Skip to content

Commit

Permalink
Merge pull request #864 from aramase/automated-cherry-pick-of-#863-up…
Browse files Browse the repository at this point in the history
…stream-release-1.1

Automated cherry pick of #863: release: update manifest and helm charts for v1.1.0-rc.0
  • Loading branch information
k8s-ci-robot authored Feb 8, 2022
2 parents 79e0a88 + 72f1bf8 commit f63c4ae
Show file tree
Hide file tree
Showing 24 changed files with 272 additions and 113 deletions.
4 changes: 2 additions & 2 deletions charts/secrets-store-csi-driver/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: secrets-store-csi-driver
version: 1.0.1
appVersion: 1.0.1
version: 1.1.0-rc.0
appVersion: 1.1.0-rc.0
kubeVersion: ">=1.16.0-0"
description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster.
icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png
Expand Down
170 changes: 78 additions & 92 deletions charts/secrets-store-csi-driver/README.md

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,10 @@ spec:
type: object
served: true
storage: true
- name: v1alpha1
- deprecated: true
deprecationWarning: secrets-store.csi.x-k8s.io/v1alpha1 is deprecated. Use secrets-store.csi.x-k8s.io/v1
instead.
name: v1alpha1
schema:
openAPIV3Schema:
description: SecretProviderClass is the Schema for the secretproviderclasses
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,8 @@ spec:
type: object
served: true
storage: true
- name: v1alpha1
- deprecated: true
name: v1alpha1
schema:
openAPIV3Schema:
description: SecretProviderClassPodStatus is the Schema for the secretproviderclassespodstatus
Expand Down
4 changes: 4 additions & 0 deletions charts/secrets-store-csi-driver/templates/csidriver.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,3 +8,7 @@ spec:
# Added in Kubernetes 1.16 with default mode of Persistent. Secrets store csi driver needs Ephermeral to be set.
volumeLifecycleModes:
- Ephemeral
{{- if .Values.tokenRequests }}
tokenRequests:
{{- toYaml .Values.tokenRequests | nindent 2}}
{{- end }}
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{{ if .Values.rbac.install }}

---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: secretproviderclasses-admin-role
rules:
- apiGroups:
- secrets-store.csi.x-k8s.io
resources:
- secretproviderclasses
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
{{ end }}
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
{{ if .Values.rbac.install }}

---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
rbac.authorization.k8s.io/aggregate-to-view: "true"
name: secretproviderclasses-viewer-role
rules:
- apiGroups:
- secrets-store.csi.x-k8s.io
resources:
- secretproviderclasses
verbs:
- get
- list
- watch
{{ end }}
16 changes: 16 additions & 0 deletions charts/secrets-store-csi-driver/templates/role-tokenrequest.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
{{ if .Values.tokenRequests }}

---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: secretprovidertokenrequest-role
rules:
- apiGroups:
- ""
resources:
- serviceaccounts/token
verbs:
- create
{{ end }}
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{{ if .Values.tokenRequests }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: secretprovidertokenrequest-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: secretprovidertokenrequest-role
subjects:
- kind: ServiceAccount
name: secrets-store-csi-driver
namespace: {{ .Release.Namespace }}
{{ end }}
10 changes: 10 additions & 0 deletions charts/secrets-store-csi-driver/templates/role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,16 @@ rules:
- get
- patch
- update
- apiGroups:
- storage.k8s.io
resourceNames:
- secrets-store.csi.k8s.io
resources:
- csidrivers
verbs:
- get
- list
- watch
{{- if .Values.rbac.pspEnabled }}
- apiGroups:
- policy
Expand Down
12 changes: 9 additions & 3 deletions charts/secrets-store-csi-driver/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@ linux:
enabled: true
image:
repository: k8s.gcr.io/csi-secrets-store/driver
tag: v1.0.1
tag: v1.1.0-rc.0
pullPolicy: IfNotPresent

crds:
image:
repository: k8s.gcr.io/csi-secrets-store/driver-crds
tag: v1.0.1
tag: v1.1.0-rc.0
pullPolicy: IfNotPresent
annotations: {}

Expand Down Expand Up @@ -93,7 +93,7 @@ windows:
enabled: false
image:
repository: k8s.gcr.io/csi-secrets-store/driver
tag: v1.0.1
tag: v1.1.0-rc.0
pullPolicy: IfNotPresent

## Prevent the CSI driver from being scheduled on virtual-kubelet nodes
Expand Down Expand Up @@ -207,3 +207,9 @@ providerHealthCheck: false
providerHealthCheckInterval: 2m

imagePullSecrets: []

