Skip to content

v0.0.22

Compare
Choose a tag to compare
@aramase aramase released this 18 May 00:09
e2f85d3

Announcement 📢

  • syncSecret.enabled will be set to false by default in the next release v0.0.23. Refer to #268 for more info.
  • --filtered-watch-secret will be enabled by default in v0.1.0 release. Refer to #550 for more info.
  • Note to Providers: Prepare to return files in gRPC responses as this will become the recommended approach in a future release. See #551

Features 🌈

  • add optional healthcheck for provider plugins (#508, @aramase)
  • allow maxCallRecvMsgSize to be increased for large secret mounts (#512, @tam7t)
  • vendor atomic_writer and use it to write files returned by grpc (#520, @tam7t)

Bug Fixes 🐞

  • GetMountedFiles() returns map that key includes sub directory (#516, @mitsutaka)
  • windows targetpath cleanup as part of node unpublish (#545, @aramase)

Documentation 📘

Testing 💚

  • include nested path in secret sync and update vault suite (#532, @aramase)

Helm 📈

  • Added Pod Security Policy to the chart (#478, @pierluigilenoci)
  • node affinity now prevents CSI driver from being scheduled on a node with a label 'type=virtual-kublet' (#513, @manedurphy)

Maintenance 🔧

  • updates CSIDriver api ver to storage.k8s.io/v1 (#518, @nilekhc)
  • update to using k8s.io/mount-utils (#524, @aramase)
  • remove windows file deletion on unmount (#526, @tam7t)
  • update sidecar images and set imagePullPolicy to IfNotPresent (#519, @aramase)
  • update release docs and makefile targets (#543, @aramase)
  • Bump versions for v0.0.22 (#544, @tam7t)
  • make manifests dependencies (#547, @tam7t)

Driver images are hosted in GCR at k8s.gcr.io/csi-secrets-store/driver