Skip to content

Commit

Permalink
Merge pull request bank-vaults#65 from becker-s/main
Browse files Browse the repository at this point in the history
chore: use hashicorp/vault image as _/vault is deprecated
  • Loading branch information
sagikazarmark authored Jul 18, 2023
2 parents 3495c24 + f38e47e commit 2b42e2f
Show file tree
Hide file tree
Showing 7 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/ci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ jobs:

services:
vault:
image: vault:${{ matrix.vault_version }}
image: hashicorp/vault:${{ matrix.vault_version }}
env:
SKIP_SETCAP: true
VAULT_DEV_ROOT_TOKEN_ID: 227e1cce-6bf7-30bb-2d2a-acc854318caf
Expand Down
2 changes: 1 addition & 1 deletion deploy/charts/vault-secrets-webhook/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ The following tables lists configurable parameters of the vault-secrets-webhook
| topologySpreadConstraints | topologySpreadConstraints to add | `{}` |
| rbac.psp.enabled | use pod security policy | `false` |
| rbac.authDelegatorRole.enabled | bind `system:auth-delegator` to the ServiceAccount | `false` |
| env.VAULT_IMAGE | vault image | `vault:1.6.2` |
| env.VAULT_IMAGE | vault image | `hashicorp/vault:1.13.3` |
| env.VAULT_ENV_CPU_REQUEST | cpu requests for init-containers vault-env and copy-vault-env | `50m` |
| env.VAULT_ENV_MEMORY_REQUEST | memory requests for init-containers vault-env and copy-vault-env | `64Mi` |
| env.VAULT_ENV_CPU_LIMIT | cpu limits for init-containers vault-env and copy-vault-env | `250m` |
Expand Down
2 changes: 1 addition & 1 deletion deploy/charts/vault-secrets-webhook/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ vaultEnv:
tag: "v1.21.0"

env:
VAULT_IMAGE: vault:1.13.3
VAULT_IMAGE: hashicorp/vault:1.13.3
# VAULT_CAPATH: /vault/tls
# # Used when the pod that should get secret injected does not
# # specify an imagePullSecret
Expand Down
2 changes: 1 addition & 1 deletion docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ version: "3.9"

services:
vault:
image: vault:1.13.3
image: hashicorp/vault:1.13.3
ports:
- 127.0.0.1:8200:8200
environment:
Expand Down
2 changes: 1 addition & 1 deletion e2e/deploy/vault-secrets-webhook/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ podsFailurePolicy: "Fail"
secretsFailurePolicy: "Fail"

env:
VAULT_IMAGE: vault:1.13.3
VAULT_IMAGE: hashicorp/vault:1.13.3
2 changes: 1 addition & 1 deletion e2e/deploy/vault/vault.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: "vault"
spec:
size: 1
image: vault:1.13.3
image: hashicorp/vault:1.13.3

# Specify the ServiceAccount where the Vault Pod and the Bank-Vaults configurer/unsealer is running
serviceAccount: vault
Expand Down
2 changes: 1 addition & 1 deletion pkg/webhook/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -443,7 +443,7 @@ func getPullPolicy(pullPolicyStr string) corev1.PullPolicy {
}

func SetConfigDefaults() {
viper.SetDefault("vault_image", "vault:latest")
viper.SetDefault("vault_image", "hashicorp/vault:latest")
viper.SetDefault("vault_image_pull_policy", string(corev1.PullIfNotPresent))
viper.SetDefault("vault_env_image", "ghcr.io/bank-vaults/vault-env:latest")
viper.SetDefault("vault_env_pull_policy", string(corev1.PullIfNotPresent))
Expand Down

0 comments on commit 2b42e2f

Please sign in to comment.