From f7395ce1b62be3718759bd9892be06d5963ac41e Mon Sep 17 00:00:00 2001 From: Tanmay Pereira Naik Date: Wed, 26 Jul 2023 12:41:23 +0530 Subject: [PATCH] chore: Update to hashicorp/vault:1.14.1 Signed-off-by: Tanmay Pereira Naik --- .github/workflows/ci.yaml | 2 +- Makefile | 2 +- deploy/dev/microk8s/dev.yaml | 2 +- deploy/dev/multi-dc/aws/cr-primary.yaml | 2 +- deploy/dev/multi-dc/aws/cr-secondary.yaml | 2 +- deploy/dev/multi-dc/aws/cr-tertiary.yaml | 2 +- deploy/dev/multi-dc/test/cr-primary.yaml | 2 +- deploy/dev/multi-dc/test/cr-secondary.yaml | 2 +- deploy/dev/multi-dc/test/cr-tertiary.yaml | 2 +- deploy/dev/multi-dc/test/multi-dc-raft.sh | 2 +- deploy/examples/cr-alibaba.yaml | 2 +- deploy/examples/cr-audit.yaml | 2 +- deploy/examples/cr-aws-server-side-encryption.yaml | 2 +- deploy/examples/cr-aws.yaml | 2 +- deploy/examples/cr-awskms.yaml | 2 +- deploy/examples/cr-azure.yaml | 2 +- deploy/examples/cr-cert-manager.yaml | 2 +- deploy/examples/cr-containers.yaml | 2 +- deploy/examples/cr-credentialFromSecret.yaml | 2 +- deploy/examples/cr-customports.yaml | 2 +- deploy/examples/cr-disabled-root-token-storage.yaml | 2 +- deploy/examples/cr-file.yaml | 2 +- deploy/examples/cr-gcpkms.yaml | 2 +- deploy/examples/cr-gcs-ha-autounseal.yaml | 2 +- deploy/examples/cr-gcs-ha.yaml | 2 +- deploy/examples/cr-hsm-nitrokey.yaml | 2 +- deploy/examples/cr-hsm-softhsm.yaml | 2 +- deploy/examples/cr-init-containers.yaml | 2 +- deploy/examples/cr-istio.yaml | 2 +- deploy/examples/cr-k8s-startup-secret.yaml | 2 +- deploy/examples/cr-kvv2.yaml | 2 +- deploy/examples/cr-mysql-ha.yaml | 2 +- deploy/examples/cr-nodeAffinity.yaml | 2 +- deploy/examples/cr-oidc.yaml | 2 +- deploy/examples/cr-podAntiAffinity.yaml | 2 +- deploy/examples/cr-policy-with-accessor.yaml | 2 +- deploy/examples/cr-priority.yaml | 2 +- deploy/examples/cr-prometheus.yaml | 2 +- deploy/examples/cr-raft-1.yaml | 2 +- deploy/examples/cr-raft-ha-storage.yaml | 2 +- deploy/examples/cr-raft.yaml | 2 +- deploy/examples/cr-resource.yaml | 2 +- deploy/examples/cr-statsd.yaml | 2 +- deploy/examples/cr-transit-unseal.yaml | 4 ++-- deploy/examples/cr-vault-kv-unseal.yaml | 2 +- deploy/examples/cr.yaml | 2 +- test/deploy/test-external-secrets-watch-deployment.yaml | 2 +- 47 files changed, 48 insertions(+), 48 deletions(-) diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml index 46970bfd..830bb78c 100644 --- a/.github/workflows/ci.yaml +++ b/.github/workflows/ci.yaml @@ -211,7 +211,7 @@ jobs: strategy: matrix: k8s_version: ["v1.24.15", "v1.25.11", "v1.26.6", "v1.27.3"] - vault_version: ["1.11.12", "1.12.8", "1.13.4", "1.14.0"] + vault_version: ["1.11.12", "1.12.8", "1.13.4", "1.14.1"] steps: - name: Checkout repository diff --git a/Makefile b/Makefile index d9416a91..67e852c0 100644 --- a/Makefile +++ b/Makefile @@ -5,7 +5,7 @@ IMG ?= ghcr.io/bank-vaults/vault-operator:dev # Default test data TEST_K8S_VERSION ?= 1.27.1 -TEST_VAULT_VERSION ?= 1.14.0 +TEST_VAULT_VERSION ?= 1.14.1 TEST_BANK_VAULTS_VERSION ?= 1.19.0 TEST_BANK_VAULTS_IMAGE ?= ghcr.io/banzaicloud/bank-vaults:$(TEST_BANK_VAULTS_VERSION) TEST_OPERATOR_VERSION ?