update base vault images to point at quay.io/openbao/openbao; add more helm docs

Signed-off-by: jessebot <jessebot@linux.com>
This commit is contained in:
jessebot 2024-05-18 13:52:10 +02:00 committed by Nathan A Phelps
parent ed58ce3e78
commit 915f7c845c
3 changed files with 126 additions and 95 deletions

View file

@ -3,7 +3,7 @@
apiVersion: v2 apiVersion: v2
name: openbao name: openbao
version: 0.1.0 version: 0.2.0
appVersion: v2.0.0-alpha20240329 appVersion: v2.0.0-alpha20240329
kubeVersion: ">= 1.27.0-0" kubeVersion: ">= 1.27.0-0"
description: Official OpenBao Chart description: Official OpenBao Chart

View file

@ -1,8 +1,8 @@
# openbao # openbao
![Version: 0.1.0](https://img.shields.io/badge/Version-0.1.0-informational?style=flat-square) ![AppVersion: v2.0.0-alpha20240329](https://img.shields.io/badge/AppVersion-v2.0.0--alpha20240329-informational?style=flat-square) ![Version: 0.2.0](https://img.shields.io/badge/Version-0.2.0-informational?style=flat-square) ![AppVersion: v2.0.0-alpha20240329](https://img.shields.io/badge/AppVersion-v2.0.0--alpha20240329-informational?style=flat-square)
Official openbao Chart Official OpenBao Chart
**Homepage:** <https://github.com/openbao/openbao-helm> **Homepage:** <https://github.com/openbao/openbao-helm>
@ -10,7 +10,7 @@ Official openbao Chart
| Name | Email | Url | | Name | Email | Url |
| ---- | ------ | --- | | ---- | ------ | --- |
| jessebot | | <https://github.com/jessebot> | | OpenBao | | <https://openbao.org> |
## Source Code ## Source Code
@ -26,9 +26,10 @@ Kubernetes: `>= 1.27.0-0`
|-----|------|---------|-------------| |-----|------|---------|-------------|
| csi.agent.enabled | bool | `true` | | | csi.agent.enabled | bool | `true` | |
| csi.agent.extraArgs | list | `[]` | | | csi.agent.extraArgs | list | `[]` | |
| csi.agent.image.pullPolicy | string | `"IfNotPresent"` | | | csi.agent.image.pullPolicy | string | `"IfNotPresent"` | image pull policy to use for agent image. if tag is "latest", set to "Always" |
| csi.agent.image.repository | string | `"hashicorp/vault"` | | | csi.agent.image.registry | string | `"quay.io"` | image registry to use for agent image |
| csi.agent.image.tag | string | `"1.15.2"` | | | csi.agent.image.repository | string | `"openbao/openbao"` | image repo to use for agent image |
| csi.agent.image.tag | string | `"2.0.0-alpha20240329"` | image tag to use for agent image |
| csi.agent.logFormat | string | `"standard"` | | | csi.agent.logFormat | string | `"standard"` | |
| csi.agent.logLevel | string | `"info"` | | | csi.agent.logLevel | string | `"info"` | |
| csi.agent.resources | object | `{}` | | | csi.agent.resources | object | `{}` | |
@ -41,12 +42,13 @@ Kubernetes: `>= 1.27.0-0`
| csi.daemonSet.updateStrategy.maxUnavailable | string | `""` | | | csi.daemonSet.updateStrategy.maxUnavailable | string | `""` | |
| csi.daemonSet.updateStrategy.type | string | `"RollingUpdate"` | | | csi.daemonSet.updateStrategy.type | string | `"RollingUpdate"` | |
| csi.debug | bool | `false` | | | csi.debug | bool | `false` | |
| csi.enabled | bool | `false` | | | csi.enabled | bool | `false` | True if you want to install a secrets-store-csi-driver-provider-vault daemonset. Requires installing the secrets-store-csi-driver separately, see: https://github.com/kubernetes-sigs/secrets-store-csi-driver#install-the-secrets-store-csi-driver With the driver and provider installed, you can mount Vault secrets into volumes similar to the Vault Agent injector, and you can also sync those secrets into Kubernetes secrets. |
| csi.extraArgs | list | `[]` | | | csi.extraArgs | list | `[]` | |
| csi.hmacSecretName | string | `""` | | | csi.hmacSecretName | string | `""` | |
| csi.image.pullPolicy | string | `"IfNotPresent"` | | | csi.image.pullPolicy | string | `"IfNotPresent"` | image pull policy to use for csi image. if tag is "latest", set to "Always" |
| csi.image.repository | string | `"hashicorp/vault-csi-provider"` | | | csi.image.registry | string | `"docker.io"` | image registry to use for csi image |
| csi.image.tag | string | `"1.4.1"` | | | csi.image.repository | string | `"hashicorp/vault-csi-provider"` | image repo to use for csi image |
| csi.image.tag | string | `"1.4.1"` | image tag to use for csi image |
