Skip to content

Commit 21e7c9d

Browse files
authored
Prepare v1.7.0 release (#774)
Updating changelog, kind, k8s versions, and Vault versions.
1 parent fc657b1 commit 21e7c9d

File tree

9 files changed

+38
-16
lines changed

9 files changed

+38
-16
lines changed

.github/actions/integration-test/action.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ inputs:
2121
default: 'vault-k8s'
2222
bats-version:
2323
description: 'Version of bats to run tests with'
24-
default: '1.11.0'
24+
default: '1.11.1'
2525
vault-license:
2626
description: 'Vault license to use for enterprise tests'
2727
required: true
@@ -50,7 +50,7 @@ runs:
5050
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
5151
with:
5252
repository: "hashicorp/vault-helm"
53-
ref: "v0.29.1"
53+
ref: "v0.30.0"
5454
path: "vault-helm"
5555

5656
- name: Create Kind Cluster
@@ -59,7 +59,7 @@ runs:
5959
cluster_name: ${{ inputs.kind-cluster-name }}
6060
config: vault-helm/test/kind/config.yaml
6161
node_image: kindest/node:v${{ inputs.k8s-version }}
62-
version: "v0.27.0"
62+
version: "v0.29.0"
6363

6464
- name: Create kind export log root
6565
id: create_kind_export_log_root

.github/workflows/jira.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,4 @@ jobs:
1414
JIRA_SYNC_USER_EMAIL: ${{ secrets.JIRA_SYNC_USER_EMAIL }}
1515
JIRA_SYNC_API_TOKEN: ${{ secrets.JIRA_SYNC_API_TOKEN }}
1616
with:
17-
teams-array: '["vault-eco"]'
17+
teams-array: '["vault-eco", "vault-eco-infra"]'

.github/workflows/tests.yaml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,10 +39,11 @@ jobs:
3939
- run: echo "setting versions"
4040
outputs:
4141
# JSON encoded array of k8s versions.
42-
K8S_VERSIONS: '["1.32.2", "1.31.6", "1.30.10", "1.29.14", "1.28.15"]'
43-
VAULT_N: "1.18.5"
44-
VAULT_N_1: "1.17.6"
45-
VAULT_N_2: "1.16.3"
42+
K8S_VERSIONS: '["1.33.1", "1.32.5", "1.31.9", "1.30.13", "1.29.14"]'
43+
VAULT_N: "1.19.5"
44+
VAULT_N_1: "1.18.5"
45+
VAULT_N_2: "1.17.6"
46+
VAULT_LTS_1: "1.16.3"
4647

4748
latest-vault:
4849
name: vault:${{ matrix.vault-version }} kind:${{ matrix.k8s-version }}
@@ -81,6 +82,7 @@ jobs:
8182
vault-version:
8283
- ${{ needs.versions.outputs.VAULT_N_1 }}
8384
- ${{ needs.versions.outputs.VAULT_N_2 }}
85+
- ${{ needs.versions.outputs.VAULT_LTS_1 }}
8486
runs-on: ubuntu-latest
8587
steps:
8688
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2

CHANGELOG.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,26 @@
11
## Unreleased
22

3+
## 1.7.0 (June 24, 2025)
4+
35
Changes:
46
* Building with Go 1.24.4
7+
* Default Vault version updated to 1.19.5
8+
* Testing with K8s versions 1.29 - 1.33
9+
* Dependency updates:
10+
* Docker image `alpine` 3.21.3 => 3.22.0
11+
* Docker image `ubi8/ubi-minimal` 8.10-1179.1739286367 => 8.10-1295.1749680713
12+
* github.com/go-logr/logr v1.4.2 => v1.4.3
13+
* github.com/hashicorp/go-secure-stdlib/parseutil v0.1.9 => v0.2.0
14+
* github.com/hashicorp/vault/sdk v0.15.0 => v0.18.0
15+
* github.com/operator-framework/operator-lib v0.17.0 => v0.18.0
16+
* github.com/prometheus/client_golang v1.21.0 => v1.22.0
17+
* k8s.io/api v0.32.2 => v0.33.2
18+
* k8s.io/apimachinery v0.32.2 => v0.33.2
19+
* k8s.io/client-go v0.32.2 => v0.33.2
20+
* sigs.k8s.io/controller-runtime v0.20.2 => v0.21.0
21+
22+
Features:
23+
* Add support for setting `template_config.lease_duration_threshold` in Agent config [GH-761](https://github.com/hashicorp/vault-k8s/pull/761)
524

625
## 1.6.2 (February 26, 2025)
726

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ ENTRYPOINT ["/bin/vault-k8s"]
6666

