Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DATAGO-59818: Upgrading vault to 1.13.1 #21

Merged
merged 109 commits into from
Aug 25, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
109 commits
Select commit Hold shift + click to select a range
c47ff33
add staticSecretRenderInterval to injector (#621)
kaitoii11 Nov 6, 2021
21cc21f
Update jira action (#644)
tomhjp Nov 16, 2021
0375b18
remove support for the leader-elector container (#649)
tvoran Nov 17, 2021
9fa25e9
vault-helm 0.18.0 release (#650)
tvoran Nov 17, 2021
48eebb0
Run CI tests in github workflows (#657)
tvoran Dec 11, 2021
609444d
Configurable PodDisruptionBudget for Injector (#653)
sosheskaz Dec 14, 2021
b4a9249
Fix spelling error in server disruptionbudget test (#654)
sosheskaz Dec 14, 2021
248397f
Make terminationGracePeriodSeconds configurable (#659)
mikutas Dec 15, 2021
0c0b6e3
injector: ability to set deployment update strategy (continued) (#661)
tvoran Dec 16, 2021
0043023
csi: ability to set priorityClassName for csi daemonset pods (#670)
brainiac84 Jan 4, 2022
c511d30
Fixed a small typo (#672)
nikstur Jan 7, 2022
0a1f8d1
Disable unit and acceptance tests in CircleCI (#675)
tvoran Jan 11, 2022
d6e1cd0
update CONTRIBUTING.md (#677)
tvoran Jan 12, 2022
a84a61f
add namespace support for openshift route (#679)
Jan 14, 2022
e629dc9
Add volumes and env vars to helm hook test pod (#673)
Iristyle Jan 20, 2022
92da512
allow injection of TLS config for OpenShift routes (#686)
mbaldessari Jan 20, 2022
b0528fc
Release 0.19.0 (#687)
tvoran Jan 20, 2022
a2d9a01
Add extraLabels for CSI DaemonSet (#690)
michaeljs1990 Feb 25, 2022
b447a92
Updated hashicorp/vault-csi-provider image to v1.0.0 (#689)
TroyFluegge Feb 25, 2022
19b417c
Fix unit test assertions (#693)
tomhjp Feb 25, 2022
a7e56d8
vault: bump image to 1.9.3 (#695)
lion24 Mar 2, 2022
4f5c01f
changelog++ (#699)
tomhjp Mar 2, 2022
a81a992
change helm trigger branch from master to main (#700)
alvin-huang Mar 3, 2022
f59f3d4
Add namespace to injector-leader-elector role, rolebinding and secret…
thechristschn Mar 16, 2022
549d9b8
allow to configure publishNotReadyAddresses on server services (#694)
avoidik Mar 17, 2022
56a253b
Maintain pre-existing Mutating Webhook default values for Kubernetes …
RemcoBuddelmeijer Mar 18, 2022
7109159
VAULT-571 Matching documented behavior and consul (#703)
swenson Mar 21, 2022
460b5e1
Update k8s versions (#706)
tvoran Mar 21, 2022
4da0638
Fix values schema to support config in YAML (#684)
gw0 Mar 28, 2022
12444bf
Support policy/v1 disruptionbudget beyond kube 1.21 (#710)
sharkannon Apr 5, 2022
4ae52c8
Remove unncessary template calls (#712)
Iristyle Apr 13, 2022
87e4567
Issue 629: updated to allow customization of the CLUSTER_ADDR the sam…
sharkannon Apr 14, 2022
230bba4
VAULT-5838 Update CSI provider to 1.1.0 (#721)
swenson Apr 27, 2022
9b43054
VUALT-5838 Restore Secrets Store CSI driver to 1.0.0 (#722)
swenson Apr 27, 2022
4005767
Implement support for Topology Spread Constraints (#652)
sosheskaz Apr 28, 2022
eba7548
Update the changelog with changes from 614 and 652 (#723)
swenson Apr 28, 2022
6ca2f72
Prepare v0.20.0 release (#727)
tomhjp May 16, 2022
86b3009
Fix CSI acceptance tests (#728)
tomhjp May 16, 2022
3dcc3fd
Update minimum required helm version in readme (#730)
tvoran May 20, 2022
830761a
Restore missing 'vault' service account (#737)
swenson May 24, 2022
daa2b3b
Set default object selector for webhooks to exclude injector itself (…
swenson May 24, 2022
45897a6
Prepare for release 0.20.1 (#739)
swenson May 26, 2022
80560f5
Mention minimum helm version in changelog (#742)
tvoran Jun 1, 2022
48f4ab8
Start testing against Kubernetes 1.24 (#744)
swenson Jun 2, 2022
d78a292
Update .helmignore (#732)
alexey-ban-test Jun 2, 2022
44a07b8
Set VAULT_ADDR env var for CSI Provider pods (#745)
tomhjp Jun 7, 2022
6c14d9d
Support to add annotations in injector serviceaccount (#753)
brunopadz Jul 11, 2022
324d689
changelog++ (#757)
tvoran Jul 18, 2022
999b0b7
jira-sync: transition to "Closed" not "Close" (#758)
tvoran Jul 19, 2022
553af86
Add support for nodePort for active and standby services (#610)
jzck Aug 1, 2022
eb95ac5
Feat/adding pod and container security context (#750)
ChrisFraun Aug 2, 2022
6931720
Changelog and schema update for active/standby node port (#761)