= $(lastword $(subst :, ,$(IMG))) diff --git a/deploy/dev/microk8s/dev.yaml b/deploy/dev/microk8s/dev.yaml index 5895b51f..d4327304 100644 --- a/deploy/dev/microk8s/dev.yaml +++ b/deploy/dev/microk8s/dev.yaml @@ -4,7 +4,7 @@ metadata: name: vault-dev spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults: # Common annotations for all created resources diff --git a/deploy/dev/multi-dc/aws/cr-primary.yaml b/deploy/dev/multi-dc/aws/cr-primary.yaml index c7bea1bc..f000af74 100644 --- a/deploy/dev/multi-dc/aws/cr-primary.yaml +++ b/deploy/dev/multi-dc/aws/cr-primary.yaml @@ -4,7 +4,7 @@ metadata: name: "vault-primary" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/dev/multi-dc/aws/cr-secondary.yaml b/deploy/dev/multi-dc/aws/cr-secondary.yaml index 651b06d3..cf726413 100644 --- a/deploy/dev/multi-dc/aws/cr-secondary.yaml +++ b/deploy/dev/multi-dc/aws/cr-secondary.yaml @@ -4,7 +4,7 @@ metadata: name: "vault-secondary" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/dev/multi-dc/aws/cr-tertiary.yaml b/deploy/dev/multi-dc/aws/cr-tertiary.yaml index 2f5c9f63..73a128e2 100644 --- a/deploy/dev/multi-dc/aws/cr-tertiary.yaml +++ b/deploy/dev/multi-dc/aws/cr-tertiary.yaml @@ -4,7 +4,7 @@ metadata: name: "vault-tertiary" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/dev/multi-dc/test/cr-primary.yaml b/deploy/dev/multi-dc/test/cr-primary.yaml index f9b915da..9ec0243f 100644 --- a/deploy/dev/multi-dc/test/cr-primary.yaml +++ b/deploy/dev/multi-dc/test/cr-primary.yaml @@ -4,7 +4,7 @@ metadata: name: "vault-primary" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/dev/multi-dc/test/cr-secondary.yaml b/deploy/dev/multi-dc/test/cr-secondary.yaml index 62a1527c..c2575d06 100644 --- a/deploy/dev/multi-dc/test/cr-secondary.yaml +++ b/deploy/dev/multi-dc/test/cr-secondary.yaml @@ -4,7 +4,7 @@ metadata: name: "vault-secondary" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/dev/multi-dc/test/cr-tertiary.yaml b/deploy/dev/multi-dc/test/cr-tertiary.yaml index 04df8b38..f669144d 100644 --- a/deploy/dev/multi-dc/test/cr-tertiary.yaml +++ b/deploy/dev/multi-dc/test/cr-tertiary.yaml @@ -4,7 +4,7 @@ metadata: name: "vault-tertiary" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/dev/multi-dc/test/multi-dc-raft.sh b/deploy/dev/multi-dc/test/multi-dc-raft.sh index 693381ac..2790c487 100755 --- a/deploy/dev/multi-dc/test/multi-dc-raft.sh +++ b/deploy/dev/multi-dc/test/multi-dc-raft.sh @@ -14,7 +14,7 @@ set -xeo pipefail # METALLB_VERSION=v0.13.10 -VAULT_VERSION=1.14.0 +VAULT_VERSION=1.14.1 BANK_VAULTS_VERSION=1.19.0 VAULT_TOKEN=$(uuidgen) export VAULT_TOKEN diff --git a/deploy/examples/cr-alibaba.yaml b/deploy/examples/cr-alibaba.yaml index b3c9d391..6afa14e6 100644 --- a/deploy/examples/cr-alibaba.yaml +++ b/deploy/examples/cr-alibaba.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Describe where you would like to store the Vault unseal keys and root token # in OSS encrypted with KMS. diff --git a/deploy/examples/cr-audit.yaml b/deploy/examples/cr-audit.yaml index 8c2acd4c..86ce7477 100644 --- a/deploy/examples/cr-audit.yaml +++ b/deploy/examples/cr-audit.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/examples/cr-aws-server-side-encryption.yaml b/deploy/examples/cr-aws-server-side-encryption.yaml index 8b291b2e..ecd62dbf 100644 --- a/deploy/examples/cr-aws-server-side-encryption.yaml +++ b/deploy/examples/cr-aws-server-side-encryption.yaml @@ -57,7 +57,7 @@ spec: policies: ["allow_secrets", "allow_pki"] ttl: 1h - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # It's always a good idea to specify resources: diff --git a/deploy/examples/cr-aws.yaml b/deploy/examples/cr-aws.yaml index 84fb2ae6..cd6d3096 100644 --- a/deploy/examples/cr-aws.yaml +++ b/deploy/examples/cr-aws.