Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DATAGO-59820: Upgrading vault to 1.14.0 #23

Merged
merged 131 commits into from
Aug 29, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
131 commits
Select commit Hold shift + click to select a range
c47ff33
add staticSecretRenderInterval to injector (#621)
kaitoii11 Nov 6, 2021
21cc21f
Update jira action (#644)
tomhjp Nov 16, 2021
0375b18
remove support for the leader-elector container (#649)
tvoran Nov 17, 2021
9fa25e9
vault-helm 0.18.0 release (#650)
tvoran Nov 17, 2021
48eebb0
Run CI tests in github workflows (#657)
tvoran Dec 11, 2021
609444d
Configurable PodDisruptionBudget for Injector (#653)
sosheskaz Dec 14, 2021
b4a9249
Fix spelling error in server disruptionbudget test (#654)
sosheskaz Dec 14, 2021
248397f
Make terminationGracePeriodSeconds configurable (#659)
mikutas Dec 15, 2021
0c0b6e3
injector: ability to set deployment update strategy (continued) (#661)
tvoran Dec 16, 2021
0043023
csi: ability to set priorityClassName for csi daemonset pods (#670)
brainiac84 Jan 4, 2022
c511d30
Fixed a small typo (#672)
nikstur Jan 7, 2022
0a1f8d1
Disable unit and acceptance tests in CircleCI (#675)
tvoran Jan 11, 2022
d6e1cd0
update CONTRIBUTING.md (#677)
tvoran Jan 12, 2022
a84a61f
add namespace support for openshift route (#679)
Jan 14, 2022
e629dc9
Add volumes and env vars to helm hook test pod (#673)
Iristyle Jan 20, 2022
92da512
allow injection of TLS config for OpenShift routes (#686)
mbaldessari Jan 20, 2022
b0528fc
Release 0.19.0 (#687)
tvoran Jan 20, 2022
a2d9a01
Add extraLabels for CSI DaemonSet (#690)
michaeljs1990 Feb 25, 2022
b447a92
Updated hashicorp/vault-csi-provider image to v1.0.0 (#689)
TroyFluegge Feb 25, 2022
19b417c
Fix unit test assertions (#693)
tomhjp Feb 25, 2022
a7e56d8
vault: bump image to 1.9.3 (#695)
lion24 Mar 2, 2022
4f5c01f
changelog++ (#699)
tomhjp Mar 2, 2022
a81a992
change helm trigger branch from master to main (#700)
alvin-huang Mar 3, 2022
f59f3d4
Add namespace to injector-leader-elector role, rolebinding and secret…
thechristschn Mar 16, 2022
549d9b8
allow to configure publishNotReadyAddresses on server services (#694)
avoidik Mar 17, 2022
56a253b
Maintain pre-existing Mutating Webhook default values for Kubernetes …
NLRemco Mar 18, 2022
7109159
VAULT-571 Matching documented behavior and consul (#703)
swenson Mar 21, 2022
460b5e1
Update k8s versions (#706)
tvoran Mar 21, 2022
4da0638
Fix values schema to support config in YAML (#684)
gw0 Mar 28, 2022
12444bf
Support policy/v1 disruptionbudget beyond kube 1.21 (#710)
sharkannon Apr 5, 2022
4ae52c8
Remove unncessary template calls (#712)
Iristyle Apr 13, 2022
87e4567
Issue 629: updated to allow customization of the CLUSTER_ADDR the sam…
sharkannon Apr 14, 2022
230bba4
VAULT-5838 Update CSI provider to 1.1.0 (#721)
swenson Apr 27, 2022
9b43054
VUALT-5838 Restore Secrets Store CSI driver to 1.0.0 (#722)
swenson Apr 27, 2022
4005767
Implement support for Topology Spread Constraints (#652)
sosheskaz Apr 28, 2022
eba7548
Update the changelog with changes from 614 and 652 (#723)
swenson Apr 28, 2022
6ca2f72
Prepare v0.20.0 release (#727)
tomhjp May 16, 2022
86b3009
Fix CSI acceptance tests (#728)
tomhjp May 16, 2022
3dcc3fd
Update minimum required helm version in readme (#730)
tvoran May 20, 2022
830761a
Restore missing 'vault' service account (#737)
swenson May 24, 2022
daa2b3b
Set default object selector for webhooks to exclude injector itself (…