## This allows CSI drivers to impersonate the pods that they mount the volumes for.
# refer to https://kubernetes-csi.github.io/docs/token-requests.html for more details.
tokenRequests: []
# - audience: aud1
# - audience: aud2
10 changes: 10 additions & 0 deletions deploy/rbac-secretproviderclass.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,16 @@ rules:
- get
- patch
- update
- apiGroups:
- storage.k8s.io
resourceNames:
- secrets-store.csi.k8s.io
resources:
- csidrivers
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
25 changes: 25 additions & 0 deletions deploy/rbac-secretprovidertokenrequest.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: secretprovidertokenrequest-role
rules:
- apiGroups:
- ""
resources:
- serviceaccounts/token
verbs:
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: secretprovidertokenrequest-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: secretprovidertokenrequest-role
subjects:
- kind: ServiceAccount
name: secrets-store-csi-driver
namespace: kube-system
20 changes: 20 additions & 0 deletions deploy/role-secretproviderclasses-admin.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: secretproviderclasses-admin-role
rules:
- apiGroups:
- secrets-store.csi.x-k8s.io
resources:
- secretproviderclasses
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
15 changes: 15 additions & 0 deletions deploy/role-secretproviderclasses-viewer.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
rbac.authorization.k8s.io/aggregate-to-view: "true"
name: secretproviderclasses-viewer-role
rules:
- apiGroups:
- secrets-store.csi.x-k8s.io
resources:
- secretproviderclasses
verbs:
- get
- list
- watch
2 changes: 1 addition & 1 deletion deploy/secrets-store-csi-driver-windows.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ spec:
cpu: 100m
memory: 100Mi
- name: secrets-store
image: k8s.gcr.io/csi-secrets-store/driver:v1.0.1
image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0
args:
- "--endpoint=$(CSI_ENDPOINT)"
- "--nodeid=$(KUBE_NODE_NAME)"
Expand Down
2 changes: 1 addition & 1 deletion deploy/secrets-store-csi-driver.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ spec:
cpu: 10m
memory: 20Mi
- name: secrets-store
image: k8s.gcr.io/csi-secrets-store/driver:v1.0.1
image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0
args:
- "--endpoint=$(CSI_ENDPOINT)"
- "--nodeid=$(KUBE_NODE_NAME)"
Expand Down
5 changes: 4 additions & 1 deletion deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,10 @@ spec:
type: object
served: true
storage: true
- name: v1alpha1
- deprecated: true
deprecationWarning: secrets-store.csi.x-k8s.io/v1alpha1 is deprecated. Use secrets-store.csi.x-k8s.io/v1
instead.
name: v1alpha1
schema:
openAPIV3Schema:
description: SecretProviderClass is the Schema for the secretproviderclasses
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,8 @@ spec:
type: object
served: true
storage: true
- name: v1alpha1
- deprecated: true
name: v1alpha1
schema:
openAPIV3Schema:
description: SecretProviderClassPodStatus is the Schema for the secretproviderclassespodstatus
Expand Down
4 changes: 2 additions & 2 deletions manifest_staging/charts/secrets-store-csi-driver/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: secrets-store-csi-driver
version: 1.0.1
appVersion: 1.0.1
version: 1.1.0-rc.0
appVersion: 1.1.0-rc.0
kubeVersion: ">=1.16.0-0"
description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster.
icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png
Expand Down
6 changes: 3 additions & 3 deletions manifest_staging/charts/secrets-store-csi-driver/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,10 +32,10 @@ The following table lists the configurable parameters of the csi-secrets-store-p
| `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` |
| `linux.image.repository` | Linux image repository | `k8s.gcr.io/csi-secrets-store/driver` |
| `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` |
| `linux.image.tag` | Linux image tag | `v1.0.1` |
| `linux.image.tag` | Linux image tag | `v1.1.0-rc.0` |
| `linux.crds.image.repository` | Linux crds image repository | `k8s.gcr.io/csi-secrets-store/driver-crds` |
| `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` |
| `linux.crds.image.tag` | Linux crds image tag | `v1.0.1` |
| `linux.crds.image.tag` | Linux crds image tag | `v1.1.0-rc.0` |
| `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` |
| `linux.driver.resources` | The resource request/limits for the linux secrets-store container image | `limits: 200m CPU, 200Mi; requests: 50m CPU, 100Mi` |
| `linux.enabled` | Install secrets store csi driver on linux nodes | true |
Expand Down Expand Up @@ -64,7 +64,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p
| `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` |
| `windows.image.repository` | Windows image repository | `k8s.gcr.io/csi-secrets-store/driver` |
| `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` |
| `windows.image.tag` | Windows image tag | `v1.0.1` |
| `windows.image.tag` | Windows image tag | `v1.1.0-rc.0` |
| `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` |
| `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` |
| `windows.enabled` | Install secrets store csi driver on windows nodes | false |
Expand Down
6 changes: 3 additions & 3 deletions manifest_staging/charts/secrets-store-csi-driver/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@ linux:
enabled: true
image:
repository: k8s.gcr.io/csi-secrets-store/driver
tag: v1.0.1
tag: v1.1.0-rc.0
pullPolicy: IfNotPresent

crds:
image:
repository: k8s.gcr.io/csi-secrets-store/driver-crds
tag: v1.0.1
tag: v1.1.0-rc.0
pullPolicy: IfNotPresent
annotations: {}

Expand Down Expand Up @@ -93,7 +93,7 @@ windows:
enabled: false
image:
repository: k8s.gcr.io/csi-secrets-store/driver
tag: v1.0.1
tag: v1.1.0-rc.0
pullPolicy: IfNotPresent

## Prevent the CSI driver from being scheduled on virtual-kubelet nodes
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ spec:
cpu: 100m
memory: 100Mi
- name: secrets-store
image: k8s.gcr.io/csi-secrets-store/driver:v1.0.1
image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0
args:
- "--endpoint=$(CSI_ENDPOINT)"
- "--nodeid=$(KUBE_NODE_NAME)"
Expand Down
2 changes: 1 addition & 1 deletion manifest_staging/deploy/secrets-store-csi-driver.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ spec:
cpu: 10m
memory: 20Mi
- name: secrets-store
image: k8s.gcr.io/csi-secrets-store/driver:v1.0.1
image: k8s.gcr.io/csi-secrets-store/driver:v1.1.0-rc.0
args:
- "--endpoint=$(CSI_ENDPOINT)"
- "--nodeid=$(KUBE_NODE_NAME)"
Expand Down

0 comments on commit f63c4ae

Please sign in to comment.