Skip to content

Commit 333b082

Browse files
authored
release: bump version to v0.4.0 (#194)
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
1 parent b3d9753 commit 333b082

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

Makefile

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ REGISTRY ?= $(REGISTRY_NAME).azurecr.io/$(REPO_PREFIX)
88
LOCAL_REGISTRY_NAME ?= kind-registry
99
LOCAL_REGISTRY_PORT ?= 5000
1010
IMAGE_NAME ?= keyvault
11-
IMAGE_VERSION ?= v0.3.0
11+
IMAGE_VERSION ?= v0.4.0
1212
IMAGE_TAG := $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION)
1313
CGO_ENABLED_FLAG := 0
1414

@@ -79,7 +79,7 @@ docker-build:
7979
--output=$(OUTPUT_TYPE) \
8080
-t $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION)-linux-$(ARCH) . \
8181
--progress=plain; \
82-
82+
8383
@if [ "$(ARCH)" = "amd64" ] && [ "$(OUTPUT_TYPE)" = "type=docker" ]; then \
8484
docker tag $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION)-linux-$(ARCH) $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION); \
8585
fi

docs/manual-install.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,10 @@ This guide demonstrates steps required to enable the KMS Plugin for Key Vault in
3737

3838
After your cluster is provisioned, depending on your cluster identity configuration, run one of the following commands to retrieve the **ID** of your managed identity or service principal, which will be used for role assignment to access Keyvault:
3939

40-
| Cluster configuration | Command |
41-
| ------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
42-
| AKS cluster with service principal | `az aks show -g <AKSResourceGroup> -n <AKSClusterName> --query servicePrincipalProfile.clientId -otsv` |
43-
| AKS cluster with managed identity | `az aks show -g <AKSResourceGroup> -n <AKSClusterName> --query identityProfile.kubeletidentity.clientId -otsv` |
40+
| Cluster configuration | Command |
41+
| ---------------------------------- | -------------------------------------------------------------------------------------------------------------- |
42+
| AKS cluster with service principal | `az aks show -g <AKSResourceGroup> -n <AKSClusterName> --query servicePrincipalProfile.clientId -otsv` |
43+
| AKS cluster with managed identity | `az aks show -g <AKSResourceGroup> -n <AKSClusterName> --query identityProfile.kubeletidentity.clientId -otsv` |
4444

4545
Assign the following permissions:
4646

@@ -66,7 +66,7 @@ This guide demonstrates steps required to enable the KMS Plugin for Key Vault in
6666
hostNetwork: true
6767
containers:
6868
- name: azure-kms-provider
69-
image: mcr.microsoft.com/oss/azure/kms/keyvault:v0.3.0
69+
image: mcr.microsoft.com/oss/azure/kms/keyvault:v0.4.0
7070
imagePullPolicy: IfNotPresent
7171
args:
7272
- --listen-addr=unix:///opt/azurekms.socket # [OPTIONAL] gRPC listen address. Default is unix:///opt/azurekms.socket

docs/rotation.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ spec:
2929
hostNetwork: true
3030
containers:
3131
- name: azure-kms-provider
32-
image: mcr.microsoft.com/oss/azure/kms/keyvault:v0.3.0
32+
image: mcr.microsoft.com/oss/azure/kms/keyvault:v0.4.0
3333
imagePullPolicy: IfNotPresent
3434
args:
3535
- --listen-addr=unix:///opt/azurekms2.socket # unix:///opt/azurekms.socket is used by the primary kms plugin pod. So use a different listen address here for the new kms plugin pod.

0 commit comments

Comments
 (0)