swenson May 24, 2022
45897a6
Prepare for release 0.20.1 (#739)
swenson May 26, 2022
80560f5
Mention minimum helm version in changelog (#742)
tvoran Jun 1, 2022
48f4ab8
Start testing against Kubernetes 1.24 (#744)
swenson Jun 2, 2022
d78a292
Update .helmignore (#732)
alexey-ban Jun 2, 2022
44a07b8
Set VAULT_ADDR env var for CSI Provider pods (#745)
tomhjp Jun 7, 2022
6c14d9d
Support to add annotations in injector serviceaccount (#753)
brunopadz Jul 11, 2022
324d689
changelog++ (#757)
tvoran Jul 18, 2022
999b0b7
jira-sync: transition to "Closed" not "Close" (#758)
tvoran Jul 19, 2022
553af86
Add support for nodePort for active and standby services (#610)
jzck Aug 1, 2022
eb95ac5
Feat/adding pod and container security context (#750)
ChrisFraun Aug 2, 2022
6931720
Changelog and schema update for active/standby node port (#761)
swenson Aug 2, 2022
91b6c64
changelog++ and json schema update (#762)
tvoran Aug 3, 2022
8bc1604
Update jira sync (#768)
benashz Aug 5, 2022
9efd98a
csi/server.statefulset: custom security context (#767)
swenson Aug 8, 2022
eca526b
Prepare for 0.21.0 release (#771)
swenson Aug 10, 2022
9fa4c6c
DOC: Minor typos fixes (#669)
hayorov Aug 16, 2022
85562b4
update values comments for server.securityContext (#778)
tvoran Aug 26, 2022
8a6872e
CI: run acceptance tests on push to any (#781)
benashz Sep 1, 2022
0407431
Add support for the Prometheus Operator (#772)
benashz Sep 1, 2022
99d745c
Update vault-k8s to 1.0.0 (#784)
swenson Sep 8, 2022
c15d83e
Prepare for 0.22.0 release (#785)
swenson Sep 8, 2022
7e21a09
Add server.hostNetwork option (#775)
tomhjp Sep 12, 2022
a3bbaea
[COMPLIANCE] Add MPL 2.0 LICENSE (#800)
hashicorp-copywrite[bot] Oct 12, 2022
5d7014c
Prepare to release to 0.22.1 (#803)
tomhjp Oct 26, 2022
46e6fb5
Fix CircleCI config (#804)
tomhjp Oct 27, 2022
ab5b471
Add extraLabels for Vault server serviceAccount (#806)
AleksandrTitov Nov 3, 2022
0110f97
Quote `.server.ha.clusterAddr` value (#810)
justusbunsi Nov 9, 2022
21ce524
Support selectively disabling active/standby services and service dis…
tomhjp Nov 14, 2022
c13151a
server: Allow disabling the instance selector for services (#813)
tomhjp Nov 17, 2022
2d7fd5d
Prepare for 0.23.0 release (#814)
tomhjp Nov 28, 2022
72914d8
Amending docs (#828)
dtrts Jan 12, 2023
a4e076b
swap helm charts call to GHA (#840)
claire-labry Feb 3, 2023
c5c28cb
Call helm publish workflow by file name without path (#843)
marianoasselborn Feb 13, 2023
742ddb1
adding SPDX copyright headers (#844)
tvoran Feb 13, 2023
34d8650
Fix typo in telemetry example (#846)
jordanfelle Feb 16, 2023
e31e70e
Add extraPorts property (#841)
mitashkistz Feb 16, 2023
f4f05aa
fix: remove k8s 1.16 from acceptance testing (#848)
thyton Feb 27, 2023
9328917
feat: make injector livenessProbe and readinessProbe configurable and…
thyton Mar 16, 2023
2c4cd3a
Updating GHA and default Vault version (#863)
tvoran Apr 3, 2023
9f18980
Add portnumber (#831)
bhargav2427 Apr 4, 2023
fc7d432
Add changelog for #831 (#867)
kschoche Apr 4, 2023
0fe9164
Add Vault Agent sidecar to CSI Provider (#749)
tomhjp Apr 6, 2023
d52c4a5
Prepare for 0.24.0 release (#868)
swenson Apr 6, 2023
1307dbe
add copyright header to csi-agent-configmap.yaml (#870)
tvoran Apr 11, 2023
bb9a069
Convert hashicorp/vault-helm to GitHub Actions (#861)
hc-github-team-es-release-engineering Apr 12, 2023
ded705d
Remove CircelCI (#871)
dekimsey Apr 12, 2023
