-csi-driver/templates/csidriver.yaml index 55bfaf57b..2ff74ca09 100644 --- a/charts/secrets-store-csi-driver/templates/csidriver.yaml +++ b/charts/secrets-store-csi-driver/templates/csidriver.yaml @@ -8,7 +8,7 @@ spec: # Added in Kubernetes 1.16 with default mode of Persistent. Secrets store csi driver needs Ephermeral to be set. volumeLifecycleModes: - Ephemeral - {{- if .Values.tokenRequests }} + {{- if and (semverCompare ">=1.20-0" .Capabilities.KubeVersion.Version) .Values.tokenRequests }} tokenRequests: {{- toYaml .Values.tokenRequests | nindent 2}} {{- end }} diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml index ba39b86f1..4ce4fec83 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver-windows.yaml @@ -76,7 +76,8 @@ spec: {{- end }} - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" - - "--provider-volume=C:\\k\\secrets-store-csi-providers" + - "--provider-volume={{ .Values.windows.providersDir }}" + - "--additional-provider-volume-paths={{ join "," .Values.windows.additionalProvidersDirs }}" {{- if and (semverCompare ">= v0.0.9-0" .Values.windows.image.tag) .Values.minimumProviderVersions }} - "--min-provider-version={{ .Values.minimumProviderVersions }}" {{- end }} @@ -131,7 +132,11 @@ spec: - name: mountpoint-dir mountPath: {{ .Values.windows.kubeletRootDir }}\pods - name: providers-dir - mountPath: C:\k\secrets-store-csi-providers + mountPath: "{{ .Values.windows.providersDir }}" + {{- range $i, $path := .Values.windows.additionalProvidersDirs }} + - name: providers-dir-{{ $i }} + mountPath: "{{ $path }}" + {{- end }} {{- if .Values.windows.volumeMounts }} {{- toYaml .Values.windows.volumeMounts | nindent 12}} {{- end }} @@ -174,8 +179,14 @@ spec: type: DirectoryOrCreate - name: providers-dir hostPath: - path: {{ .Values.windows.providersDir }} + path: "{{ .Values.windows.providersDir }}" + type: DirectoryOrCreate + {{- range $i, $path := .Values.windows.additionalProvidersDirs }} + - name: providers-dir-{{ $i }} + hostPath: + path: "{{ $path }}" type: DirectoryOrCreate + {{- end }} {{- if .Values.windows.volumes }} {{- toYaml .Values.windows.volumes | nindent 8}} {{- end }} diff --git a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml index 0184ee007..48a4f4028 100644 --- a/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml +++ b/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml @@ -76,7 +76,8 @@ spec: {{- end }} - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" - - "--provider-volume=/etc/kubernetes/secrets-store-csi-providers" + - "--provider-volume={{ .Values.linux.providersDir }}" + - "--additional-provider-volume-paths={{ join "," .Values.linux.additionalProvidersDirs }}" {{- if and (semverCompare ">= v0.0.8-0" .Values.linux.image.tag) .Values.minimumProviderVersions }} - "--min-provider-version={{ .Values.minimumProviderVersions }}" {{- end }} @@ -134,7 +135,11 @@ spec: mountPath: {{ .Values.linux.kubeletRootDir }}/pods mountPropagation: Bidirectional - name: providers-dir - mountPath: /etc/kubernetes/secrets-store-csi-providers + mountPath: {{ .Values.linux.providersDir }} + {{- range $i, $path := .Values.linux.additionalProvidersDirs }} + - name: providers-dir-{{ $i }} + mountPath: "{{ $path }}" + {{- end }} {{- if .Values.linux.volumeMounts }} {{- toYaml .Values.linux.volumeMounts | nindent 12}} {{- end }} @@ -179,6 +184,12 @@ spec: hostPath: path: {{ .Values.linux.providersDir }} type: DirectoryOrCreate + {{- range $i, $path := .Values.linux.additionalProvidersDirs }} + - name: providers-dir-{{ $i }} + hostPath: + path: "{{ $path }}" + type: DirectoryOrCreate + {{- end }} {{- if .Values.linux.volumes }} {{- toYaml .Values.linux.volumes | nindent 8}} {{- end }} diff --git a/charts/secrets-store-csi-driver/values.yaml b/charts/secrets-store-csi-driver/values.yaml