Skip to content

Commit

Permalink
Merge pull request #131 from tanmay-pnaik/chore/vault-1.14.1
Browse files Browse the repository at this point in the history
chore: Update to `hashicorp/vault:1.14.1`
  • Loading branch information
sagikazarmark authored Jul 26, 2023
2 parents be6bef8 + f7395ce commit 13ff470
Show file tree
Hide file tree
Showing 47 changed files with 48 additions and 48 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/ci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -211,7 +211,7 @@ jobs:
strategy:
matrix:
k8s_version: ["v1.24.15", "v1.25.11", "v1.26.6", "v1.27.3"]
vault_version: ["1.11.12", "1.12.8", "1.13.4", "1.14.0"]
vault_version: ["1.11.12", "1.12.8", "1.13.4", "1.14.1"]

steps:
- name: Checkout repository
Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ IMG ?= ghcr.io/bank-vaults/vault-operator:dev

# Default test data
TEST_K8S_VERSION ?= 1.27.1
TEST_VAULT_VERSION ?= 1.14.0
TEST_VAULT_VERSION ?= 1.14.1
TEST_BANK_VAULTS_VERSION ?= 1.19.0
TEST_BANK_VAULTS_IMAGE ?= ghcr.io/banzaicloud/bank-vaults:$(TEST_BANK_VAULTS_VERSION)
TEST_OPERATOR_VERSION ?= $(lastword $(subst :, ,$(IMG)))
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/microk8s/dev.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault-dev
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:<branch_name>

# Common annotations for all created resources
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/aws/cr-primary.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault-primary"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/aws/cr-secondary.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault-secondary"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/aws/cr-tertiary.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault-tertiary"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/test/cr-primary.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault-primary"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/test/cr-secondary.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault-secondary"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/test/cr-tertiary.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault-tertiary"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/dev/multi-dc/test/multi-dc-raft.sh
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ set -xeo pipefail
#

METALLB_VERSION=v0.13.10
VAULT_VERSION=1.14.0
VAULT_VERSION=1.14.1
BANK_VAULTS_VERSION=1.19.0
VAULT_TOKEN=$(uuidgen)
export VAULT_TOKEN
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-alibaba.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Describe where you would like to store the Vault unseal keys and root token
# in OSS encrypted with KMS.
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-audit.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-aws-server-side-encryption.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ spec:
policies: ["allow_secrets", "allow_pki"]
ttl: 1h

image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# It's always a good idea to specify
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-aws.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Instead of credentialsConfig one can use IAM instance profiles, or kube2iam for example:
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-awskms.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-azure.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Describe where you would like to store the Vault unseal keys and root token
# in Azure KeyVault.
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-cert-manager.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-containers.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
# specify a custom bank-vaults image with bankVaultsImage:
# bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-credentialFromSecret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-customports.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-disabled-root-token-storage.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
# specify a custom bank-vaults image with bankVaultsImage:
# bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-file.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-gcpkms.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-gcs-ha-autounseal.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 2
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Describe where you would like to store the Vault unseal keys and root token
# in GCS encrypted with KMS.
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-gcs-ha.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 2
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Describe where you would like to store the Vault unseal keys and root token
# in GCS encrypted with KMS.
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-hsm-nitrokey.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-hsm-softhsm.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-init-containers.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-istio.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

# Common annotations for all created resources
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-k8s-startup-secret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-kvv2.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the Service's type where the Vault Service is exposed
serviceType: ClusterIP
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-mysql-ha.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 2
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-nodeAffinity.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 3
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# A YAML representation of nodeAffinity
# Detail can reference: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-oidc.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-podAntiAffinity.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 3
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Set use which node label for pod anti-affinity. Prevent all vault put on same AZ.
# Detail can reference: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-policy-with-accessor.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-priority.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

vaultPodSpec:
priorityClassName: high-priority
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-prometheus.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ metadata:
name: "vault"
spec:
size: 2
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-raft-1.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
vault_cr: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-raft-ha-storage.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 3
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1
bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest

# Schedule the pods on the same node, since we are using hostPath storage
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-raft.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
vault_cr: vault
spec:
size: 3
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Common annotations for all created resources
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-resource.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

resources:
# A YAML representation of resource ResourceRequirements for vault container
Expand Down
2 changes: 1 addition & 1 deletion deploy/examples/cr-statsd.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: vault
spec:
size: 1
image: hashicorp/vault:1.14.0
image: hashicorp/vault:1.14.1

# Specify the Service's type where the Vault Service is exposed
serviceType: ClusterIP
Expand Down
Loading

0 comments on commit 13ff470

Please sign in to comment.