Releases: bitnami-labs/sealed-secrets
Releases · bitnami-labs/sealed-secrets
v0.7.0
Big change for this release is the switch to per-key encrypted values.
("Keys" as in "object key/value", not as in "encryption key". English is hard.)
- Previously we generated a single big encrypted blob for each Secret, now we encrypt each value in the Secret separately, with the keys in plain text.
- This allows:
- Existing keys can now be renamed and deleted without re-encrypting the value(s).
- New keys/values can be added to the SealedSecret without re-encrypting (or even having access to!) the existing values.
- Note that (as before) the encrypted values are still tied to the namespace/name of the enclosing Secret/SealedSecret, so can't be moved to another Secret.
(The cluster-wide annotation does allow this, with the corresponding caveats, as before)
- The
kubesealtool does not yet have an option to output just a single value, but you can safely mix+match the individual values fromkubesealoutput with an existing SealedSecret. Improvingkubesealsupport for this feature is still an open action item. - Existing/older "all-in-one" SealedSecrets are declared deprecated, but will continue to be supported by the controller for the foreseeable future. New invocations of the
kubesealtool now produce per-key encrypted output - if you need to produce the older format, just use an olderkubeseal. Please raise a github issue if you have a use-case that requires supporting "all-in-one" SealedSecrets going forward. - Note the CRD schema used for server-side validation in k8s >=1.9 has been temporarily removed, because it was unable to support the new per-key structure correctly (see kubernetes/kubernetes#59485).
- Huge thanks to @sullerandras for the code and his persistence in getting this merged!
v0.6.0
- Support "cluster wide" secrets, that are not restricted to the original namespace
- Set
sealedsecrets.bitnami.com/cluster-wide: "true"annotation - Warning: cluster-wide SealedSecrets can be decrypted by anyone who can create a SealedSecret in your cluster
- Set
- Move to client-go v5.0
- Move to bitnami-labs github org
- Fix bug in schema validation for k8s 1.9
v0.5.1
Note: this version moves TPR/CRD definition into a separate file. To install, you need controller.yaml and either sealedsecret-tpr.yaml or sealedsecret-crd.yaml
- Add CRD definition and TPR->CRD migration documentation
- Add
kubeseal --fetch-certto dump server cert to stdout, for later offline use withkubeseal --cert - Better sanitisation of input object to
kubeseal
(v0.5.1 fixes a travis/github release issue with v0.5.0)
v0.4.0
v0.3.1
- Add
controller-norbac.yamlto the release build. This iscontroller.yamlwithout RBAC rules and related service account - for environments where RBAC is not yet supported, like Azure. - Fix missing controller RBAC ClusterRoleBinding in v0.3.0
v0.3.0
v0.2.1
- Fix invalid field
resourceNamein v0.2.0 controller.yaml (thanks @Globegitter)
Second alpha release
- Client tool has better defaults, and can fetch the certificate automatically from the controller.
- Improve release process to include pre-built Linux and OSX x86-64 binaries.
Initial alpha release
Basic functionality is complete.
v0.0.1: Drive docker release from travis-ci
- Clean up controller.jsonnet - Switch to quay.io (docker hub doesn't offer robot accounts??) - Add deploy section to .travis.yml