index bfa5576bc..8c6a6d071 100644 --- a/charts/secrets-store-csi-driver/values.yaml +++ b/charts/secrets-store-csi-driver/values.yaml @@ -2,26 +2,26 @@ linux: enabled: true image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent - + crds: image: repository: k8s.gcr.io/csi-secrets-store/driver-crds - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent annotations: {} ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes - affinity: + affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet + - matchExpressions: + - key: type + operator: NotIn + values: + - virtual-kubelet driver: resources: @@ -34,7 +34,7 @@ linux: registrarImage: repository: k8s.gcr.io/sig-storage/csi-node-driver-registrar - tag: v2.4.0 + tag: v2.5.0 pullPolicy: IfNotPresent registrar: @@ -49,7 +49,7 @@ linux: livenessProbeImage: repository: k8s.gcr.io/sig-storage/livenessprobe - tag: v2.5.0 + tag: v2.6.0 pullPolicy: IfNotPresent livenessProbe: @@ -61,7 +61,6 @@ linux: cpu: 10m memory: 20Mi - updateStrategy: type: RollingUpdate rollingUpdate: @@ -69,6 +68,8 @@ linux: kubeletRootDir: /var/lib/kubelet providersDir: /etc/kubernetes/secrets-store-csi-providers + additionalProvidersDirs: + - /var/run/secrets-store-csi-providers nodeSelector: {} tolerations: [] metricsAddr: ":8095" @@ -93,19 +94,19 @@ windows: enabled: false image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes - affinity: + affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - - matchExpressions: - - key: type - operator: NotIn - values: - - virtual-kubelet + - matchExpressions: + - key: type + operator: NotIn + values: + - virtual-kubelet driver: resources: @@ -118,7 +119,7 @@ windows: registrarImage: repository: k8s.gcr.io/sig-storage/csi-node-driver-registrar - tag: v2.4.0 + tag: v2.5.0 pullPolicy: IfNotPresent registrar: @@ -133,7 +134,7 @@ windows: livenessProbeImage: repository: k8s.gcr.io/sig-storage/livenessprobe - tag: v2.5.0 + tag: v2.6.0 pullPolicy: IfNotPresent livenessProbe: @@ -151,7 +152,8 @@ windows: maxUnavailable: 1 kubeletRootDir: C:\var\lib\kubelet - providersDir: C:\k\secrets-store-csi-providers + providersDir: C:\\k\\secrets-store-csi-providers + additionalProvidersDirs: nodeSelector: {} tolerations: [] metricsAddr: ":8095" @@ -210,6 +212,7 @@ imagePullSecrets: [] ## This allows CSI drivers to impersonate the pods that they mount the volumes for. # refer to https://kubernetes-csi.github.io/docs/token-requests.html for more details. +# Supported only for Kubernetes v1.20+ tokenRequests: [] # - audience: aud1 # - audience: aud2 diff --git a/deploy/secrets-store-csi-driver-windows.yaml b/deploy/secrets-store-csi-driver-windows.yaml index 4ec1c6fa5..8ffe03a5b 100644 --- a/deploy/secrets-store-csi-driver-windows.yaml +++ b/deploy/secrets-store-csi-driver-windows.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.4.0 + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.5.0 args: - --v=5 - "--csi-address=unix://C:\\csi\\csi.sock" @@ -50,7 +50,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0 + image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -99,7 +99,7 @@ spec: - name: providers-dir mountPath: C:\k\secrets-store-csi-providers - name: liveness-probe - image: k8s.gcr.io/sig-storage/livenessprobe:v2.5.0 + image: k8s.gcr.io/sig-storage/livenessprobe:v2.6.0 imagePullPolicy: IfNotPresent args: - "--csi-address=unix://C:\\csi\\csi.sock" diff --git a/deploy/secrets-store-csi-driver.yaml b/deploy/secrets-store-csi-driver.yaml index 78f00a801..0e72617b6 100644 --- a/deploy/secrets-store-csi-driver.yaml +++ b/deploy/secrets-store-csi-driver.