Skip to content

Commit

Permalink
Target vault-csi-provider release 0.1.0 (#475)
Browse files Browse the repository at this point in the history
  • Loading branch information
tomhjp authored Mar 25, 2021
1 parent 2ddac08 commit 102f9e4
Show file tree
Hide file tree
Showing 7 changed files with 13 additions and 46 deletions.
4 changes: 0 additions & 4 deletions templates/csi-daemonset.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,6 @@ spec:
mountPath: {{ .path | default "/vault/userconfig" }}/{{ .name }}
readOnly: true
{{- end }}
{{- if .Values.csi.livenessProbe.enabled }}
livenessProbe:
httpGet:
path: /health/ready
Expand All @@ -57,8 +56,6 @@ spec:
periodSeconds: {{ .Values.csi.livenessProbe.periodSeconds }}
successThreshold: {{ .Values.csi.livenessProbe.successThreshold }}
timeoutSeconds: {{ .Values.csi.livenessProbe.timeoutSeconds }}
{{- end }}
{{- if .Values.csi.readinessProbe.enabled }}
readinessProbe:
httpGet:
path: /health/ready
Expand All @@ -68,7 +65,6 @@ spec:
periodSeconds: {{ .Values.csi.readinessProbe.periodSeconds }}
successThreshold: {{ .Values.csi.readinessProbe.successThreshold }}
timeoutSeconds: {{ .Values.csi.readinessProbe.timeoutSeconds }}
{{- end }}
volumes:
- name: providervol
hostPath:
Expand Down
1 change: 1 addition & 0 deletions test/acceptance/csi-test/nginx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ metadata:
name: nginx
spec:
terminationGracePeriodSeconds: 0
serviceAccountName: nginx
containers:
- image: docker.mirror.hashicorp.services/nginx
name: nginx
Expand Down
7 changes: 3 additions & 4 deletions test/acceptance/csi-test/vault-kv-secretproviderclass.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@ spec:
roleName: "kv-role"
vaultAddress: http://vault:8200
objects: |
array:
- |
objectName: "bar1"
objectPath: "v1/secret/kv1"
- objectName: "bar"
secretPath: "secret/data/kv1"
secretKey: "bar1"
6 changes: 1 addition & 5 deletions test/acceptance/csi-test/vault-policy.hcl
Original file line number Diff line number Diff line change
@@ -1,7 +1,3 @@
path "sys/mounts" {
capabilities = ["read"]
}

path "secret/*" {
path "secret/data/kv1" {
capabilities = ["read"]
}
12 changes: 6 additions & 6 deletions test/acceptance/csi.bats
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,10 @@ load _helpers
kubectl create namespace acceptance

# Install Secrets Store CSI driver
helm install secrets-store-csi-driver https://github.com/kubernetes-sigs/secrets-store-csi-driver/blob/master/charts/secrets-store-csi-driver-0.0.19.tgz?raw=true \
helm install secrets-store-csi-driver https://github.com/kubernetes-sigs/secrets-store-csi-driver/blob/master/charts/secrets-store-csi-driver-0.0.20.tgz?raw=true \
--wait --timeout=5m \
--namespace=acceptance \
--set linux.image.pullPolicy="IfNotPresent" \
--set grpcSupportedProviders="azure;gcp;vault"
--set linux.image.pullPolicy="IfNotPresent"
# Install Vault and Vault provider
helm install vault \
--wait --timeout=5m \
Expand All @@ -30,9 +29,10 @@ load _helpers
kubectl --namespace=acceptance exec vault-0 -- sh -c 'vault write auth/kubernetes/config \
token_reviewer_jwt="$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)" \
kubernetes_host="https://$KUBERNETES_PORT_443_TCP_ADDR:443" \
kubernetes_ca_cert=@/var/run/secrets/kubernetes.io/serviceaccount/ca.crt'
kubernetes_ca_cert=@/var/run/secrets/kubernetes.io/serviceaccount/ca.crt \
disable_iss_validation=true'
kubectl --namespace=acceptance exec vault-0 -- vault write auth/kubernetes/role/kv-role \
bound_service_account_names=vault-csi-provider \
bound_service_account_names=nginx \
bound_service_account_namespaces=acceptance \
policies=kv-policy \
ttl=20m
Expand All @@ -42,7 +42,7 @@ load _helpers
kubectl --namespace=acceptance apply -f ./test/acceptance/csi-test/nginx.yaml
kubectl --namespace=acceptance wait --for=condition=Ready --timeout=5m pod nginx

result=$(kubectl --namespace=acceptance exec nginx -- cat /mnt/secrets-store/bar1)
result=$(kubectl --namespace=acceptance exec nginx -- cat /mnt/secrets-store/bar)
[[ "$result" == "hello1" ]]
}

