Commit graph

280 commits

Author SHA1 Message Date
Jan Martens
e0be4ae6de
disable injector and CSI tests
We do not provide our own images for those components yet which is
causing some incompabilites and test failures

Signed-off-by: Jan Martens <jan@martens.eu.org>
2024-09-04 23:51:49 +02:00
Jan Martens
4f63aa2373
fix acceptance tests
Signed-off-by: Jan Martens <jan@martens.eu.org>
2024-09-04 23:51:49 +02:00
Jan Martens
d6a660e868
fix chart unit tests
Signed-off-by: Jan Martens <jan@martens.eu.org>
2024-09-04 23:51:48 +02:00
Jan Martens
5fba05f8f8
fix chart verifier tests
Signed-off-by: Jan Martens <jan@martens.eu.org>
2024-09-04 23:51:48 +02:00
jessebot
d5dba29bf5 more updates of vault to openbao, and more updates of old k8s versions
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
jessebot
547020f267 update all the tests to use kube-version 1.27.x instead of 1.22.x so we're supporting supported versions of kubernetes
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
jessebot
8f700eb551 fix chart dir for unit tests
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
jessebot
b473c07acc update more vault to openbao everywhere
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
jessebot
f15d0f69f9 remove enterprise tests
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
jessebot
4f8924d1d7 replace vault command with bao and helm install/delete vault with openbao - part 1
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
jessebot
a139a100bf attempt to fix helm install in bats tests
Signed-off-by: jessebot <jessebot@linux.com>
2024-05-29 10:43:12 -04:00
Nathan Phelps
be6fa5a195 Issue 6: Changed some of the Hashicorp Vault refences in the docs to OpenBao.
Signed-off-by: Nathan Phelps <naphelps@us.ibm.com>
2024-05-20 17:43:17 -04:00
Theron Voran
e439b28914
injector: add get for nodes in clusterrole (#1005)
Required for operator-lib leader logic
2024-03-18 21:55:51 -07:00
Christopher Swenson
d186b6ff29
Add annotation on config change (#1001)
When updating the Vault config (and corresponding)
configmap, we now generate a checksum of the config
and set it as an annotation on both the configmap
and the Vault StatefulSet pod template.

This allows the deployer to know what pods need to
be restarted to pick up the a changed config.

We still recommend using the standard upgrade
[method for Vault on Kubernetes](https://developer.hashicorp.com/vault/tutorials/kubernetes/kubernetes-raft-deployment-guide#upgrading-vault-on-kubernetes),
i.e., using the `OnDelete` strategy
for the Vault StatefulSet, so updating the config
and doing a `helm upgrade` should not trigger the
pods to restart, and then deleting pods one
at a time, starting with the standby pods.

With `kubectl` and `jq`, you can check check which
pods need to be updated by first getting the value
of the current configmap checksum:

```shell
kubectl get pods -o json | jq -r ".items[] | select(.metadata.annotations.\"config/checksum\" != $(kubectl get configmap vault-config -o json | jq '.metadata.annotations."config/checksum"') ) | .metadata.name"
```

Fixes #748.

---------

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2024-03-18 11:03:56 -07:00
Alan Tang
3e16e05ba7
Add labels for PVC template (#969) 2023-11-15 17:55:09 -08:00
Marco Lecheler
e77dce38b2
feat: ingress rules for server networkPolicy (#877)
* feat: allow server netPol to specify podSelector

* feat(test): add podSelector NetworkPolicy unittest

* chore: introduce server.networkPolicy.ingress

As suggested let users template the whole ingress object for the
networkPolicy than only the podSelector.

Co-authored-by: tvoran <444265+tvoran@users.noreply.github.com>

---------

Co-authored-by: tvoran <444265+tvoran@users.noreply.github.com>
2023-11-15 16:42:26 -08:00
Aleix Murtra
ad64f921b5
Add persistentVolumeClaimRetentionPolicy variable to values.yaml (#965)
This variable is used to set the persistentVolumeClaimRetentionPolicy
value in the server-statefulset.yaml template, which is used to
configure the retention policy for the PVCs used by the server
statefulset.
2023-11-13 11:55:33 -08:00
Thy Ton
2bb6994dd9
support exec in server liveness probe (#971)
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-11-09 13:38:59 -08:00
tekicat
7728f8c650
Allow additional annotations for standby and active services via config (#896)
* Allow additional annotations for standby and active services via config
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
2023-09-26 15:28:54 -05:00
Milan Rafaj
3387881451
feat: add hostAliases for statefulset (#955) 2023-09-18 08:53:00 -07:00
Arend Lapere
377b68f13b
Add support for dual stack clusters (#833) 2023-08-24 15:14:19 -07:00
Marco Lecheler
ea1c36922b
chore(test): use vault.fullname in Helm test (#912) 2023-08-23 11:30:35 -07:00
gillcaleb
1e12d49d74
Add optional long lived SA token (#923)
---------

Co-authored-by: Caleb Gill <cgill@stavvy.com>
2023-08-17 14:05:50 +01:00
Johannes Siebel
ec964a33ea
Allow scale to zero (#943) 2023-08-15 10:50:25 +01:00
KhizerJaan
9a16496e86
Allows the release namespace to be overridden (#909) 2023-07-04 14:30:35 +01:00
Tom Proctor
e2711a2002
Prepare for 0.25.0 release (#916)
* Prepare for 0.25.0 release
* Update CSI acceptance test assertion

