Skip to content

Commit 125ec0d

Browse files
committed
bump version to v0.11.0, update docs, and changelog
Signed-off-by: Chanwit Kaewkasi <[email protected]>
1 parent 2664b41 commit 125ec0d

File tree

6 files changed

+74
-13
lines changed

6 files changed

+74
-13
lines changed

CHANGELOG.md

+18-4
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,20 @@
22

33
All notable changes of this project are documented in this file.
44

5+
# v0.11.0
6+
7+
**Release date:** 2022-08-12
8+
9+
This release is another milestone of the project as it is the first release of TF-controller
10+
that supports Flux's OCIRepository.
11+
12+
New Features and Bug Fixing:
13+
* Added support for Flux's OCIRepository (@chanwit)
14+
* Fixed EnvVars to pick up `valueFrom` to work with Secrets and ConfigMaps (@Nalum)
15+
* Fixed tfctl to show plan in the working directory (@github-vincent-miszczak)
16+
* Updated tfexec to v0.16.1 for the force-lock option (@chanwit)
17+
* Updated the Source controller to v0.26.1 (@chanwit)
18+
519
# v0.10.1
620

721
**Release date:** 2022-08-05
@@ -42,7 +56,7 @@ This pre-release contains the following changes.
4256
New Features:
4357
* Update Terraform binary to 1.1.9 (@chanwit)
4458
* Allow runner pod metadata customization (@tomhuang12)
45-
* Support runner pod environment variables specification (@nalum)
59+
* Support runner pod environment variables specification (@Nalum)
4660
* Implement `.spec.refreshBeforeApply` to refresh the state before apply (@chanwit)
4761
* Use controller runtime logging library in runner (@chanwit)
4862

@@ -58,11 +72,11 @@ Bug Fixing:
5872
This pre-release contains the following changes.
5973

6074
New Features and Bug Fixing:
61-
* Fix Helm chart to support image pull secrets for `tf-runner` Service Accounts (@nalum)
75+
* Fix Helm chart to support image pull secrets for `tf-runner` Service Accounts (@Nalum)
6276
* Upgrade Source Controller API to v0.22.4 (@tomhuang12)
6377
* Fix json bytes encoding (@phoban01)
64-
* Add Helm chart an option to specify AWS Security Group policy (@nalum)
65-
* Move plan revision from labels to annotations (@nalum)
78+
* Add Helm chart an option to specify AWS Security Group policy (@Nalum)
79+
* Move plan revision from labels to annotations (@Nalum)
6680
* Update images to include fix for CVE-2022-28391 (@chanwit)
6781
* Update Terraform binary to 1.1.8 (@chanwit)
6882

charts/tf-controller/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,5 @@ apiVersion: v2
22
name: tf-controller
33
description: The Helm chart for Weave GitOps Terraform Controller
44
type: application
5-
version: 0.4.2
6-
appVersion: "v0.11.0-rc.3"
5+
version: 0.4.3
6+
appVersion: "v0.11.0"

charts/tf-controller/values.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ image:
1010
repository: ghcr.io/weaveworks/tf-controller
1111
pullPolicy: IfNotPresent
1212
# Overrides the image tag whose default is the chart appVersion.
13-
tag: "v0.11.0-rc.3"
13+
tag: "v0.11.0"
1414
# extraEnv -- Additional container environment variables.
1515
extraEnv: {}
1616
imagePullSecrets: []
@@ -27,7 +27,7 @@ serviceAccount:
2727
runner:
2828
image:
2929
repository: ghcr.io/weaveworks/tf-runner
30-
tag: "v0.11.0-rc.3"
30+
tag: "v0.11.0"
3131
serviceAccount:
3232
# Specifies whether a service account should be created
3333
create: true

config/manager/kustomization.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ generatorOptions:
88
images:
99
- name: weaveworks/tf-controller
1010
newName: ghcr.io/weaveworks/tf-controller
11-
newTag: v0.11.0-rc.3
11+
newTag: v0.11.0

docs/release.yaml

+3-3
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ spec:
2020
sourceRef:
2121
kind: HelmRepository
2222
name: tf-controller
23-
version: '>=0.3.0'
23+
version: '>=0.4.3'
2424
interval: 1h0s
2525
releaseName: tf-controller
2626
targetNamespace: flux-system
@@ -41,7 +41,7 @@ spec:
4141
caCertValidityDuration: 24h
4242
certRotationCheckFrequency: 30m
4343
image:
44-
tag: v0.10.1
44+
tag: v0.11.0
4545
runner:
4646
image:
47-
tag: v0.10.1
47+
tag: v0.11.0

docs/use_cases.md

+48-1
Original file line numberDiff line numberDiff line change
@@ -451,4 +451,51 @@ spec:
451451
image: registry.io/tf-runner:xyz
452452
```
453453

454-
You can use [`runner.Dockerfile`](https://github.com/weaveworks/tf-controller/blob/main/runner.Dockerfile) as a basis of customizing runner pod image.
454+
You can use [`runner.Dockerfile`](https://github.com/weaveworks/tf-controller/blob/main/runner.Dockerfile) as a basis of customizing runner pod image.
455+
456+
## Using OCI Artifact as Source
457+
458+
To use OCI artifacts as the source of TF-controller, you need Flux2 version v0.32.0 or higher.
459+
460+
Assuming that you have Terraform files (your root module may contain sub-modules) under ./modules,
461+
you can use Flux CLI to create an OCI artifact for your Terraform modules
462+
by running the following commands:
463+
464+
```bash
465+
flux push artifact oci://ghcr.io/tf-controller/helloworld:$(git rev-parse --short HEAD) \
466+
--path="./modules" \
467+
--source="$(git config --get remote.origin.url)" \
468+
--revision="$(git branch --show-current)/$(git rev-parse HEAD)"
469+
470+
flux tag artifact oci://ghcr.io/tf-controller/helloworld:$(git rev-parse --short HEAD) \
471+
--tag main
472+
```
473+
474+
Then you define a source (`OCIRepository`), and use it as the `sourceRef` of your Terraform object.
475+
476+
```yaml
477+
---
478+
apiVersion: source.toolkit.fluxcd.io/v1beta2
479+
kind: OCIRepository
480+
metadata:
481+
name: helloworld-oci
482+
spec:
483+
interval: 1m
484+
url: oci://ghcr.io/tf-controller/helloworld
485+
ref:
486+
tag: main
487+
---
488+
apiVersion: infra.contrib.fluxcd.io/v1alpha1
489+
kind: Terraform
490+
metadata:
491+
name: helloworld-tf-oci
492+
spec:
493+
path: ./
494+
approvePlan: "auto"
495+
interval: 1m
496+
sourceRef:
497+
kind: OCIRepository
498+
name: helloworld-oci
499+
writeOutputsToSecret:
500+
name: helloworld-outputs
501+
```

0 commit comments

Comments
 (0)