Skip to content
This repository has been archived by the owner on Nov 28, 2022. It is now read-only.

Commit

Permalink
Update HashiCorp Vault image (#27)
Browse files Browse the repository at this point in the history
  • Loading branch information
asaintsever authored May 18, 2020
1 parent 0ba384b commit ef36d76
Show file tree
Hide file tree
Showing 5 changed files with 13 additions and 7 deletions.
6 changes: 6 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,12 @@

## Release v6.1.0 - 2020-05-18

This release fixes VSI deployment on Kubernetes 1.18+ clusters. It also comes with better AppRole integration and updated Vault image.

**Changed**

- [VSI #27](https://github.com/Talend/vault-sidecar-injector/pull/27) - Update HashiCorp Vault image to 1.4.1

**Added**

- [VSI #26](https://github.com/Talend/vault-sidecar-injector/pull/26) - Improve AppRole support: add tests, enforce check over secrets type, tune Vault Agent config
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -800,7 +800,7 @@ Using HashiCorp's Vault Helm chart:
```bash
$ git clone https://github.com/hashicorp/vault-helm.git
$ cd vault-helm
$ git checkout v0.4.0
$ git checkout v0.5.0
$ helm install . --name=vault --set injector.enabled=false --set server.dev.enabled=true --set ui.enabled=true --set ui.serviceType="NodePort"
```

Expand Down Expand Up @@ -1024,7 +1024,7 @@ The following table lists the configurable parameters of the `Vault Sidecar Inje
| injectconfig.jobbabysitter.resources.requests.memory | Job babysitter sidecar memory resource requests | 20Mi |
| injectconfig.vault.image.path | Image path | vault |
| injectconfig.vault.image.pullPolicy | Pull policy for image: IfNotPresent or Always | Always |
| injectconfig.vault.image.tag | Image tag | 1.3.4 |
| injectconfig.vault.image.tag | Image tag | 1.4.1 |
| injectconfig.vault.loglevel | Vault log level: trace, debug, info, warn, err | info |
| injectconfig.vault.resources.limits.cpu | Vault sidecar CPU resource limits | 50m |
| injectconfig.vault.resources.limits.memory | Vault sidecar memory resource limits | 50Mi |
Expand Down
2 changes: 1 addition & 1 deletion deploy/helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ injectconfig:
vault:
image:
path: "vault" # image path
tag: "1.3.4" # image tag
tag: "1.4.1" # image tag
pullPolicy: Always # Pull policy for images: IfNotPresent or Always
loglevel: info # Vault log level: trace, debug, info, warn, err
resources:
Expand Down
4 changes: 2 additions & 2 deletions test/config/injectionconfig.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
initContainers:
- name: tvsi-vault-agent-init
image: vault:1.3.4
image: vault:1.4.1
imagePullPolicy: Always
env:
- name: SKIP_SETCAP
Expand Down Expand Up @@ -94,7 +94,7 @@ containers:
mountPath: /var/run/secrets/kubernetes.io/serviceaccount
readOnly: true
- name: tvsi-vault-agent
image: vault:1.3.4
image: vault:1.4.1
imagePullPolicy: Always
env:
- name: SKIP_SETCAP
Expand Down
4 changes: 2 additions & 2 deletions test/config/injectionconfig.yaml.resolved
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ containers:
- name: VSI_VAULT_AUTH_METHOD
value: kubernetes
- name: VSI_VAULT_ROLE
image: vault:1.3.4
image: vault:1.4.1
imagePullPolicy: Always
lifecycle:
preStop:
Expand Down Expand Up @@ -173,7 +173,7 @@ initContainers:
value: https://vault:8200
- name: VSI_SECRETS_TEMPLATES_PLACEHOLDER
- name: VSI_VAULT_ROLE
image: vault:1.3.4
image: vault:1.4.1
imagePullPolicy: Always
name: tvsi-vault-agent-init
resources: {}
Expand Down

0 comments on commit ef36d76

Please sign in to comment.