swenson Aug 2, 2022
91b6c64
changelog++ and json schema update (#762)
tvoran Aug 3, 2022
8bc1604
Update jira sync (#768)
benashz Aug 5, 2022
9efd98a
csi/server.statefulset: custom security context (#767)
swenson Aug 8, 2022
eca526b
Prepare for 0.21.0 release (#771)
swenson Aug 10, 2022
9fa4c6c
DOC: Minor typos fixes (#669)
hayorov Aug 16, 2022
85562b4
update values comments for server.securityContext (#778)
tvoran Aug 26, 2022
8a6872e
CI: run acceptance tests on push to any (#781)
benashz Sep 1, 2022
0407431
Add support for the Prometheus Operator (#772)
benashz Sep 1, 2022
99d745c
Update vault-k8s to 1.0.0 (#784)
swenson Sep 8, 2022
c15d83e
Prepare for 0.22.0 release (#785)
swenson Sep 8, 2022
7e21a09
Add server.hostNetwork option (#775)
tomhjp Sep 12, 2022
a3bbaea
[COMPLIANCE] Add MPL 2.0 LICENSE (#800)
hashicorp-copywrite[bot] Oct 12, 2022
5d7014c
Prepare to release to 0.22.1 (#803)
tomhjp Oct 26, 2022
46e6fb5
Fix CircleCI config (#804)
tomhjp Oct 27, 2022
ab5b471
Add extraLabels for Vault server serviceAccount (#806)
AleksandrTitov Nov 3, 2022
0110f97
Quote `.server.ha.clusterAddr` value (#810)
justusbunsi Nov 9, 2022
21ce524
Support selectively disabling active/standby services and service dis…
tomhjp Nov 14, 2022
c13151a
server: Allow disabling the instance selector for services (#813)
tomhjp Nov 17, 2022
2d7fd5d
Prepare for 0.23.0 release (#814)
tomhjp Nov 28, 2022
72914d8
Amending docs (#828)
dtrts Jan 12, 2023
a4e076b
swap helm charts call to GHA (#840)
claire-labry Feb 3, 2023
c5c28cb
Call helm publish workflow by file name without path (#843)
marianoasselborn Feb 13, 2023
742ddb1
adding SPDX copyright headers (#844)
tvoran Feb 13, 2023
34d8650
Fix typo in telemetry example (#846)
jordanfelle Feb 16, 2023
e31e70e
Add extraPorts property (#841)
mitashkistz Feb 16, 2023
f4f05aa
fix: remove k8s 1.16 from acceptance testing (#848)
thyton Feb 27, 2023
9328917
feat: make injector livenessProbe and readinessProbe configurable and…
thyton Mar 16, 2023
2c4cd3a
Updating GHA and default Vault version (#863)
tvoran Apr 3, 2023
9f18980
Add portnumber (#831)
bhargav2427 Apr 4, 2023
fc7d432
Add changelog for #831 (#867)
kschoche Apr 4, 2023
0fe9164
Add Vault Agent sidecar to CSI Provider (#749)
tomhjp Apr 6, 2023
d52c4a5
Prepare for 0.24.0 release (#868)
swenson Apr 6, 2023
14c77c4
Explain this fork in the README
j-setiawan Apr 2, 2020
a208997
Adding support for LoadBalancerIP field in ServiceSpec
Apr 10, 2020
c0e3c3d
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
e42f208
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
6cca865
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
ead9298
Explain this fork in the README
j-setiawan Apr 2, 2020
2ec2a82
Adding support for LoadBalancerIP field in ServiceSpec
Apr 10, 2020
82c1870
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
c8f726f
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
e72399a
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
99af695
feat(DATAGO-27002): Upgrade vault to version 1.7.9 (#12)
nagsubhrajitt Jun 1, 2022
a8f0998
fix: deploy_local.sh error with file
adhish2001 Jul 14, 2022
6e500de
minor changes
adhish2001 Jul 14, 2022
7d4bc52
Adding support for LoadBalancerIP field in ServiceSpec
Apr 10, 2020
e3043dc
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
e293928
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
8c5452a
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
e6348b6
DATAGO-13861: Adding support for logrotate
hadielaham88 May 19, 2021
04c8467
DATAGO-13861: Adding audit log rotation and shipment to datdog
hadielaham88 May 26, 2021
e8d9f81
Fixing minor typos and removing extra lines
hadielaham88 May 26, 2021
8c7a91b
feat(DATAGO-27002): Upgrade vault to version 1.7.9 (#12)
nagsubhrajitt Jun 1, 2022
26e56b0
Datago 30304/upgrading vault to 1.9.2 (#14)
adhish2001 Jul 27, 2022
2262e10
feat(DATAGO-30305): Upgrade vault server to 1.10.x (#16)
xiaocongji Mar 21, 2023
23131a2
DATAGO-59401: Upgrading vault to 1.11.x (#18)
xiaocongji Aug 4, 2023
6da1130
Merge branch 'develop' of https://github.com/solacedev/vault-helm int…
xiaocongji Aug 24, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
22 changes: 16 additions & 6 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
# Copyright (c) HashiCorp, Inc.
# SPDX-License-Identifier: MPL-2.0

version: 2.1
orbs:
slack: circleci/[email protected]
Expand All @@ -21,17 +24,24 @@ jobs:
echo "chart version (${chart_tag}) did not match git version (${git_tag})"
exit 1
fi
- run:
name: install gh tool
command: |
version="2.22.1"
curl --show-error --silent --location --output "gh.tar.gz" "https://github.com/cli/cli/releases/download/v${version}/gh_${version}_linux_amd64.tar.gz"
tar -xvzf gh.tar.gz && mkdir -p bin && mv "gh_${version}_linux_amd64/bin/gh" bin/

- run:
name: update helm-charts index
environment:
RELEASE_TAG: << pipeline.parameters.release-tag >>
command: |
curl --show-error --silent --fail --user "${CIRCLE_TOKEN}:" \
-X POST \
-H 'Content-Type: application/json' \
-H 'Accept: application/json' \
-d "{\"branch\": \"main\",\"parameters\":{\"SOURCE_REPO\": \"${CIRCLE_PROJECT_USERNAME}/${CIRCLE_PROJECT_REPONAME}\",\"SOURCE_TAG\": \"${RELEASE_TAG:-$CIRCLE_TAG}\"}}" \
"${CIRCLE_ENDPOINT}/${CIRCLE_PROJECT}/pipeline"
export GITHUB_TOKEN="${HELM_CHARTS_GITHUB_TOKEN}"
./bin/gh workflow run publish-charts.yml \
--repo hashicorp/helm-charts \
--ref main \
-f SOURCE_TAG="${CIRCLE_TAG}" \
-f SOURCE_REPO="${CIRCLE_PROJECT_USERNAME}/${CIRCLE_PROJECT_REPONAME}"
- slack/status:
fail_only: true
failure_message: "Failed to trigger an update to the helm charts index. Check the logs at: ${CIRCLE_BUILD_URL}"
Expand Down
3 changes: 3 additions & 0 deletions .github/ISSUE_TEMPLATE/config.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
# Copyright (c) HashiCorp, Inc.
# SPDX-License-Identifier: MPL-2.0

