diff --git a/charts/secrets-store-csi-driver/Chart.yaml b/charts/secrets-store-csi-driver/Chart.yaml index ee1a71c9b..e69aa5607 100644 --- a/charts/secrets-store-csi-driver/Chart.yaml +++ b/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.3.3 -appVersion: 1.3.3 +version: 1.3.4 +appVersion: 1.3.4 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/charts/secrets-store-csi-driver/README.md b/charts/secrets-store-csi-driver/README.md index 076df264e..15cbf350e 100644 --- a/charts/secrets-store-csi-driver/README.md +++ b/charts/secrets-store-csi-driver/README.md @@ -33,11 +33,11 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.3.3` | +| `linux.image.tag` | Linux image tag | `v1.3.4` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.3.3` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.3.4` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -51,12 +51,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `linux.registrarImage.repository` | Linux node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `linux.registrarImage.pullPolicy` | Linux node-driver-registrar image pull policy | `IfNotPresent` | -| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.7.0` | +| `linux.registrarImage.tag` | Linux node-driver-registrar image tag | `v2.8.0` | | `linux.registrar.resources` | The resource request/limits for the linux node-driver-registrar container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `linux.livenessProbeImage.repository` | Linux liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `linux.livenessProbeImage.pullPolicy` | Linux liveness-probe image pull policy | `IfNotPresent` | -| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.9.0` | +| `linux.livenessProbeImage.tag` | Linux liveness-probe image tag | `v2.10.0` | | `linux.livenessProbe.resources` | The resource request/limits for the linux liveness-probe container image | `limits: 100m CPU, 100Mi; requests: 10m CPU, 20Mi` | | `linux.env` | Environment variables to be passed for the daemonset on linux nodes | `[]` | | `linux.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | @@ -69,7 +69,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.3.3` | +| `windows.image.tag` | Windows image tag | `v1.3.4` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | @@ -81,12 +81,12 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `windows.metricsAddr` | The address the metric endpoint binds to | `:8095` | | `windows.registrarImage.repository` | Windows node-driver-registrar image repository | `registry.k8s.io/sig-storage/csi-node-driver-registrar` | | `windows.registrarImage.pullPolicy` | Windows node-driver-registrar image pull policy | `IfNotPresent` | -| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.7.0` | +| `windows.registrarImage.tag` | Windows node-driver-registrar image tag | `v2.8.0` | | `windows.registrar.resources` | The resource request/limits for the windows node-driver-registrar container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.registrar.logVerbosity` | Log level for node-driver-registrar. Uses V logs (klog) | `5` | | `windows.livenessProbeImage.repository` | Windows liveness-probe image repository | `registry.k8s.io/sig-storage/livenessprobe` | | `windows.livenessProbeImage.pullPolicy` | Windows liveness-probe image pull policy | `IfNotPresent` | -| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.9.0` | +| `windows.livenessProbeImage.tag` | Windows liveness-probe image tag | `v2.10.0` | | `windows.livenessProbe.resources` | The resource request/limits for the windows liveness-probe container image | `limits: 200m CPU, 200Mi; requests: 10m CPU, 20Mi` | | `windows.env` | Environment variables to be passed for the daemonset on windows nodes | `[]` | | `windows.priorityClassName` | Indicates the importance of a Pod relative to other Pods. | `""` | diff --git a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml index 80fa563a1..aa177b495 100644 --- a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml +++ b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml @@ -3,8 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.9.0 - creationTimestamp: null + controller-gen.kubebuilder.io/version: v0.11.4 name: secretproviderclasses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io diff --git a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml index 724b1db8c..0a0121b33 100644 --- a/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml +++ b/charts/secrets-store-csi-driver/crds/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml @@ -3,8 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.9.0 - creationTimestamp: null + controller-gen.kubebuilder.io/version: v0.11.4 name: secretproviderclasspodstatuses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io diff --git a/charts/secrets-store-csi-driver/templates/role-rotation.yaml b/charts/secrets-store-csi-driver/templates/role-rotation.yaml index c1f78c2d9..64bbf28fa 100644 --- a/charts/secrets-store-csi-driver/templates/role-rotation.yaml +++ b/charts/secrets-store-csi-driver/templates/role-rotation.yaml @@ -3,7 +3,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretproviderrotation-role labels: {{ include "sscd.labels" . | indent 4 }} diff --git a/charts/secrets-store-csi-driver/templates/role-syncsecret.yaml b/charts/secrets-store-csi-driver/templates/role-syncsecret.yaml