From a8525a28f06dd748dc35dd13794f58e6a259ca16 Mon Sep 17 00:00:00 2001 From: Theron Voran Date: Wed, 25 Oct 2023 08:35:41 -0700 Subject: [PATCH] Preparing for v1.3.1 release (#539) changelog and version updates --- CHANGELOG.md | 5 +++++ agent-inject/agent/agent.go | 2 +- deploy/injector-deployment.yaml | 4 ++-- subcommand/injector/flags_test.go | 2 +- 4 files changed, 9 insertions(+), 4 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 0f13c393..0a29f8db 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,6 +1,9 @@ ## Unreleased +## 1.3.1 (October 25, 2023) + Changes: +* Default Vault version updated to 1.15.1 * Building with Go 1.21.3 * Testing with K8s versions 1.24-1.28 * Dependency updates: @@ -16,9 +19,11 @@ Changes: * `k8s.io/client-go` v0.27.4 => v0.28.3 * `github.com/hashicorp/vault/sdk` v0.9.2 => v0.10.2 * `github.com/prometheus/client_golang` v1.16.0 => v1.17.0 + * `github.com/evanphx/json-patch` v5.6.0 => v5.7.0 Improvements: * Injector can set CA certificate for injected pods via `AGENT_INJECT_VAULT_CACERT_BYTES` env var or `-vault-cacert-bytes` flag [GH-507](https://github.com/hashicorp/vault-k8s/pull/507) +* Remove refs to deprecated io/ioutil [GH-516](https://github.com/hashicorp/vault-k8s/pull/516) ## 1.3.0 (August 16, 2023) diff --git a/agent-inject/agent/agent.go b/agent-inject/agent/agent.go index 76909def..3ecbdb07 100644 --- a/agent-inject/agent/agent.go +++ b/agent-inject/agent/agent.go @@ -17,7 +17,7 @@ import ( ) const ( - DefaultVaultImage = "hashicorp/vault:1.14.1" + DefaultVaultImage = "hashicorp/vault:1.15.1" DefaultVaultAuthType = "kubernetes" DefaultVaultAuthPath = "auth/kubernetes" DefaultAgentRunAsUser = 100 diff --git a/deploy/injector-deployment.yaml b/deploy/injector-deployment.yaml index b9ebfc43..e415f8e0 100644 --- a/deploy/injector-deployment.yaml +++ b/deploy/injector-deployment.yaml @@ -24,7 +24,7 @@ spec: serviceAccountName: "vault-injector" containers: - name: sidecar-injector - image: "hashicorp/vault-k8s:1.3.0" + image: "hashicorp/vault-k8s:1.3.1" imagePullPolicy: IfNotPresent env: - name: NAMESPACE @@ -44,7 +44,7 @@ spec: - name: AGENT_INJECT_VAULT_ADDR value: "https://vault.$(NAMESPACE).svc:8200" - name: AGENT_INJECT_VAULT_IMAGE - value: "hashicorp/vault:1.14.1" + value: "hashicorp/vault:1.15.1" - name: AGENT_INJECT_TLS_AUTO value: vault-agent-injector-cfg - name: AGENT_INJECT_TLS_AUTO_HOSTS diff --git a/subcommand/injector/flags_test.go b/subcommand/injector/flags_test.go index 89ca01ae..854d9bb1 100644 --- a/subcommand/injector/flags_test.go +++ b/subcommand/injector/flags_test.go @@ -119,7 +119,7 @@ func TestCommandEnvs(t *testing.T) { {env: "AGENT_INJECT_VAULT_CACERT_BYTES", value: "foo", cmdPtr: &cmd.flagVaultCACertBytes}, {env: "AGENT_INJECT_PROXY_ADDR", value: "http://proxy:3128", cmdPtr: &cmd.flagProxyAddress}, {env: "AGENT_INJECT_VAULT_AUTH_PATH", value: "auth-path-test", cmdPtr: &cmd.flagVaultAuthPath}, - {env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.14.1", cmdPtr: &cmd.flagVaultImage}, + {env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.15.1", cmdPtr: &cmd.flagVaultImage}, {env: "AGENT_INJECT_VAULT_NAMESPACE", value: "test-namespace", cmdPtr: &cmd.flagVaultNamespace}, {env: "AGENT_INJECT_TLS_KEY_FILE", value: "server.key", cmdPtr: &cmd.flagKeyFile}, {env: "AGENT_INJECT_TLS_CERT_FILE", value: "server.crt", cmdPtr: &cmd.flagCertFile},