Releases: hashicorp/vault-csi-provider
Releases · hashicorp/vault-csi-provider
v0.4.0
0.4.0 (January 12th, 2022)
Changes
-write-secrets
flag now defaults tofalse
, delegating file writes to the driver. [GH-127]- Note:
-write-secrets
is deprecated and will be removed in the next major version.
- Note:
Features
- Support extracting JSON values using
secretKey
in the SecretProviderClass [GH-126]
Maintenance
- Multi-arch images now available on Docker hub, including
amd64
,arm64
,arm/v6
and386
0.3.0
0.3.0 (June 7th, 2021)
Announcements
--write-secrets=false
will become the default from v0.4.0, and requires secrets-store-csi-driver v0.0.21+.- The
--health_addr
flag is marked deprecated but still functioning. Please use--health-addr
instead.--health_addr
is currently planned for removal in v0.5.0.
Features
- Support for changing the default Vault address and Kubernetes mount path via CLI flag to the vault-csi-provider binary [GH-96]
- Support for sending secret contents to driver for writing via
--write-secrets=false
[GH-89]- Note:
--write-secrets=false
will become the default from v0.4.0 and require secrets-store-csi-driver v0.0.21+
- Note:
Changes
--health_addr
flag is marked deprecated and replaced by--health-addr
. Slated for removal in v0.5.0 [GH-100]
Bugs
- Added missing error handling when transforming SecretProviderClass config to a Vault request [GH-97]
0.2.0
0.1.0
0.1.0 (March 24th, 2021)
CHANGES
- All secret engines are now supported [GH-63]
- This makes several breaking changes to the configuration of the SecretProviderClass'
objects
entry - There is no top-level
array
entry underobjects
objectVersion
is now ignoredobjectPath
is renamed tosecretPath
secretKey
,secretArgs
andmethod
are newly available optionsobjectName
no longer determines which key is read from the secret's data- If
secretKey
is set, that is the key from the secret's data that will be written - If
secretKey
is not set, the whole JSON response from Vault will be written vaultSkipTLSVerify
is no longer required to be set to"true"
if thevaultAddress
scheme is nothttps
- This makes several breaking changes to the configuration of the SecretProviderClass'
- The provider will now authenticate to Vault as the requesting pod's service account [GH-64]
- This is likely a breaking change for existing deployments being upgraded
- vault-csi-provider service account now requires cluster-wide permission to create service account tokens
- auth/kubernetes mounts in Vault will now need to bind ACL policies to the requesting pods'
service accounts instead of the provider's service account. spec.parameters.kubernetesServiceAccountPath
is now ignored and will log a warning if set
- The provider now supports mTLS [GH-65]
spec.parameters.vaultCAPem
is now ignored and will log a warning if set. This is a breaking changespec.parameters.vaultTLSClientCertPath
andspec.parameters.vaultTLSClientKeyPath
are newly available options
IMPROVEMENTS
Release 0.0.7
CHANGES:
- Switch provider to gRPC. [GH-54]
- Note this requires at least v0.0.14 of the driver, and the driver should have 'vault' included in
--grpcSupportedProviders
. - Existing installations being upgraded will also need to set the provider's service account as the one that can authenticate with Vault instead of the driver, as the Vault requests now happen in the provider container.
- Note this requires at least v0.0.14 of the driver, and the driver should have 'vault' included in