From 113953dbaf8e7cc72c8ddfbfa301c19cde5e843a Mon Sep 17 00:00:00 2001 From: Tanmay Pereira Naik <59953366+tanmay-pnaik@users.noreply.github.com> Date: Wed, 2 Aug 2023 02:29:13 +0530 Subject: [PATCH] chore: Update to hashicorp/vault:1.14.1 Signed-off-by: Tanmay Pereira Naik <59953366+tanmay-pnaik@users.noreply.github.com> --- .../dotnet-vault/docker-compose-vault-agent-template.yml | 2 +- secrets/dotnet-vault/docker-compose-vault-agent-token.yml | 2 +- secrets/dotnet-vault/docker-compose.yml | 2 +- secrets/openldap/README.md | 6 +++--- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/secrets/dotnet-vault/docker-compose-vault-agent-template.yml b/secrets/dotnet-vault/docker-compose-vault-agent-template.yml index bf566a8c..e052b908 100644 --- a/secrets/dotnet-vault/docker-compose-vault-agent-template.yml +++ b/secrets/dotnet-vault/docker-compose-vault-agent-template.yml @@ -2,7 +2,7 @@ version: "3.3" services: vault-agent: - image: vault:1.11.0 + image: hashicorp/vault:1.14.1 restart: always command: [ 'vault', 'agent', '-config=/vault/ProjectApi/vault-agent/config-vault-agent-template.hcl'] volumes: diff --git a/secrets/dotnet-vault/docker-compose-vault-agent-token.yml b/secrets/dotnet-vault/docker-compose-vault-agent-token.yml index 64d81e77..fdc5fecb 100644 --- a/secrets/dotnet-vault/docker-compose-vault-agent-token.yml +++ b/secrets/dotnet-vault/docker-compose-vault-agent-token.yml @@ -2,7 +2,7 @@ version: "3.3" services: vault-agent: - image: vault:1.11.0 + image: hashicorp/vault:1.14.1 restart: always command: [ 'vault', 'agent', '-config=/vault/ProjectApi/vault-agent/config-vault-agent-token.hcl'] volumes: diff --git a/secrets/dotnet-vault/docker-compose.yml b/secrets/dotnet-vault/docker-compose.yml index dd4ad341..679284e3 100644 --- a/secrets/dotnet-vault/docker-compose.yml +++ b/secrets/dotnet-vault/docker-compose.yml @@ -2,7 +2,7 @@ version: "3.3" services: vault: - image: vault:1.11.0 + image: hashicorp/vault:1.14.1 restart: always command: [ 'vault', 'server', '-dev', '-dev-listen-address=0.0.0.0:8200'] environment: diff --git a/secrets/openldap/README.md b/secrets/openldap/README.md index 51b17c9b..1e63f83d 100644 --- a/secrets/openldap/README.md +++ b/secrets/openldap/README.md @@ -242,7 +242,7 @@ We will use a simple Vault development server container for the purpose of this -p 8200:8200 \ --detach \ --rm \ - vault:1.4.0-rc1 + hashicorp/vault:1.14.1 ``` The flags to `docker run` define a container name, network hostname, name of Docker network to join, the IPC_LOCK capability for `mlock()` support, an environment variable to set the initial Vault root token, an environment variable to set the listen address, and the port mapping plus exposed port. @@ -253,8 +253,8 @@ We will use a simple Vault development server container for the purpose of this ```plaintext ... - Status: Downloaded newer image for vault:1.4.0-rc1 - 089b6beed68bafd942ae771f444008fd51694960973c15ce0af9700874f835b3 + Status: Downloaded newer image for hashicorp/vault:1.14.1 + 5ed45b1f0d2d44fe1f8ae4fa99617cd3658b5f31eea0781b5ba327340e9f7039 ``` > **NOTE**: We have started the Vault server in [development mode](https://www.vaultproject.io/docs/commands/server/#inlinecode--dev-1); this means Vault initializes, unseals itself, and sets the initial root token to _c0ffee0ca7_ for us. Any 1.4.0+ version of the container can be used.