contact_links:
- name: Ask a question
url: https://discuss.hashicorp.com/c/vault
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/acceptance.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,19 +7,19 @@ jobs:
strategy:
fail-fast: false
matrix:
kind-k8s-version: [1.16.15, 1.20.15, 1.21.14, 1.22.15, 1.23.12, 1.24.6, 1.25.3]
kind-k8s-version: [1.22.17, 1.23.17, 1.24.12, 1.25.8, 1.26.3]
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- name: Setup test tools
uses: ./.github/workflows/setup-test-tools

- name: Create K8s Kind Cluster
uses: helm/kind-action@v1.4.0
uses: helm/kind-action@d8ccf8fb623ce1bb360ae2f45f323d9d5c5e9f00 # v1.5.0
with:
config: test/kind/config.yaml
node_image: kindest/node:v${{ matrix.kind-k8s-version }}
version: v0.16.0
version: v0.17.0

- run: bats --tap --timing ./test/acceptance
env:
Expand Down
71 changes: 8 additions & 63 deletions .github/workflows/jira.yaml
Original file line number Diff line number Diff line change
@@ -1,72 +1,17 @@
name: Jira Sync
on:
issues:
types: [opened, closed, deleted, reopened]
pull_request_target:
types: [opened, closed, reopened]
issue_comment: # Also triggers when commenting on a PR from the conversation view
types: [created]

name: Jira Sync

jobs:
sync:
runs-on: ubuntu-latest
name: Jira sync
steps:
- name: Login
uses: atlassian/[email protected]
env:
JIRA_BASE_URL: ${{ secrets.JIRA_SYNC_BASE_URL }}
JIRA_USER_EMAIL: ${{ secrets.JIRA_SYNC_USER_EMAIL }}
JIRA_API_TOKEN: ${{ secrets.JIRA_SYNC_API_TOKEN }}

- name: Preprocess
if: github.event.action == 'opened' || github.event.action == 'created'
id: preprocess
run: |
if [[ "${{ github.event_name }}" == "pull_request_target" ]]; then
echo "::set-output name=type::PR"
else
echo "::set-output name=type::ISS"
fi

- name: Create ticket
if: github.event.action == 'opened'
uses: tomhjp/[email protected]
with:
project: VAULT
issuetype: "GH Issue"
summary: "${{ github.event.repository.name }} [${{ steps.preprocess.outputs.type }} #${{ github.event.issue.number || github.event.pull_request.number }}]: ${{ github.event.issue.title || github.event.pull_request.title }}"
description: "${{ github.event.issue.body || github.event.pull_request.body }}\n\n_Created from GitHub Action for ${{ github.event.issue.html_url || github.event.pull_request.html_url }} from ${{ github.actor }}_"
# customfield_10089 is Issue Link custom field
# customfield_10091 is team custom field
extraFields: '{"fixVersions": [{"name": "TBD"}], "customfield_10091": ["ecosystem", "foundations"], "customfield_10089": "${{ github.event.issue.html_url || github.event.pull_request.html_url }}"}'

- name: Search
if: github.event.action != 'opened'
id: search
uses: tomhjp/[email protected]
with:
# cf[10089] is Issue Link custom field
jql: 'project = "VAULT" and cf[10089]="${{ github.event.issue.html_url || github.event.pull_request.html_url }}"'

- name: Sync comment
if: github.event.action == 'created' && steps.search.outputs.issue
uses: tomhjp/[email protected]
with:
issue: ${{ steps.search.outputs.issue }}
comment: "${{ github.actor }} ${{ github.event.review.state || 'commented' }}:\n\n${{ github.event.comment.body || github.event.review.body }}\n\n${{ github.event.comment.html_url || github.event.review.html_url }}"

- name: Close ticket
if: (github.event.action == 'closed' || github.event.action == 'deleted') && steps.search.outputs.issue
uses: atlassian/[email protected]
with:
issue: ${{ steps.search.outputs.issue }}
transition: Closed

- name: Reopen ticket
if: github.event.action == 'reopened' && steps.search.outputs.issue
uses: atlassian/[email protected]
with:
issue: ${{ steps.search.outputs.issue }}
transition: "Pending Triage"
uses: hashicorp/vault-workflows-common/.github/workflows/jira.yaml@main
secrets:
JIRA_SYNC_BASE_URL: ${{ secrets.JIRA_SYNC_BASE_URL }}
JIRA_SYNC_USER_EMAIL: ${{ secrets.JIRA_SYNC_USER_EMAIL }}
JIRA_SYNC_API_TOKEN: ${{ secrets.JIRA_SYNC_API_TOKEN }}
with:
teams-array: '["ecosystem", "foundations"]'
4 changes: 2 additions & 2 deletions .github/workflows/setup-test-tools/action.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: Install bats and python-yq
runs:
using: "composite"
steps:
- uses: actions/setup-node@v2
- uses: actions/setup-node@64ed1c7eab4cce3362f8c340dee64e5eaeef8f7c # v3.6.0
with:
node-version: '16'
- run: npm install -g bats@${BATS_VERSION}
Expand All @@ -13,7 +13,7 @@ runs:
BATS_VERSION: '1.8.2'
- run: bats -v
shell: bash
- uses: actions/setup-python@v4
- uses: actions/setup-python@d27e3f3d7c64b4bbf8e4abfb9b63b83e846e0435 # v4.5.0
with:
python-version: '3.10'
- run: pip install yq
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/tests.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,19 +6,19 @@ jobs:
bats-unit-tests:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- uses: ./.github/workflows/setup-test-tools
- run: bats --tap --timing ./test/unit

chart-verifier:
runs-on: ubuntu-latest
env:
CHART_VERIFIER_VERSION: '1.2.1'
CHART_VERIFIER_VERSION: '1.10.1'
steps:
- uses: actions/checkout@v3
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- name: Setup test tools
uses: ./.github/workflows/setup-test-tools
- uses: actions/setup-go@v3
- uses: actions/setup-go@6edd4406fa81c3da01a34fa6f6343087c207a568 # v3.5.0
with:
go-version: '1.19.2'
- run: go install github.com/redhat-certification/chart-verifier@${CHART_VERIFIER_VERSION}
Expand Down
12 changes: 12 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,17 @@
## Unreleased

## 0.24.0 (April 6, 2023)

Changes:
* Earliest Kubernetes version tested is now 1.22
* `vault` updated to 1.13.1

Features:
* server: New `extraPorts` option for adding ports to the Vault server statefulset [GH-841](https://github.com/hashicorp/vault-helm/pull/841)
* server: Add configurable Port Number in readinessProbe and livenessProbe for the server-statefulset [GH-831](https://github.com/hashicorp/vault-helm/pull/831)
* injector: Make livenessProbe and readinessProbe configurable and add configurable startupProbe [GH-852](https://github.com/hashicorp/vault-helm/pull/852)
* csi: Add an Agent sidecar to Vault CSI Provider pods to provide lease caching and renewals [GH-749](https://github.com/hashicorp/vault-helm/pull/749)

## 0.23.0 (November 28th, 2022)

Changes:
Expand Down
11 changes: 8 additions & 3 deletions Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
# Copyright (c) HashiCorp, Inc.
# SPDX-License-Identifier: MPL-2.0

apiVersion: v2
name: vault
version: 0.23.0
appVersion: 1.12.1
kubeVersion: ">= 1.16.0-0"
version: 0.24.0
appVersion: 1.13.1
kubeVersion: ">= 1.22.0-0"
description: Official HashiCorp Vault Chart
home: https://www.vaultproject.io
icon: https://github.com/hashicorp/vault/raw/f22d202cde2018f9455dec755118a9b84586e082/Vault_PrimaryLogo_Black.png
Expand All @@ -12,3 +15,5 @@ sources:
- https://github.com/hashicorp/vault-helm
- https://github.com/hashicorp/vault-k8s
- https://github.com/hashicorp/vault-csi-provider
annotations:
charts.openshift.io/name: HashiCorp Vault
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ LOCAL_ACCEPTANCE_TESTS?=false
KIND_CLUSTER_NAME?=vault-helm

# kind k8s version
KIND_K8S_VERSION?=v1.25.0
KIND_K8S_VERSION?=v1.26.3

# Generate json schema for chart values. See test/README.md for more details.
values-schema:
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ this README. Please refer to the Kubernetes and Helm documentation.
The versions required are:

* **Helm 3.6+**
* **Kubernetes 1.16+** - This is the earliest version of Kubernetes tested.
* **Kubernetes 1.22+** - This is the earliest version of Kubernetes tested.
It is possible that this chart works with earlier versions but it is
untested.

Expand Down
17 changes: 16 additions & 1 deletion templates/_helpers.tpl
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
{{/*
Copyright (c) HashiCorp, Inc.
SPDX-License-Identifier: MPL-2.0
*/}}

{{/*
Create a default fully qualified app name.
We truncate at 63 chars because some Kubernetes name fields are limited to
Expand Down Expand Up @@ -59,7 +64,7 @@ Compute if the server is enabled.
{{- end -}}

{{/*
Compute if the server auth delegator serviceaccount is enabled.
Compute if the server serviceaccount is enabled.
*/}}
{{- define "vault.serverServiceAccountEnabled" -}}
{{- $_ := set . "serverServiceAccountEnabled"
Expand Down Expand Up @@ -783,6 +788,16 @@ Sets the container resources if the user has set any.
{{ end }}
{{- end -}}

{{/*
Sets the container resources for CSI's Agent sidecar if the user has set any.
*/}}
{{- define "csi.agent.resources" -}}
{{- if .Values.csi.agent.resources -}}
resources:
{{ toYaml .Values.csi.agent.resources | indent 12}}
{{ end }}
{{- end -}}

{{/*
Sets extra CSI daemonset annotations
*/}}
Expand Down
29 changes: 29 additions & 0 deletions templates/csi-agent-configmap.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{{- template "vault.csiEnabled" . -}}
{{- if and (.csiEnabled) (eq (.Values.csi.agent.enabled | toString) "true") -}}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ template "vault.fullname" . }}-csi-provider-agent-config
namespace: {{ .Release.Namespace }}
labels:
helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
data:
config.hcl: |
vault {
{{- if .Values.global.externalVaultAddr }}
"address" = "{{ .Values.global.externalVaultAddr }}"
{{- else }}
"address" = "{{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }}"
{{- end }}
}

cache {}

listener "unix" {
address = "/var/run/vault/agent.sock"
tls_disable = true
}
{{- end }}
5 changes: 5 additions & 0 deletions templates/csi-clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
{{/*
Copyright (c) HashiCorp, Inc.
SPDX-License-Identifier: MPL-2.0
*/}}

{{- template "vault.csiEnabled" . -}}
{{- if .csiEnabled -}}
apiVersion: rbac.authorization.k8s.io/v1
Expand Down
5 changes: 5 additions & 0 deletions templates/csi-clusterrolebinding.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
{{/*
Copyright (c) HashiCorp, Inc.
SPDX-License-Identifier: MPL-2.0
*/}}

{{- template "vault.csiEnabled" . -}}
{{- if .csiEnabled -}}
apiVersion: rbac.authorization.k8s.io/v1
Expand Down
Loading