Releases: tektoncd/pipeline
Tekton Pipeline release v0.56.0 "Persian Terminator LTS"
-Docs @ v0.56.0
-Examples @ v0.56.0
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.56.0/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a0c94b8ccf25fa815c6b01ab90941b17a37373885d8f62efc99b17eea417bed4d
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a0c94b8ccf25fa815c6b01ab90941b17a37373885d8f62efc99b17eea417bed4d
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.56.0/release.yaml
REKOR_UUID=24296fb24b8ad77a0c94b8ccf25fa815c6b01ab90941b17a37373885d8f62efc99b17eea417bed4d
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.56.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
- β¨ Support overriding the SCM type and server URL (#7450)
User are now able to override the global server URL when using the git resolver to allow fetching from multiple git providers. - β¨ TEP-0142: Introduce WorkingDir in StepActions (#7461)
- β¨ TEP-0075(object params and results) promoted to stable (#7544)
TEP-0075 promoted to stable - object params and results is now possible with enable-api-fields set to stable. - β¨ kind/feature : populate-params-and-results-to-workspace-bindings (#7503)
- β¨ TEP-0142: Passing StepResults between Steps (#7458)
Enable passingStepResults
betweenSteps
in a `Task. - β¨ param substitutions not allowed in StepAction's script (#7459)
Param substitutions not allowed directly in StepAction's script
Fixes
- π fix: ensure global podTemplate configuration is merged correctly (#7552)
Merge the env
and volumes
from the podTemplate in the pipelineRun or TaskRun with the global defaults, instead of only considering the specified in the Run's.
- π Add back conversion for TaskRunStatus Resources (#7507)
restore conversion functions from taskRun and taskRunStatus resources for backwards compatibility
- π add default resource requirements to init-containers and containers of a pod (#7003)
[Bug fix]: takes default values of a resource requirements from a config map and updates to a init-container and container resource requirements value, if the value is not present
- π kind/bug allowExecution evaluation for when expression returns early when CEL is defined (#7569)
- π Fix broken import of go.opentelemetry.io/otel to v1.21.0 (#7465)
Misc
- π¨ Label for failure PipelineRun Status Message (#7475)
user error attributions can now be seen via PipelineRunStatus condition messages
- π¨ Error sweep: correct InvalidPipelineResultReference failure reason (#7459)
- π¨ Bump github.com/sigstore/sigstore from 1.7.5 to 1.8.1 (#7575)
- π¨ Bump github.com/spiffe/spire-api-sdk from 1.8.5 to 1.8.7 (#7570)
- π¨ Bump tj-actions/changed-files from 41.0.1 to 41.1.1 (#7567)
- π¨ Bump actions/upload-artifact from 4.0.0 to 4.1.0 (#7566)
- π¨ Bump github/codeql-action from 3.22.12 to 3.23.0 (#7548)
- π¨ Bump actions/checkout from 3.1.0 to 4.1.1 (#7537)
- π¨ Bump ossf/scorecard-action from 2.1.2 to 2.3.1 (#7536)
- π¨ Bump tj-actions/changed-files from 40.2.3 to 41.0.1 (#7535)
- π¨ Bump actions/upload-artifact from 3.1.0 to 4.0.0 (#7534)
- π¨ Bump github/codeql-action from 2.2.4 to 3.22.12 (#7533)
- π¨ Bump github.com/containerd/containerd from 1.7.8 to 1.7.11 (#7529)
- π¨ Bump golang.org/x/crypto from 0.16.0 to 0.17.0 (#7527)
- π¨ Hardened GitHub workflows a little bit (#7524)
- π¨ Bump k8s.io/api from 0.27.8 to 0.27.9 in /test/custom-task-ctrls/wait-task-beta (#7518)
- π¨ Bump github.com/jenkins-x/go-scm from 1.14.20 to 1.14.24 (#7515)
- π¨ Bump google.golang.org/grpc from 1.59.0 to 1.60.1 (#7506)
- π¨ Bump github.com/google/go-containerregistry from 0.16.1 to 0.17.0 (#7462)
Docs
Thanks
Thanks to these contributors who contributed to v0.56.0!