9954df5
Add role for creating CSI's HMAC secret key (#872)
tomhjp Apr 14, 2023
677c932
Prepare for 0.24.1 release (#879)
tomhjp Apr 17, 2023
a5d803a
Fix chart version for 0.24.1 release (#880)
tomhjp Apr 17, 2023
14585a1
Result of tsccr-helper -pin-all-workflows . (#882)
hashicorp-tsccr[bot] Apr 21, 2023
582e7d0
spelling fix (#888)
akumar-99 May 15, 2023
b9096ee
Make injected Agent ephemeral storage configurable through injector.a…
krishnadas-m May 17, 2023
a276600
Default prometheusRules.rules should be an empty list (#886)
rissson May 18, 2023
3640daa
ci: upgrade kind-action and kind version (#899)
tvoran May 23, 2023
da34c6c
publishNotReadyAddresses for headless service always true (#902)
tomhjp May 30, 2023
a56c27c
Fix syntax for actionlint workflow (#903)
tomhjp May 31, 2023
3ce721f
CSI configurable nodeSelector and affinity (#862)
Toninh0 Jun 1, 2023
1be1038
[COMPLIANCE] Add Copyright and License Headers (#905)
hashicorp-copywrite[bot] Jun 5, 2023
cd30d98
csi: update affinity and nodeselector schema (#907)
tvoran Jun 7, 2023
38335f8
Bump actions/checkout from 3.5.2 to 3.5.3 (#910)
dependabot[bot] Jun 14, 2023
785a5e7
Bump actions/setup-go from 4.0.0 to 4.0.1 (#891)
dependabot[bot] Jun 14, 2023
a86803d
ci: Fix yq command syntax (#881)
dekimsey Jun 19, 2023
e2711a2
Prepare for 0.25.0 release (#916)
tomhjp Jun 26, 2023
18cc8ba
Explain this fork in the README
j-setiawan Apr 2, 2020
715f2c7
Adding support for LoadBalancerIP field in ServiceSpec
Apr 10, 2020
db114c8
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
f3f6e71
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
8b13f7a
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
ceed154
Explain this fork in the README
j-setiawan Apr 2, 2020
f01b3da
Adding support for LoadBalancerIP field in ServiceSpec
Apr 10, 2020
f1925dd
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
3882633
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
6c6c3c9
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
45ac830
feat(DATAGO-27002): Upgrade vault to version 1.7.9 (#12)
nagsubhrajitt Jun 1, 2022
294e9b4
fix: deploy_local.sh error with file
adhish2001 Jul 14, 2022
555f650
minor changes
adhish2001 Jul 14, 2022
c167a6d
Adding support for LoadBalancerIP field in ServiceSpec
Apr 10, 2020
008613d
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
eb39c45
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
404a8f7
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
ab0b18f
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
e7f760d
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
93f8ad7
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
0a92a9c
feat(DATAGO-27002): Upgrade vault to version 1.7.9 (#12)
nagsubhrajitt Jun 1, 2022
7ff771b
Datago 30304/upgrading vault to 1.9.2 (#14)
adhish2001 Jul 27, 2022
ae40084
feat(DATAGO-30305): Upgrade vault server to 1.10.x (#16)
xiaocongji Mar 21, 2023
a3a30c5
DATAGO-59401: Upgrading vault to 1.11.x (#18)
xiaocongji Aug 4, 2023
7c07ee6
DATAGO-59809: Upgrade vault to 1.12.1 (#20)
nagsubhrajitt Aug 17, 2023
efea2de
DATAGO-59818: Upgrading vault to 1.13.1 (#21)
xiaocongji Aug 25, 2023
26dcde7
Merge branch 'develop' of https://github.com/solacedev/vault-helm int…
xiaocongji Aug 25, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
63 changes: 62 additions & 1 deletion .circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,58 @@ orbs:
slack: circleci/slack@3.4.2

