Skip to content

Commit 62e3b51

Browse files
authored
Merge 520b176 into 7642fad
2 parents 7642fad + 520b176 commit 62e3b51

File tree

21 files changed

+1221
-590
lines changed

21 files changed

+1221
-590
lines changed

.github/workflows/keyfactor-bootstrap-workflow.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ jobs:
1414
build:
1515
name: Build and Lint
1616
runs-on: ubuntu-latest
17-
timeout-minutes: 5
17+
timeout-minutes: 8
1818
steps:
19-
- uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0
20-
- uses: actions/setup-go@93397bea11091df50f3d7e59dc26a7711a8bcfbe # v4.1.0
19+
- uses: actions/checkout@v4
20+
- uses: actions/setup-go@v4.2.1
2121
with:
2222
go-version-file: 'go.mod'
2323
cache: true
@@ -35,9 +35,9 @@ jobs:
3535
timeout-minutes: 5
3636
steps:
3737
- name: Checkout
38-
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0
38+
uses: actions/checkout@v4
3939
- name: Set up Go 1.x
40-
uses: actions/setup-go@93397bea11091df50f3d7e59dc26a7711a8bcfbe # v4.1.0
40+
uses: actions/setup-go@v4.2.1
4141
with:
4242
go-version-file: 'go.mod'
4343
cache: true

CHANGELOG.md

Lines changed: 39 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,36 @@
1-
# v1.0.4
2-
1+
# v2.2.0
32
## Features
4-
* feat(signer): Signer recognizes `metadata.command-issuer.keyfactor.com/<metadata-field-name>: <metadata-value>` annotations on the CertificateRequest resource and uses them to populate certificate metadata in Command.
5-
* feat(release): Container build and release now uses GitHub Actions.
3+
- Added support for enrolling CSRs with [Enrollment Patterns](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Enrollment-Patterns.htm), a new feature introduced in Keyfactor Command 25.1. [Release notes](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReleaseNotes/Release2511.htm)
4+
- Usage of `CertificateTemplate` is still supported, but if using Keyfactor Command 25.1 and above, it is recommended to start using Enrollment Patterns in your issuer specification. You may use `EnrollmentPatternId` or `EnrollmentPatternName` in your specification.
5+
6+
## Chores
7+
- Updated documentation for using ambient credentials with Azure Kuberentes Services.
8+
- Removed documentation for using ambient credentials with Google Kubernetes Engine. As of writing, Google is not a supported identity provider in Keyfactor Command.
9+
- Migrated from using [keyfactor-go-client](https://github.com/Keyfactor/keyfactor-go-client) to [keyfactor-go-client-sdk](https://github.com/keyfactor/keyfactor-go-client-sdk).
10+
11+
# v2.1.1
612

713
## Fixes
8-
* fix(helm): CRDs now correspond to correct values for the `command-issuer`.
9-
* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint.
10-
* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate.
11-
* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role.
14+
- Update Helm chart deployment template to resolve Docker image metadata issue.
1215

13-
# v1.0.5
16+
## Chores
17+
- Update documentation for more clear instructions on deploying workloads to Azure Kubernetes Service and Google Kubernetes Engine, as well as permissions needed on Command Security Roles.
1418

15-
## Features
16-
* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions.
19+
# v2.1.0
1720

1821
## Fixes
19-
* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API
20-
* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration.
22+
- Updated library golang.org/x/crypto to version v0.33.0 to address authorization bypass vulnerability (https://github.com/advisories/GHSA-v778-237x-gjrc)
23+
- Bug fix for Google ambient credentials
24+
25+
# v2.0.2
26+
27+
## Fixes
28+
- Bug fix in Helm chart release action
29+
30+
# v2.0.1
31+
32+
## Fixes
33+
- Change Helm release trigger from `v*` to `release-*` to support Keyfactor Bootstrap Workflow
2134

2235
# v2.0.0
2336

@@ -33,26 +46,23 @@
3346
- Refactor unit tests to use fake Command API instead of requiring live Command server.
3447
- Write e2e integration test.
3548

36-
# v2.0.1
37-
38-
## Fixes
39-
- Change Helm release trigger from `v*` to `release-*` to support Keyfactor Bootstrap Workflow
49+
# v1.0.5
4050

41-
# v2.0.2
51+
## Features
52+
* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions.
4253

4354
## Fixes
44-
- Bug fix in Helm chart release action
45-
46-
# v2.1.0
55+
* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API
56+
* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration.
4757

48-
## Fixes
49-
- Updated library golang.org/x/crypto to version v0.33.0 to address authorization bypass vulnerability (https://github.com/advisories/GHSA-v778-237x-gjrc)
50-
- Bug fix for Google ambient credentials
58+
# v1.0.4
5159

52-
# v2.1.1
60+
## Features
61+
* feat(signer): Signer recognizes `metadata.command-issuer.keyfactor.com/<metadata-field-name>: <metadata-value>` annotations on the CertificateRequest resource and uses them to populate certificate metadata in Command.
62+
* feat(release): Container build and release now uses GitHub Actions.
5363

5464
## Fixes
55-
- Update Helm chart deployment template to resolve Docker image metadata issue.
56-
57-
## Chores
58-
- Update documentation for more clear instructions on deploying workloads to Azure Kubernetes Service and Google Kubernetes Engine, as well as permissions needed on Command Security Roles.
65+
* fix(helm): CRDs now correspond to correct values for the `command-issuer`.
66+
* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint.
67+
* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate.
68+
* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role.

0 commit comments

Comments
 (0)