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Instead of credentialsConfig one can use IAM instance profiles, or kube2iam for example: annotations: diff --git a/deploy/examples/cr-awskms.yaml b/deploy/examples/cr-awskms.yaml index fde25ece..fc0f28cd 100644 --- a/deploy/examples/cr-awskms.yaml +++ b/deploy/examples/cr-awskms.yaml @@ -4,7 +4,7 @@ metadata: name: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest serviceAccount: vault diff --git a/deploy/examples/cr-azure.yaml b/deploy/examples/cr-azure.yaml index b722309c..5e5854fd 100644 --- a/deploy/examples/cr-azure.yaml +++ b/deploy/examples/cr-azure.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Describe where you would like to store the Vault unseal keys and root token # in Azure KeyVault. diff --git a/deploy/examples/cr-cert-manager.yaml b/deploy/examples/cr-cert-manager.yaml index 7a7e639c..75d2fa45 100644 --- a/deploy/examples/cr-cert-manager.yaml +++ b/deploy/examples/cr-cert-manager.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running diff --git a/deploy/examples/cr-containers.yaml b/deploy/examples/cr-containers.yaml index d284367f..896cc5a2 100644 --- a/deploy/examples/cr-containers.yaml +++ b/deploy/examples/cr-containers.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # specify a custom bank-vaults image with bankVaultsImage: # bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest diff --git a/deploy/examples/cr-credentialFromSecret.yaml b/deploy/examples/cr-credentialFromSecret.yaml index 26936375..6f2a47f1 100644 --- a/deploy/examples/cr-credentialFromSecret.yaml +++ b/deploy/examples/cr-credentialFromSecret.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-customports.yaml b/deploy/examples/cr-customports.yaml index 5246bdcc..f2194508 100644 --- a/deploy/examples/cr-customports.yaml +++ b/deploy/examples/cr-customports.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-disabled-root-token-storage.yaml b/deploy/examples/cr-disabled-root-token-storage.yaml index b2f0db8b..2afc00cc 100644 --- a/deploy/examples/cr-disabled-root-token-storage.yaml +++ b/deploy/examples/cr-disabled-root-token-storage.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # specify a custom bank-vaults image with bankVaultsImage: # bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest diff --git a/deploy/examples/cr-file.yaml b/deploy/examples/cr-file.yaml index d8e79683..ed13ece3 100644 --- a/deploy/examples/cr-file.yaml +++ b/deploy/examples/cr-file.yaml @@ -4,7 +4,7 @@ metadata: name: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest serviceAccount: vault diff --git a/deploy/examples/cr-gcpkms.yaml b/deploy/examples/cr-gcpkms.yaml index beb11717..472d4ede 100644 --- a/deploy/examples/cr-gcpkms.yaml +++ b/deploy/examples/cr-gcpkms.yaml @@ -4,7 +4,7 @@ metadata: name: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest serviceAccount: vault diff --git a/deploy/examples/cr-gcs-ha-autounseal.yaml b/deploy/examples/cr-gcs-ha-autounseal.yaml index e61cefef..28dd24bf 100644 --- a/deploy/examples/cr-gcs-ha-autounseal.yaml +++ b/deploy/examples/cr-gcs-ha-autounseal.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 2 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Describe where you would like to store the Vault unseal keys and root token # in GCS encrypted with KMS. diff --git a/deploy/examples/cr-gcs-ha.yaml b/deploy/examples/cr-gcs-ha.yaml index 8760385f..3834b271 100644 --- a/deploy/examples/cr-gcs-ha.yaml +++ b/deploy/examples/cr-gcs-ha.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 2 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Describe where you would like to store the Vault unseal keys and root token # in GCS encrypted with KMS. diff --git a/deploy/examples/cr-hsm-nitrokey.yaml b/deploy/examples/cr-hsm-nitrokey.yaml index f94411d6..45a706b5 100644 --- a/deploy/examples/cr-hsm-nitrokey.yaml +++ b/deploy/examples/cr-hsm-nitrokey.