Starting in 1.4.0, the CSI provider caches Vault tokens locally. The main thing
we want to check is that the Agent cache is being used so that it's doing the
renewal legwork for any leased secrets, so check for the renewal log message instead
because CSI won't auth over and over anymore.
2023-06-26 16:00:04 +01:00
Theron Voran
cd30d9890a
csi: update affinity and nodeselector schema (#907)
array -> object
2023-06-06 22:51:14 -07:00
Toninh0
3ce721fca4
CSI configurable nodeSelector and affinity (#862) 2023-06-01 10:38:22 +01:00
Tom Proctor
da34c6c986
publishNotReadyAddresses for headless service always true (#902) 2023-05-30 15:54:00 +01:00
risson
a276600b71
Default prometheusRules.rules should be an empty list (#886)
Support for prometheus-operator was added in
https://github.com/hashicorp/vault-helm/pull/772 and a default empty
set of rules was defined as an empty map `{}`. However, as evidenced
by the commented out rule examples below that very same values.yaml,
this is expected to be a list, so `rules:` value should be set to an
empty list `[]`.

Co-authored-by: Marc 'risson' Schmitt <marc.schmitt@risson.space>
Co-authored-by: Vitaliy <vitaliyf@users.noreply.github.com>
2023-05-17 22:01:22 -07:00
Krishnadas M
b9096ee15b
Make injected Agent ephemeral storage configurable through injector.agentDefaults (#798) 2023-05-17 13:59:05 +01:00
Tom Proctor
9954df5e68
Add role for creating CSI's HMAC secret key (#872) 2023-04-14 13:31:41 +01:00
Christopher Swenson
d52c4a519d
Prepare for 0.24.0 release (#868) 2023-04-06 15:38:23 -07:00
Tom Proctor
0fe916481c
Add Vault Agent sidecar to CSI Provider (#749)
Adds Agent as a sidecar for the CSI Provider to:

* Cache k8s auth login leases
* Cache secret leases
* Automatically renew renewable leases in the background
2023-04-06 19:45:10 +01:00
Kyle Schochenmaier
fc7d4326fc
Add changelog for #831 (#867)
* Add changelog for #831
* fixes bats test
2023-04-04 10:21:42 -05:00
Bhargav Akhani
9f189801a6
Add portnumber (#831)
* Add configurable Port Number in readinessProbe and livenessProbe for the server-statefulset. 
Co-authored-by: Kyle Schochenmaier <kyle.schochenmaier@hashicorp.com>
2023-04-04 09:17:24 -05:00
Theron Voran
2c4cd3a3c3
Updating GHA and default Vault version (#863)
Test with latest kind k8s versions 1.22-1.26. Remove support for old
disruptionbudget and ingress APIs (pre 1.22).

Pin all actions to SHAs, and use the common jira sync.

Update the default Vault version to v1.13.1.

Update chart-verifier used in tests to 1.10.1, also add an openshift
name annotation to Chart.yaml (one of the required checks).
2023-04-03 16:44:13 -07:00
Thy Ton
932891778f
feat: make injector livenessProbe and readinessProbe configurable and add configurable startupProbe (#852) 2023-03-16 12:03:27 -07:00
Thy Ton
f4f05aaa74
fix: remove k8s 1.16 from acceptance testing (#848)
* remove 1.16 from the versions tested in .github/workflows/acceptance.yaml as kind no longer supports creating a k8s 1.16 cluster
* update vault-helm's minimum support k8s version to 1.20 in README and Chart.yaml
* refactor server-ingress's templating and unit tests applied to k8s versions < 1.20
2023-02-27 12:04:17 -08:00
Dimitar Zafirov
e31e70ea0b
Add extraPorts property (#841) 2023-02-16 10:49:07 -08:00
jordanfelle
34d8650cca
Fix typo in telemetry example (#846)
Also in the telemetry test
2023-02-16 09:07:41 -08:00
Theron Voran
742ddb1c52
adding SPDX copyright headers (#844) 2023-02-13 08:48:20 -08:00
Tom Proctor
2d7fd5d565
Prepare for 0.23.0 release (#814) 2022-11-28 23:33:08 +00:00
Tom Proctor
c13151a6ac
server: Allow disabling the instance selector for services (#813) 2022-11-17 19:54:18 +00:00
Tom Proctor
21ce5245a3
Support selectively disabling active/standby services and service discovery role (#811) 2022-11-14 14:10:21 +00:00
Steven Kriegler
0110f977b2
Quote .server.ha.clusterAddr value (#810) 2022-11-09 14:19:38 -08:00
Aleksandr Titov
ab5b471c27
Add extraLabels for Vault server serviceAccount (#806) 2022-11-02 18:01:35 -07:00
Tom Proctor
5d7014c7bb
Prepare to release to 0.22.1 (#803)
* Prepare to release to 0.22.1

* Revert chart verifier update for now

* Remove unused jobs from CircleCI config
2022-10-26 20:32:46 +01:00
Tom Proctor
7e21a09ebd
Add server.hostNetwork option (#775) 2022-09-12 15:17:24 +01:00
Christopher Swenson
c15d83e397
Prepare for 0.22.0 release (#785)
Prepare for 0.21.1 release

* Update Vault to 1.11.3
2022-09-08 11:59:17 -07:00