Triggers Versions Save

Event triggering with Tekton!

v0.24.1

11 months ago

-Docs @ v0.24.1 -Examples @ v0.24.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a2d710a90da7f62da10b6c562208f9042953f121566a007a0bdcf2280135cae56

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a2d710a90da7f62da10b6c562208f9042953f121566a007a0bdcf2280135cae56
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.1/interceptors.yaml
REKOR_UUID=24296fb24b8ad77a2d710a90da7f62da10b6c562208f9042953f121566a007a0bdcf2280135cae56

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.24.1@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Fixes

  • :bug: [release-v0.24.x] Add SetType and SetSubject to CE sink response (#1605)
  • :bug: [release-v0.24.x] Fix k8s Events generation (#1604)

Notice

  • In EventListener Response to event from CloudEvent providers, the Source will be changed in CloudEvent response to what we provide to CloudEvent sink (provided in CloudEventURI) during the processing of Triggers.

Thanks

Thanks to these contributors who contributed to v0.24.1!

  • :heart: @khrm

v0.24.0

1 year ago

-Docs @ v0.24.0 -Examples @ v0.24.0

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/release.yaml 
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77ad326130394b66644f55dcff5934aea2584561dbbc454134c61361188b50fd005

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77ad326130394b66644f55dcff5934aea2584561dbbc454134c61361188b50fd005
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.24.0/interceptors.yaml
REKOR_UUID=24296fb24b8ad77ad326130394b66644f55dcff5934aea2584561dbbc454134c61361188b50fd005

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.24.0@sha256:" + .digest.sha256')


# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Slack interceptor 1542 (#1548)

Added a Slack Interceptor that allows you to extract fields from a slack slash command payload which are sent in the http form-data section.

  • :sparkles: Add support for Affinity and TopologySpreadConstraints (#1540)

Triggers now support Affinity and TopologySpreadConstraints as part of Kubernetes and Custom resource

Fixes

  • :bug: Add Default Informers setup to Event Listener Sink (#1584)

Kubernetes API requests performed by EventListeners are now cached.

Misc

  • :hammer: Remove PipelineResource support and bump pipeline to 0.46.0 (#1577)

This will remove PipelineResource and it's all occurrence and also bump pipeline to 0.46.0 and add Swagger.json for Triggers with Pipelines v0.46

  • :hammer: Remove comparing serviceaccount in tests (#1576)

Remove comparing serviceaccount in tests

  • :hammer: Move wlynch to emeritus_approvers (#1585)

  • :hammer: Update pull_request_template.md (#1580)

  • :hammer: Upgrade Tekton Pipelines to v0.47.0 (#1590)

  • :hammer: Bump google.golang.org/protobuf from 1.29.0 to 1.29.1 (#1581)

  • :hammer: Fix Error by given linters during tests (#1578)

  • :hammer: Adding Minimum Kubernetes version (#1560)

  • :hammer: Upgrading Go to 1.19 (#1554)

  • :hammer: Create codeql-analysis.yml (#1546)

  • :hammer: Add the instruction for release attestation (#1545)

  • :hammer: Add v0.23.0 to releases.md (#1544)

Docs

Thanks

Thanks to these contributors who contributed to v0.24.0!

  • :heart: @dependabot[bot]
  • :heart: @dibyom
  • :heart: @ilan-pinto
  • :heart: @khrm
  • :heart: @miguelvalerio
  • :heart: @piyush-garg
  • :heart: @pratap0007
  • :heart: @savitaashture
  • :heart: @wlynch

Extra shout-out for awesome release notes:

  • :heart_eyes: @dibyom
  • :heart_eyes: @ilan-pinto
  • :heart_eyes: @miguelvalerio
  • :heart_eyes: @piyush-garg
  • :heart_eyes: @pratap0007
  • :heart_eyes: @savitaashture
  • :heart_eyes: @wlynch

v0.23.1

1 year ago

-Docs @ v0.23.1 -Examples @ v0.23.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.1/interceptors.yaml

Changes

Features

Fixes

Misc

  • :hammer: [release-v0.23.x] Fix marshalJSON for lists of objects (#1557)

ix a bug in CEL interceptor's marshalJSON binding to allow marshaling of maps.

  • :hammer: [release-v0.23.x] Upgrade to latest knative.dev/pkg 1.9 (#1558)

Docs

  • :book: [Release-v0.23.x] Fix Weight and Title in Docs (#1550)
  • :book: Fix Weight and Title in Docs (#1549)

Thanks

Thanks to these contributors who contributed to v0.23.1!

  • :heart: @khrm
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @savitaashture

v0.23.0

1 year ago

-Docs @ v0.23.0 -Examples @ v0.23.0

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a11b8a3dc45583f50a2166834931fa90e92b29af49e99c54e95972c81c27a5e56

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a11b8a3dc45583f50a2166834931fa90e92b29af49e99c54e95972c81c27a5e56
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.0/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.23.0/interceptors.yaml
REKOR_UUID=24296fb24b8ad77a11b8a3dc45583f50a2166834931fa90e92b29af49e99c54e95972c81c27a5e56

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.23.0@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Github Interceptor to support Owners File Validation (#1516)

Github interceptor blocks a pull request trigger from being executed unless invoked by an owner or with a configurable comment by an owner, for example /ok_to_test. This feature can be enabled/disabled by feature flagging it true/false

  • :sparkles: Add support for v1 pipeline types and customruns (#1514)

Triggers now allows creating v1 PipelineRuns, TaskRuns, Tasks, and Pipelines as well as v1beta1 CustomRuns

  • :sparkles: add changed files to the github interceptor (#1507)

The GitHub Interceptor now has the ability to add a comma delimited list of all files that have changed (added, modified or deleted) for the push and pull_request events. The list of changed files are added to the changed_files property of the event payload in the top-level extensions field

Fixes

  • :bug: Change TLS MinVersion to in order to make Triggers run on OCP where FIPS enabled (#1518)

Changed TLS MinVersion to tls.VersionTLS12 in order to make Triggers run on OCP(Where FIPS enabled) as OCP uses MInTLS as 1.2 for all components

  • :bug: Add SecurityContext to Eventlistener containers (#1494)

Eventlistener containers now contain the right security context to allow running with restricted pod security admission

  • :bug: Skip webhook validation on delete for v1beta1 (#1470)

Resource validation is skipped on deletion

  • :bug: Remove the GO111MODULE=off in release pipeline (#1536)
  • :bug: Fix the error message during InterceptorExecution (#1523)

Misc

  • :hammer: Add v0.22.2 to releases.md (#1532)

  • :hammer: chore: use http constants to replace numbers (#1531)

  • :hammer: Add v0.22.x to releases.md (#1511)

  • :hammer: test: use T.Setenv to set env vars in tests (#1491)

  • :hammer: Update ko image to latest with Go 1.19 (#1541)

  • :hammer: Fix go1.19 related codegen issues (#1534)

  • :hammer: Remove git files from KODATA (#1533)

  • :hammer: Update Pipelines to v0.44 and cel-go to v0.13.0 (#1525)

Docs

Thanks

Thanks to these contributors who contributed to v0.23.0!

  • :heart: @Juneezee
  • :heart: @dependabot[bot]
  • :heart: @dibyom
  • :heart: @kcloutie
  • :heart: @khrm
  • :heart: @lbernick
  • :heart: @my-git9
  • :heart: @nagasree9
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @dependabot[bot]
  • :heart_eyes: @dibyom
  • :heart_eyes: @kcloutie
  • :heart_eyes: @lbernick
  • :heart_eyes: @my-git9
  • :heart_eyes: @nagasree9
  • :heart_eyes: @savitaashture

v0.22.2

1 year ago

-Docs @ v0.22.2 -Examples @ v0.22.2

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.2/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.2/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a0f930f513e632de87b322aa71f55d0223274ba1270553b8aec75be52a95e2540

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a0f930f513e632de87b322aa71f55d0223274ba1270553b8aec75be52a95e2540
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.2/release.yaml
REKOR_UUID=24296fb24b8ad77a0f930f513e632de87b322aa71f55d0223274ba1270553b8aec75be52a95e2540

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.22.2@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Fixes

  • :bug: Change TLS MinVersion to tls.VersionTLS12 in order to make Triggers run on OCP where FIPS enabled (#1521)

Changed TLS MinVersion to tls.VersionTLS12 in order to make Triggers run on Openshift cluster(Where FIPS enabled) as Openshift uses MInTLS as 1.2 for all components

  • :bug: Replace cloudevents resource with task from hub (#1530)

Cloud events pipeline resource was removed from pipelines recently. Triggers E2E tests run against the main branch of pipelines and that the getting-started tutorial still uses this resource, so Triggers e2e tests have been failing.

Misc

  • :hammer: Bump golang.org/x/net from 0.1.0 to 0.7.0 (#1529)

Fixes https://github.com/advisories/GHSA-69cg-p879-7622

Thanks

Thanks to these contributors who contributed to v0.22.2!

  • :heart: @khrm
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @khrm
  • :heart_eyes: @savitaashture

v0.22.1

1 year ago

-Docs @ v0.22.1 -Examples @ v0.22.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.1/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a9a5778385ae597be33104fbf5b171adcf449e023a3add7cddad9a3ce4b2ec9c6

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a9a5778385ae597be33104fbf5b171adcf449e023a3add7cddad9a3ce4b2ec9c6
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.1/release.yaml
REKOR_UUID=24296fb24b8ad77a9a5778385ae597be33104fbf5b171adcf449e023a3add7cddad9a3ce4b2ec9c6

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.22.1@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

Fixes

  • [release-v0.22.x] Fix the lint error given by CI (#1510)

  • [release-v0.22.x] Restore v1alpha1.Runs as valid resources (#1509) Restore support for Runs in TriggerTemplates

  • [release-v0.22.x] Set default Interceptor.Kind for EventListener TriggerGroups (#1508) Sets a default interceptor kind for interceptors in event listener trigger groups.

Thanks

Thanks to these contributors who contributed to v0.22.1!

  • :heart: @abayer
  • :heart: @afrittoli
  • :heart: @khrm
  • :heart: @tekton-robot

Extra shout-out for awesome release notes:

  • :heart: @abayer
  • :heart: @afrittoli
  • :heart: @khrm
  • :heart: @tekton-robot

v0.22.0

1 year ago

-Docs @ v0.22.0 -Examples @ v0.22.0

Installation one-liner

Triggers now requires Kuberentes v.123 or higher

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 24296fb24b8ad77a825172e0ac852ced908622c18666b3dbba54ae7e1934a9424b651bdd6041f9af

Obtain the attestation:

REKOR_UUID=24296fb24b8ad77a825172e0ac852ced908622c18666b3dbba54ae7e1934a9424b651bdd6041f9af
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.22.0/release.yaml
REKOR_UUID=24296fb24b8ad77a825172e0ac852ced908622c18666b3dbba54ae7e1934a9424b651bdd6041f9af

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.22.0@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Make the webhook port number configurable (#1472)

The port on which the webhook server listens may be configured via the WEBHOOK_PORT environment variable.

  • :sparkles: Respond appropriately to CloudEvent requests (#1469)

CloudEvents sent to a Trigger will now receive a valid CloudEvent response.

  • :sparkles: Add Namespaced Scope Interceptor (#1462)

Interceptor CRD has been added which can be used to define a namespace scoped Interceptor. Use Namespaced Interceptor in kind section of Interceptors Ref in Triggers or EventListener spec.

  • :sparkles: Allow trigger eventID to be used as input to TriggerBinding (#1449)

Add eventID as input to TriggerBinding

  • :sparkles: Move CloudEvent to Stable (#1414)

cloudEventURI field can be used in stable APIs now.

Fixes

  • :bug: Fixes for running on k8s 1.23 and restricted PodSecurityAdmission level (#1477)

action required: If using Kubernetes 1.22, set PodSecurity flag to true to enforce a restricted pod security level in Tekton namespaces. See https://kubernetes.io/docs/reference/command-line-tools-reference/feature-gates/#feature-gates-for-graduated-or-deprecated-features for more information.

E2E tests now use cos_containerd image instead of the unsupported cos image

Misc

  • :hammer: Update CEL version to 0.12.5 and modified functions (#1483)

  • :hammer: Modify e2e test scripts to support running on kind (#1476)

  • :hammer: Refactor interceptor main package (#1467)

  • :hammer: Add OpenSSF Best Practices Badge (#1458)

  • :hammer: Remove redundant code for chan in TLS ticker (#1460)

  • :hammer: Fix the Typo in Trigger Types API docs (#1456)

  • :hammer: Remove unused issue template (#1455)

  • :hammer: Bump tektoncd/pipeline to v0.41.0 (#1482)

Docs

  • :book: Add releases.md (#1461)
  • :book: Updating example pipeline to use workspaces and git-clone task (#1453)
  • :book: Add v0.21.0 docs link (#1445)

Thanks

Thanks to these contributors who contributed to v0.22.0!

  • :heart: @AlanGreene
  • :heart: @afrittoli
  • :heart: @bigkevmcd
  • :heart: @dibyom
  • :heart: @jmcshane
  • :heart: @khrm
  • :heart: @piyush-garg
  • :heart: @savitaashture
  • :heart: @sel

Extra shout-out for awesome release notes:

  • :heart_eyes: @bigkevmcd
  • :heart_eyes: @dibyom
  • :heart_eyes: @jmcshane
  • :heart_eyes: @khrm
  • :heart_eyes: @piyush-garg
  • :heart_eyes: @savitaashture
  • :heart_eyes: @sel

v0.21.0

1 year ago

-Docs @ v0.21.0 -Examples @ v0.21.0

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.21.0/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.21.0/interceptors.yaml

Attestation

The Rekor UUID for this release is 362f8ecba72f432613304d144d86d7ab8b4bf16899268cac0fdb0ec939822bdba5d36e69d467ec46

Obtain the attestation:

REKOR_UUID=362f8ecba72f432613304d144d86d7ab8b4bf16899268cac0fdb0ec939822bdba5d36e69d467ec46
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.21.0/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.21.0/interceptors.yaml
REKOR_UUID=362f8ecba72f432613304d144d86d7ab8b4bf16899268cac0fdb0ec939822bdba5d36e69d467ec46

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.21.0@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

  • :sparkles: Add validation and rotation of certificate for clusterinterceptor (#1385)

Triggers Interceptor now does validation and rotation of certificates if expires

Deprecation Notices

  • :rotating_light: Deprecate Trigger as well as Namespace-Selector in EventListener Spec (#1420)

Deprecation Warning: Having both Triggers as well as Namespace-Selector in EventListener Spec is deprecated.

Fixes

  • :bug: Fix RBAC for getting started (#1367)
  • :bug: Remove Validation on Delete (#1407)

Remove Validation on Deleting Objects

  • :bug: Fix Knative e2e-tests flakiness & update to v1.6.0 (#1412)
  • :bug: Fix cannot create ingress for getting-started guide (#1418)
  • :bug: Update log keys to match logstream (#1424)

action required Log lines formatted as JSON have the severity in "severity" (was "level"), timestamp in "timestamp" (was "ts"), and message in "message" (was "msg").

  • :bug: Fix the sink timeout warning (#1433)
  • :bug: Pass CommitID to knative logging (#1435)

Misc

  • :hammer: Update webhook-run.yaml (#1386)
  • :hammer: refactor interceptors logger and secret getter (#1409)
  • :hammer: Add v0.20.2 docs link (#1410)
  • :hammer: Fix Knative e2e-tests flakiness & update to v1.6.0 (#1412)
  • :hammer: Update Cronjob API in Example to v1 (#1415)
  • :hammer: Bump golangci-lint to v1.47.2 to support Go 1.18 (#1416)
  • :hammer: Prefer SHA256 in Github interceptor (#1417)

Prefer SHA256 for validation of Github payloads

  • :hammer: Add AzureRepo push and pull request examples (#1419)

Added sample examples for AzureRepo

  • :hammer: Remove duplicate word (#1422)

  • :hammer: Disable stack traces in error logs (#1423)

EventListener error logs will no longer contain a stacktrace as part of the structured log by default.

  • :hammer: Add examples for Bitbucket Cloud and Update doc (#1428)

Add example support for Bitbucket Cloud

  • :hammer: Add temporary GOPATH script for codegen (#1440)
  • :hammer: Update ko to v0.12.0 (#1443)
  • :hammer: Bump Pipeline version to v0.39.0 (#1444)

Security

  • :closed_lock_with_key: Add Nil Check for context in the core interceptors (#1432)

Docs

  • :book: Fix the link for Triggers Website config (#1366)

  • :book: Add v0.20.1 docs link (#1384)

  • :book: Update cel_expressions.md (#1395)

  • :book: Setting Debug level for EventListener (#1401)

  • :book: Update RBAC link to point to k8s docs (#1411)

  • :book: Update Install instructions for binding-eval tool (#1413)

  • :book: Fix tkn command in troubleshooting (#1425)

  • :book: Document that examples expect default namespace (#1426)

  • :book: Update installation document (#1436)

  • :book: Add that CloudEvents require Alpha flag (#1442)

Thanks

Thanks to these contributors who contributed to v0.21.0!

  • :heart: @abayer
  • :heart: @clcchai
  • :heart: @dibyom
  • :heart: @geriom
  • :heart: @jasperjonker
  • :heart: @khrm
  • :heart: @lbernick
  • :heart: @marniks7
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @clcchai
  • :heart_eyes: @dibyom
  • :heart_eyes: @khrm
  • :heart_eyes: @lbernick
  • :heart_eyes: @savitaashture

v0.20.2

1 year ago

-Docs @ v0.20.2 -Examples @ v0.20.2

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.2/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.2/interceptors.yaml

Attestation

The Rekor UUID for this release is 362f8ecba72f4326cc085f5232c91de9c2a90c2045e93d844c967b0cea3a0ca99621d91fed618038

Obtain the attestation:

REKOR_UUID=362f8ecba72f4326cc085f5232c91de9c2a90c2045e93d844c967b0cea3a0ca99621d91fed618038
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.2/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.2/interceptors.yaml
REKOR_UUID=362f8ecba72f4326cc085f5232c91de9c2a90c2045e93d844c967b0cea3a0ca99621d91fed618038

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.20.2@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

Fixes

  • :bug: Add watching mechanism to watch on caBundle for core interceptor (#1398) Added watching mechanism to watch on caBundle for core interceptor

  • :bug: Fix http based custom interceptor connection issue (#1394)

Misc

  • Upgrade the TriggerTemplate in Examples to Beta API (#1404)

Docs

Thanks

Thanks to these contributors who contributed to v0.20.2!

  • :heart: @khrm
  • :heart: @savitaashture

Extra shout-out for awesome release notes:

  • :heart_eyes: @savitaashture

v0.20.1

1 year ago

-Docs @ v0.20.1 -Examples @ v0.20.1

Installation one-liner

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.1/interceptors.yaml

Upgrade Notices

To upgrade from v0.19.1, run:

kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.1/release.yaml
kubectl apply -f https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.1/interceptors.yaml

Attestation

The Rekor UUID for this release is 362f8ecba72f4326ee3bb3524462a97866d5433e686cde8f81b7eab724a47596f69c8d5d4f4fde47

Obtain the attestation:

REKOR_UUID=362f8ecba72f4326ee3bb3524462a97866d5433e686cde8f81b7eab724a47596f69c8d5d4f4fde47
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.1/release.yaml
INTERCEPTORS_FILE=https://storage.googleapis.com/tekton-releases/triggers/previous/v0.20.1/interceptors.yaml
REKOR_UUID=362f8ecba72f4326ee3bb3524462a97866d5433e686cde8f81b7eab724a47596f69c8d5d4f4fde47

# Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v0.20.1@sha256:" + .digest.sha256')

# Download the release file
curl "$RELEASE_FILE" > release.yaml
curl "$INTERCEPTORS_FILE" >> release.yaml

# For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
  printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

Features

Fixes

  • :bug: Match service port to interceptor port (#1383)
  • :bug: Remove Condition from getting started pipeline (#1382)
  • :bug: Add watching mechanism to eventlistener to wait for clusterInterceptor caBundle (#1378) Eventlistener pod will not come to running state untill interceptors filled with caBundle in spec.

Misc

  • :hammer: Add v0.20.0 docs link (#1365)

Docs

Thanks

Thanks to these contributors who contributed to v0.20.1!

  • :heart: @khrm
  • :heart: @savitaashture
  • :heart: freefood89

Extra shout-out for awesome release notes:

  • :heart_eyes: @savitaashture