parent
addf8a4f65
commit
ee4e532159
5 changed files with 20 additions and 18 deletions
12
CHANGELOG.md
12
CHANGELOG.md
|
@ -1,5 +1,7 @@
|
||||||
## Unreleased
|
## Unreleased
|
||||||
|
|
||||||
|
## 0.8.0 (October 20th, 2020)
|
||||||
|
|
||||||
Improvements:
|
Improvements:
|
||||||
* Make server NetworkPolicy independent of OpenShift [GH-381](https://github.com/hashicorp/vault-helm/pull/381)
|
* Make server NetworkPolicy independent of OpenShift [GH-381](https://github.com/hashicorp/vault-helm/pull/381)
|
||||||
* Added configurables for all probe values [GH-387](https://github.com/hashicorp/vault-helm/pull/387)
|
* Added configurables for all probe values [GH-387](https://github.com/hashicorp/vault-helm/pull/387)
|
||||||
|
@ -114,7 +116,7 @@ Features:
|
||||||
|
|
||||||
* Extra containers can now be added to the Vault pods
|
* Extra containers can now be added to the Vault pods
|
||||||
* Added configurability of pod probes
|
* Added configurability of pod probes
|
||||||
* Added Vault Agent Injector
|
* Added Vault Agent Injector
|
||||||
|
|
||||||
Improvements:
|
Improvements:
|
||||||
|
|
||||||
|
@ -168,21 +170,21 @@ Features:
|
||||||
|
|
||||||
* Added `extraSecretEnvironmentVars` to allow users to mount secrets as
|
* Added `extraSecretEnvironmentVars` to allow users to mount secrets as
|
||||||
environment variables
|
environment variables
|
||||||
* Added `tlsDisable` configurable to change HTTP protocols from HTTP/HTTPS
|
* Added `tlsDisable` configurable to change HTTP protocols from HTTP/HTTPS
|
||||||
depending on the value
|
depending on the value
|
||||||
* Added `serviceNodePort` to configure a NodePort value when setting `serviceType`
|
* Added `serviceNodePort` to configure a NodePort value when setting `serviceType`
|
||||||
to "NodePort"
|
to "NodePort"
|
||||||
|
|
||||||
Improvements:
|
Improvements:
|
||||||
|
|
||||||
* Changed UI port to 8200 for better HTTP protocol support
|
* Changed UI port to 8200 for better HTTP protocol support
|
||||||
* Added `path` to `extraVolumes` to define where the volume should be
|
* Added `path` to `extraVolumes` to define where the volume should be
|
||||||
mounted. Defaults to `/vault/userconfig`
|
mounted. Defaults to `/vault/userconfig`
|
||||||
* Upgraded Vault to 1.2.2
|
* Upgraded Vault to 1.2.2
|
||||||
|
|
||||||
Bugs:
|
Bugs:
|
||||||
|
|
||||||
* Fixed bug where upgrade would fail because immutable labels were being
|
* Fixed bug where upgrade would fail because immutable labels were being
|
||||||
changed (Helm Version label)
|
changed (Helm Version label)
|
||||||
* Fixed bug where UI service used wrong selector after updating helm labels
|
* Fixed bug where UI service used wrong selector after updating helm labels
|
||||||
* Added `VAULT_API_ADDR` env to Vault pod to fixed bug where Vault thinks
|
* Added `VAULT_API_ADDR` env to Vault pod to fixed bug where Vault thinks
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
name: vault
|
name: vault
|
||||||
version: 0.7.0
|
version: 0.8.0
|
||||||
appVersion: 1.5.2
|
appVersion: 1.5.4
|
||||||
description: Official HashiCorp Vault Chart
|
description: Official HashiCorp Vault Chart
|
||||||
home: https://www.vaultproject.io
|
home: https://www.vaultproject.io
|
||||||
icon: https://github.com/hashicorp/vault/raw/f22d202cde2018f9455dec755118a9b84586e082/Vault_PrimaryLogo_Black.png
|
icon: https://github.com/hashicorp/vault/raw/f22d202cde2018f9455dec755118a9b84586e082/Vault_PrimaryLogo_Black.png
|
||||||
|
|
|
@ -7,7 +7,7 @@ load _helpers
|
||||||
|
|
||||||
helm install "$(name_prefix)-east" \
|
helm install "$(name_prefix)-east" \
|
||||||
--set='server.image.repository=hashicorp/vault-enterprise' \
|
--set='server.image.repository=hashicorp/vault-enterprise' \
|
||||||
--set='server.image.tag=1.5.2_ent' \
|
--set='server.image.tag=1.5.4_ent' \
|
||||||
--set='injector.enabled=false' \
|
--set='injector.enabled=false' \
|
||||||
--set='server.ha.enabled=true' \
|
--set='server.ha.enabled=true' \
|
||||||
--set='server.ha.raft.enabled=true' .
