diff --git a/.github/workflows/create-release.yml b/.github/workflows/create-release.yml index da3a7166..7b7b4ae6 100644 --- a/.github/workflows/create-release.yml +++ b/.github/workflows/create-release.yml @@ -9,7 +9,7 @@ permissions: jobs: create-release: - runs-on: ubuntu-22.04 + runs-on: ubuntu-latest steps: - name: Harden Runner uses: step-security/harden-runner@eb238b55efaa70779f274895e782ed17c84f2895 # v2.6.1 diff --git a/Makefile b/Makefile index 2e45d5e0..a3a0e745 100644 --- a/Makefile +++ b/Makefile @@ -8,7 +8,7 @@ REGISTRY ?= $(REGISTRY_NAME).azurecr.io/$(REPO_PREFIX) LOCAL_REGISTRY_NAME ?= kind-registry LOCAL_REGISTRY_PORT ?= 5000 IMAGE_NAME ?= keyvault -IMAGE_VERSION ?= v0.7.0 +IMAGE_VERSION ?= v0.9.0 IMAGE_TAG := $(REGISTRY)/$(IMAGE_NAME):$(IMAGE_VERSION) CGO_ENABLED_FLAG := 0 diff --git a/docs/manual-install.md b/docs/manual-install.md index 7f3f1550..87546c52 100644 --- a/docs/manual-install.md +++ b/docs/manual-install.md @@ -66,7 +66,7 @@ This guide demonstrates steps required to enable the KMS Plugin for Key Vault in hostNetwork: true containers: - name: azure-kms-provider - image: mcr.microsoft.com/oss/v2/azure/kms/keyvault:v0.8.0 + image: mcr.microsoft.com/oss/v2/azure/kms/keyvault:v0.9.0 imagePullPolicy: IfNotPresent args: - --listen-addr=unix:///opt/azurekms.socket # [OPTIONAL] gRPC listen address. Default is unix:///opt/azurekms.socket diff --git a/docs/rotation.md b/docs/rotation.md index a00233e3..e4ac5970 100644 --- a/docs/rotation.md +++ b/docs/rotation.md @@ -29,7 +29,7 @@ spec: hostNetwork: true containers: - name: azure-kms-provider - image: mcr.microsoft.com/oss/v2/azure/kms/keyvault:v0.8.0 + image: mcr.microsoft.com/oss/v2/azure/kms/keyvault:v0.9.0 imagePullPolicy: IfNotPresent args: - --listen-addr=unix:///opt/azurekms2.socket # unix:///opt/azurekms.socket is used by the primary kms plugin pod. So use a different listen address here for the new kms plugin pod.