- β€οΈ @JeromeJu
- β€οΈ @Yongxuanzhang
- β€οΈ @chitrangpatel
- β€οΈ @dependabot[bot]
- β€οΈ @ericzzzzzzz
- β€οΈ @jkandasa
- β€οΈ @l-qing
- β€οΈ @vdemeester
Extra shout-out for awesome release notes:
- π @JeromeJu
- π @Yongxuanzhang
- π @chitrangpatel
- π @ericzzzzzzz
- π @jkandasa
- π @l-qing
Tekton Pipeline release v0.47.6 "Chartreux Rachael"
-Docs @ v0.47.6
-Examples @ v0.47.6
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.47.6/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a62ebb1cced6d37e04f6bce5a7736fcb8c2cf92c823122b72fa8c812ca90bb7b0
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a62ebb1cced6d37e04f6bce5a7736fcb8c2cf92c823122b72fa8c812ca90bb7b0
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.47.6/release.yaml
REKOR_UUID=24296fb24b8ad77a62ebb1cced6d37e04f6bce5a7736fcb8c2cf92c823122b72fa8c812ca90bb7b0
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.47.6@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
Fixes
- π [release-v0.47.x] don't return validation error when final tasks failed/skipped (#7487)
Misc
Docs
Thanks
Thanks to these contributors who contributed to v0.47.6!
- β€οΈ @vdemeester
Extra shout-out for awesome release notes:
Tekton Pipeline release v0.55.0 "Bambino Alojzy GΔ bka"
π PipelineTask.OnError and bugfixes π
-Docs @ v0.55.0
-Examples @ v0.55.0
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.55.0/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77acf6e7f5cf38da4c2178e88e08bc2f291dc52b756371a21d349ca985bd125ace9
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77acf6e7f5cf38da4c2178e88e08bc2f291dc52b756371a21d349ca985bd125ace9
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.55.0/release.yaml
REKOR_UUID=24296fb24b8ad77acf6e7f5cf38da4c2178e88e08bc2f291dc52b756371a21d349ca985bd125ace9
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.55.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
- β¨ TEP-0142: Introduce WorkingDir in StepActions (#7461)
Introduce WorkingDir in StepActions
- β¨ Support overriding the SCM type and server URL (#7450)
User are now able to override the global server URL when using the git resolver to allow fetching from multiple git providers.
- β¨ [TEP-0050] Implement PipelineTask OnError (#7422)
Implement "Ignore Task Failure" with new "PipelineTask.OnError" API field (TEP-0050). User can now set pipelineTask.onError: continue
to ignore failure
Fixes
- π Fix enum validation with multiple param references (#7481)
bug fix: allow task-level param references multiple pipeline-level params with enum
- π Fix: do not fail TaskRun for concurrent modification errors (#7467)
fix: taskRuns will not fail for concurrent modification errors when stopping sideCars
- π Fix validations for Sidecars to be consistent (#7443)
sidecars are now validated at admission webhook
- π fix: resolve issue where resolutionrequest defaulted to v1alpha1 vs v1beta1 (#7438)
Resolved issue where resolutionrequest defaulted to v1alpha1 when it should be v1beta1
- π Do not require for entrypoint cancellation (#7430)
ntrypoint cancellation only requires keep-pod-on-cancel: true
feature-flag.
- π Freeze image sha for dind-sidecar example test. (#7498)
- π FIX: Prevent panic on parameter evaluation (#7488)
- π change ResultRef.ResultsIndex from int to *int (#7460)
- π don't return validation error when final tasks failed/skipped (#7407)
Misc
- π¨ Tracing: Add credentialsSecret for basic authentication to remote endpoint (#7238)
Tracing config now includes an additional optional field credentialsSecret
where users can specify the name of a secret. The username and password fields from the secret will be used to authenticate against Tracing collector endpoint.
