Kubernetes operator to manage installation, updation and uninstallation of tektoncd projects (pipeline, …)
A Helm chart to deploy the Tekton Operator and its CRDs
-Docs @ v0.70.0 -Examples @ v0.70.0
kubectl apply -f https://storage.googleapis.com/tekton-releases/operator/previous/v0.70.0/release.yaml
The Rekor UUID for this release is ``
Obtain the attestation:
REKOR_UUID=
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/operator/previous/v0.70.0/release.yaml
REKOR_UUID=
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.70.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Adds support for `artifacts.pipelinerun.enable-deep-inspection` and `builddefinition.buildtype` to Chains spec
SecurityContextConstraints (SCC) pipelines-scc now supports CSI Volume Types
system:authenticated user can view route for Tekton Results API endpoints.
- Added support to update HorizontalPodAutoscaler via `options`. create HPA options is disabled see https://github.com/tektoncd/operator/issues/2002
- Added support for adding labels and annotations on Deployments and StatefulSets podTemplate via `options`.
Add config leader election configmaps for operator controller, operator webhook and proxy webhook
Thanks to these contributors who contributed to v0.70.0!
Extra shout-out for awesome release notes:
A Helm chart to deploy the Tekton Operator and its CRDs
-Docs @ v0.69.1 -Examples @ v0.69.1
kubectl apply -f https://storage.googleapis.com/tekton-releases/operator/previous/v0.69.1/release.yaml
The Rekor UUID for this release is ``
Obtain the attestation:
REKOR_UUID=
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/operator/previous/v0.69.1/release.yaml
REKOR_UUID=
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.69.1@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
Allow to update PriorityClassName via options in Deployment and StatefulSet
If a Deployment or StatefulSet has a Horizontal Pod Autoscaling (HPA) and is in active state, Operator will not control the replicas to that resource. However if `status.desiredReplicas` and `spec.minReplicas` not present in HPA, operator takes the control. Also if HPA disabled, operator takes control. Even though the operator takes the control, the replicas value will be adjusted to the hpa's scaling range.
Thanks to these contributors who contributed to v0.69.1!
Extra shout-out for awesome release notes:
-Docs @ v0.68.1 -Examples @ v0.68.1
kubectl apply -f https://storage.googleapis.com/tekton-releases/operator/previous/v0.68.1/release.yaml
The Rekor UUID for this release is ``
Obtain the attestation:
REKOR_UUID=
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/operator/previous/v0.68.1/release.yaml
REKOR_UUID=
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.68.1@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
our release note here
If a Deployment or StatefulSet has a Horizontal Pod Autoscaling (HPA) and is in active state, Operator will not control the replicas to that resource. However if `status.desiredReplicas` and `spec.minReplicas` not present in HPA, operator takes the control. Also if HPA disabled, operator takes control. Even though the operator takes the control, the replicas value will be adjusted to the hpa's scaling range.
Thanks to these contributors who contributed to v0.68.1!
Extra shout-out for awesome release notes:
A Helm chart to deploy the Tekton Operator and its CRDs
-Docs @ v0.68.0 -Examples @ v0.68.0
kubectl apply -f https://storage.googleapis.com/tekton-releases/operator/previous/v0.68.0/release.yaml
The Rekor UUID for this release is ``
Obtain the attestation:
REKOR_UUID=
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/operator/previous/v0.68.0/release.yaml
REKOR_UUID=
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.68.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
----------------------------------------------------------------------
org component version
----------------------------------------------------------------------
tektoncd hub "v1.14.0"
tektoncd dashboard "v0.39.0"
tektoncd pipeline "v0.50.1"
openshift-pipelines pipelines-as-code "0.21.0"
tektoncd chains "v0.17.0"
tektoncd results "v0.8.0"
tektoncd triggers "v0.25.0"
----------------------------------------------------------------------
