|
1 | | -# v1.0.4 |
2 | | - |
| 1 | +# v2.2.0 |
3 | 2 | ## Features |
4 | | -* feat(signer): Signer recognizes `metadata.command-issuer.keyfactor.com/<metadata-field-name>: <metadata-value>` annotations on the CertificateRequest resource and uses them to populate certificate metadata in Command. |
5 | | -* feat(release): Container build and release now uses GitHub Actions. |
| 3 | +- Added support for enrolling CSRs with [Enrollment Patterns](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Enrollment-Patterns.htm), a new feature introduced in Keyfactor Command 25.1. [Release notes](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReleaseNotes/Release2511.htm) |
| 4 | + - Usage of `CertificateTemplate` is still supported, but if using Keyfactor Command 25.1 and above, it is recommended to start using Enrollment Patterns in your issuer specification. You may use `EnrollmentPatternId` or `EnrollmentPatternName` in your specification. |
| 5 | + |
| 6 | +## Chores |
| 7 | +- Updated documentation for using ambient credentials with Azure Kuberentes Services. |
| 8 | +- Removed documentation for using ambient credentials with Google Kubernetes Engine. As of writing, Google is not a supported identity provider in Keyfactor Command. |
| 9 | +- Migrated from using [keyfactor-go-client](https://github.com/Keyfactor/keyfactor-go-client) to [keyfactor-go-client-sdk](https://github.com/keyfactor/keyfactor-go-client-sdk). |
6 | 10 |
|
7 | 11 | ## Fixes |
8 | | -* fix(helm): CRDs now correspond to correct values for the `command-issuer`. |
9 | | -* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint. |
10 | | -* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate. |
11 | | -* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role. |
| 12 | +- Fix the Helm chart releaser job to not run into issues with overlapping Helm chart versions. |
12 | 13 |
|
13 | | -# v1.0.5 |
| 14 | +# v2.1.1 |
14 | 15 |
|
15 | | -## Features |
16 | | -* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions. |
| 16 | +## Fixes |
| 17 | +- Update Helm chart deployment template to resolve Docker image metadata issue. |
| 18 | + |
| 19 | +## Chores |
| 20 | +- Update documentation for more clear instructions on deploying workloads to Azure Kubernetes Service and Google Kubernetes Engine, as well as permissions needed on Command Security Roles. |
| 21 | + |
| 22 | +# v2.1.0 |
17 | 23 |
|
18 | 24 | ## Fixes |
19 | | -* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API |
20 | | -* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration. |
| 25 | +- Updated library golang.org/x/crypto to version v0.33.0 to address authorization bypass vulnerability (https://github.com/advisories/GHSA-v778-237x-gjrc) |
| 26 | +- Bug fix for Google ambient credentials |
| 27 | + |
| 28 | +# v2.0.2 |
| 29 | + |
| 30 | +## Fixes |
| 31 | +- Bug fix in Helm chart release action |
| 32 | + |
| 33 | +# v2.0.1 |
| 34 | + |
| 35 | +## Fixes |
| 36 | +- Change Helm release trigger from `v*` to `release-*` to support Keyfactor Bootstrap Workflow |
21 | 37 |
|
22 | 38 | # v2.0.0 |
23 | 39 |
|
|
33 | 49 | - Refactor unit tests to use fake Command API instead of requiring live Command server. |
34 | 50 | - Write e2e integration test. |
35 | 51 |
|
36 | | -# v2.0.1 |
37 | | - |
38 | | -## Fixes |
39 | | -- Change Helm release trigger from `v*` to `release-*` to support Keyfactor Bootstrap Workflow |
| 52 | +# v1.0.5 |
40 | 53 |
|
41 | | -# v2.0.2 |
| 54 | +## Features |
| 55 | +* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions. |
42 | 56 |
|
43 | 57 | ## Fixes |
44 | | -- Bug fix in Helm chart release action |
45 | | - |
46 | | -# v2.1.0 |
| 58 | +* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API |
| 59 | +* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration. |
47 | 60 |
|
48 | | -## Fixes |
49 | | -- Updated library golang.org/x/crypto to version v0.33.0 to address authorization bypass vulnerability (https://github.com/advisories/GHSA-v778-237x-gjrc) |
50 | | -- Bug fix for Google ambient credentials |
| 61 | +# v1.0.4 |
51 | 62 |
|
52 | | -# v2.1.1 |
| 63 | +## Features |
| 64 | +* feat(signer): Signer recognizes `metadata.command-issuer.keyfactor.com/<metadata-field-name>: <metadata-value>` annotations on the CertificateRequest resource and uses them to populate certificate metadata in Command. |
| 65 | +* feat(release): Container build and release now uses GitHub Actions. |
53 | 66 |
|
54 | 67 | ## Fixes |
55 | | -- Update Helm chart deployment template to resolve Docker image metadata issue. |
56 | | - |
57 | | -## Chores |
58 | | -- Update documentation for more clear instructions on deploying workloads to Azure Kubernetes Service and Google Kubernetes Engine, as well as permissions needed on Command Security Roles. |
| 68 | +* fix(helm): CRDs now correspond to correct values for the `command-issuer`. |
| 69 | +* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint. |
| 70 | +* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate. |
| 71 | +* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role. |
0 commit comments