| csi.livenessProbe.failureThreshold | int | `2` | | | csi.livenessProbe.failureThreshold | int | `2` | |
| csi.livenessProbe.initialDelaySeconds | int | `5` | | | csi.livenessProbe.initialDelaySeconds | int | `5` | |
| csi.livenessProbe.periodSeconds | int | `5` | | | csi.livenessProbe.periodSeconds | int | `5` | |
@ -66,17 +68,17 @@ Kubernetes: `>= 1.27.0-0`
| csi.resources | object | `{}` | | | csi.resources | object | `{}` | |
| csi.serviceAccount.annotations | object | `{}` | | | csi.serviceAccount.annotations | object | `{}` | |
| csi.serviceAccount.extraLabels | object | `{}` | | | csi.serviceAccount.extraLabels | object | `{}` | |
| csi.volumeMounts | string | `nil` | | | csi.volumeMounts | string | `nil` | volumeMounts is a list of volumeMounts for the main server container. These are rendered via toYaml rather than pre-processed like the extraVolumes value. The purpose is to make it easy to share volumes between containers. |
| csi.volumes | string | `nil` | | | csi.volumes | string | `nil` | volumes is a list of volumes made available to all containers. These are rendered via toYaml rather than pre-processed like the extraVolumes value. The purpose is to make it easy to share volumes between containers. |
| global.enabled | bool | `true` | | | global.enabled | bool | `true` | enabled is the master enabled switch. Setting this to true or false will enable or disable all the components within this chart by default. |
| global.externalVaultAddr | string | `""` | | | global.externalVaultAddr | string | `""` | External vault server address for the injector and CSI provider to use. Setting this will disable deployment of a vault server. |
| global.imagePullSecrets | list | `[]` | | | global.imagePullSecrets | list | `[]` | Image pull secret to use for registry authentication. Alternatively, the value may be specified as an array of strings. |
| global.namespace | string | `""` | | | global.namespace | string | `""` | The namespace to deploy to. Defaults to the `helm` installation namespace. |
| global.openshift | bool | `false` | | | global.openshift | bool | `false` | If deploying to OpenShift |
| global.psp.annotations | string | `"seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default\napparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default\nseccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default\napparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default\n"` | | | global.psp | object | `{"annotations":"seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default\napparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default\nseccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default\napparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default\n","enable":false}` | Create PodSecurityPolicy for pods |
| global.psp.enable | bool | `false` | | | global.psp.annotations | string | `"seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default\napparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default\nseccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default\napparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default\n"` | Annotation for PodSecurityPolicy. This is a multi-line templated string map, and can also be set as YAML. |
| global.serverTelemetry.prometheusOperator | bool | `false` | | | global.serverTelemetry.prometheusOperator | bool | `false` | Enable integration with the Prometheus Operator See the top level serverTelemetry section below before enabling this feature. |
| global.tlsDisable | bool | `true` | | | global.tlsDisable | bool | `true` | TLS for end-to-end encrypted transport |
| injector.affinity | string | `"podAntiAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n - labelSelector:\n matchLabels:\n app.kubernetes.io/name: {{ template \"vault.name\" . }}-agent-injector\n app.kubernetes.io/instance: \"{{ .Release.Name }}\"\n component: webhook\n topologyKey: kubernetes.io/hostname\n"` | | | injector.affinity | string | `"podAntiAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n - labelSelector:\n matchLabels:\n app.kubernetes.io/name: {{ template \"vault.name\" . }}-agent-injector\n app.kubernetes.io/instance: \"{{ .Release.Name }}\"\n component: webhook\n topologyKey: kubernetes.io/hostname\n"` | |