:sparkles: Enable TektonResults access by system:authenticated user (#1680)
:sparkles: Add informer for statefulset workloads (#1664)
:sparkles: Introduce additional field options to components (#1656)
pipeline.performance.replicas
.:sparkles: Add Google Creds for Results (#1652)
:sparkles: Add Metrics for TektonResult (#1599)
results_reconciled
added which has log_type
which tells us logging type used during installtion of results.:sparkles: Add Metrics for TektonChains (#1598)
chains_reconciled
added which has {oci/pipelinerun/taskrun}_{storage/format/signer} information as metrics tags.:sparkles: Access to Results Service and Route for system:authenticated user (#1682)
:sparkles: Add support for External DB in Tekton Results (#1654)
:bug: Changing Shell Image from UBI-minimal to shell image (#1637)
:bug: Fix Getting Kubeclient in OpenShift Extension of Pipeline (#1544)
:bug: Fix Transformers for Results Configuration (#1539)
:bug: [main] [0.67.x] Fix Image Transforms for Results (#1532)
:bug: add openshift monitoring label to targetNamespace (#1530)
:hammer: Bump Results and Dashboard (#1678)
:hammer: Updated CRS for for Result (#1573)
:hammer: Bump github.com/tektoncd/triggers from 0.24.1 to 0.25.0 (#1662)
:hammer: Bump gomodules.xyz/jsonpatch/v2 from 2.3.0 to 2.4.0 (#1648)
:hammer: Bump go.uber.org/zap from 1.24.0 to 1.25.0 (#1645)
:hammer: Bump github.com/openshift-pipelines/pipelines-as-code from 0.19.2 to 0.19.4 (#1644)
:hammer: Bump golang.org/x/mod from 0.11.0 to 0.12.0 (#1605)
:hammer: Bump gotest.tools/v3 from 3.4.0 to 3.5.0 (#1603)
:hammer: Bump golang.org/x/sync from 0.1.0 to 0.3.0 (#1585)
:hammer: Bump golang.org/x/mod from 0.10.0 to 0.11.0 (#1577)
:hammer: Bump github.com/openshift-pipelines/pipelines-as-code from 0.19.1 to 0.19.2 (#1551)
:hammer: Bump github.com/tektoncd/triggers from 0.24.0 to 0.24.1 (#1550)
:hammer: Bump github.com/spf13/viper from 1.15.0 to 1.16.0 (#1538)
:hammer: Bump github.com/stretchr/testify from 1.8.3 to 1.8.4 (#1537)
:hammer: Update Chains and Add Results to CSV (#1519)
:hammer: Remove Third Party folder (#1515)
:hammer: Bump github.com/stretchr/testify from 1.8.2 to 1.8.3 (#1501)
:hammer: Bump gomodules.xyz/jsonpatch/v2 from 2.2.0 to 2.3.0 (#1500)
Thanks to these contributors who contributed to v0.68.0!
Extra shout-out for awesome release notes:
A Helm chart to deploy the Tekton Operator and its CRDs
-Docs @ v0.67.0 -Examples @ v0.67.0
kubectl apply -f https://storage.googleapis.com/tekton-releases/operator/previous/v0.67.0/release.yaml
The Rekor UUID for this release is ``
Obtain the attestation:
REKOR_UUID=
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .
Verify that all container images in the attestation are in the release file:
RELEASE_FILE=https://storage.googleapis.com/tekton-releases/operator/previous/v0.67.0/release.yaml
REKOR_UUID=
# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.67.0@sha256:" + .digest.sha256')
# Download the release file
curl "$RELEASE_FILE" > release.yaml
# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done
----------------------------------------------------------------------
org component version
----------------------------------------------------------------------
tektoncd hub "v1.13.0"
tektoncd dashboard "v0.35.0"
tektoncd pipeline "v0.47.0"
openshift-pipelines pipelines-as-code "0.19.1"
tektoncd chains "v0.16.0"
tektoncd results "v0.6.0"
tektoncd triggers "v0.24.0"
----------------------------------------------------------------------
Add Properties to Results for configuring API server and Logging Storage.
Thanks to these contributors who contributed to v0.67.0!
Extra shout-out for awesome release notes:
-Docs @ v0.66.0 -Examples @ v0.66.0
kubectl apply -f https://storage.googleapis.com/tekton-releases/operator/previous/v0.66.0/release.yaml
----------------------------------------------------------------------
org component version
----------------------------------------------------------------------
tektoncd hub "v1.12.0"
tektoncd dashboard "v0.33.0"
tektoncd pipeline "v0.45.0"
openshift-pipelines pipelines-as-code "0.17.1"
tektoncd chains "v0.15.0"
tektoncd results "v0.5.0"
tektoncd triggers "v0.23.0"
----------------------------------------------------------------------
Thanks to these contributors who contributed to v0.66.0!
Extra shout-out for awesome release notes: