Triggers Versions Save

Event triggering with Tekton!

v0.26.1

3 months ago

-Docs @ v0.26.1 -Examples @ v0.26.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.26.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.26.1/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77ada4bd989265c7c72c1dbd6295312ef4314f485d4221703b03c60f9edd76000c8

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77ada4bd989265c7c72c1dbd6295312ef4314f485d4221703b03c60f9edd76000c8
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.26.1/release.yaml
REKOR_UUID=24296fb24b8ad77ada4bd989265c7c72c1dbd6295312ef4314f485d4221703b03c60f9edd76000c8

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.26.1@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

Fixes

  • :bug: Revert "Follow naming conventions for resourceTemplates" (#1694) Changed the resourceTemplates tag back to resourcetemplates because it's breaking the upgrade flow. This is due to the existing TriggerTemplate data with the old tag still persisting in etcd. Consequently, during an upgrade with the new tag, the data isn't fetched for the trigger template as expected.

Misc

  • :hammer: Modify the Knative package and Serving version to align with the Kubernetes version for compatibility (#1692) With this commit, updating the version to maintain consistency with the Kubernetes version of Tekton Pipeline

Docs

Thanks

Thanks to these contributors who contributed to v0.26.1!

  • :heart: @savitaashture

Extra shout-out for awesome release notes:

v0.26.0

3 months ago

-Docs @ v0.26.0 -Examples @ v0.26.0

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.26.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.26.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77adb2b758a907715ae9c12bd31be75af1e58f488fa6d02f6f29886e7bb1aa4046c

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77adb2b758a907715ae9c12bd31be75af1e58f488fa6d02f6f29886e7bb1aa4046c
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.26.0/release.yaml
REKOR_UUID=24296fb24b8ad77adb2b758a907715ae9c12bd31be75af1e58f488fa6d02f6f29886e7bb1aa4046c

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.26.0@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Add string translation to CEL interceptor. (#1686)

New translate function added to the CEL interceptor.

  • :sparkles: Add first and last functions. (#1636)

Two new functions for the CEL interceptor, to allow easy access to the first and last elements in an array.

Breaking changes

In current release:

  • :rotating_light:

The decision to modify the tag from resourcetemplates to resourceTemplates within the triggerTemplate spec was made to align with JSON or YAML camelCase format standards. However, this alteration has caused a disruption in the upgrade process, as previous versions of Triggers relied on the resourcetemplates tag. which is a breaking change.

To address this issue, we reverted the change back and released Triggers version v0.26.1. We will reintroduce the change when we support the new ApiVersion in Triggers. At that point, we'll utilize conversion functionality (convertTo and convertFrom) to ensure seamless transition. By incorporating the ApiVersion, we'll be able to adjust the tag accordingly. https://github.com/tektoncd/triggers/pull/1694

Fixes

  • :bug: Fix bitbucket server example when both SSH and HTTPS enabled (#1641)

Misc

  • :hammer: Update Cel-go to v0.19.0 (#1688)
  • :hammer: Bump Pipelines to v0.56.0 (#1683)
  • :hammer: Bump tekton/pipelines v0.53.0 LTS release (#1671)
  • :hammer: Add Triggers v0.25.2 and v0.24.2 to the release (#1669)
  • :hammer: Follow naming conventions for resourceTemplates (#1650)
  • :hammer: Remove Pipelineressources from integration test (#1643)
  • :hammer: Bump golang.org/x/crypto from 0.14.0 to 0.17.0 (#1679)
  • :hammer: Bump knative.dev/serving from 0.30.1-0.20220402124840-21c05dc9d9a4 to 0.39.0 (#1677)
  • :hammer: Bump GRPC from 1.56.2 to 1.59.0 (#1660)

Docs

  • :book: Add v0.25.0 to docs (#1635)

Thanks

Thanks to these contributors who contributed to v0.26.0!

  • :heart: @bigkevmcd
  • :heart: @dependabot[bot]
  • :heart: @khrm
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @bigkevmcd
  • :heart_eyes: @khrm

v0.25.3

5 months ago

-Docs @ v0.25.3 -Examples @ v0.25.3

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.3/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.3/interceptors.yaml

Changes

Security

Fixes

  • :bug: Update triggers core interceptor to create secret when necessary Now the core interceptor will create secrets in only 2 cases:
    • when there is no secret present in the cluster.
    • when certificates expire within the existing secret. If secret exist and have valid certificates no need to recreate secret every time

Thanks

Thanks to these contributors who contributed to v0.25.3!

