Skip to content

Commit 43d06cc

Browse files
author
Christopher Swenson
authored
Prepare for 1.2.1 release (#460)
Update Go, Vault, Changelog
1 parent e3883c1 commit 43d06cc

File tree

7 files changed

+25
-17
lines changed

7 files changed

+25
-17
lines changed

.go-version

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.20.2
1+
1.20.3

CHANGELOG.md

+17-9
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,24 @@
11
## Unreleased
22

3+
## 1.2.1 (April 6, 2023)
4+
35
Changes:
4-
* Building with Go 1.20.2
6+
* Default to Vault 1.13.1
7+
* Building with Go 1.20.3
58
* Dependency updates:
6-
* golang.org/x/net v0.4.0 => v0.7.0
7-
* golang.org/x/sys v0.3.0 => v0.5.0
8-
* golang.org/x/term v0.3.0 => v0.5.0
9-
* golang.org/x/text v0.5.0 => v0.7.0
10-
* k8s.io/api 0.25.4 => 0.26.3
11-
* k8s.io/apimachinery 0.25.4 => 0.26.3
12-
* k8s.io/client-go 0.25.4 => 0.26.3
13-
* k8s.io/utils v0.0.0-20220728103510-ee6ede2d64ed => v0.0.0-20221107191617-1a15be271d1d
9+
* `github.com/cenkalti/backoff/v4` v4.1.3 -> v4.2.0
10+
* `github.com/hashicorp/go-hclog` v1.3.1 -> v1.5.0
11+
* `github.com/hashicorp/vault/sdk` v0.6.1 -> v0.8.1
12+
* `golang.org/x/net` v0.4.0 -> v0.7.0
13+
* `golang.org/x/sys` v0.3.0 -> v0.5.0
14+
* `golang.org/x/term` v0.3.0 -> v0.5.0
15+
* `golang.org/x/text` v0.5.0 -> v0.7.0
16+
* `k8s.io/api` v0.25.4 -> v0.26.3
17+
* `k8s.io/apimachinery` v0.25.4 -> v0.26.3
18+
* `k8s.io/client-go` v0.25.4 -> v0.26.3
19+
* `k8s.io/utils` v0.0.0-20220728103510-ee6ede2d64ed -> v0.0.0-20230406110748-d93618cff8a2
20+
* Docker UBI image `ubi8/ubi-minimal` 8.7 -> 8.7-1107
21+
* Used fixed Docker alpine version: 3.17.3
1422

1523
Bugs:
1624
* Don't override `shareProcessNamespace` if an annotation is not present [GH-445](https://github.com/hashicorp/vault-k8s/pull/445)

agent-inject/agent/agent.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import (
1717
)
1818

1919
const (
20-
DefaultVaultImage = "hashicorp/vault:1.12.3"
20+
DefaultVaultImage = "hashicorp/vault:1.13.1"
2121
DefaultVaultAuthType = "kubernetes"
2222
DefaultVaultAuthPath = "auth/kubernetes"
2323
DefaultAgentRunAsUser = 100

deploy/injector-deployment.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ spec:
2424
serviceAccountName: "vault-injector"
2525
containers:
2626
- name: sidecar-injector
27-
image: "hashicorp/vault-k8s:1.2.0"
27+
image: "hashicorp/vault-k8s:1.2.1"
2828
imagePullPolicy: IfNotPresent
2929
env:
3030
- name: NAMESPACE
@@ -44,7 +44,7 @@ spec:
4444
- name: AGENT_INJECT_VAULT_ADDR
4545
value: "https://vault.$(NAMESPACE).svc:8200"
4646
- name: AGENT_INJECT_VAULT_IMAGE
47-
value: "hashicorp/vault:1.12.3"
47+
value: "hashicorp/vault:1.13.1"
4848
- name: AGENT_INJECT_TLS_AUTO
4949
value: vault-agent-injector-cfg
5050
- name: AGENT_INJECT_TLS_AUTO_HOSTS

go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ require (
1919
k8s.io/api v0.26.3
2020
k8s.io/apimachinery v0.26.3
2121
k8s.io/client-go v0.26.3
22-
k8s.io/utils v0.0.0-20221107191617-1a15be271d1d
22+
k8s.io/utils v0.0.0-20230406110748-d93618cff8a2
2323
)
2424

2525
require (

go.sum

+2-2
Original file line numberDiff line numberDiff line change
@@ -669,8 +669,8 @@ k8s.io/klog/v2 v2.80.1 h1:atnLQ121W371wYYFawwYx1aEY2eUfs4l3J72wtgAwV4=
669669
k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
670670
k8s.io/kube-openapi v0.0.0-20221012153701-172d655c2280 h1:+70TFaan3hfJzs+7VK2o+OGxg8HsuBr/5f6tVAjDu6E=
671671
k8s.io/kube-openapi v0.0.0-20221012153701-172d655c2280/go.mod h1:+Axhij7bCpeqhklhUTe3xmOn6bWxolyZEeyaFpjGtl4=
672-
k8s.io/utils v0.0.0-20221107191617-1a15be271d1d h1:0Smp/HP1OH4Rvhe+4B8nWGERtlqAGSftbSbbmm45oFs=
673-
k8s.io/utils v0.0.0-20221107191617-1a15be271d1d/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
672+
k8s.io/utils v0.0.0-20230406110748-d93618cff8a2 h1:qY1Ad8PODbnymg2pRbkyMT/ylpTrCM8P2RJ0yroCyIk=
673+
k8s.io/utils v0.0.0-20230406110748-d93618cff8a2/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
674674
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
675675
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
676676
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=

subcommand/injector/flags_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ func TestCommandEnvs(t *testing.T) {
118118
{env: "AGENT_INJECT_VAULT_ADDR", value: "http://vault:8200", cmdPtr: &cmd.flagVaultService},
119119
{env: "AGENT_INJECT_PROXY_ADDR", value: "http://proxy:3128", cmdPtr: &cmd.flagProxyAddress},
120120
{env: "AGENT_INJECT_VAULT_AUTH_PATH", value: "auth-path-test", cmdPtr: &cmd.flagVaultAuthPath},
121-
{env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.12.3", cmdPtr: &cmd.flagVaultImage},
121+
{env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.13.1", cmdPtr: &cmd.flagVaultImage},
122122
{env: "AGENT_INJECT_VAULT_NAMESPACE", value: "test-namespace", cmdPtr: &cmd.flagVaultNamespace},
123123
{env: "AGENT_INJECT_TLS_KEY_FILE", value: "server.key", cmdPtr: &cmd.flagKeyFile},
124124
{env: "AGENT_INJECT_TLS_CERT_FILE", value: "server.crt", cmdPtr: &cmd.flagCertFile},

0 commit comments

Comments
 (0)