All notable changes to this project will be documented in this file. See standard-version for commit guidelines.
6.0.0 (2020-10-09)
- azure: Unwraps the value returned from Azure Key vault (migration: "property: value" -> remove property selector) (#460)
- aws: add region support to ssm and sm (#475) (0b35441)
- aws: add support for setting an intermediate iam role (#454) (72920e4)
- Cluster level default settings for Hashicorp Vault (#472) (5215090)
- azure: Unwraps the value returned from Azure Key vault (migration: "property: value" -> remove property selector) (#460) (36d5bbb)
- deps: update dependency @google-cloud/secret-manager to v3 (#345) (2bf42db)
- helm: apply namespace to Deployment and Service (#471) (ba38e3a)
- vault: Cache Vault clients/tokens on a per-role&mountpoint basis. (#488) (ab36718)
- vault: handle token renewal failures (#497) (c3c27bc)
- e2e tests to work with kind 0.9.0 + bump k8s version used (#498) (f815afd)
- provide a meaningful error message when an SSM parameter is missing (#483) (99ce81e)
5.2.0 (2020-08-18)
- logging: add config to allow switching level format to human-readable log levels (#429) (4602ad0)
- secretsManager: add support for versionId in AWS Secrets Manager (#436) (95827bc)
- added the option to enforce namespace annotations (#448) (1517333)
- config: extract LOG_MESSAGE_KEY properly (#456) (a50c219)
- pino: messageKey option as root constructor property (#455) (22208b0)
- reverts assumeRole to use pod role instead of web identity (#453) (fa747dc)
- upgrade the Azure Identity SDK and Azure KeyVault secret SDK to support AKS pod identity for authorization (#447) (020c10b)
- vault: token ttl conditional renew (#457) (a52987b)
5.1.0 (2020-07-27)
- config: extract LOG_MESSAGE_KEY properly (#456) (a50c219)
- pino: messageKey option as root constructor property (#455) (22208b0)
5.0.0 (2020-07-24)
- upgrade the Azure Identity SDK and Azure KeyVault secret SDK to support AKS pod identity for authorization (#447) (020c10b)
- logging: add config to allow switching level format to human-readable log levels (#429) (4602ad0)
- secretsManager: add support for versionId in AWS Secrets Manager (#436) (95827bc)
4.2.0 (2020-07-12)
4.1.0 (2020-07-09)
- add e2e test for naming conventions enforcement (#412) (bfb5ed2)
- allow permitted-key-name to be provided as list (#409) (10e3991)
- Vault namespace support (#403) (6bd9570)
- vault: fix requestOptions for vault namespace support (#410) (e80d83d)
- pass in the Web Identity token to assumeRoleWithWebIdentity (#417) (23d511f)
- use assumeRoleWithWebIdentity when using IRSA (#416) (117b926)
4.0.0 (2020-06-02)
- Changes the values return type from GCP secret manager
Previously secret value was wrapped in an object
{ "value": <secret> }
while now<secret>
will be returned directly so KES features can be properly used GOOGLE_APPLICATION_CREDENTIALS: /app/gcp-creds/gcp-creds.json
is no longer set by default as it causes conflicts with other configurations.
- add support for Alibaba Cloud KMS Secret Manager (#355) (cceb40b)
- Chart optionally installs CRD / CR Manager configurable for more strict clusters (#344) (131e201)
- don't set GOOGLE_APPLICATION_CREDENTIALS by default and update README for Google Secret Manager (#371) (e9db0f8)
- Handle JSON in GCP Secrets Manager (#373) (4273598)
- vault: follow all redirects to support vault HA (#394) (a05aa92)
3.3.0 (2020-05-01)
- add last_state metric (#357) (1d9d237)
- enable use of AWS STS regional endpoints (#348) (9a46773)
- improve out-of-the-box compatibility with clusters running locked down PodSecurityPolicy enabling runAsNonRoot by default (#361) (27ba7e1)
- support isBinary for GCP (#353) (de20a1b), closes #352
- deps: update dependency kubernetes-client to v9 (#367) (f06bd59)
- deps: update dependency pino to v6 (#322) (3664540)
- deps: update dependency prom-client to v12 (#323) (504ed6c)
3.2.0 (2020-03-27)
- stringify json object based secrets (#247) (828d0ce)
- upgrade aws-sdk from 2.575.0 to 2.628.0 (#305) (149e33a)
- upgrade pino from 5.13.6 to 5.16.0 (#306) (be74814)
- verify dataFrom property in naming convention verification (#292) (f26bf2b)
- azure-registry: handle binary files (#311) (9727d48)
3.1.0 (2020-02-06)
- add validation to CRD (#208) (d2ebaeb)
- allow disabling of interval polling (#211) (9441216)
- chart: support mounting existing secrets as files (#213) (ac9b9e2)
- allow enforcing naming conventions for key names, limiting which keys can be fetched from backends (#230) (c4fdea6), closes #178 #178 #178
- implement basic e2e tests (#207) (dfa210b)
- release: use same version for app and chart release (#242) (2000864)
- secrets-manager: Added support for secrets versioning in Secrets Manager using version stage labels (#181) (9d6c2f9)
- add dataFrom support to vault backend (refactor kv-backend) (#206) (24421b9)
- bump pino and sub dependency flatstr, fixes #218 (#219) (db3491b)
- chart: remove one of the duplicate securityContext (#222) (2b54f34)
- kv-backend: Add empty keyOptions for dataFrom case. (#221) (8e838ee)
- script: remove external-secrets.yml patching from release.sh (#216) (9d871cd)
- default service account annotation value (#252) (b163a69)
- do not skew binary data (#244) (01e0ca2)
- remove required top level key from vault backend validation (#255) (e567117)
- status update conflicts should not cause crash, fixes #199 (#215) (e6171c8)
- Stringify JSON response for compatibility with KV backend (#214) (5527530)
3.0.0 (2020-01-09)
- default service account annotation value (#252) (b163a69)
- remove required top level key from vault backend validation (#255) (e567117)
- allow enforcing naming conventions for key names, limiting which keys can be fetched from backends (#230) (c4fdea6), closes #178 #178 #178
- release: use same version for app and chart release (#242) (2000864)
2.2.1 (2019-12-06)
- bump pino and sub dependency flatstr, fixes #218 (#219) (db3491b)
- chart: remove one of the duplicate securityContext (#222) (2b54f34)
- kv-backend: Add empty keyOptions for dataFrom case. (#221) (8e838ee)
- do not skew binary data (#244) (01e0ca2)
2.2.0 (2019-11-14)
- add dataFrom support to vault backend (refactor kv-backend) (#206) (24421b9)
- status update conflicts should not cause crash, fixes #199 (#215) (e6171c8)
- Stringify JSON response for compatibility with KV backend (#214) (5527530)
- script: remove external-secrets.yml patching from release.sh (#216) (9d871cd)
- add validation to CRD (#208) (d2ebaeb)
- allow disabling of interval polling (#211) (9441216)
- chart: support mounting existing secrets as files (#213) (ac9b9e2)
- secrets-manager: Added support for secrets versioning in Secrets Manager using version stage labels (#181) (9d6c2f9)
- implement basic e2e tests (#207) (dfa210b)
2.1.0 (2019-11-08)
- script: fix release scripts (#186) (238ebd6)
- add missing rbac rules to external-secrets.yml (#195) (b6d8229)
- RBAC config to access namespaces (#177) (9605756)
- add option to assume role (#144) (f0ce6ed)
- add status subresource with last sync and generation tracking (#133) (8db1749)
- add support for dataFrom & fix: encoding of non-string values (#196) (90f01c5)
- allow setting additional markup on generated secret resource using template (#192) (25e2f74)
- make role-scope annotation configurable & fix: allow missing roleArn even if annotations are set (#179) (8c17819), closes #174 #174
- support Secret Binary from AWS Secrets Manager (#197) (731edb1)
- Update aws-sdk to enable IRSA (AWS IAM Roles for ServiceAccounts) support, add securityContext to helm chart (#200) (165662c)
- use spec in external secret resource, keeping secretDescriptor for backwards compat (#204) (a2a9dff)
- vault: Support for Hashicorp Vault (#198) (d61312c)
2.0.0 (2019-11-05)
- script: fix release scripts (#186) (238ebd6)
- add missing rbac rules to external-secrets.yml (#195) (b6d8229)
- RBAC config to access namespaces (#177) (9605756)
1.6.0 (2019-10-23)
1.5.0 (2019-09-27)
1.4.0 (2019-09-27)
- daemon: Upsert secrets immediately poller added (a986dfb)
- secret: fix SSM parameter store code (e5e635f)
1.3.1 (2019-07-18)
- secret: fix SSM parameter store code (e5e635f)
1.3.0 (2019-06-22)
1.2.3 (2019-06-06)
1.2.2 (2019-06-03)
1.2.1 (2019-05-20)
- config: remove default aws region (#54) (4584a09)
- package: update kubernetes-client to version 7.0.0 (#49) (eeb7acf)
1.2.0 (2019-04-09)
- backends: fix secretsManager backend name (#27) (d494edf)
- deploy: fix deployment file (#4) (bcb1ad1)
- dockerfile: remove broken commands (#3) (7901f90)
- rbac: adjust the poller upsert code so it doesn't need
get
(#22) (5cffe97) - typo: fix typo in external secrets name (#8) (e26f75c)
- updating: use PUT not PATCH when updating an existing Secret (#20) (856d8e0)