Tekton Triggers release v0.20.0
π Tekton Triggers release v0.20.0π
-Docs @ v0.20.0
-Examples @ v0.20.0
Installation one-liner
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.0/interceptors.yaml
Upgrade Notices
To upgrade from v0.19.1, run:
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.0/interceptors.yaml
Attestation
The Rekor UUID for this release is 1b1bf6a5e16513d528ad55dc81414de10a330c50349485578f8bff996e59c361
Obtain the attestation:
REKOR_UUID=1b1bf6a5e16513d528ad55dc81414de10a330c50349485578f8bff996e59c361
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | base64 --decode | jq
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.0/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.0/interceptors.yaml
REKOR_UUID=1b1bf6a5e16513d528ad55dc81414de10a330c50349485578f8bff996e59c361
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | base64 --decode | jq -r '.subject[]|.name + ":v0.20.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Changes
Features
- β¨ Moved the TriggerGroups to stable (#1345)
TriggerGroups will be available by default. No changes in config will be required for running it.
- β¨ Add changes to run clusterinterceptor as HTTPS (#1333)
Triggers now support end to end secure connection by running ClusterInterceptor server as HTTPS
Fixes
-
π Fix nil pointer exception for nil interceptor (#1325)
-
π Fix bug to enable attestation for every images (#1330)
-
π¨ Avoid watching all secrets in the cluster (#1274)
Reduce memory usage of the core-interceptors container
Misc
- π¨ Add v0.18.1 and v0.19.1 doc links (#1332)
- π¨ Remove redundant struct PodTemplate from types (#1347)
- π¨ Update to go 1.17.8 (#1340)
- π¨ Update CEL-GO to v0.11.3 & SJSON to v1.2.4 (#1363)
- π¨ Add Multiarch Image in Getting Started (#1362)
- π¨ Bump Pipeline, k8s, and Knative dependencies (#1353)
- π¨ Add v1beta1 specific example in e2e-tests (#1348)
- π¨ Update the release cheatsheet to release drafter pipeline (#1329)
- π¨ Update CEL GO to v0.9.0 and CEL Spec to v0.6.0 (#1322)
- π¨ Bump to CEL v0.11.2 (#1334)
- π¨ Add tool for evaluating cel expresssions (#1310)
Docs
- π Add Example for GKE Autopilot (#1346)
Add an example for deploying EventListener in GKE autopilot.
- π Fix the documentation for wildcard in NamespaceSelector EL (#1342)
Thanks
Thanks to these contributors who contributed to v0.20.0!
- β€οΈ @TristonianJones
- β€οΈ @abayer
- β€οΈ @dibyom
- β€οΈ @guillaumerose
- β€οΈ @khrm
- β€οΈ @ljupchokotev
- β€οΈ @savitaashture
Extra shout-out for awesome release notes:
- π @TristonianJones
- π @dibyom
- π @guillaumerose
- π @khrm
- π @ljupchokotev
- π @savitaashture