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-hsm-softhsm.yaml b/deploy/examples/cr-hsm-softhsm.yaml index 8fdb473f..eac8c8c7 100644 --- a/deploy/examples/cr-hsm-softhsm.yaml +++ b/deploy/examples/cr-hsm-softhsm.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-init-containers.yaml b/deploy/examples/cr-init-containers.yaml index 807ca5be..c85f2614 100644 --- a/deploy/examples/cr-init-containers.yaml +++ b/deploy/examples/cr-init-containers.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-istio.yaml b/deploy/examples/cr-istio.yaml index f5af293a..805a7683 100644 --- a/deploy/examples/cr-istio.yaml +++ b/deploy/examples/cr-istio.yaml @@ -4,7 +4,7 @@ metadata: name: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest # Common annotations for all created resources diff --git a/deploy/examples/cr-k8s-startup-secret.yaml b/deploy/examples/cr-k8s-startup-secret.yaml index 4ef5c01f..8a459b14 100644 --- a/deploy/examples/cr-k8s-startup-secret.yaml +++ b/deploy/examples/cr-k8s-startup-secret.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-kvv2.yaml b/deploy/examples/cr-kvv2.yaml index 11545683..61ed3d9f 100644 --- a/deploy/examples/cr-kvv2.yaml +++ b/deploy/examples/cr-kvv2.yaml @@ -4,7 +4,7 @@ metadata: name: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the Service's type where the Vault Service is exposed serviceType: ClusterIP diff --git a/deploy/examples/cr-mysql-ha.yaml b/deploy/examples/cr-mysql-ha.yaml index 8ca654d6..9a42f42a 100644 --- a/deploy/examples/cr-mysql-ha.yaml +++ b/deploy/examples/cr-mysql-ha.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 2 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/examples/cr-nodeAffinity.yaml b/deploy/examples/cr-nodeAffinity.yaml index f093d53d..20f57f07 100644 --- a/deploy/examples/cr-nodeAffinity.yaml +++ b/deploy/examples/cr-nodeAffinity.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 3 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # A YAML representation of nodeAffinity # Detail can reference: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity diff --git a/deploy/examples/cr-oidc.yaml b/deploy/examples/cr-oidc.yaml index 2a98678a..db790a78 100644 --- a/deploy/examples/cr-oidc.yaml +++ b/deploy/examples/cr-oidc.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/examples/cr-podAntiAffinity.yaml b/deploy/examples/cr-podAntiAffinity.yaml index acfdb97f..d73d7505 100644 --- a/deploy/examples/cr-podAntiAffinity.yaml +++ b/deploy/examples/cr-podAntiAffinity.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 3 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Set use which node label for pod anti-affinity. Prevent all vault put on same AZ. # Detail can reference: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity diff --git a/deploy/examples/cr-policy-with-accessor.yaml b/deploy/examples/cr-policy-with-accessor.yaml index d0ff1cb1..d6674f25 100644 --- a/deploy/examples/cr-policy-with-accessor.yaml +++ b/deploy/examples/cr-policy-with-accessor.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/examples/cr-priority.yaml b/deploy/examples/cr-priority.yaml index c264c4f1..c84c4cb3 100644 --- a/deploy/examples/cr-priority.yaml +++ b/deploy/examples/cr-priority.