Skip to content

Releases: datum-cloud/network-services-operator

v0.21.0

20 Mar 20:35
de8ffdf

Choose a tag to compare

What's Changed

  • feat: split work based on clusters with sharding by @zachsmith1 in #128
  • chore: convert prometheus config to kustomize component by @scotwells in #130
  • chore: add metrics service to prometheus component by @scotwells in #131

Full Changelog: v0.20.0...v0.21.0

v0.20.0

18 Mar 01:28
@ecv ecv
950f980

Choose a tag to compare

What's Changed

  • feat: add quota resource registrations and claim policies by @zachsmith1 in #129

Full Changelog: v0.19.1...v0.20.0

v0.19.1

12 Mar 22:23
d8b94d8

Choose a tag to compare

What's Changed

Full Changelog: v0.19.0...v0.19.1

v0.19.0

12 Mar 20:41
e3b16c5

Choose a tag to compare

What's Changed

  • feat: make hostnames more human-friendly by @drewr in #121

New Contributors

Full Changelog: v0.18.1...v0.19.0

v0.18.1

10 Mar 02:22
e2abe52

Choose a tag to compare

What's Changed

Full Changelog: v0.18.0...v0.18.1

v0.18.0

06 Mar 02:17
ebc3cba

Choose a tag to compare

What's Changed

  • feat: add leader election config by @zachsmith1 in #113
  • feat: add config for gateway concurrent reconciles by @zachsmith1 in #119
  • fix: resolve gateway annotation phantom-blocking and httpproxy reconciliation storm by @zachsmith1 in #120
  • feat: shared tls secret for default https listener by @zachsmith1 in #118

Full Changelog: v0.17.0...v0.18.0

v0.17.0

26 Feb 13:20
e8271c4

Choose a tag to compare

🎉 v0.17.0 Release Notes

Your proxies just got a whole lot chattier (in a good way!)

This release is all about visibility. We've taught your HTTPProxy resources to tell you exactly what's happening with your TLS certificates and DNS setup—no more wondering why things aren't working.

✨ Certificate Health Tracking

Ever deployed an HTTPProxy and wondered if your TLS certificate actually got issued? Wonder no more! HTTPProxy now sports a shiny new CertificatesReady condition that tells you the state of all your HTTPS hostnames at a glance. You'll also see per-hostname CertificateReady conditions with helpful messages like "We're provisioning and applying a certificate to this hostname - it may take a few minutes" instead of cryptic error codes.

kubectl get httpproxy
NAME       HOSTNAME            PROGRAMMED   CERTIFICATES   AGE
my-proxy   app.example.com     True         True           5m

🔍 Smarter DNS Authority Checks

We've made the DNS integration smarter about figuring out whether Datum DNS actually has authority over your domain. Instead of just checking if a domain was "verified via DNSZone," we now verify the full chain: domain ownership + DNSZone readiness + nameserver delegation. This means better compatibility with domains that were verified before recent fixes, and clearer error messages when something's off.

New status reasons like DNSAuthorityMissing will tell you exactly what to fix—whether it's updating your registrar's NS records or waiting for the DNSZone to become ready.

🧹 Proper DNS Cleanup

Fixed a sneaky bug where DNSRecordSets weren't being cleaned up when you deleted a Gateway. Turns out Kubernetes garbage collection wasn't doing its job here (long story involving controller owner references), so we added explicit cleanup in the Gateway finalizer. Your DNS records will now properly disappear when the Gateway does.


Full details: PR #115@mattdjenkinson's first contribution 🎊

v0.16.0

19 Feb 17:44
0473f87

Choose a tag to compare

Automatic DNS Record Management for Gateway Hostnames

Configure custom hostnames on an HTTPProxy or Gateway and DNS records are created automatically when Datum DNS manages your domain. The operator creates CNAME records pointing to the gateway's canonical hostname (or ALIAS records for apex domains).

New status fields surface DNS programming status per-hostname via status.hostnameStatuses with Verified, DNSRecordProgrammed, and Available conditions, plus an aggregate DNSRecordsProgrammed condition.

See #111 for details.

Requirements

  • Domain verified via Datum DNS zone
  • Feature flag enableDNSIntegration: true in operator config
  • dns-operator CRDs installed

Bug Fixes

  • preserve VerifiedDNSZone condition after DNSZone verification (#111)
  • use non-controller ownerReference for DNSRecordSets (#111)

Full Changelog: v0.15.1...v0.16.0

v0.15.1

18 Feb 22:50
c38b842

Choose a tag to compare

What's Changed

  • fix: wait for https listener before applying envoypatchpolicy by @zachsmith1 in #112

Full Changelog: v0.15.0...v0.15.1

v0.15.0

18 Feb 20:09
5a1759e

Choose a tag to compare

What's Changed

  • feat: Add connector EnvoyPatchPolicy for HTTPProxy backends by @zachsmith1 in #93

Full Changelog: v0.14.5...v0.15.0