Skip to content
This repository has been archived by the owner on Nov 28, 2022. It is now read-only.

Commit

Permalink
Update Vault default image (#44)
Browse files Browse the repository at this point in the history
  • Loading branch information
asaintsever authored Feb 9, 2021
1 parent ea5fb8f commit 223449e
Show file tree
Hide file tree
Showing 6 changed files with 14 additions and 8 deletions.
8 changes: 7 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,13 @@

## Release v7.1.0 - TO_BE_RELEASED

A new `sidecar.vault.talend.org/vault-image` annotation has been added to override the default injected image. Refer to the [samples](samples) for a working example.
A new `sidecar.vault.talend.org/vault-image` annotation has been added to override the default injected image. Refer to the [samples](samples) for a [working example](samples/app-dep-10-secrets_custom_image_notify.yaml).

The default Vault image has been bumped to version `1.6.2`.

**Changed**

- [VSI #44](https://github.com/Talend/vault-sidecar-injector/pull/44) - Update HashiCorp Vault image to 1.6.2

**Added**

Expand Down
2 changes: 1 addition & 1 deletion deploy/helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ injectconfig:
vault:
image:
path: "vault" # image path
tag: "1.5.4" # image tag
tag: "1.6.2" # image tag
pullPolicy: Always # Pull policy for images: IfNotPresent or Always
log:
level: info # Vault log level: trace, debug, info, warn, err
Expand Down
2 changes: 1 addition & 1 deletion doc/Configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ The following table lists the configurable parameters of the `Vault Sidecar Inje
| injectconfig.jobbabysitter.resources.requests.memory | Job babysitter sidecar memory resource requests | 20Mi |
| injectconfig.vault.image.path | Image path | vault |
| injectconfig.vault.image.pullPolicy | Pull policy for image: IfNotPresent or Always | Always |
| injectconfig.vault.image.tag | Image tag | 1.5.4 |
| injectconfig.vault.image.tag | Image tag | 1.6.2 |
| injectconfig.vault.log.format | Vault log format: standard, json | json |
| injectconfig.vault.log.level | Vault log level: trace, debug, info, warn, err | info |
| injectconfig.vault.resources.limits.cpu | Vault sidecar CPU resource limits | 50m |
Expand Down
2 changes: 1 addition & 1 deletion doc/Deploy.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Using HashiCorp's Vault Helm chart:
```bash
git clone https://github.com/hashicorp/vault-helm.git
cd vault-helm
git checkout v0.7.0
git checkout v0.9.1
helm install vault . --set injector.enabled=false --set server.dev.enabled=true --set ui.enabled=true --set ui.serviceType="NodePort"
```

Expand Down
4 changes: 2 additions & 2 deletions test/config/injectionconfig.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
initContainers:
- name: tvsi-vault-agent-init
image: vault:1.5.4
image: vault:1.6.2
imagePullPolicy: Always
env:
- name: SKIP_SETCAP
Expand Down Expand Up @@ -106,7 +106,7 @@ containers:
mountPath: /var/run/secrets/kubernetes.io/serviceaccount
readOnly: true
- name: tvsi-vault-agent
image: vault:1.5.4
image: vault:1.6.2
imagePullPolicy: Always
env:
- name: SKIP_SETCAP
Expand Down
4 changes: 2 additions & 2 deletions test/config/injectionconfig.yaml.resolved
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ containers:
- name: VSI_VAULT_AUTH_METHOD
value: kubernetes
- name: VSI_VAULT_ROLE
image: vault:1.5.4
image: vault:1.6.2
imagePullPolicy: Always
lifecycle:
preStop:
Expand Down Expand Up @@ -173,7 +173,7 @@ initContainers:
value: https://vault:8200
- name: VSI_SECRETS_TEMPLATES_PLACEHOLDER
- name: VSI_VAULT_ROLE
image: vault:1.5.4
image: vault:1.6.2
imagePullPolicy: Always
name: tvsi-vault-agent-init
resources: {}
Expand Down

0 comments on commit 223449e

Please sign in to comment.