Skip to content

Latest commit

 

History

History
262 lines (208 loc) · 6.7 KB

CHANGELOG.adoc

File metadata and controls

262 lines (208 loc) · 6.7 KB

Changelog

Version 0.7.4

ID Type Description

#33

Security

Fix CVE-2023-6378 by upgrading to logback-classic:1.3.14

#34

Maintenance

Upgrade dependency versions

Version 0.7.3

ID Type Description

#29

Enhancement

File Geneator - create non-existing target directories

#31

Enhancement

File Geneator - support base directory for source (templates) files

#32

Security Fix

Parameter of _gen_anm_pwd_hash() lookup function is now masked in logs.

Version 0.7.2

ID Type Description

#28

Fix

Fix config command.

Version 0.7.1

ID Type Description

#26

Fix

Fix build pipeline.

#dependabot-4

Fix

Fix json-path Out-of-bounds Write vulnerability.

Version 0.7.0

ID Type Description

#21

Enhancement

Generate Files.

#22

Enhancement

Evaluate Expression.

eval command to evaluate expression and print result to stdout.

Example:

$ export NAME="World"
$ yamlesutils.sh -q eval "Hello {{ _env('NAME') }}!"
Hello World!

#24

Enhancement

Lookup function to generate hashed ANM password.

Example:

$ yamlesutils.sh -q eval "{{ _gen_anm_pwd_hash('changeme') }}"
$AAGQAAAAAQAC$oALW5N6CWi0PszIfVK3w5w==$uERZwFPmZ2bEknEfZiyrK7QfqcODTyjFJNrbpEQfEDI=

Version 0.6.0

ID Type Description

#13

Enhancement, Refactoring

Lookup- and certificate providers as external plugins.

External plugins are dynamically loaded if exists in the plugins folder of the distribution. To disable a plugin, it can be just deleted from the folder.

Each plugin includes all dependent classes and is loaded by a separate classloaders to avoid class version conflicts.

#17

Enhancement

Support dry run and syntax check.

New parameter -m MODE or --mode=MODE added to specific the execution mode:

  • CONFIG: Build and write configuration (default).

  • DRY_RUN: Build configuration, but don’t write to disk.

  • SYNTAX_CHECK: Check syntax of configuration files only. Lookups are evaluated to empty strings; no connections to external systems (e.g. AWS Secrets Manager) are established.

#18

Enhancement

New parameter -f and --fragment.

The parameter --config=FILE may be misleading. The file is a fragment of the resulting values.yaml file.

New parameters -f FILE and --fragment=FILE are added as an alias of the --config parameter of the merge config and config command.

The --config and -c parameters are deprecated and may be removed in future releases.

Version 0.5.0

ID Type Description

#8

Enhancement

Add multiple certificates from keystore.

#12

Enhancement

Lookup provider for AWS Secrets Manager (aws_sm_plain) supports binary secrets.

The values of binary secrets are returned as a Base64 encoded string.

#14

Enhancement

Combine feature of lint, merge certs and merge config command into one single config command.

#15

Enhancement

Check certificate expiration.

0

Refactoring

Various refactoring to improve code quality and to prepare for future plugin support.

Version 0.4.3

ID Type Description

0

Fix

Due to a bug private keys are not retrieved from a keystore. This is fixed now.

Version 0.4.2

ID Type Description

0

Fix

Add STS component for AWS to enable service account authentication in EKS.

Version 0.4.1

ID Type Description

0

Fix

Fix line endings for Maven wrapper.

Version 0.4.0

ID Type Description

0

Enhancement

Lookup values from file content.

0

Enhancement

Provide Docker image to be used as an init container for K8s deployments.

Version 0.3.0

ID Type Description

0

Enhancement

Add public certificates from files in DER (.crt) or PEM (.pem) format.

Version 0.2.0

ID Type Description

0

Enhancement

Add support for plaintext secrets on AWS Secrets Manager (lookup provider: aws_sm_plain)

0

Breaking Change

Lookup provider for JSON secrets on AWS Secrets Manager is renamed from aws_sm to aws_sm_json. In case of usage, rename the provider in the according lookup configuration.

0

Enhancement

Keystore certificate provider enhanced:

  • Base64 encoded keystore data (config parameter data). In combination with the new plaintext support for AWS Secrets Manager, keystores can be stored in AWS SM as a Base64 encoded string.

  • optional add certificate chain

  • optional suppress private key

0

Refactoring

Refactor lookup providers. Now, lookup providers build specific lookup functions instead of handling lookups by them self.

0

Enhancement

Support usage of built-in and non-built-in lookup functions in lookup provider configuration. Lookup function must be defined before usage.

Version 0.1.0

ID Type Description

0

Enhancement

After a complete redesign, this version provides a stable configuration format.