index ed21ebf15..f5c6b76e2 100644 --- a/charts/secrets-store-csi-driver/templates/role-syncsecret.yaml +++ b/charts/secrets-store-csi-driver/templates/role-syncsecret.yaml @@ -3,7 +3,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretprovidersyncing-role labels: {{ include "sscd.labels" . | indent 4 }} diff --git a/charts/secrets-store-csi-driver/templates/role-tokenrequest.yaml b/charts/secrets-store-csi-driver/templates/role-tokenrequest.yaml index 62b199198..f81594ea0 100644 --- a/charts/secrets-store-csi-driver/templates/role-tokenrequest.yaml +++ b/charts/secrets-store-csi-driver/templates/role-tokenrequest.yaml @@ -3,7 +3,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretprovidertokenrequest-role labels: {{ include "sscd.labels" . | indent 4 }} diff --git a/charts/secrets-store-csi-driver/templates/role.yaml b/charts/secrets-store-csi-driver/templates/role.yaml index 71192bc12..58fa18b62 100644 --- a/charts/secrets-store-csi-driver/templates/role.yaml +++ b/charts/secrets-store-csi-driver/templates/role.yaml @@ -3,7 +3,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretproviderclasses-role labels: {{ include "sscd.labels" . | indent 4 }} diff --git a/charts/secrets-store-csi-driver/values.yaml b/charts/secrets-store-csi-driver/values.yaml index bbbae9c6f..572038d05 100644 --- a/charts/secrets-store-csi-driver/values.yaml +++ b/charts/secrets-store-csi-driver/values.yaml @@ -2,14 +2,14 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.3 + tag: v1.3.4 pullPolicy: IfNotPresent crds: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.3.3 + tag: v1.3.4 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -44,7 +44,7 @@ linux: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.7.0 + tag: v2.8.0 pullPolicy: IfNotPresent registrar: @@ -59,7 +59,7 @@ linux: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.9.0 + tag: v2.10.0 pullPolicy: IfNotPresent livenessProbe: @@ -107,7 +107,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.3 + tag: v1.3.4 pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes @@ -132,7 +132,7 @@ windows: registrarImage: repository: registry.k8s.io/sig-storage/csi-node-driver-registrar - tag: v2.7.0 + tag: v2.8.0 pullPolicy: IfNotPresent registrar: @@ -147,7 +147,7 @@ windows: livenessProbeImage: repository: registry.k8s.io/sig-storage/livenessprobe - tag: v2.9.0 + tag: v2.10.0 pullPolicy: IfNotPresent livenessProbe: diff --git a/deploy/rbac-secretproviderclass.yaml b/deploy/rbac-secretproviderclass.yaml index 26a025bf2..0c3753709 100644 --- a/deploy/rbac-secretproviderclass.yaml +++ b/deploy/rbac-secretproviderclass.yaml @@ -7,7 +7,6 @@ metadata: apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretproviderclasses-role rules: - apiGroups: diff --git a/deploy/rbac-secretproviderrotation.yaml b/deploy/rbac-secretproviderrotation.yaml index 53af8cd97..24ecde822 100644 --- a/deploy/rbac-secretproviderrotation.yaml +++ b/deploy/rbac-secretproviderrotation.yaml @@ -1,7 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretproviderrotation-role rules: - apiGroups: diff --git a/deploy/rbac-secretprovidersyncing.yaml b/deploy/rbac-secretprovidersyncing.yaml index b021f5099..6b62b2eaf 100644 --- a/deploy/rbac-secretprovidersyncing.yaml +++ b/deploy/rbac-secretprovidersyncing.yaml @@ -1,7 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretprovidersyncing-role rules: - apiGroups: diff --git a/deploy/rbac-secretprovidertokenrequest.yaml b/deploy/rbac-secretprovidertokenrequest.yaml index f96c8372f..b97ff3d55 100644 --- a/deploy/rbac-secretprovidertokenrequest.yaml +++ b/deploy/rbac-secretprovidertokenrequest.yaml @@ -1,7 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: secretprovidertokenrequest-role rules: - apiGroups: diff --git a/deploy/secrets-store-csi-driver-windows.yaml b/deploy/secrets-store-csi-driver-windows.yaml index 61e92a122..8a37fcc98 100644 --- a/deploy/secrets-store-csi-driver-windows.yaml +++ b/deploy/secrets-store-csi-driver-windows.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.7.0 + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 args: - --v=5 - "--csi-address=unix://C:\\csi\\csi.sock" @@ -44,7 +44,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.3 + image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -93,7 +93,7 @@ spec: - name: providers-dir mountPath: C:\k\secrets-store-csi-providers - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.9.0 + image: registry.k8s.io/sig-storage/livenessprobe:v2.10.0 imagePullPolicy: IfNotPresent args: - "--csi-address=unix://C:\\csi\\csi.sock" diff --git a/deploy/secrets-store-csi-driver.yaml b/deploy/secrets-store-csi-driver.yaml index caa0691c7..7ca1b7c3d 100644 --- a/deploy/secrets-store-csi-driver.yaml +++ b/deploy/secrets-store-csi-driver.