- π¨ [TEP-0131] Update Conformance Spec for v1 api types (#7224)
Updates the conformance api spec with v1 api types in line with TEP-131
- π¨ Error sweep: complete user-facing error messages formats (#7474)
- π¨ Replace PipelineRunReasonFailedValidation with more granular reasons (#7417)
- π¨ Error sweep: Move TaskRun Reasons in pkg/pod to pkg/apis (#7406)
- π¨ Cleanup error message for Step container status (#7405)
- π¨ Error sweep: add more context for PipelineRunCouldntGetPipeline error message (#7403)
- π¨ Error sweep: refactor steps termination when failing TaskRun (#7386)
- π¨ Refactor common util functions for /test (#7369)
- π¨ Fix showing error message when validation fail (#7509)
- π¨ Git resolver: validate repo URL (#7482)
- π¨ Bump github.com/spiffe/spire-api-sdk from 1.8.4 to 1.8.5 (#7463)
- π¨ Fix some spelling in stepactions.md (#7432)
- π¨ Remove .envrc and show an example in .envrc.sample (#7429)
- π¨ Create scorecard.yml (#7409)
- π¨ Add @JeromeJu as a pipelines maintainer (#7327)
- π¨ Bump github.com/google/uuid from 1.3.1 to 1.4.0 (#7308)
Docs
- π Add
stdoutConfig
andstderrConfig
to alpha features table (#7494) - π Fix step actions documentation (#7492)
- π [TEP-0050] Add Ignore Task Failure to alpha table (#7468)
- π Update Feature Flags Documentation (#7445)
- π Update StepActions Documentation (#7441)
- π Fix typos and broken links in StepActions doc (#7431)
- π Make git resolver label explicit (#7428)
- π Update release with v0.54.0 (#7427)
- π Update release cheat sheet (#7425)
Thanks
Thanks to these contributors who contributed to v0.55.0!
- β€οΈ @AlanGreene
- β€οΈ @JeromeJu
- β€οΈ @QuanZhang-William
- β€οΈ @Yongxuanzhang
- β€οΈ @aaron-prindle
- β€οΈ @afrittoli
- β€οΈ @chitrangpatel
- β€οΈ @chmouel
- β€οΈ @dependabot[bot]
- β€οΈ @dibyom
- β€οΈ @jerop
- β€οΈ @joaosilva15
- β€οΈ @kmjayadeep
- β€οΈ @vdemeester
Extra shout-out for awesome release notes:
- π @JeromeJu
- π @QuanZhang-William
- π @aaron-prindle
- π @chitrangpatel
- π @chmouel
- π @dibyom
- π @kmjayadeep
- π @vdemeester
Tekton Pipeline release v0.54.2 "Korat Bender"
-Docs @ v0.54.2
-Examples @ v0.54.2
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.54.2/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a70414b954f5ea533eecb2a83f9a87997dc311d043ea27f6e609f4af5dcba94a1
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a70414b954f5ea533eecb2a83f9a87997dc311d043ea27f6e609f4af5dcba94a1
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.54.2/release.yaml
REKOR_UUID=24296fb24b8ad77a70414b954f5ea533eecb2a83f9a87997dc311d043ea27f6e609f4af5dcba94a1
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.54.2@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
Fixes
- π [release-v0.54.x] FIX: Prevent panic on parameter evaluation (#7512)
Misc
Docs
Thanks
Thanks to these contributors who contributed to v0.54.2!
- β€οΈ @tekton-robot
Extra shout-out for awesome release notes:
Tekton Pipeline release v0.54.1 "Korat Bender"
-Docs @ v0.54.1
-Examples @ v0.54.1
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.54.1/release.yaml
Attestation
The Rekor UUID for this release is ``
Obtain the attestation:
REKOR_UUID=
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.54.1/release.yaml
REKOR_UUID=
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.54.1@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
Fixes
- π [release-v0.54.x] don't return validation error when final tasks failed/skipped (#7510)
Misc
Docs
Thanks
Thanks to these contributors who contributed to v0.54.1!