  • :heart: @khrm
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @khrm
  • :heart_eyes: @savitaashture

v0.25.2

6 months ago

-Docs @ v0.25.2 -Examples @ v0.25.2

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.2/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.2/interceptors.yaml

Changes

Security

Thanks

Thanks to these contributors who contributed to v0.25.2!

  • :heart: @khrm

Extra shout-out for awesome release notes:

  • :heart_eyes: @khrm

v0.24.2

6 months ago

-Docs @ v0.24.2 -Examples @ v0.24.2

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.2/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.2/interceptors.yaml

Changes

Security

  • [0.24.x] Bump GRPC to 1.56.3 (#1661)
  • [v0.24.x] Bump golang.org/x/net from 0.11.0 to 0.17.0 (#1654)

Address the https://github.com/advisories/GHSA-qppj-fm5r-hxr3 - which involves HTTP/2 Stream Cancellation Attack

Misc

  • [release-v0.24.x] Fix integration Test by upgrading Knative (#1655)

Thanks

Thanks to these contributors who contributed to v0.24.2!

  • :heart: @khrm

v0.23.2

6 months ago

-Docs @ v0.23.2 -Examples @ v0.23.2

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.2/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.2/interceptors.yaml

Changes

Fixes

Security

Misc

  • [release-v0.23.x] Fix integration Test by upgrading Knative (#1656)

Thanks

Thanks to these contributors who contributed to v0.23.2!

  • :heart: @khrm

Extra shout-out for awesome release notes:

  • :heart: @khrm

v0.25.1

6 months ago

-Docs @ v0.25.1 -Examples @ v0.25.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.1/interceptors.yaml

Changes

Fixes

  • Bump golang.org/x/net from 0.11.0 to 0.17.0 (#1653)

Address the CVE-2023-44487 - which involves HTTP/2 Stream Cancellation Attack

Thanks

Thanks to these contributors who contributed to v0.25.1!

  • :heart: @khrm

Extra shout-out for awesome release notes:

  • :heart_eyes: @khrm

v0.25.0

8 months ago

-Docs @ v0.25.0 -Examples @ v0.25.0

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a3b75040e94727f4d7a7246d5e704172f48f5969d1202903ecd5fb22a0cc5b0f5

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a3b75040e94727f4d7a7246d5e704172f48f5969d1202903ecd5fb22a0cc5b0f5
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.0/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.25.0/interceptors.yaml
REKOR_UUID=24296fb24b8ad77a3b75040e94727f4d7a7246d5e704172f48f5969d1202903ecd5fb22a0cc5b0f5

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.25.0@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Add probes support in Triggers eventlistener (#1633)

Triggers now support probes setting on EventListener object Triggers now have default value for failure-threshold as 3 for both readiness and liveness probes

  • :sparkles: Change Leader Election Config Map for Controllers and Webhook (#1624)
  • :sparkles: Move interceptor structs to their specific interceptor implementations (#1588)

Backwards incompatible changes

In current release:

  • :rotating_light: There are changes to move Interceptors structure to their specific interceptor implementations (#1588) So whoever depends on interceptor structure they have to change their import path This change effects for those who build something using Triggers code Example: Tekton CLI import path change and usage

Fixes

  • :bug: Fix EL Status URL for kubernetesresource.serviceport (#1632)

Misc

  • :hammer: Remove third_party directory (#1579)
  • :hammer: drop manual use of knative.dev/pkg::injection.Dynamic (#1594)
  • :hammer: Fix SA1019 error by staticcheck due to deprecation (#1629)
  • :hammer: Bump tekton/pipelines v0.50.1 LTS in preparation of release (#1625)
  • :hammer: Update Cel-Go to v0.17.1 (#1622)
  • :hammer: Fix integraion Test by upgrading Knative (#1616)
  • :hammer: Update Cel-Go to v0.16.0 (#1613)
  • :hammer: Add v0.23.1 and v0.24.0 (as LTS) to releases.md (#1582)

Docs

  • :book: Added clarification about escaping special character in TB (#1631)
  • :book: Add AWS CodeCommit examples for push request and also README to configure AWS CodeCommit (#1619)
  • :book: Add v0.24.1 to docs (#1608)

Thanks

Thanks to these contributors who contributed to v0.25.0!