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar - image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.7.0 + image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 args: - --v=5 - --csi-address=/csi/csi.sock @@ -44,7 +44,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.3 + image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" @@ -99,7 +99,7 @@ spec: cpu: 50m memory: 100Mi - name: liveness-probe - image: registry.k8s.io/sig-storage/livenessprobe:v2.9.0 + image: registry.k8s.io/sig-storage/livenessprobe:v2.10.0 imagePullPolicy: IfNotPresent args: - --csi-address=/csi/csi.sock diff --git a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml index 80fa563a1..aa177b495 100644 --- a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml +++ b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml @@ -3,8 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.9.0 - creationTimestamp: null + controller-gen.kubebuilder.io/version: v0.11.4 name: secretproviderclasses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io diff --git a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml index 724b1db8c..0a0121b33 100644 --- a/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml +++ b/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml @@ -3,8 +3,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.9.0 - creationTimestamp: null + controller-gen.kubebuilder.io/version: v0.11.4 name: secretproviderclasspodstatuses.secrets-store.csi.x-k8s.io spec: group: secrets-store.csi.x-k8s.io diff --git a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml index ee1a71c9b..e69aa5607 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: secrets-store-csi-driver -version: 1.3.3 -appVersion: 1.3.3 +version: 1.3.4 +appVersion: 1.3.4 kubeVersion: ">=1.16.0-0" description: A Helm chart to install the SecretsStore CSI Driver inside a Kubernetes cluster. icon: https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png diff --git a/manifest_staging/charts/secrets-store-csi-driver/README.md b/manifest_staging/charts/secrets-store-csi-driver/README.md index 076df264e..e038d41d5 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/README.md +++ b/manifest_staging/charts/secrets-store-csi-driver/README.md @@ -33,11 +33,11 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `fullnameOverride` | String to fully override secrets-store-csi-driver.fullname template with a string | `""` | | `linux.image.repository` | Linux image repository | `registry.k8s.io/csi-secrets-store/driver` | | `linux.image.pullPolicy` | Linux image pull policy | `IfNotPresent` | -| `linux.image.tag` | Linux image tag | `v1.3.3` | +| `linux.image.tag` | Linux image tag | `v1.3.4` | | `linux.crds.enabled` | If the CRDs should be managed by the chart | `true` | | `linux.crds.image.repository` | Linux crds image repository | `registry.k8s.io/csi-secrets-store/driver-crds` | | `linux.crds.image.pullPolicy` | Linux crds image pull policy | `IfNotPresent` | -| `linux.crds.image.tag` | Linux crds image tag | `v1.3.3` | +| `linux.crds.image.tag` | Linux crds image tag | `v1.3.4` | | `linux.crds.resources` | The resource request/limits for the linux crds container image | `{}` | | `linux.crds.podLabels` | Linux *Pod* labels appended to CRD helm hook job pods | `{}` | | `linux.affinity` | Linux affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | @@ -69,7 +69,7 @@ The following table lists the configurable parameters of the csi-secrets-store-p | `linux.updateStrategy` | Configure a custom update strategy for the daemonset on linux nodes | `RollingUpdate with 1 maxUnavailable` | | `windows.image.repository` | Windows image repository | `registry.k8s.io/csi-secrets-store/driver` | | `windows.image.pullPolicy` | Windows image pull policy | `IfNotPresent` | -| `windows.image.tag` | Windows image tag | `v1.3.3` | +| `windows.image.tag` | Windows image tag | `v1.3.4` | | `windows.affinity` | Windows affinity | `key: type; operator: NotIn; values: [virtual-kubelet]` | | `windows.driver.resources` | The resource request/limits for the windows secrets-store container image | `limits: 400m CPU, 400Mi; requests: 50m CPU, 100Mi` | | `windows.enabled` | Install secrets store csi driver on windows nodes | false | diff --git a/manifest_staging/charts/secrets-store-csi-driver/values.yaml b/manifest_staging/charts/secrets-store-csi-driver/values.yaml index bbbae9c6f..67621ece5 100644 --- a/manifest_staging/charts/secrets-store-csi-driver/values.yaml +++ b/manifest_staging/charts/secrets-store-csi-driver/values.yaml @@ -2,14 +2,14 @@ linux: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.3 + tag: v1.3.4 pullPolicy: IfNotPresent crds: enabled: true image: repository: registry.k8s.io/csi-secrets-store/driver-crds - tag: v1.3.3 + tag: v1.3.4 pullPolicy: IfNotPresent ## Optionally override resource limits for crd hooks(jobs) resources: {} @@ -107,7 +107,7 @@ windows: enabled: false image: repository: registry.k8s.io/csi-secrets-store/driver - tag: v1.3.3 + tag: v1.3.4 pullPolicy: IfNotPresent ## Prevent the CSI driver from being scheduled on virtual-kubelet nodes diff --git a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml index 61e92a122..eee717a90 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver-windows.yaml @@ -44,7 +44,7 @@ spec: cpu: 100m memory: 100Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.3 + image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" diff --git a/manifest_staging/deploy/secrets-store-csi-driver.yaml b/manifest_staging/deploy/secrets-store-csi-driver.yaml index caa0691c7..ca3f7e4a2 100644 --- a/manifest_staging/deploy/secrets-store-csi-driver.yaml +++ b/manifest_staging/deploy/secrets-store-csi-driver.yaml @@ -44,7 +44,7 @@ spec: cpu: 10m memory: 20Mi - name: secrets-store - image: registry.k8s.io/csi-secrets-store/driver:v1.3.3 + image: registry.k8s.io/csi-secrets-store/driver:v1.3.4 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)"