Skip to content

Commit 3a0fb2f

Browse files
committed
Preparing v1.6.2 release
Updating kind, k8s versions, Vault version, and changelog.
1 parent 362f8ff commit 3a0fb2f

File tree

7 files changed

+26
-13
lines changed

7 files changed

+26
-13
lines changed

.github/actions/integration-test/action.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ runs:
5959
cluster_name: ${{ inputs.kind-cluster-name }}
6060
config: vault-helm/test/kind/config.yaml
6161
node_image: kindest/node:v${{ inputs.k8s-version }}
62-
version: "v0.26.0"
62+
version: "v0.27.0"
6363

6464
- name: Create kind export log root
6565
id: create_kind_export_log_root

.github/workflows/tests.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ jobs:
3939
- run: echo "setting versions"
4040
outputs:
4141
# JSON encoded array of k8s versions.
42-
K8S_VERSIONS: '["1.31.2", "1.30.6", "1.29.10", "1.28.15", "1.27.16"]'
43-
VAULT_N: "1.18.2"
42+
K8S_VERSIONS: '["1.32.2", "1.31.6", "1.30.10", "1.29.14", "1.28.15"]'
43+
VAULT_N: "1.18.5"
4444
VAULT_N_1: "1.17.6"
4545
VAULT_N_2: "1.16.3"
4646

CHANGELOG.md

+18-5
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,38 @@
11
## Unreleased
22

3+
## 1.6.2 (February 26, 2025)
4+
35
Changes:
46
* Building with Go 1.23.6
7+
* Default Vault version updated to 1.18.5
8+
* Testing with K8s versions 1.28 - 1.32
59
* Dependency updates:
10+
* Docker image `alpine` 3.21.0 => 3.21.3
11+
* Docker image `ubi8/ubi-minimal` 8.10-1130 => 8.10-1179.1739286367
12+
* github.com/evanphx/json-patch v5.9.0+incompatible => v5.9.11+incompatible
13+
* github.com/hashicorp/go-secure-stdlib/parseutil v0.1.8 => v0.1.9
14+
* github.com/hashicorp/vault/sdk v0.14.0 => v0.15.0
15+
* github.com/operator-framework/operator-lib v0.15.0 => v0.17.0
616
* golang.org/x/crypto v0.31.0 => v0.35.0
7-
* golang.org/x/oauth2 v0.24.0 => v0.27.0
817
* golang.org/x/net v0.32.0 => v0.35.0
18+
* golang.org/x/oauth2 v0.21.0 => v0.27.0
919
* golang.org/x/sys v0.28.0 => v0.30.0
1020
* golang.org/x/term v0.27.0 => v0.29.0
1121
* golang.org/x/text v0.21.0 => v0.22.0
12-
* k8s.io/apimachinery v0.31.3 => v0.32.0
13-
* k8s.io/client-go v0.31.3 => v0.32.0
22+
* k8s.io/api v0.31.3 => v0.32.2
23+
* k8s.io/apimachinery v0.31.3 => v0.32.2
24+
* k8s.io/client-go v0.31.3 => v0.32.2
1425
* k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 => v0.0.0-20241104100929-3ea5e8cea738
15-
* sigs.k8s.io/controller-runtime v0.19.2 => v0.19.3
26+
* sigs.k8s.io/controller-runtime v0.19.2 => v0.20.2
27+
28+
Bugs:
29+
* Update webhook CA bundle verification log message [GH-739](https://github.com/hashicorp/vault-k8s/pull/739)
1630

1731
## 1.6.1 (December 16, 2024)
1832

1933
Changes:
2034
* Dependency updates:
2135
* Docker image `alpine` 3.20.3 => 3.21.0
22-
* Docker image `ubi8/ubi-minimal` 8.10-1130 => 8.10-1154
2336
* golang.org/x/crypto v0.30.0 => v0.31.0
2437

2538
Bugs:

Makefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
REGISTRY_NAME ?= docker.io/hashicorp
22
IMAGE_NAME = vault-k8s
33
VERSION ?= 0.0.0-dev
4-
VAULT_VERSION ?= 1.18.2
4+
VAULT_VERSION ?= 1.18.5
55
IMAGE_TAG ?= $(REGISTRY_NAME)/$(IMAGE_NAME):$(VERSION)
66
PUBLISH_LOCATION ?= https://releases.hashicorp.com
77
DOCKER_DIR = ./build/docker

agent-inject/agent/agent.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import (
1717
)
1818

1919
const (
20-
DefaultVaultImage = "hashicorp/vault:1.18.2"
20+
DefaultVaultImage = "hashicorp/vault:1.18.5"
2121
DefaultVaultAuthType = "kubernetes"
2222
DefaultVaultAuthPath = "auth/kubernetes"
2323
DefaultAgentRunAsUser = 100

deploy/injector-deployment.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ spec:
2424
serviceAccountName: "vault-injector"
2525
containers:
2626
- name: sidecar-injector
27-
image: "hashicorp/vault-k8s:1.6.0"
27+
image: "hashicorp/vault-k8s:1.6.2"
2828
imagePullPolicy: IfNotPresent
2929
env:
3030
- name: NAMESPACE
@@ -44,7 +44,7 @@ spec:
4444
- name: AGENT_INJECT_VAULT_ADDR
4545
value: "https://vault.$(NAMESPACE).svc:8200"
4646
- name: AGENT_INJECT_VAULT_IMAGE
47-
value: "hashicorp/vault:1.18.2"
47+
value: "hashicorp/vault:1.18.5"
4848
- name: AGENT_INJECT_TLS_AUTO
4949
value: vault-agent-injector-cfg
5050
- name: AGENT_INJECT_TLS_AUTO_HOSTS

subcommand/injector/flags_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ func TestCommandEnvs(t *testing.T) {
119119
{env: "AGENT_INJECT_VAULT_CACERT_BYTES", value: "foo", cmdPtr: &cmd.flagVaultCACertBytes},
120120
{env: "AGENT_INJECT_PROXY_ADDR", value: "http://proxy:3128", cmdPtr: &cmd.flagProxyAddress},
121121
{env: "AGENT_INJECT_VAULT_AUTH_PATH", value: "auth-path-test", cmdPtr: &cmd.flagVaultAuthPath},
122-
{env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.18.2", cmdPtr: &cmd.flagVaultImage},
122+
{env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.18.5", cmdPtr: &cmd.flagVaultImage},
123123
{env: "AGENT_INJECT_VAULT_NAMESPACE", value: "test-namespace", cmdPtr: &cmd.flagVaultNamespace},
124124
{env: "AGENT_INJECT_TLS_KEY_FILE", value: "server.key", cmdPtr: &cmd.flagKeyFile},
125125
{env: "AGENT_INJECT_TLS_CERT_FILE", value: "server.crt", cmdPtr: &cmd.flagCertFile},

0 commit comments

Comments
 (0)