- β€οΈ @tekton-robot
Extra shout-out for awesome release notes:
Tekton Pipeline release v0.53.3 "Munchkin Maschinenmensch"
-Docs @ v0.53.3
-Examples @ v0.53.3
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.53.3/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77afb99bd712cd691b6390f8d712a52f96661eaa96ad92eefe7cb047049140f16f3
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77afb99bd712cd691b6390f8d712a52f96661eaa96ad92eefe7cb047049140f16f3
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.53.3/release.yaml
REKOR_UUID=24296fb24b8ad77afb99bd712cd691b6390f8d712a52f96661eaa96ad92eefe7cb047049140f16f3
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.53.3@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
Fixes
- π [release-v0.53.x] Fix: do not fail TaskRun for concurrent modification errors (#7479)
ix: taskRuns will not fail for concurrent modification errors when stopping sideCars
- π [release-v0.53.x] Do not require for entrypoint cancellation (#7457)
Entrypoint cancellation only requires keep-pod-on-cancel: true
feature-flag.
- π [release-v0.53.x] Fix validations for Sidecars to be consistent (#7446)
idecars are now validated at admission webhook
- π [release-v0.53.x] FIX: Prevent panic on parameter evaluation (#7491)
- π [release-v0.53.x] don't return validation error when final tasks failed/skipped (#7486)
Misc
- π¨ [release-v0.53.x] Use a maintained action for "changed files" (#7490)
- π¨ [v0.53.x] bump knative version to get a CVE fix (#7372)
Docs
Thanks
Thanks to these contributors who contributed to v0.53.3!
- β€οΈ @JeromeJu
- β€οΈ @jkandasa
- β€οΈ @tekton-robot
- β€οΈ @vdemeester
Extra shout-out for awesome release notes:
- π @tekton-robot
- π @vdemeester
Tekton Pipeline release v0.54.0 "Korat Bender"
π Reusable Steps via StepActions, Param Enums, HTTP Resolver! π
-Docs @ v0.54.0
-Examples @ v0.54.0
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.54.0/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a6a820444f8789f9b68835a66c6c0ad3cecabee051b9af0c824b04baf1b57433c
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a6a820444f8789f9b68835a66c6c0ad3cecabee051b9af0c824b04baf1b57433c
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.54.0/release.yaml
REKOR_UUID=24296fb24b8ad77a6a820444f8789f9b68835a66c6c0ad3cecabee051b9af0c824b04baf1b57433c
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.54.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
-
β¨ TEP-0142: Surface step results via sidecar logs (#7414)
Surface step results via sidecar logs
-
β¨ TEP-0142: Introduce StepResults in Steps, StepActions (#7382)
Introduce StepResults in Steps for StepAction's Result storage.
-
β¨ TEP-0142: Surface step results via termination message (#7349)
Surface step results via termination message
-
β¨ TEP-0142: Introduce Value in TaskResults (#7347)
StepActions: Introduce Value in TaskResults
-
β¨ [TEP-0142] Add VolumeMounts to StepAction (#7340)
Users can define VolumeMounts in StepAction, the VolumeMounts Name should use string param reference to the params passed to the StepAction.
-
β¨ [TEP-0144] Validate PipelineRun for Param Enum (#7338)
Implement Param Enum validation for PipelineRuns. Param Enum is supported per TEP-0144
-
β¨ [TEP-0142] Add SecurityContext (#7337)
Users can declare SecurityContext in StepAction.
-
β¨ TEP-0142: Add support for params between Step and StepActions (#7332)
Completes support for params in StepActions.
-
β¨ [TEP-0144] Validate TaskRun for Param Enum (#7326)
Implement Param Enum validation for TaskRuns
-
β¨ [TEP-0142] Remote Resolution for StepAction (#7321)
Support Remote Resolution for StepAction
-
β¨ TEP-0142: Introduce Params and Results into StepActions CRD (#7317)
Introduces params and results into the StepAction CRD.
-
β¨ Add credentials to HTTP resolver (#7315)
The http resolver supports passing username and password for fetching URLs with basic credentials
-
β¨ [TEP-0144] Add enum API field (#7289)
Add
Enum
API field -
β¨ TEP-0142: Introduce StepAction referencing syntax in Steps (#7284)
Introduces referencing syntax for StepAction in Steps
-
β¨ [TEP-0144] Add feature flag and doc placeholder (#7279)
Add
enable-param-enum
feature flag to gate the use ofParam.Enum
API field -
β¨ TEP-0142: Referencing StepActions in Steps (#7271)
Enables referencing of StepActions in Steps if the feature flag "enable-step-actions: true" is set.
