Releases: cyberark/secrets-provider-for-k8s
Releases · cyberark/secrets-provider-for-k8s
v1.5.2
[1.5.2] - 2023-06-07
v1.5.1
[1.5.1] - 2023-05-26
Security
- Forced github.com/emicklei/go-restful/v3 to use v3.10.2 to remove PRISMA-2022-0227 (found in Twistlock scan)
and updated versions of gotelemetry.io/otel (to 1.16.0), github.com/stretchr/testify (to 1.8.3), and
the k8s.io libraries (to 0.27.2)
cyberark/secrets-provider-for-k8s#526
v1.5.0
[1.5.0] - 2023-04-12
Added
- Convert cmd/secrets-provider to unit testable entrypoint package.
cyberark/secrets-provider-for-k8s#507 - Adds support for binary secret values and values with special characters.
cyberark/secrets-provider-for-k8s#500 - Adds support for content-type annotation and base64 secrets decoding feature.
cyberark/secrets-provider-for-k8s#508
cyberark/secrets-provider-for-k8s#511
cyberark/secrets-provider-for-k8s#513
cyberark/secrets-provider-for-k8s#512
cyberark/secrets-provider-for-k8s#509
cyberark/secrets-provider-for-k8s#504
cyberark/secrets-provider-for-k8s#506 - Use Conjur CLI v8.0.
cyberark/secrets-provider-for-k8s#505 - Add ImagePullSecret to Helm deployment.
cyberark/secrets-provider-for-k8s#503
v1.4.7
[1.4.7] - 2023-02-10
v1.4.6
[1.4.6] - 2023-01-26
Security
- Updated replace statements in go.mod to remove vulnerable versions of golang.org/x/net
cyberark/secrets-provider-for-k8s#496
v1.4.5
[1.4.5] - 2022-09-26
Changed
- Updated Go to 1.19
cyberark/secrets-provider-for-k8s#484 - Updated go.opentelmetry.io/otel to 1.10.0 and k8s.io/api, k8s.io/apimachinery,
and k8s.io/client-go to latest versions
cyberark/secrets-provider-for-k8s#484
Security
- More replace statements for golang.org/x/crypto, gopkg.in/yaml.v2, and golang.org/x/net
cyberark/secrets-provider-for-k8s#486 - Updated replace statements in go.mod to remove vulnerable versions of golang.org/x/net
cyberark/secrets-provider-for-k8s#484
cyberark/secrets-provider-for-k8s#485 - Updated replace statements in go.mod to remove vulnerable versions of golang.org/x/text
cyberark/secrets-provider-for-k8s#484
v1.4.4
[1.4.4] - 2022-07-12
Changed
- Updated multiple go dependencies
cyberark/secrets-provider-for-k8s#477
Security
- Add replace statements to go.mod to prune vulnerable dependency versions from the dependency tree.
cyberark/secrets-provider-for-k8s#478
Fixed
- Fixes the following error seen on boot up when the status volumemount is not added
"open /conjur/status/conjur-secrets-unchanged.sh: no such file or directory"
cyberark/secrets-provider-for-k8s#479
v1.4.3
[1.4.3] - 2022-07-07
Removed
- Support for OpenShift v3.11 is officially removed as of this release.
cyberark/secrets-provider-for-k8s#474
Security
- Add replace statements to go.mod to prune vulnerable dependency versions from the dependency tree.
cyberark/secrets-provider-for-k8s#470
cyberark/secrets-provider-for-k8s#471 - Update the Red Hat ubi image in Dockerfile.
cyberark/secrets-provider-for-k8s#469
v1.4.2
[1.4.2] - 2022-05-03
v1.4.1
1.4.1 - 2022-04-01
Changed
- Update to automated release process. cyberark/secrets-provider-for-k8s#455
Added
- Secrets files are written in an atomic operation. cyberark/secrets-provider-for-k8s#440
- Secret files are deleted when secrets are removed from Conjur or access is revoked. Can be disabled with annotation.
cyberark/secrets-provider-for-k8s#447 - Kubernetes Secrets are cleared when secrets are removed from Conjur or access is revoked. Can be disabled with annotation.
cyberark/secrets-provider-for-k8s#449 - Secrets Provider allows for its status to be monitored through the creation of a couple of empty sentinel files:
CONJUR_SECRETS_PROVIDED
andCONJUR_SECRETS_UPDATED
. The first file is created when SP has completed its first round of providing secrets via secret files / Kubernetes Secrets. It creates/recreates the second file whenever it has updated secret files / Kubernetes Secrets. If desirable, application containers can mount these files via a shared volume.
cyberark/secrets-provider-for-k8s#450 - Adds support for secrets rotation with Kubernetes Secrets.
cyberark/secrets-provider-for-k8s#448