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 vaultPodSpec: priorityClassName: high-priority diff --git a/deploy/examples/cr-prometheus.yaml b/deploy/examples/cr-prometheus.yaml index 4a365598..7d636cc9 100644 --- a/deploy/examples/cr-prometheus.yaml +++ b/deploy/examples/cr-prometheus.yaml @@ -11,7 +11,7 @@ metadata: name: "vault" spec: size: 2 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running serviceAccount: vault diff --git a/deploy/examples/cr-raft-1.yaml b/deploy/examples/cr-raft-1.yaml index 21e6fb56..41f0d236 100644 --- a/deploy/examples/cr-raft-1.yaml +++ b/deploy/examples/cr-raft-1.yaml @@ -7,7 +7,7 @@ metadata: vault_cr: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-raft-ha-storage.yaml b/deploy/examples/cr-raft-ha-storage.yaml index 117b0fed..f0bea21a 100644 --- a/deploy/examples/cr-raft-ha-storage.yaml +++ b/deploy/examples/cr-raft-ha-storage.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 3 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest # Schedule the pods on the same node, since we are using hostPath storage diff --git a/deploy/examples/cr-raft.yaml b/deploy/examples/cr-raft.yaml index 6eb44d66..17f46ca3 100644 --- a/deploy/examples/cr-raft.yaml +++ b/deploy/examples/cr-raft.yaml @@ -7,7 +7,7 @@ metadata: vault_cr: vault spec: size: 3 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Common annotations for all created resources annotations: diff --git a/deploy/examples/cr-resource.yaml b/deploy/examples/cr-resource.yaml index e0979da0..a1d15406 100644 --- a/deploy/examples/cr-resource.yaml +++ b/deploy/examples/cr-resource.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 resources: # A YAML representation of resource ResourceRequirements for vault container diff --git a/deploy/examples/cr-statsd.yaml b/deploy/examples/cr-statsd.yaml index 40fe8009..2163e8d7 100644 --- a/deploy/examples/cr-statsd.yaml +++ b/deploy/examples/cr-statsd.yaml @@ -4,7 +4,7 @@ metadata: name: vault spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the Service's type where the Vault Service is exposed serviceType: ClusterIP diff --git a/deploy/examples/cr-transit-unseal.yaml b/deploy/examples/cr-transit-unseal.yaml index dda7567c..eee83c5d 100644 --- a/deploy/examples/cr-transit-unseal.yaml +++ b/deploy/examples/cr-transit-unseal.yaml @@ -16,7 +16,7 @@ metadata: namespace: default spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults # configurer/unsealer will be running @@ -166,7 +166,7 @@ metadata: namespace: tenant spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Specify the ServiceAccount where the Vault Pod and the Bank-Vaults # configurer/unsealer will be running diff --git a/deploy/examples/cr-vault-kv-unseal.yaml b/deploy/examples/cr-vault-kv-unseal.yaml index ea1bd8e1..c1a5f0ea 100644 --- a/deploy/examples/cr-vault-kv-unseal.yaml +++ b/deploy/examples/cr-vault-kv-unseal.yaml @@ -5,7 +5,7 @@ metadata: name: "vault-kv-unseal" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # Describe where you would like to store the Vault unseal keys and root token # in seperate remote Vault instance. diff --git a/deploy/examples/cr.yaml b/deploy/examples/cr.yaml index adfbf2e4..3fda95e8 100644 --- a/deploy/examples/cr.yaml +++ b/deploy/examples/cr.yaml @@ -4,7 +4,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 # specify a custom bank-vaults image with bankVaultsImage: # bankVaultsImage: ghcr.io/banzaicloud/bank-vaults:latest diff --git a/test/deploy/test-external-secrets-watch-deployment.yaml b/test/deploy/test-external-secrets-watch-deployment.yaml index 50804d3a..ecb126f6 100644 --- a/test/deploy/test-external-secrets-watch-deployment.yaml +++ b/test/deploy/test-external-secrets-watch-deployment.yaml @@ -5,7 +5,7 @@ metadata: name: "vault" spec: size: 1 - image: hashicorp/vault:1.14.0 + image: hashicorp/vault:1.14.1 bankVaultsImage: banzaicloud/bank-vaults:latest # Common annotations for all created resources