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.4.0 + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.5.0 args: - --v=5 - --csi-address=/csi/csi.sock @@ -50,11 +50,12 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0 + image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" - "--provider-volume=/etc/kubernetes/secrets-store-csi-providers" + - "--additional-provider-volume-paths=/var/run/secrets-store-csi-providers" - "--metrics-addr=:8095" - "--enable-secret-rotation=false" - "--rotation-poll-interval=2m" @@ -94,6 +95,8 @@ spec: mountPropagation: Bidirectional - name: providers-dir mountPath: /etc/kubernetes/secrets-store-csi-providers + - name: providers-dir-0 + mountPath: /var/run/secrets-store-csi-providers resources: limits: cpu: 200m @@ -102,7 +105,7 @@ spec: cpu: 50m memory: 100Mi - name: liveness-probe - image: k8s.gcr.io/sig-storage/livenessprobe:v2.5.0 + image: k8s.gcr.io/sig-storage/livenessprobe:v2.6.0 imagePullPolicy: IfNotPresent args: - --csi-address=/csi/csi.sock @@ -136,5 +139,9 @@ spec: hostPath: path: /etc/kubernetes/secrets-store-csi-providers type: DirectoryOrCreate + - name: providers-dir-0 + hostPath: + path: /var/run/secrets-store-csi-providers + type: DirectoryOrCreate nodeSelector: kubernetes.io/os: linux diff --git a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml index 043ebf099..05f4c78ac 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.1.0-rc.0 -appVersion: 1.1.0-rc.0 +version: 1.1.0 +appVersion: 1.1.0 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/manifest_staging/charts/secrets-store-csi-driver/README.md b/manifest_staging/charts/secrets-store-csi-driver/README.md index ce1823787..648376fea 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/README.md +++ b/manifest_staging/charts/secrets-store-csi-driver/README.md @@ -32,10 +32,10 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.1.0-rc.0` | +| `linux.image.tag` | Linux image tag | `v1.1.0` | | `linux.crds.image.repository` | Linux crds image repository | `k8s.gcr.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.1.0-rc.0` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.1.0` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `linux.driver.resources` | The resource request/limits for the linux secrets-store container image | `limits: 200m CPU, 200Mi; requests: 50m CPU, 100Mi` | | `linux.enabled` | Install secrets store csi driver on linux nodes | true | @@ -64,7 +64,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `k8s.gcr.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.1.0-rc.0` | +| `windows.image.tag` | Windows image tag | `v1.1.0` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | diff --git a/manifest_staging/charts/secrets-store-csi-driver/values.yaml b/manifest_staging/charts/secrets-store-csi-driver/values.yaml index ec6b6345e..8c6a6d071 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/values.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/values.yaml @@ -2,13 +2,13 @@ linux: enabled: true image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent crds: image: repository: k8s.gcr.io/csi-secrets-store/driver-crds - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent annotations: {} @@ -94,7 +94,7 @@ windows: enabled: false image: repository: k8s.gcr.io/csi-secrets-store/driver - tag: v1.1.0-rc.0 + tag: v1.1.0 pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes diff --git a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml index 45c451122..8ffe03a5b 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml @@ -50,7 +50,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0 + image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/deploy/secrets-store-csi-driver.yaml b/manifest_staging/deploy/secrets-store-csi-driver.yaml index fd67fd21e..0e72617b6 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver.yaml @@ -50,7 +50,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0 + image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)"