| injector.agentDefaults.cpuLimit | string | `"500m"` | | | injector.agentDefaults.cpuLimit | string | `"500m"` | |
| injector.agentDefaults.cpuRequest | string | `"250m"` | | | injector.agentDefaults.cpuRequest | string | `"250m"` | |
@ -85,43 +87,47 @@ Kubernetes: `>= 1.27.0-0`
| injector.agentDefaults.template | string | `"map"` | | | injector.agentDefaults.template | string | `"map"` | |
| injector.agentDefaults.templateConfig.exitOnRetryFailure | bool | `true` | | | injector.agentDefaults.templateConfig.exitOnRetryFailure | bool | `true` | |
| injector.agentDefaults.templateConfig.staticSecretRenderInterval | string | `""` | | | injector.agentDefaults.templateConfig.staticSecretRenderInterval | string | `""` | |
| injector.agentImage.repository | string | `"hashicorp/vault"` | | | injector.agentImage | object | `{"pullPolicy":"IfNotPresent","registry":"quay.io","repository":"openbao/openbao","tag":"2.0.0-alpha20240329"}` | agentImage sets the repo and tag of the Vault image to use for the Vault Agent containers. This should be set to the official Vault image. Vault 1.3.1+ is required. |
| injector.agentImage.tag | string | `"1.15.2"` | | | injector.agentImage.pullPolicy | string | `"IfNotPresent"` | image pull policy to use for agent image. if tag is "latest", set to "Always" |
| injector.agentImage.registry | string | `"quay.io"` | image registry to use for agent image |
| injector.agentImage.repository | string | `"openbao/openbao"` | image repo to use for agent image |
| injector.agentImage.tag | string | `"2.0.0-alpha20240329"` | image tag to use for agent image |
| injector.annotations | object | `{}` | | | injector.annotations | object | `{}` | |
| injector.authPath | string | `"auth/kubernetes"` | | | injector.authPath | string | `"auth/kubernetes"` | |
| injector.certs.caBundle | string | `""` | | | injector.certs.caBundle | string | `""` | |
| injector.certs.certName | string | `"tls.crt"` | | | injector.certs.certName | string | `"tls.crt"` | |
| injector.certs.keyName | string | `"tls.key"` | | | injector.certs.keyName | string | `"tls.key"` | |
| injector.certs.secretName | string | `nil` | | | injector.certs.secretName | string | `nil` | |
| injector.enabled | string | `"-"` | | | injector.enabled | string | `"-"` | True if you want to enable vault agent injection. @default: global.enabled |
| injector.externalVaultAddr | string | `""` | | | injector.externalVaultAddr | string | `""` | Deprecated: Please use global.externalVaultAddr instead. |
| injector.extraEnvironmentVars | object | `{}` | | | injector.extraEnvironmentVars | object | `{}` | |
| injector.extraLabels | object | `{}` | | | injector.extraLabels | object | `{}` | |
| injector.failurePolicy | string | `"Ignore"` | | | injector.failurePolicy | string | `"Ignore"` | |
| injector.hostNetwork | bool | `false` | | | injector.hostNetwork | bool | `false` | |
| injector.image.pullPolicy | string | `"IfNotPresent"` | | | injector.image.pullPolicy | string | `"IfNotPresent"` | image pull policy to use for k8s image. if tag is "latest", set to "Always" |
| injector.image.repository | string | `"hashicorp/vault-k8s"` | | | injector.image.registry | string | `"docker.io"` | image registry to use for k8s image |
| injector.image.tag | string | `"1.3.1"` | | | injector.image.repository | string | `"hashicorp/vault-k8s"` | image repo to use for k8s image |
| injector.leaderElector.enabled | bool | `true` | | | injector.image.tag | string | `"1.3.1"` | image tag to use for k8s image |
| injector.livenessProbe.failureThreshold | int | `2` | | | injector.leaderElector | object | `{"enabled":true}` | If multiple replicas are specified, by default a leader will be determined so that only one injector attempts to create TLS certificates. |
| injector.livenessProbe.initialDelaySeconds | int | `5` | | | injector.livenessProbe.failureThreshold | int | `2` | When a probe fails, Kubernetes will try failureThreshold times before giving up |
| injector.livenessProbe.periodSeconds | int | `2` | | | injector.livenessProbe.initialDelaySeconds | int | `5` | Number of seconds after the container has started before probe initiates |
| injector.livenessProbe.successThreshold | int | `1` | | | injector.livenessProbe.periodSeconds | int | `2` | How often (in seconds) to perform the probe |
| injector.livenessProbe.timeoutSeconds | int | `5` | | | injector.livenessProbe.successThreshold | int | `1` | Minimum consecutive successes for the probe to be considered successful after having failed |
| injector.logFormat | string | `"standard"` | | | injector.livenessProbe.timeoutSeconds | int | `5` | Number of seconds after which the probe times out. |
| injector.logLevel | string | `"info"` | | | injector.logFormat | string | `"standard"` | Configures the log format of the injector. Supported log formats: "standard", "json". |
| injector.metrics.enabled | bool | `false` | | | injector.logLevel | string | `"info"` | Configures the log verbosity of the injector. Supported log levels include: trace, debug, info, warn, error |
| injector.metrics | object | `{"enabled":false}` | If true, will enable a node exporter metrics endpoint at /metrics. |
| injector.namespaceSelector | object | `{}` | | | injector.namespaceSelector | object | `{}` | |
| injector.nodeSelector | object | `{}` | | | injector.nodeSelector | object | `{}` | |
| injector.objectSelector | object | `{}` | | | injector.objectSelector | object | `{}` | |
| injector.podDisruptionBudget | object | `{}` | | | injector.podDisruptionBudget | object | `{}` | |
| injector.port | int | `8080` | | | injector.port | int | `8080` | Configures the port the injector should listen on |
| injector.priorityClassName | string | `""` | | | injector.priorityClassName | string | `""` | |
| injector.readinessProbe.failureThreshold | int | `2` | | | injector.readinessProbe.failureThreshold | int | `2` | When a probe fails, Kubernetes will try failureThreshold times before giving up |
| injector.readinessProbe.initialDelaySeconds | int | `5` | | | injector.readinessProbe.initialDelaySeconds | int | `5` | Number of seconds after the container has started before probe initiates |
| injector.readinessProbe.periodSeconds | int | `2` | | | injector.readinessProbe.periodSeconds | int | `2` | How often (in seconds) to perform the probe |
| injector.readinessProbe.successThreshold | int | `1` | | | injector.readinessProbe.successThreshold | int | `1` | Minimum consecutive successes for the probe to be considered successful after having failed |
| injector.readinessProbe.timeoutSeconds | int | `5` | | | injector.readinessProbe.timeoutSeconds | int | `5` | Number of seconds after which the probe times out. |
| injector.replicas | int | `1` | | | injector.replicas | int | `1` | |
| injector.resources | object | `{}` | | | injector.resources | object | `{}` | |
| injector.revokeOnShutdown | bool | `false` | | | injector.revokeOnShutdown | bool | `false` | |
@ -129,11 +135,11 @@ Kubernetes: `>= 1.27.0-0`
| injector.securityContext.pod | object | `{}` | | | injector.securityContext.pod | object | `{}` | |
| injector.service.annotations | object | `{}` | | | injector.service.annotations | object | `{}` | |
| injector.serviceAccount.annotations | object | `{}` | | | injector.serviceAccount.annotations | object | `{}` | |
| injector.startupProbe.failureThreshold | int | `12` | | | injector.startupProbe.failureThreshold | int | `12` | When a probe fails, Kubernetes will try failureThreshold times before giving up |
| injector.startupProbe.initialDelaySeconds | int | `5` | | | injector.startupProbe.initialDelaySeconds | int | `5` | Number of seconds after the container has started before probe initiates |
| injector.startupProbe.periodSeconds | int | `5` | | | injector.startupProbe.periodSeconds | int | `5` | How often (in seconds) to perform the probe |
| injector.startupProbe.successThreshold | int | `1` | | | injector.startupProbe.successThreshold | int | `1` | Minimum consecutive successes for the probe to be considered successful after having failed |
| injector.startupProbe.timeoutSeconds | int | `5` | | | injector.startupProbe.timeoutSeconds | int | `5` | Number of seconds after which the probe times out. |
| injector.strategy | object | `{}` | | | injector.strategy | object | `{}` | |
| injector.tolerations | list | `[]` | | | injector.tolerations | list | `[]` | |
| injector.topologySpreadConstraints | list | `[]` | | | injector.topologySpreadConstraints | list | `[]` | |
