Skip to content

Latest commit

 

History

History
173 lines (85 loc) · 12.1 KB

CHANGELOG.md

File metadata and controls

173 lines (85 loc) · 12.1 KB

Changelog

All notable changes to this project will be documented in this file. See standard-version for commit guidelines.

2.2.0 (2019-11-14)

Bug Fixes

  • add dataFrom support to vault backend (refactor kv-backend) (#206) (24421b9)
  • status update conflicts should not cause crash, fixes #199 (#215) (e6171c8)
  • Stringify JSON response for compatibility with KV backend (#214) (5527530)
  • script: remove external-secrets.yml patching from release.sh (#216) (9d871cd)

Features

  • add validation to CRD (#208) (d2ebaeb)
  • allow disabling of interval polling (#211) (9441216)
  • chart: support mounting existing secrets as files (#213) (ac9b9e2)
  • secrets-manager: Added support for secrets versioning in Secrets Manager using version stage labels (#181) (9d6c2f9)
  • implement basic e2e tests (#207) (dfa210b)

2.1.0 (2019-11-08)

Bug Fixes

Features

  • add option to assume role (#144) (f0ce6ed)
  • add status subresource with last sync and generation tracking (#133) (8db1749)
  • add support for dataFrom & fix: encoding of non-string values (#196) (90f01c5)
  • allow setting additional markup on generated secret resource using template (#192) (25e2f74)
  • make role-scope annotation configurable & fix: allow missing roleArn even if annotations are set (#179) (8c17819), closes #174 #174
  • support Secret Binary from AWS Secrets Manager (#197) (731edb1)
  • Update aws-sdk to enable IRSA (AWS IAM Roles for ServiceAccounts) support, add securityContext to helm chart (#200) (165662c)
  • use spec in external secret resource, keeping secretDescriptor for backwards compat (#204) (a2a9dff)
  • vault: Support for Hashicorp Vault (#198) (d61312c)

2.0.0 (2019-11-05)

Bug Fixes

Features

  • add status subresource with last sync and generation tracking (#133) (8db1749)

1.6.0 (2019-10-23)

Features

1.5.0 (2019-09-27)

Features

1.4.0 (2019-09-27)

Bug Fixes

  • daemon: Upsert secrets immediately poller added (a986dfb)
  • secret: fix SSM parameter store code (e5e635f)

Features

  • allow setting type in external secret to support other than Opaque secrets (#130) (226697a)

1.3.1 (2019-07-18)

Bug Fixes

  • secret: fix SSM parameter store code (e5e635f)

1.3.0 (2019-06-22)

Bug Fixes

  • remove logging of potentially secret value (#96) (6063f79)

Features

  • secret: add ownerreference to remove created secret when external secret is removed (#95) (66af903)

1.2.3 (2019-06-06)

Bug Fixes

  • logging: show error on missing property (#87) (ef8bd5f)

1.2.2 (2019-06-03)

Bug Fixes

  • AWSSM: treat value as object iff the es specifies .property (#74) (1d5a9dd)

1.2.1 (2019-05-20)

Bug Fixes

  • config: remove default aws region (#54) (4584a09)
  • package: update kubernetes-client to version 7.0.0 (#49) (eeb7acf)

1.2.0 (2019-04-09)

Bug Fixes

  • package: update make-promises-safe to version 5.0.0 (#33) (a25b1d2)

Features

  • data: support .data in the secretDescriptor (#40) (4887469)

1.1.0 (2019-03-14)

Bug Fixes

  • backends: fix secretsManager backend name (#27) (d494edf)
  • deploy: fix deployment file (#4) (bcb1ad1)
  • dockerfile: remove broken commands (#3) (7901f90)
  • rbac: adjust the poller upsert code so it doesn't need get (#22) (5cffe97)
  • typo: fix typo in external secrets name (#8) (e26f75c)
  • updating: use PUT not PATCH when updating an existing Secret (#20) (856d8e0)

Features

  • cicd: add .travis.yml file (#9) (fbe52b3)
  • deploy: move deploy resources into single file (#5) (a264f2c)
  • examples: add hello-service example (#6) (af5b1d2)
  • json: support JSON objects in AWS Secret Manager (#13) (cd7130f)
  • project: add nodemon for development (#7) (ec25cbd)