|
1 | | -# v1.0.4 |
2 | | - |
| 1 | +# v2.2.0 |
3 | 2 | ## Features |
4 | | -* feat(signer): Signer recognizes `metadata.command-issuer.keyfactor.com/<metadata-field-name>: <metadata-value>` annotations on the CertificateRequest resource and uses them to populate certificate metadata in Command. |
5 | | -* feat(release): Container build and release now uses GitHub Actions. |
| 3 | +- Added support for enrolling CSRs with [Enrollment Patterns](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Enrollment-Patterns.htm), a new feature introduced in Keyfactor Command 25.1. [Release notes](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReleaseNotes/Release2511.htm) |
| 4 | + - Usage of `CertificateTemplate` is still supported, but if using Keyfactor Command 25.1 and above, it is recommended to start using Enrollment Patterns in your issuer specification. You may use `EnrollmentPatternId` or `EnrollmentPatternName` in your specification. |
| 5 | +- When using ambient credentials, some relevant token claims (subject, issuer, object ID, etc.) are logged for easier debugging and setup for security roles and identity providers. |
| 6 | + |
| 7 | +## Chores |
| 8 | +- Updated documentation for using ambient credentials with Azure Kuberentes Services. |
| 9 | +- Removed documentation for using ambient credentials with Google Kubernetes Engine. As of writing, Google is not a supported identity provider in Keyfactor Command. |
| 10 | +- Migrated from using [keyfactor-go-client](https://github.com/Keyfactor/keyfactor-go-client) to [keyfactor-go-client-sdk](https://github.com/keyfactor/keyfactor-go-client-sdk). |
6 | 11 |
|
7 | 12 | ## Fixes |
8 | | -* fix(helm): CRDs now correspond to correct values for the `command-issuer`. |
9 | | -* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint. |
10 | | -* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate. |
11 | | -* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role. |
| 13 | +- Fix the Helm chart releaser job to not run into issues with overlapping Helm chart versions. |
12 | 14 |
|
13 | | -# v1.0.5 |
| 15 | +# v2.1.1 |
14 | 16 |
|
15 | | -## Features |
16 | | -* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions. |
| 17 | +## Fixes |
| 18 | +- Update Helm chart deployment template to resolve Docker image metadata issue. |
| 19 | + |
| 20 | +## Chores |
| 21 | +- Update documentation for more clear instructions on deploying workloads to Azure Kubernetes Service and Google Kubernetes Engine, as well as permissions needed on Command Security Roles. |
| 22 | + |
| 23 | +# v2.1.0 |
17 | 24 |
|
18 | 25 | ## Fixes |
19 | | -* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API |
20 | | -* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration. |
| 26 | +- Updated library golang.org/x/crypto to version v0.33.0 to address authorization bypass vulnerability (https://github.com/advisories/GHSA-v778-237x-gjrc) |
| 27 | +- Bug fix for Google ambient credentials |
| 28 | + |
| 29 | +# v2.0.2 |
| 30 | + |
| 31 | +## Fixes |
| 32 | +- Bug fix in Helm chart release action |
| 33 | + |
| 34 | +# v2.0.1 |
| 35 | + |
| 36 | +## Fixes |
| 37 | +- Change Helm release trigger from `v*` to `release-*` to support Keyfactor Bootstrap Workflow |
21 | 38 |
|
22 | 39 | # v2.0.0 |
23 | 40 |
|
|
33 | 50 | - Refactor unit tests to use fake Command API instead of requiring live Command server. |
34 | 51 | - Write e2e integration test. |
35 | 52 |
|
36 | | -# v2.0.1 |
37 | | - |
38 | | -## Fixes |
39 | | -- Change Helm release trigger from `v*` to `release-*` to support Keyfactor Bootstrap Workflow |
| 53 | +# v1.0.5 |
40 | 54 |
|
41 | | -# v2.0.2 |
| 55 | +## Features |
| 56 | +* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions. |
42 | 57 |
|
43 | 58 | ## Fixes |
44 | | -- Bug fix in Helm chart release action |
45 | | - |
46 | | -# v2.1.0 |
| 59 | +* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API |
| 60 | +* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration. |
47 | 61 |
|
48 | | -## Fixes |
49 | | -- Updated library golang.org/x/crypto to version v0.33.0 to address authorization bypass vulnerability (https://github.com/advisories/GHSA-v778-237x-gjrc) |
50 | | -- Bug fix for Google ambient credentials |
| 62 | +# v1.0.4 |
51 | 63 |
|
52 | | -# v2.1.1 |
| 64 | +## Features |
| 65 | +* feat(signer): Signer recognizes `metadata.command-issuer.keyfactor.com/<metadata-field-name>: <metadata-value>` annotations on the CertificateRequest resource and uses them to populate certificate metadata in Command. |
| 66 | +* feat(release): Container build and release now uses GitHub Actions. |
53 | 67 |
|
54 | 68 | ## Fixes |
55 | | -- Update Helm chart deployment template to resolve Docker image metadata issue. |
56 | | - |
57 | | -## Chores |
58 | | -- Update documentation for more clear instructions on deploying workloads to Azure Kubernetes Service and Google Kubernetes Engine, as well as permissions needed on Command Security Roles. |
| 69 | +* fix(helm): CRDs now correspond to correct values for the `command-issuer`. |
| 70 | +* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint. |
| 71 | +* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate. |
| 72 | +* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role. |
0 commit comments