@ -187,9 +193,10 @@ Kubernetes: `>= 1.27.0-0`
| server.ha.replicas | int | `3` | | | server.ha.replicas | int | `3` | |
| server.hostAliases | list | `[]` | | | server.hostAliases | list | `[]` | |
| server.hostNetwork | bool | `false` | | | server.hostNetwork | bool | `false` | |
| server.image.pullPolicy | string | `"IfNotPresent"` | | | server.image.pullPolicy | string | `"IfNotPresent"` | image pull policy to use for server image. if tag is "latest", set to "Always" |
| server.image.repository | string | `"hashicorp/vault"` | | | server.image.registry | string | `"quay.io"` | image registry to use for server image |
| server.image.tag | string | `"1.15.2"` | | | server.image.repository | string | `"openbao/openbao"` | image repo to use for server image |
| server.image.tag | string | `"2.0.0-alpha20240329"` | image tag to use for server image |
| server.ingress.activeService | bool | `true` | | | server.ingress.activeService | bool | `true` | |
| server.ingress.annotations | object | `{}` | | | server.ingress.annotations | object | `{}` | |
| server.ingress.enabled | bool | `false` | | | server.ingress.enabled | bool | `false` | |

View file

@ -4,33 +4,33 @@
# Available parameters and their default values for the Vault chart. # Available parameters and their default values for the Vault chart.
global: global:
# enabled is the master enabled switch. Setting this to true or false # -- enabled is the master enabled switch. Setting this to true or false
# will enable or disable all the components within this chart by default. # will enable or disable all the components within this chart by default.
enabled: true enabled: true
# The namespace to deploy to. Defaults to the `helm` installation namespace. # -- The namespace to deploy to. Defaults to the `helm` installation namespace.
namespace: "" namespace: ""
# Image pull secret to use for registry authentication. # -- Image pull secret to use for registry authentication.
# Alternatively, the value may be specified as an array of strings. # Alternatively, the value may be specified as an array of strings.
imagePullSecrets: [] imagePullSecrets: []
# imagePullSecrets: # imagePullSecrets:
# - name: image-pull-secret # - name: image-pull-secret
# TLS for end-to-end encrypted transport # -- TLS for end-to-end encrypted transport
tlsDisable: true tlsDisable: true
# External vault server address for the injector and CSI provider to use. # -- External vault server address for the injector and CSI provider to use.
# Setting this will disable deployment of a vault server. # Setting this will disable deployment of a vault server.
externalVaultAddr: "" externalVaultAddr: ""
# If deploying to OpenShift # -- If deploying to OpenShift
openshift: false openshift: false
# Create PodSecurityPolicy for pods # -- Create PodSecurityPolicy for pods
psp: psp:
enable: false enable: false
# Annotation for PodSecurityPolicy. # -- Annotation for PodSecurityPolicy.
# This is a multi-line templated string map, and can also be set as YAML. # This is a multi-line templated string map, and can also be set as YAML.
annotations: | annotations: |
seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default
@ -39,44 +39,54 @@ global:
apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default
serverTelemetry: serverTelemetry:
# Enable integration with the Prometheus Operator # -- Enable integration with the Prometheus Operator
# See the top level serverTelemetry section below before enabling this feature. # See the top level serverTelemetry section below before enabling this feature.
prometheusOperator: false prometheusOperator: false
injector: injector:
# True if you want to enable vault agent injection. # -- True if you want to enable vault agent injection. @default: global.enabled
# @default: global.enabled
enabled: "-" enabled: "-"
replicas: 1 replicas: 1
# Configures the port the injector should listen on # -- Configures the port the injector should listen on
port: 8080 port: 8080
# If multiple replicas are specified, by default a leader will be determined # -- If multiple replicas are specified, by default a leader will be determined
# so that only one injector attempts to create TLS certificates. # so that only one injector attempts to create TLS certificates.
leaderElector: leaderElector:
enabled: true enabled: true
# If true, will enable a node exporter metrics endpoint at /metrics. # -- If true, will enable a node exporter metrics endpoint at /metrics.
metrics: metrics:
enabled: false enabled: false
# Deprecated: Please use global.externalVaultAddr instead. # -- Deprecated: Please use global.externalVaultAddr instead.
externalVaultAddr: "" externalVaultAddr: ""
# image sets the repo and tag of the vault-k8s image to use for the injector. # image sets the repo and tag of the vault-k8s image to use for the injector.
image: image:
# -- image registry to use for k8s image
registry: "docker.io"
# -- image repo to use for k8s image
repository: "hashicorp/vault-k8s" repository: "hashicorp/vault-k8s"
# -- image tag to use for k8s image
tag: "1.3.1" tag: "1.3.1"
# -- image pull policy to use for k8s image. if tag is "latest", set to "Always"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# agentImage sets the repo and tag of the Vault image to use for the Vault Agent # -- agentImage sets the repo and tag of the Vault image to use for the Vault Agent
# containers. This should be set to the official Vault image. Vault 1.3.1+ is # containers. This should be set to the official Vault image. Vault 1.3.1+ is
# required. # required.
agentImage: agentImage:
repository: "hashicorp/vault" # -- image registry to use for agent image
tag: "1.15.2" registry: "quay.io"
# -- image repo to use for agent image
repository: "openbao/openbao"
# -- image tag to use for agent image
tag: "2.0.0-alpha20240329"
# -- image pull policy to use for agent image. if tag is "latest", set to "Always"
pullPolicy: IfNotPresent
# The default values for the injected Vault Agent containers. # The default values for the injected Vault Agent containers.
agentDefaults: agentDefaults:
@ -100,49 +110,49 @@ injector:
# Used to define custom livenessProbe settings # Used to define custom livenessProbe settings
livenessProbe: livenessProbe:
# When a probe fails, Kubernetes will try failureThreshold times before giving up # -- When a probe fails, Kubernetes will try failureThreshold times before giving up
failureThreshold: 2 failureThreshold: 2
# Number of seconds after the container has started before probe initiates # -- Number of seconds after the container has started before probe initiates
initialDelaySeconds: 5 initialDelaySeconds: 5
# How often (in seconds) to perform the probe # -- How often (in seconds) to perform the probe
periodSeconds: 2 periodSeconds: 2
# Minimum consecutive successes for the probe to be considered successful after having failed # -- Minimum consecutive successes for the probe to be considered successful after having failed
successThreshold: 1 successThreshold: 1
# Number of seconds after which the probe times out. # -- Number of seconds after which the probe times out.
timeoutSeconds: 5 timeoutSeconds: 5
# Used to define custom readinessProbe settings # Used to define custom readinessProbe settings
readinessProbe: readinessProbe:
# When a probe fails, Kubernetes will try failureThreshold times before giving up # -- When a probe fails, Kubernetes will try failureThreshold times before giving up
failureThreshold: 2 failureThreshold: 2
# Number of seconds after the container has started before probe initiates # -- Number of seconds after the container has started before probe initiates
initialDelaySeconds: 5 initialDelaySeconds: 5
# How often (in seconds) to perform the probe # -- How often (in seconds) to perform the probe
periodSeconds: 2 periodSeconds: 2
# Minimum consecutive successes for the probe to be considered successful after having failed # -- Minimum consecutive successes for the probe to be considered successful after having failed
successThreshold: 1 successThreshold: 1
# Number of seconds after which the probe times out. # -- Number of seconds after which the probe times out.
timeoutSeconds: 5 timeoutSeconds: 5
# Used to define custom startupProbe settings # Used to define custom startupProbe settings
startupProbe: startupProbe:
# When a probe fails, Kubernetes will try failureThreshold times before giving up # -- When a probe fails, Kubernetes will try failureThreshold times before giving up
failureThreshold: 12 failureThreshold: 12
# Number of seconds after the container has started before probe initiates # -- Number of seconds after the container has started before probe initiates
initialDelaySeconds: 5 initialDelaySeconds: 5
# How often (in seconds) to perform the probe # -- How often (in seconds) to perform the probe
periodSeconds: 5 periodSeconds: 5
# Minimum consecutive successes for the probe to be considered successful after having failed # -- Minimum consecutive successes for the probe to be considered successful after having failed
successThreshold: 1 successThreshold: 1
# Number of seconds after which the probe times out. # -- Number of seconds after which the probe times out.
timeoutSeconds: 5 timeoutSeconds: 5
# Mount Path of the Vault Kubernetes Auth Method. # Mount Path of the Vault Kubernetes Auth Method.
authPath: "auth/kubernetes" authPath: "auth/kubernetes"
# Configures the log verbosity of the injector. # -- Configures the log verbosity of the injector.
# Supported log levels include: trace, debug, info, warn, error # Supported log levels include: trace, debug, info, warn, error
logLevel: "info" logLevel: "info"
# Configures the log format of the injector. Supported log formats: "standard", "json". # -- Configures the log format of the injector. Supported log formats: "standard", "json".
logFormat: "standard" logFormat: "standard"
# Configures all Vault Agent sidecars to revoke their token when shutting down # Configures all Vault Agent sidecars to revoke their token when shutting down
@ -376,9 +386,13 @@ server:
# By default no direct resource request is made. # By default no direct resource request is made.
image: image:
repository: "hashicorp/vault" # -- image registry to use for server image
tag: "1.15.2" registry: "quay.io"
# Overrides the default Image Pull Policy # -- image repo to use for server image
repository: "openbao/openbao"
# -- image tag to use for server image
tag: "2.0.0-alpha20240329"
# -- image pull policy to use for server image. if tag is "latest", set to "Always"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# Configure the Update Strategy Type for the StatefulSet # Configure the Update Strategy Type for the StatefulSet
@ -1075,7 +1089,7 @@ ui:
# secrets-store-csi-driver-provider-vault # secrets-store-csi-driver-provider-vault
csi: csi:
# True if you want to install a secrets-store-csi-driver-provider-vault daemonset. # -- True if you want to install a secrets-store-csi-driver-provider-vault daemonset.
# #
# Requires installing the secrets-store-csi-driver separately, see: # Requires installing the secrets-store-csi-driver separately, see:
# https://github.com/kubernetes-sigs/secrets-store-csi-driver#install-the-secrets-store-csi-driver # https://github.com/kubernetes-sigs/secrets-store-csi-driver#install-the-secrets-store-csi-driver
@ -1086,11 +1100,16 @@ csi:
enabled: false enabled: false
image: image:
# -- image registry to use for csi image
registry: "docker.io"
# -- image repo to use for csi image
repository: "hashicorp/vault-csi-provider" repository: "hashicorp/vault-csi-provider"
# -- image tag to use for csi image
tag: "1.4.1" tag: "1.4.1"
# -- image pull policy to use for csi image. if tag is "latest", set to "Always"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# volumes is a list of volumes made available to all containers. These are rendered # -- volumes is a list of volumes made available to all containers. These are rendered
# via toYaml rather than pre-processed like the extraVolumes value. # via toYaml rather than pre-processed like the extraVolumes value.
# The purpose is to make it easy to share volumes between containers. # The purpose is to make it easy to share volumes between containers.
volumes: null volumes: null
@ -1098,7 +1117,7 @@ csi:
# secret: # secret:
# secretName: vault-tls # secretName: vault-tls
# volumeMounts is a list of volumeMounts for the main server container. These are rendered # -- volumeMounts is a list of volumeMounts for the main server container. These are rendered
# via toYaml rather than pre-processed like the extraVolumes value. # via toYaml rather than pre-processed like the extraVolumes value.
# The purpose is to make it easy to share volumes between containers. # The purpose is to make it easy to share volumes between containers.
volumeMounts: null volumeMounts: null
@ -1171,8 +1190,13 @@ csi:
extraArgs: [] extraArgs: []
image: image:
repository: "hashicorp/vault" # -- image registry to use for agent image
tag: "1.15.2" registry: "quay.io"
# -- image repo to use for agent image
repository: "openbao/openbao"
# -- image tag to use for agent image
tag: "2.0.0-alpha20240329"
# -- image pull policy to use for agent image. if tag is "latest", set to "Always"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
logFormat: standard logFormat: standard