From 02ae74e025bcf7df657ac595490544783521d143 Mon Sep 17 00:00:00 2001 From: Tom Proctor Date: Wed, 12 Jan 2022 18:59:41 +0000 Subject: [PATCH] Prepare to release 0.4.0 (#130) --- CHANGELOG.md | 2 ++ deployment/vault-csi-provider.yaml | 8 +------- manifest_staging/deployment/vault-csi-provider.yaml | 2 +- 3 files changed, 4 insertions(+), 8 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index ac4d2a5..fc4a899 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,7 @@ ## Unreleased +## 0.4.0 (January 12th, 2022) + CHANGES: * `-write-secrets` flag now defaults to `false`, delegating file writes to the driver. [[GH-127](https://github.com/hashicorp/vault-csi-provider/pull/127)] diff --git a/deployment/vault-csi-provider.yaml b/deployment/vault-csi-provider.yaml index 11f4a1c..012f352 100644 --- a/deployment/vault-csi-provider.yaml +++ b/deployment/vault-csi-provider.yaml @@ -51,7 +51,7 @@ spec: tolerations: containers: - name: provider-vault-installer - image: hashicorp/vault-csi-provider:0.3.0 + image: hashicorp/vault-csi-provider:0.4.0 imagePullPolicy: Always args: - -endpoint=/provider/vault.sock @@ -66,9 +66,6 @@ spec: volumeMounts: - name: providervol mountPath: "/provider" - - name: mountpoint-dir - mountPath: /var/lib/kubelet/pods - mountPropagation: HostToContainer livenessProbe: httpGet: path: "/health/ready" @@ -93,8 +90,5 @@ spec: - name: providervol hostPath: path: "/etc/kubernetes/secrets-store-csi-providers" - - name: mountpoint-dir - hostPath: - path: /var/lib/kubelet/pods nodeSelector: beta.kubernetes.io/os: linux diff --git a/manifest_staging/deployment/vault-csi-provider.yaml b/manifest_staging/deployment/vault-csi-provider.yaml index 0275c24..012f352 100644 --- a/manifest_staging/deployment/vault-csi-provider.yaml +++ b/manifest_staging/deployment/vault-csi-provider.yaml @@ -51,7 +51,7 @@ spec: tolerations: containers: - name: provider-vault-installer - image: hashicorp/vault-csi-provider:0.3.0 + image: hashicorp/vault-csi-provider:0.4.0 imagePullPolicy: Always args: - -endpoint=/provider/vault.sock