Releases: FairwindsOps/rok8s-scripts
Releases · FairwindsOps/rok8s-scripts
v7.0.0 Secrets everywhere
Breaking Changes:
S3_SECRETS
andSOPS_SECRETS
are now independent ofSECRETS
and should not be duplicated there.S3_SECRETS
are nowEXTERNAL_SECRETS
and use a full URL sepcified in a.secret.external
file
New features:
EXTERNAL_SECRETS
supports Google Storage URLs in addition to S3- The NAMESPACE required for deployment is automatically created if it doesn't exist
v6.3.0 A Google for your Secrets?
New Features:
- GCP Support for kops secrets
Bug Fixes:
- Optional config flag no longer breaks SECRETS when the file would be generated with S3 or sops.
v6.2.0
v6.2.0
v6.1.1 suo-less
Bug Fixes:
- Fix typo in
install-rok8s-requirements
v6.1.0 Should we?
New Features:
- Support optional components listed in the *.config files. This can be enabled with the
ROK8S_ENABLE_OPTIONAL_CONFIGS
environment variable.
v6.0.0 Release The World!
Breaking Changes:
- Require explicit preparation for cloud environments. This removes the command
cloud-login
and requires use ofprepare-gcloud
and/orprepare-awscli
commands - Replaces
ensure-kubectl
withinstall-rok8s-requirements
New Features:
- Updates default kubectl version when installed from 1.4.0 to 1.7.2
Bug Fixes:
- Blocking jobs will exist with cod 124 if reaching a timeout
- k8s-example-config comment updates for name change -> rok8s-scripts, support of blocking jobs
- Fix permissions error when trying to update kubectl using gcloud
v5.0.0 GCP Support
Breaking Changes:
prepare-kubectl
now requires a config, either with-f
or using the defaultk8s-scripts.config
New Features:
- Add GCR support for login/pushing items
- Support Google Service Accounts for GKE access
v4.5.0 We gots the CronJob
Breaking Changes:
- None
New Features:
- Support for deploying
CronJob
Bug Fixes:
- None
v4.4.0 Linting
New Features:
- Add
k8s-lint
linter that can be run during test phases to help prevent future deployment issues.
v4.3.0 sops Encrypted Secret Support
Adds support for kubernetes secret object files who are encrypted by AWS KMS keys and decrypted by mozilla/sops at deploy time
Breaking Changes:
- n/a
New Features:
- sops decrypting
Bug Fixes:
- n/a
Misc:
- README entries on using
./k8s-sops-secret-decrypt