jobs:
bats-unit-test:
docker:
# This image is built from test/docker/Test.dockerfile
- image: docker.mirror.hashicorp.services/hashicorpdev/vault-helm-test:0.2.0
steps:
- checkout
- run: bats ./test/unit -t

chart-verifier:
docker:
- image: docker.mirror.hashicorp.services/cimg/go:1.16
environment:
BATS_VERSION: "1.3.0"
CHART_VERIFIER_VERSION: "1.0.0"
steps:
- checkout
- run:
name: install chart-verifier
command: go get github.com/redhat-certification/chart-verifier@${CHART_VERIFIER_VERSION}
- run:
name: install bats
command: |
curl -sSL https://github.com/bats-core/bats-core/archive/v${BATS_VERSION}.tar.gz -o /tmp/bats.tgz
tar -zxf /tmp/bats.tgz -C /tmp
sudo /bin/bash /tmp/bats-core-${BATS_VERSION}/install.sh /usr/local
- run:
name: run chart-verifier tests
command: bats ./test/chart -t

acceptance:
docker:
# This image is build from test/docker/Test.dockerfile
- image: docker.mirror.hashicorp.services/hashicorpdev/vault-helm-test:0.2.0

steps:
- checkout
- run:
name: terraform init & apply
command: |
echo -e "${GOOGLE_APP_CREDS}" | base64 -d > vault-helm-test.json
export GOOGLE_CREDENTIALS=vault-helm-test.json
make provision-cluster
- run:
name: Run acceptance tests
command: bats ./test/acceptance -t

- run:
name: terraform destroy
command: |
export GOOGLE_CREDENTIALS=vault-helm-test.json
make destroy-cluster
when: always
update-helm-charts-index:
docker:
- image: docker.mirror.hashicorp.services/cimg/go:1.19.2
Expand Down Expand Up @@ -54,7 +106,16 @@ parameters:

workflows:
version: 2
# Note: unit and acceptance tests are now being run in GitHub Actions
build_and_test:
jobs:
- bats-unit-test
- chart-verifier
- acceptance:
requires:
- bats-unit-test
filters:
branches:
only: master
update-helm-charts-index:
jobs:
- update-helm-charts-index:
Expand Down
24 changes: 24 additions & 0 deletions .github/actions/setup-test-tools/action.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# Copyright (c) HashiCorp, Inc.
# SPDX-License-Identifier: MPL-2.0

name: Setup common testing tools
description: Install bats and python-yq
runs:
using: "composite"
steps:
- uses: actions/setup-node@64ed1c7eab4cce3362f8c340dee64e5eaeef8f7c # v3.6.0
with:
node-version: '16'
- run: npm install -g bats@${BATS_VERSION}
shell: bash
env:
BATS_VERSION: '1.8.2'
- run: bats -v
shell: bash
- uses: actions/setup-python@d27e3f3d7c64b4bbf8e4abfb9b63b83e846e0435 # v4.5.0
with:
python-version: '3.10'
- run: pip install yq
shell: bash
permissions:
contents: read
7 changes: 7 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
version: 2

updates:
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "daily"
16 changes: 7 additions & 9 deletions .github/workflows/acceptance.yaml
Original file line number Diff line number Diff line change
@@ -1,26 +1,24 @@
name: Acceptance Tests

on: [push, workflow_dispatch]

jobs:
kind:
strategy:
fail-fast: false
matrix:
kind-k8s-version: [1.22.17, 1.23.17, 1.24.12, 1.25.8, 1.26.3]
kind-k8s-version: [1.22.17, 1.23.17, 1.24.13, 1.25.9, 1.26.4, 1.27.2]
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- name: Setup test tools
uses: ./.github/workflows/setup-test-tools

uses: ./.github/actions/setup-test-tools
- name: Create K8s Kind Cluster
uses: helm/kind-action@d8ccf8fb623ce1bb360ae2f45f323d9d5c5e9f00 # v1.5.0
uses: helm/kind-action@fa81e57adff234b2908110485695db0f181f3c67 # v1.7.0
with:
config: test/kind/config.yaml
node_image: kindest/node:v${{ matrix.kind-k8s-version }}
version: v0.17.0

version: v0.19.0
- run: bats --tap --timing ./test/acceptance
env:
VAULT_LICENSE_CI: ${{ secrets.VAULT_LICENSE_CI }}
permissions:
contents: read
14 changes: 14 additions & 0 deletions .github/workflows/actionlint.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# If the repository is public, be sure to change to GitHub hosted runners
name: Lint GitHub Actions Workflows
on:
push:
paths:
- .github/workflows/**.yml
pull_request:
paths:
- .github/workflows/**.yml
permissions:
contents: read
jobs:
actionlint:
uses: hashicorp/vault-workflows-common/.github/workflows/actionlint.yaml@main
17 changes: 8 additions & 9 deletions .github/workflows/tests.yaml
Original file line number Diff line number Diff line change
@@ -1,25 +1,24 @@
name: Tests

on: [push, workflow_dispatch]

jobs:
bats-unit-tests:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- uses: ./.github/workflows/setup-test-tools
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- uses: ./.github/actions/setup-test-tools
- run: bats --tap --timing ./test/unit