  • :heart: @dibyom
  • :heart: @dprotaso
  • :heart: @kcloutie
  • :heart: @khrm
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @dibyom
  • :heart_eyes: @savitaashture

v0.24.1

11 months ago

-Docs @ v0.24.1 -Examples @ v0.24.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a2d710a90da7f62da10b6c562208f9042953f121566a007a0bdcf2280135cae56

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a2d710a90da7f62da10b6c562208f9042953f121566a007a0bdcf2280135cae56
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/interceptors.yaml
REKOR_UUID=24296fb24b8ad77a2d710a90da7f62da10b6c562208f9042953f121566a007a0bdcf2280135cae56

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.24.1@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Fixes

  • :bug: [release-v0.24.x] Add SetType and SetSubject to CE sink response (#1605)
  • :bug: [release-v0.24.x] Fix k8s Events generation (#1604)

Notice

  • In EventListener Response to event from CloudEvent providers, the Source will be changed in CloudEvent response to what we provide to CloudEvent sink (provided in CloudEventURI) during the processing of Triggers.

Thanks

Thanks to these contributors who contributed to v0.24.1!

  • :heart: @khrm

v0.24.0

11 months ago

-Docs @ v0.24.0 -Examples @ v0.24.0

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/release.yaml 
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77ad326130394b66644f55dcff5934aea2584561dbbc454134c61361188b50fd005

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77ad326130394b66644f55dcff5934aea2584561dbbc454134c61361188b50fd005
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/interceptors.yaml
REKOR_UUID=24296fb24b8ad77ad326130394b66644f55dcff5934aea2584561dbbc454134c61361188b50fd005

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.24.0@sha256:" + .digest.sha256')


# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Slack interceptor 1542 (#1548)

Added a Slack Interceptor that allows you to extract fields from a slack slash command payload which are sent in the http form-data section.

  • :sparkles: Add support for Affinity and TopologySpreadConstraints (#1540)

Triggers now support Affinity and TopologySpreadConstraints as part of Kubernetes and Custom resource

Fixes

  • :bug: Add Default Informers setup to Event Listener Sink (#1584)

Kubernetes API requests performed by EventListeners are now cached.

Misc

  • :hammer: Remove PipelineResource support and bump pipeline to 0.46.0 (#1577)

This will remove PipelineResource and it's all occurrence and also bump pipeline to 0.46.0 and add Swagger.json for Triggers with Pipelines v0.46

  • :hammer: Remove comparing serviceaccount in tests (#1576)

Remove comparing serviceaccount in tests

  • :hammer: Move wlynch to emeritus_approvers (#1585)

  • :hammer: Update pull_request_template.md (#1580)

  • :hammer: Upgrade Tekton Pipelines to v0.47.0 (#1590)

  • :hammer: Bump google.golang.org/protobuf from 1.29.0 to 1.29.1 (#1581)

  • :hammer: Fix Error by given linters during tests (#1578)

  • :hammer: Adding Minimum Kubernetes version (#1560)

  • :hammer: Upgrading Go to 1.19 (#1554)

  • :hammer: Create codeql-analysis.yml (#1546)

  • :hammer: Add the instruction for release attestation (#1545)

  • :hammer: Add v0.23.0 to releases.md (#1544)

Docs

Thanks

Thanks to these contributors who contributed to v0.24.0!

  • :heart: @dependabot[bot]
  • :heart: @dibyom
  • :heart: @ilan-pinto
  • :heart: @khrm
  • :heart: @miguelvalerio
  • :heart: @piyush-garg
  • :heart: @pratap0007
  • :heart: @savitaashture
  • :heart: @wlynch

Extra shout-out for awesome release notes:

  • :heart_eyes: @dibyom
  • :heart_eyes: @ilan-pinto
  • :heart_eyes: @miguelvalerio
  • :heart_eyes: @piyush-garg
  • :heart_eyes: @pratap0007
  • :heart_eyes: @savitaashture
  • :heart_eyes: @wlynch