Expand Down
21 changes: 0 additions & 21 deletions test/unit/csi-daemonset.bats
Original file line number Diff line number Diff line change
Expand Up @@ -248,31 +248,13 @@ load _helpers
#--------------------------------------------------------------------
# Readiness/liveness probes

@test "csi/daemonset: csi.livenessProbe and csi.readinessProbe default to disabled" {
cd `chart_dir`
local actual=$(helm template \
--show-only templates/csi-daemonset.yaml \
--set 'csi.enabled=true' \
. | tee /dev/stderr |
yq -r '.spec.template.spec.containers[0].livenessProbe' | tee /dev/stderr)
[ "${actual}" = "null" ]

local actual=$(helm template \
--show-only templates/csi-daemonset.yaml \
--set 'csi.enabled=true' \
. | tee /dev/stderr |
yq -r '.spec.template.spec.containers[0].readinessProbe' | tee /dev/stderr)
[ "${actual}" = "null" ]
}

@test "csi/daemonset: csi.livenessProbe is configurable" {
cd `chart_dir`

# Test the defaults
local object=$(helm template \
--show-only templates/csi-daemonset.yaml \
--set 'csi.enabled=true' \
--set 'csi.livenessProbe.enabled=true' \
. | tee /dev/stderr |
yq -r '.spec.template.spec.containers[0].livenessProbe' | tee /dev/stderr)

Expand All @@ -296,7 +278,6 @@ load _helpers
local object=$(helm template \
--show-only templates/csi-daemonset.yaml \
--set 'csi.enabled=true' \
--set 'csi.livenessProbe.enabled=true' \
--set 'csi.livenessProbe.failureThreshold=10' \
--set 'csi.livenessProbe.initialDelaySeconds=11' \
--set 'csi.livenessProbe.periodSeconds=12' \
Expand Down Expand Up @@ -329,7 +310,6 @@ load _helpers
local object=$(helm template \
--show-only templates/csi-daemonset.yaml \
--set 'csi.enabled=true' \
--set 'csi.readinessProbe.enabled=true' \
. | tee /dev/stderr |
yq -r '.spec.template.spec.containers[0].readinessProbe' | tee /dev/stderr)

Expand All @@ -353,7 +333,6 @@ load _helpers
local object=$(helm template \
--show-only templates/csi-daemonset.yaml \
--set 'csi.enabled=true' \
--set 'csi.readinessProbe.enabled=true' \
--set 'csi.readinessProbe.failureThreshold=10' \
--set 'csi.readinessProbe.initialDelaySeconds=11' \
--set 'csi.readinessProbe.periodSeconds=12' \
Expand Down
8 changes: 2 additions & 6 deletions values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -652,8 +652,8 @@ csi:
enabled: false

image:
repository: "hashicorp/secrets-store-csi-driver-provider-vault"
tag: "0.0.7"
repository: "hashicorp/vault-csi-provider"
tag: "0.1.0"
pullPolicy: IfNotPresent

# extraVolumes is a list of extra volumes to mount. These will be exposed
Expand Down Expand Up @@ -696,17 +696,13 @@ csi:

# Used to configure readinessProbe for the pods.
readinessProbe:
# Vault CSI provider does not support a readiness probe in versions <= 0.7.0
enabled: false
failureThreshold: 2
initialDelaySeconds: 5
periodSeconds: 5
successThreshold: 1
timeoutSeconds: 3
# Used to configure livenessProbe for the pods.
livenessProbe:
# Vault CSI provider does not support a liveness probe in versions <= 0.7.0
enabled: false
failureThreshold: 2
initialDelaySeconds: 5
periodSeconds: 5
Expand Down

0 comments on commit 102f9e4

Please sign in to comment.