chart-verifier:
runs-on: ubuntu-latest
env:
CHART_VERIFIER_VERSION: '1.10.1'
steps:
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- name: Setup test tools
uses: ./.github/workflows/setup-test-tools
- uses: actions/setup-go@6edd4406fa81c3da01a34fa6f6343087c207a568 # v3.5.0
uses: ./.github/actions/setup-test-tools
- uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1
with:
go-version: '1.19.2'
- run: go install github.com/redhat-certification/chart-verifier@${CHART_VERIFIER_VERSION}
- run: go install "github.com/redhat-certification/chart-verifier@${CHART_VERIFIER_VERSION}"
- run: bats --tap --timing ./test/chart
permissions:
contents: read
40 changes: 40 additions & 0 deletions .github/workflows/update-helm-charts-index.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
name: update-helm-charts-index
on:
push:
tags:
- 'v[0-9]+.[0-9]+.[0-9]+'

permissions:
contents: read

jobs:
update-helm-charts-index:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- name: verify Chart version matches tag version
run: |-
export TAG=${{ github.ref_name }}
git_tag="${TAG#v}"
chart_tag=$(yq -r '.version' Chart.yaml)
if [ "${git_tag}" != "${chart_tag}" ]; then
echo "chart version (${chart_tag}) did not match git version (${git_tag})"
exit 1
fi
- name: update helm-charts index
id: update
env:
GH_TOKEN: ${{ secrets.HELM_CHARTS_GITHUB_TOKEN }}
run: |-
gh workflow run publish-charts.yml \
--repo hashicorp/helm-charts \
--ref main \
-f SOURCE_TAG="${{ github.ref_name }}" \
-f SOURCE_REPO="${{ github.repository }}"
- uses: hashicorp/actions-slack-status@v1
if: ${{always()}}
with:
success-message: "vault-helm charts index update triggered successfully. View the run <https://github.com/hashicorp/helm-charts/actions/workflows/publish-charts.yml|here>."
failure-message: "vault-helm charts index update trigger failed."
status: ${{job.status}}
slack-webhook-url: ${{secrets.SLACK_WEBHOOK_URL}}
25 changes: 24 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,33 @@
## Unreleased

## 0.25.0 (June 26, 2023)

Changes:
* Latest Kubernetes version tested is now 1.27
* server: Headless service ignores `server.service.publishNotReadyAddresses` setting and always sets it as `true` [GH-902](https://github.com/hashicorp/vault-helm/pull/902)
* `vault` updated to 1.14.0 [GH-916](https://github.com/hashicorp/vault-helm/pull/916)
* `vault-csi-provider` updated to 1.4.0 [GH-916](https://github.com/hashicorp/vault-helm/pull/916)

Improvements:
* CSI: Make `nodeSelector` and `affinity` configurable for CSI daemonset's pods [GH-862](https://github.com/hashicorp/vault-helm/pull/862)
* injector: Add `ephemeralLimit` and `ephemeralRequest` as options for configuring Agent's ephemeral storage resources [GH-798](https://github.com/hashicorp/vault-helm/pull/798)
* Minimum kubernetes version for chart reverted to 1.20.0 to allow installation on clusters older than the oldest tested version [GH-916](https://github.com/hashicorp/vault-helm/pull/916)

Bugs:
* server: Set the default for `prometheusRules.rules` to an empty list [GH-886](https://github.com/hashicorp/vault-helm/pull/886)

## 0.24.1 (April 17, 2023)

Bugs:
* csi: Add RBAC required by v1.3.0 to create secret for HMAC key used to generate secret versions [GH-872](https://github.com/hashicorp/vault-helm/pull/872)

## 0.24.0 (April 6, 2023)

Changes:
* Earliest Kubernetes version tested is now 1.22
* `vault` updated to 1.13.1
* `vault` updated to 1.13.1 [GH-863](https://github.com/hashicorp/vault-helm/pull/863)
* `vault-k8s` updated to 1.2.1 [GH-868](https://github.com/hashicorp/vault-helm/pull/868)
* `vault-csi-provider` updated to 1.3.0 [GH-749](https://github.com/hashicorp/vault-helm/pull/749)

