Skip to content

Releases: appvia/terranetes-controller

terraform-controller-v0.2.5

09 Jun 16:38
d357945
Compare
Choose a tag to compare

Controller used to provision a terraform workflow within kubernetes

terraform-controller-v0.2.4

09 Jun 15:53
Compare
Choose a tag to compare

Controller used to provision a terraform workflow within kubernetes

Release v0.1.6

06 Jun 08:07
8a21e50
Compare
Choose a tag to compare

New Features

  • [FEATURE] - Record Configuration Cost Metrics - adds the predicted costs of the configuration as exposed prometheus metrics. By @gambol99 in #96
  • [FEATURE] - Adding the UID Labels - adding the UIDs on the labels for resources to make pinpointing the source configuration easier. By @gambol99 in #100
  • [FEATURE] - Adding Value From fields - The current implementation only allows for variables to come from the spec. In most cases this is fine, but if we take a database password supplied to an RDS module, it's not. These should be kept kubernetes secrets and sources into the terraform module. By @gambol99 in #103

Bug Fixes

What's Changed

New Contributors

Full Changelog: v0.1.5...v0.1.6

terraform-controller-v0.2.3

06 Jun 08:25
c0eea43
Compare
Choose a tag to compare

Controller used to provision a terraform workflow within kubernetes

terraform-controller-v0.2.1

26 May 10:51
Compare
Choose a tag to compare

Controller used to provision a terraform workflow within kubernetes

Release v0.1.5

25 May 18:12
Compare
Choose a tag to compare

Build

  • Fixed up the chart directory structure in order to properly supprt the helm tools and deployment #67

What's Changed

Full Changelog: v0.1.4...v0.1.5

Release v0.1.4

25 May 16:13
a32ee90
Compare
Choose a tag to compare

New Featues

  • Disable Terraform Version Override (#50) Currently all configurations have the ability to override the terraform version on their spec (this effectively overrides the terraform image tag). There might be times where you want this disabled though. This PR adds the ability to the platform teams to switch off the feature (which is enabled by default).
  • Module Selector (#58): The current module constraint is global, adding a selector here you can target specific resources or namespaces and provides a means for additional permissions. Note as with all selectors here, a empty selector indicates it applies to all.
  • External Checks for Checkov (#64): Adding the ability to source in external checks to be included in the scan.

Build

  • Workflow Speed (#61): sped up the execution time of the images by breaking them up

Testing

  • Deduplicating the E2E (#63): Much of the E2E is the we can dedup the workflow and reuse across all the providers
  • Constraint Checks (#65): adding Constraint Checks
  • Added E2E for Azure
  • Adding E2E for Google #42

What's Changed

Full Changelog: v0.1.3...v0.1.4

Release v0.1.3

24 May 11:47
b65ca9f
Compare
Choose a tag to compare

Bug Fixes

  • Fixed a issue with the API type for Provider. A enum was stopping an Azure provider from being added as it had azure not azurerm defined. #51

What's Changed

Full Changelog: v0.1.2...v0.1.3

Release v0.1.2

23 May 08:40
Compare
Choose a tag to compare

New Features

  • RBAC Support: Added support for RBAC on the Providers. This allows platform teams to specify a collection of selectors which are used to match namespace and resource labels to determine if the Configuration is permitted to use it. Click here for full details #29
  • Connection Secret Keys: added the ability for Configuration's to filter which keys from the terraform ouput they want to see in the connection secret. Click here for details. #34
  • Kubernetes Events: crucial events were being recorded in the status conditions only. This change raises those same conditions as Kubernetes events themselves which can be used to trigger off notifications. #31

Bug Fixes

  • Fixed an issue where the service account from the provider was not correctly being set on the terraform #35

Documentation

  • Added a additional docs on the types types #26
  • Updated the repository readme #25

What's Changed

Full Changelog: v0.1.1...v0.1.2

Release v0.1.1

19 May 18:14
753d89a
Compare
Choose a tag to compare

Features

Introduced the ability for the platform administrators to enforce a security profile against the terraform modules.

apiVersion: terraform.appvia.io/v1alpha1
kind: Policy
metadata:
  name: checkov
spec:
  constraints:
    checkov:
      # See: https://www.checkov.io/5.Policy%20Index/terraform.html
      checks: []
      # See: https://www.checkov.io/5.Policy%20Index/terraform.html
      skipChecks: []

Where necessary an exception can be added, targetting by namespace and resource labels; which will override the above.

---
# Create an exception to the above policy and force configurations
# in the specific namespace to use this instead
---
apiVersion: terraform.appvia.io/v1alpha1
kind: Policy
metadata:
  name: checkov-override
spec:
  constraints:
    checkov:
      selector:
        namespace:
          matchExpressions:
            - key: kubernetes.io/metadata.name
              operator: In
              values: [apps2]
      # See: https://www.checkov.io/5.Policy%20Index/terraform.html
      skipChecks:
        - <NAME>

What's Changed

Full Changelog: v0.1.0...v0.1.1