-
β¨ Add a simple HTTP resolver (#7250)
A new HTTP resolver is now available, it will let you resolve a http(s) URL to fetch a task or pipeline from.
-
β¨ Let the user pass a secret via a parameter for SCM API operations when using the git API resolver (#7239)
User are now able to pass a secret referencing token (or a tokenKey) for a SCM operation on the git resolver instead of using the global one from the configmap.
-
β¨ [TEP-0142] Support default resolver for Ref to remote StepAction (#7345)
-
β¨ TEP-0142: Add syntax for providing params to StepActions (#7334)
-
β¨ [TEP-0142] Add ResolverRef to Ref (#7322)
Fixes
-
π change bundle resolver to use secret instead of service account (#7331)
action required: Bundle resolve uses secret to pull bundle Tasks/Pipelines from private registry instead of Service Account. Please update your bundle resolver ref to use secret.
-
π fix: the pr may lose finallyStartTime when pipeline controller is not synchronized to all current state (#7186)
Reset the finallyStartTime field when one or more final tasks have been created and the current finallyStartTime is empty.
-
π fix: panic may occur when calculating the final task timeout waiting time (#7188)
Misc
- π¨ Cleanup v1beta1 reference in pipelinerun reconciler (#7395)
- π¨ fix: move getFeatureFlagsBaseOnAPIFlag from custom_task_test to another file (#7393)
- π¨ chore: pkg import only once (#7348)
- π¨ [TEP-0142] Refactor extractStepActions (#7328)
- π¨ Fix capitalization inconsistency in reconciler (#7318)
- π¨ remove GetUnsignedTask helper function and use var in each file (#6799)
- π¨ Bump k8s.io/client-go from 0.27.7 to 0.27.8 in /test/custom-task-ctrls/wait-task-beta (#7377)
- π¨ Bump github.com/tektoncd/pipeline from 0.53.0 to 0.53.1 in /test/custom-task-ctrls/wait-task-beta (#7368)
- π¨ Use a maintained action for "changed files" (#7364)
- π¨ Replace ubi9/ubi-minimal with busybox image (#7363)
- π¨ Add direnv support with boilerplate (#7344)
- π¨ Bump github.com/spiffe/spire-api-sdk from 1.8.1 to 1.8.4 (#7343)
- π¨ Bump github.com/jenkins-x/go-scm from 1.14.14 to 1.14.20 (#7339)
- π¨ Bump github.com/sigstore/sigstore from 1.7.4 to 1.7.5 (#7311)
- π¨ Bump github.com/tektoncd/pipeline from 0.52.1 to 0.53.0 in /test/custom-task-ctrls/wait-task-beta (#7305)
- π¨ Bump github.com/containerd/containerd from 1.7.7 to 1.7.8 (#7303)
- π¨ removed repeated word how-to-write-a-resolver.md (#7302)
- π¨ Fix git resolver example (#7299)
- π¨ Bump github.com/sigstore/sigstore/pkg/signature/kms/hashivault from 1.7.4 to 1.7.5 (#7288)
- π¨ Bump github.com/golangci/golangci-lint from 1.54.2 to 1.55.1 in /tools (#7283)
- π¨ Bump github.com/go-git/go-git/v5 from 5.9.0 to 5.10.0 (#7281)
- π¨ Bump sigs.k8s.io/yaml from 1.3.0 to 1.4.0 (#7280)
- π¨ Bump github.com/google/cel-go from 0.12.6 to 0.18.1 (#7253)
- π¨ Update ko to go 1.20 in release task (#7341)
- π¨ Disable HTTP/2 by updating knative/pkg (#7324)
Docs
- π Improve migration documentation (#7389)
- π docs: update upper limit for layers in a bundle (#7355)
- π fixed issue #7282 changed broken link from release-pipeline-nightly.yaml to release-pipeline.yaml (#7306)
- π Update release with v0.53.0 LTS (#7301)
Thanks
Thanks to these contributors who contributed to v0.54.0!