|
--set='server.ha.raft.enabled=true' .
|
||||||
|
@ -28,7 +28,7 @@ load _helpers
|
||||||
|
|
||||||
local primary_token=$(echo ${init} | jq -r '.unseal_keys_b64[0]')
|
local primary_token=$(echo ${init} | jq -r '.unseal_keys_b64[0]')
|
||||||
[ "${primary_token}" != "" ]
|
[ "${primary_token}" != "" ]
|
||||||
|
|
||||||
local primary_root=$(echo ${init} | jq -r '.root_token')
|
local primary_root=$(echo ${init} | jq -r '.root_token')
|
||||||
[ "${primary_root}" != "" ]
|
[ "${primary_root}" != "" ]
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ load _helpers
|
||||||
|
|
||||||
kubectl exec "$(name_prefix)-east-0" -- vault login ${primary_root}
|
kubectl exec "$(name_prefix)-east-0" -- vault login ${primary_root}
|
||||||
|
|
||||||
local raft_status=$(kubectl exec "$(name_prefix)-east-0" -- vault operator raft list-peers -format=json |
|
local raft_status=$(kubectl exec "$(name_prefix)-east-0" -- vault operator raft list-peers -format=json |
|
||||||
jq -r '.data.config.servers | length')
|
jq -r '.data.config.servers | length')
|
||||||
[ "${raft_status}" == "3" ]
|
[ "${raft_status}" == "3" ]
|
||||||
|
|
||||||
|
@ -76,7 +76,7 @@ load _helpers
|
||||||
helm install "$(name_prefix)-west" \
|
helm install "$(name_prefix)-west" \
|
||||||
--set='injector.enabled=false' \
|
--set='injector.enabled=false' \
|
||||||
--set='server.image.repository=hashicorp/vault-enterprise' \
|
--set='server.image.repository=hashicorp/vault-enterprise' \
|
||||||
--set='server.image.tag=1.5.2_ent' \
|
--set='server.image.tag=1.5.4_ent' \
|
||||||
--set='server.ha.enabled=true' \
|
--set='server.ha.enabled=true' \
|
||||||
--set='server.ha.raft.enabled=true' .
|
--set='server.ha.raft.enabled=true' .
|
||||||
wait_for_running "$(name_prefix)-west-0"
|
wait_for_running "$(name_prefix)-west-0"
|
||||||
|
|
|
@ -8,7 +8,7 @@ load _helpers
|
||||||
helm install "$(name_prefix)-east" \
|
helm install "$(name_prefix)-east" \
|
||||||
--set='injector.enabled=false' \
|
--set='injector.enabled=false' \
|
||||||
--set='server.image.repository=hashicorp/vault-enterprise' \
|
--set='server.image.repository=hashicorp/vault-enterprise' \
|
||||||
--set='server.image.tag=1.5.2_ent' \
|
--set='server.image.tag=1.5.4_ent' \
|
||||||
--set='server.ha.enabled=true' \
|
--set='server.ha.enabled=true' \
|
||||||
--set='server.ha.raft.enabled=true' .
|
--set='server.ha.raft.enabled=true' .
|
||||||
wait_for_running "$(name_prefix)-east-0"
|
wait_for_running "$(name_prefix)-east-0"
|
||||||
|
@ -28,7 +28,7 @@ load _helpers
|
||||||
|
|
||||||
local primary_token=$(echo ${init} | jq -r '.unseal_keys_b64[0]')
|
local primary_token=$(echo ${init} | jq -r '.unseal_keys_b64[0]')
|
||||||
[ "${primary_token}" != "" ]
|
[ "${primary_token}" != "" ]
|
||||||
|
|
||||||
local primary_root=$(echo ${init} | jq -r '.root_token')
|
local primary_root=$(echo ${init} | jq -r '.root_token')
|
||||||
[ "${primary_root}" != "" ]
|
[ "${primary_root}" != "" ]
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ load _helpers
|
||||||
|
|
||||||
kubectl exec "$(name_prefix)-east-0" -- vault login ${primary_root}
|
kubectl exec "$(name_prefix)-east-0" -- vault login ${primary_root}
|
||||||
|
|
||||||
local raft_status=$(kubectl exec "$(name_prefix)-east-0" -- vault operator raft list-peers -format=json |
|
local raft_status=$(kubectl exec "$(name_prefix)-east-0" -- vault operator raft list-peers -format=json |
|
||||||
jq -r '.data.config.servers | length')
|
jq -r '.data.config.servers | length')
|
||||||
[ "${raft_status}" == "3" ]
|
[ "${raft_status}" == "3" ]
|
||||||
|
|
||||||
|
@ -76,7 +76,7 @@ load _helpers
|
||||||
helm install "$(name_prefix)-west" \
|
helm install "$(name_prefix)-west" \
|
||||||
--set='injector.enabled=false' \
|
--set='injector.enabled=false' \
|
||||||
--set='server.image.repository=hashicorp/vault-enterprise' \
|
--set='server.image.repository=hashicorp/vault-enterprise' \
|
||||||
--set='server.image.tag=1.5.2_ent' \
|
--set='server.image.tag=1.5.4_ent' \
|
||||||
--set='server.ha.enabled=true' \
|
--set='server.ha.enabled=true' \
|
||||||
--set='server.ha.raft.enabled=true' .
|
--set='server.ha.raft.enabled=true' .
|
||||||
wait_for_running "$(name_prefix)-west-0"
|
wait_for_running "$(name_prefix)-west-0"
|
||||||
|
|
|
@ -38,7 +38,7 @@ injector:
|
||||||
# image sets the repo and tag of the vault-k8s image to use for the injector.
|
# image sets the repo and tag of the vault-k8s image to use for the injector.
|
||||||
image:
|
image:
|
||||||
repository: "hashicorp/vault-k8s"
|
repository: "hashicorp/vault-k8s"
|
||||||
tag: "0.5.0"
|
tag: "0.6.0"
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
|
|
||||||
# agentImage sets the repo and tag of the Vault image to use for the Vault Agent
|
# agentImage sets the repo and tag of the Vault image to use for the Vault Agent
|
||||||
|
@ -46,7 +46,7 @@ injector:
|
||||||
# required.
|
# required.
|
||||||
agentImage:
|
agentImage:
|
||||||
repository: "vault"
|
repository: "vault"
|
||||||
tag: "1.5.2"
|
tag: "1.5.4"
|
||||||
|
|
||||||
# Mount Path of the Vault Kubernetes Auth Method.
|
# Mount Path of the Vault Kubernetes Auth Method.
|
||||||
authPath: "auth/kubernetes"
|
authPath: "auth/kubernetes"
|
||||||
|
@ -140,7 +140,7 @@ server:
|
||||||
|
|
||||||
image:
|
image:
|
||||||
repository: "vault"
|
repository: "vault"
|
||||||
tag: "1.5.2"
|
tag: "1.5.4"
|
||||||
# Overrides the default Image Pull Policy
|
# Overrides the default Image Pull Policy
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue