Skip to content

Releases: cloudogu/ces-build-lib

2.0.1

11 Dec 07:12
033ca05
Compare
Choose a tag to compare

Fixed

  • Add missing values.yaml as argument to helm install of k8s-ces-setup
  • Add missing nginx-static to default setup.json

2.0.0

08 Dec 09:08
fd99d32
Compare
Choose a tag to compare

Warning

This release contains some major bugs. These are patched in 2.0.1.

Caution

Breaking changes ahead!

Changed

  • Use Helm to install and configure k8s-ces-setup in k3d; #117

1.68.0

30 Nov 08:28
1.68.0
8cd6e7e
Compare
Choose a tag to compare

Added

  • Add Helm installation with k3d.installHelm(); #115

1.67.0

04 Sep 14:33
fc649b9
Compare
Choose a tag to compare

Changed

  • Switch to hadolint Dockerfile linter; #111

Added

  • Add Dockerfile class with new linting functions; #111
    • lint() lints with default hadolint config parameters. Only fails on errors
    • lintWithConfig() lets you specify the hadolint configuration

Deprecated

  • lintDockerfile() function should be replaced by the Dockerfile lint() function

1.66.1

04 Sep 08:00
1.66.1
2ecaf0f
Compare
Choose a tag to compare

Fixed

  • Split helm-repo-config in separate values #113

1.66.0

21 Aug 09:06
1.66.0
819ecb8
Compare
Choose a tag to compare

Added

  • Add helm-repo-config to k3d-cluster #109

1.65.1: Merge pull request #108 from cloudogu/bugfix/trivy_scanning

17 Aug 09:48
d5c153d
Compare
Choose a tag to compare

Changed

findVulnerabilitiesWithTrivy schema bug fix
The trivy output scheme is now interpreted correctly
Added additionalFlags as parameter e.g. '--ingore-unfixed' can be used now

1.65.0

06 Jun 15:59
1.65.0
bf50262
Compare
Choose a tag to compare

Changed

  • findVulnerabilitiesWithTrivy #107
    • Switch from using allowlist param to built-in .trivyignore file. Advantage: More declarative.
      Fewer things in Jenkinsfile. Local trivy scans pick up allowlist as well.
    • Updated Trivy default to 0.41.0 from 0.15.0.
      • Trivy 0.20.0 introduced a JSON schema (see here)
      • findVulnerabilitiesWithTrivy code can now only parse the new one
      • findVulnerabilitiesWithTrivy returns the new schema
    • These are somewhat breaking changes, which will likely not affect anyone. So we dared to make them. Make sure to
      • not use allowlist, if so migrate to .trivyignore
      • not pin the trivyVersion, or update to trivy >= 0.20.0
      • if you parsed the result of findVulnerabilitiesWithTrivy make sure to migrate to new schema,
        e.g. VulnerabilityID moved to .Results[].Vulnerabilities[].VulnerabilityID

1.64.2

24 Apr 09:29
1.64.2
73c504d
Compare
Choose a tag to compare

Fixed

  • [#104] A missing @NonCPS annotation caused an error when calling the K3d constructor.

1.64.1

17 Apr 09:41
c428ecc
Compare
Choose a tag to compare

Fixed

  • HttpClient escapes now the credentials in curl command to support credentials with characters like $.