Features:
* server: New `extraPorts` option for adding ports to the Vault server statefulset [GH-841](https://github.com/hashicorp/vault-helm/pull/841)
Expand Down
1 change: 1 addition & 0 deletions CODEOWNERS
Validating CODEOWNERS rules …
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
* @hashicorp/vault-ecosystem-foundations
6 changes: 3 additions & 3 deletions Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@

apiVersion: v2
name: vault
version: 0.24.0
appVersion: 1.13.1
kubeVersion: ">= 1.22.0-0"
version: 0.25.0
appVersion: 1.14.0
kubeVersion: ">= 1.20.0-0"
description: Official HashiCorp Vault Chart
home: https://www.vaultproject.io
icon: https://github.com/hashicorp/vault/raw/f22d202cde2018f9455dec755118a9b84586e082/Vault_PrimaryLogo_Black.png
Expand Down
28 changes: 28 additions & 0 deletions templates/_helpers.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -859,6 +859,34 @@ Sets the injector toleration for pod placement
{{- end }}
{{- end -}}

{{/*
Sets the CSI provider nodeSelector for pod placement
*/}}
{{- define "csi.pod.nodeselector" -}}
{{- if .Values.csi.pod.nodeSelector }}
nodeSelector:
{{- $tp := typeOf .Values.csi.pod.nodeSelector }}
{{- if eq $tp "string" }}
{{ tpl .Values.csi.pod.nodeSelector . | nindent 8 | trim }}
{{- else }}
{{- toYaml .Values.csi.pod.nodeSelector | nindent 8 }}
{{- end }}
{{- end }}
{{- end -}}
{{/*
Sets the CSI provider affinity for pod placement.
*/}}
{{- define "csi.pod.affinity" -}}
{{- if .Values.csi.pod.affinity }}
affinity:
{{ $tp := typeOf .Values.csi.pod.affinity }}
{{- if eq $tp "string" }}
{{- tpl .Values.csi.pod.affinity . | nindent 8 | trim }}
{{- else }}
{{- toYaml .Values.csi.pod.affinity | nindent 8 }}
{{- end }}
{{ end }}
{{- end -}}
{{/*
Sets extra CSI provider pod annotations
*/}}
Expand Down
5 changes: 5 additions & 0 deletions templates/csi-agent-configmap.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
{{/*
Copyright (c) HashiCorp, Inc.
SPDX-License-Identifier: MPL-2.0
*/}}

{{- template "vault.csiEnabled" . -}}
{{- if and (.csiEnabled) (eq (.Values.csi.agent.enabled | toString) "true") -}}
apiVersion: v1
Expand Down
14 changes: 7 additions & 7 deletions templates/csi-daemonset.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,8 @@ spec:
{{- end }}
serviceAccountName: {{ template "vault.fullname" . }}-csi-provider
{{- template "csi.pod.tolerations" . }}
{{- template "csi.pod.nodeselector" . }}
{{- template "csi.pod.affinity" . }}
containers:
- name: {{ include "vault.name" . }}-csi-provider
{{ template "csi.resources" . }}
Expand All @@ -54,6 +56,11 @@ spec:
args:
- --endpoint=/provider/vault.sock
- --debug={{ .Values.csi.debug }}
{{- if .Values.csi.hmacSecretName }}
- --hmac-secret-name={{ .Values.csi.hmacSecretName }}
{{- else }}
- --hmac-secret-name={{- include "vault.name" . }}-csi-provider-hmac-key
{{- end }}
{{- if .Values.csi.extraArgs }}
{{- toYaml .Values.csi.extraArgs | nindent 12 }}
{{- end }}
Expand All @@ -73,13 +80,6 @@ spec:
{{- else }}
value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }}
{{- end }}
env:
- name: VAULT_ADDR
{{- if .Values.global.externalVaultAddr }}
value: "{{ .Values.global.externalVaultAddr }}"
{{- else }}
value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }}
{{- end }}
volumeMounts:
- name: providervol
mountPath: "/provider"
Expand Down
31 changes: 31 additions & 0 deletions templates/csi-role.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
{{/*
Copyright (c) HashiCorp, Inc.
SPDX-License-Identifier: MPL-2.0
*/}}

{{- template "vault.csiEnabled" . -}}
{{- if .csiEnabled -}}
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: {{ template "vault.fullname" . }}-csi-provider-role
labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
rules:
- apiGroups: [""]
resources: ["secrets"]
verbs: ["get"]
resourceNames:
{{- if .Values.csi.hmacSecretName }}
- {{ .Values.csi.hmacSecretName }}
{{- else }}
- {{ include "vault.name" . }}-csi-provider-hmac-key
{{- end }}
# 'create' permissions cannot be restricted by resource name:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#referring-to-resources
- apiGroups: [""]
resources: ["secrets"]
verbs: ["create"]
{{- end }}
Loading
Loading