6767
# This target creates a production ubi release image
6868
# for the project for use on OpenShift.
69-
FROM registry.access.redhat.com/ubi8/ubi-minimal:8.10-1295.1749680713.1749680713 AS ubi
69+
FROM registry.access.redhat.com/ubi8/ubi-minimal:8.10-1295.1749680713 AS ubi
7070

7171
ARG PRODUCT_NAME
7272
ARG PRODUCT_VERSION

Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
REGISTRY_NAME ?= docker.io/hashicorp
22
IMAGE_NAME = vault-k8s
33
VERSION ?= 0.0.0-dev
4-
VAULT_VERSION ?= 1.18.5
4+
VAULT_VERSION ?= 1.19.5
55
IMAGE_TAG ?= $(REGISTRY_NAME)/$(IMAGE_NAME):$(VERSION)
66
PUBLISH_LOCATION ?= https://releases.hashicorp.com
77
DOCKER_DIR = ./build/docker
@@ -15,7 +15,7 @@ PKG = github.com/hashicorp/vault-k8s/version
1515
LDFLAGS ?= "-X '$(PKG).Version=v$(VERSION)'"
1616
TESTARGS ?= '-test.v'
1717

18-
VAULT_HELM_CHART_VERSION ?= 0.29.1
18+
VAULT_HELM_CHART_VERSION ?= 0.30.0
1919
# TODO: add support for testing against enterprise
2020

2121
TEST_WITHOUT_VAULT_TLS ?=

agent-inject/agent/agent.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import (
1717
)
1818

1919
const (
20-
DefaultVaultImage = "hashicorp/vault:1.18.5"
20+
DefaultVaultImage = "hashicorp/vault:1.19.5"
2121
DefaultVaultAuthType = "kubernetes"
2222
DefaultVaultAuthPath = "auth/kubernetes"
2323
DefaultAgentRunAsUser = 100

deploy/injector-deployment.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ spec:
2424
serviceAccountName: "vault-injector"
2525
containers:
2626
- name: sidecar-injector
27-
image: "hashicorp/vault-k8s:1.6.2"
27+
image: "hashicorp/vault-k8s:1.7.0"
2828
imagePullPolicy: IfNotPresent
2929
env:
3030
- name: NAMESPACE
@@ -44,7 +44,7 @@ spec:
4444
- name: AGENT_INJECT_VAULT_ADDR
4545
value: "https://vault.$(NAMESPACE).svc:8200"
4646
- name: AGENT_INJECT_VAULT_IMAGE
47-
value: "hashicorp/vault:1.18.5"
47+
value: "hashicorp/vault:1.19.5"
4848
- name: AGENT_INJECT_TLS_AUTO
4949
value: vault-agent-injector-cfg
5050
- name: AGENT_INJECT_TLS_AUTO_HOSTS

subcommand/injector/flags_test.go

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ func TestCommandEnvs(t *testing.T) {
119119
{env: "AGENT_INJECT_VAULT_CACERT_BYTES", value: "foo", cmdPtr: &cmd.flagVaultCACertBytes},
120120
{env: "AGENT_INJECT_PROXY_ADDR", value: "http://proxy:3128", cmdPtr: &cmd.flagProxyAddress},
121121
{env: "AGENT_INJECT_VAULT_AUTH_PATH", value: "auth-path-test", cmdPtr: &cmd.flagVaultAuthPath},
122-
{env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.18.5", cmdPtr: &cmd.flagVaultImage},
122+
{env: "AGENT_INJECT_VAULT_IMAGE", value: "hashicorp/vault:1.19.5", cmdPtr: &cmd.flagVaultImage},
123123
{env: "AGENT_INJECT_VAULT_NAMESPACE", value: "test-namespace", cmdPtr: &cmd.flagVaultNamespace},
124124
{env: "AGENT_INJECT_TLS_KEY_FILE", value: "server.key", cmdPtr: &cmd.flagKeyFile},
125125
{env: "AGENT_INJECT_TLS_CERT_FILE", value: "server.crt", cmdPtr: &cmd.flagCertFile},
@@ -238,7 +238,8 @@ func TestCommandEnvFloats(t *testing.T) {
238238
{
239239
env: "AGENT_INJECT_TEMPLATE_LEASE_RENEWAL_THRESHOLD",
240240
value: 0.75,
241-
cmdPtr: &cmd.flagLeaseRenewalThreshold},
241+
cmdPtr: &cmd.flagLeaseRenewalThreshold,
242+
},
242243
}
243244

244245
for _, tt := range tests {

0 commit comments

Comments
 (0)