- β€οΈ @Dhruval7878
- β€οΈ @Exar04
- β€οΈ @JeromeJu
- β€οΈ @QuanZhang-William
- β€οΈ @Yongxuanzhang
- β€οΈ @afrittoli
- β€οΈ @chitrangpatel
- β€οΈ @chmouel
- β€οΈ @cugykw
- β€οΈ @dependabot[bot]
- β€οΈ @khrm
- β€οΈ @mlschmithorst
- β€οΈ @pratap0007
- β€οΈ @testwill
- β€οΈ @vdemeester
- β€οΈ @vivekBoii
Extra shout-out for awesome release notes:
- π @QuanZhang-William
- π @Yongxuanzhang
- π @chitrangpatel
- π @chmouel
- π @cugykw
- π @khrm
Tekton Pipeline release v0.53.2 "Munchkin Maschinenmensch"
-Docs @ v0.53.2
-Examples @ v0.53.2
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.53.2/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a65b4c04ecc3fa6d06bcfea7b874c1614dd3067dfc35fbffdfc8dcbe1ca0b891f
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a65b4c04ecc3fa6d06bcfea7b874c1614dd3067dfc35fbffdfc8dcbe1ca0b891f
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.53.2/release.yaml
REKOR_UUID=24296fb24b8ad77a65b4c04ecc3fa6d06bcfea7b874c1614dd3067dfc35fbffdfc8dcbe1ca0b891f
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.53.2@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Misc
- π¨ [release-v0.53.x] Fix the controller and webhook images to use stable alpine (#7371)
The Tekton controller images are now based on a distroless base image which is built on top of Alpine 3.18
Thanks
Thanks to these contributors who contributed to v0.53.2!
- β€οΈ @afrittoli
Extra shout-out for awesome release notes:
- π @afrittoli
Tekton Pipeline release v0.50.5 "Russian Blue Daneel Olivaw"
-Docs @ v0.50.5
-Examples @ v0.50.5
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.50.5/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a6931938578b4916b2944efdb45cd531e1913f85b8bc9c0a4e73512edcfbb86b5
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a6931938578b4916b2944efdb45cd531e1913f85b8bc9c0a4e73512edcfbb86b5
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.50.5/release.yaml
REKOR_UUID=24296fb24b8ad77a6931938578b4916b2944efdb45cd531e1913f85b8bc9c0a4e73512edcfbb86b5
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.50.5@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Misc
- π¨ [release-v0.50.x] Fix the controller and webhook images to use stable alpine (#7370)
The Tekton controller images are now based on a distroless base image which is built on top of Alpine 3.18
Thanks
Thanks to these contributors who contributed to v0.50.5!
- β€οΈ @afrittoli
Extra shout-out for awesome release notes:
- π @afrittoli
Tekton Pipeline release v0.53.1 "Munchkin Maschinenmensch"
-Docs @ v0.53.1
-Examples @ v0.53.1
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.53.1/release.yaml
Attestation
The Rekor UUID for this release is 24296fb24b8ad77a2b1a1e305c730d970cef50e8aa4e9da65cb4da59fd03d253eb3de693252ffad6
Obtain the attestation:
REKOR_UUID=24296fb24b8ad77a2b1a1e305c730d970cef50e8aa4e9da65cb4da59fd03d253eb3de693252ffad6
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.53.1/release.yaml
REKOR_UUID=24296fb24b8ad77a2b1a1e305c730d970cef50e8aa4e9da65cb4da59fd03d253eb3de693252ffad6
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.53.1@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Misc
- π¨ [release-v0.53.x] Pin the distroless base image to a stable alpine (#7361)
The Tekton images are now based on a distroless base image which is built on top of Alpine 3.18
Thanks
Thanks to these contributors who contributed to v0.53.1!
- β€οΈ @afrittoli
Extra shout-out for awesome release notes:
- π @afrittoli