Releases: bufferapp/kubesecret
v0.5.0 - Improved get command - Now on npm
Changes
- Adds the ability to pass the secret name directly to the
get
command, (e.g.kubesecret get my-secret-name
) and skip the interactive select secret step (#16) - kubesecret is now published to
npm
! (#14) - Fixed #5: Use the users'
kubectl
current context namespace if the namespace is not explicitly passed via the-n
flag
Installation
You can now install kubesecret via npm (min Node.js version: 10.0.0):
$ npm install -g @bufferapp/kubesecret
$ kubesecret -V
0.5.0
Alternatively, you can download via OS binary:
Download the binary relevant to your OS and place it somewhere on your $PATH
. If you get a permission error when trying to run it, run chmod +x /path/to/the/binary
to make the file executable.
Linux:
wget https://github.com/bufferapp/kubesecret/releases/download/v0.5.0/kubesecret-linux -O /usr/local/bin/kubesecret && chmod +x /usr/local/bin/kubesecret
MacOS:
wget https://github.com/bufferapp/kubesecret/releases/download/v0.5.0/kubesecret-macos -O /usr/local/bin/kubesecret && chmod +x /usr/local/bin/kubesecret
v0.4.0 - Kubesecret is released!
Notes
This release marks the addition of the major features needed to be in an MVP of kubesecret. So far kubesecret has been working well to manage existing secrets, but without the ability to actually create a secret, it's been a little lacking in that final step to allow developers to do things independently.
Now you can create secrets using kubesecret create
. The CLI will guide you through the rest of the process
Installation
Download the binary relevant to your OS and place it somewhere on your $PATH
. If you get a permission error when trying to run it, run chmod +x /path/to/the/binary
to make the file executable.
Short command for linux:
wget https://github.com/bufferapp/kubesecret/releases/download/v0.4.0/kubesecret-linux -O /usr/local/bin/kubesecret && chmod +x /usr/local/bin/kubesecret
For mac
wget https://github.com/bufferapp/kubesecret/releases/download/v0.4.0/kubesecret-macos -O /usr/local/bin/kubesecret && chmod +x /usr/local/bin/kubesecret
Sha sums for integrity checks
38a4cdf54b003eb2cc9e9e368d08a0011ec9e233f512c71e5cc04039c9266ee0 ./kubesecret-linux
1cb47a07f30b2da2083d044172e8c8ab37c3b85448a1e2f05279eba38a28d3ca ./kubesecret-macos
Version 0.4.0-rc1
The first release towards an interactive tool!
- Download the binary for your OS
- Rename it to
kubesecret
- Put it into your
$PATH
and run it using./kubesecret get -n <namespace>
to begin the interactive process
(If you get a permission error, use chmod +x /path/to/kubesecret
v0.3 - Improved UX of the tool
Merge pull request #1 from bufferapp/task/improve-ux-of-command-for-r…
v0.2 - Now apply your secrets
This release allows you to apply your secrets while checking for conflicts in the cluster
kubesecret apply <secretfile.yaml>
will read the contents of secretfile.yaml
and check the cluster for a secret matching the secret in the file:
- If it can't find one, it confirms if you want to create one fresh
- If it does find one it:
- checks if there are any keys that are on the server that don't exist in the local file and warns about them
- checks for differences between the keys in the server and the local file and notes all of them
- asks for confirmation on the above before applying the changes.
Hashes:
e1314264859b7c927e5dfed17d0703a36cd9936f468cc1a201ecbfb7572773e6 kubesecret_darwin_amd64
6f6ef8c7e0827422f65d13332130f56b410a4d7833797f72adfe17b44d716724 kubesecret_linux_amd64
V 0.1 - The first
This release introduces the ability to query a secret from kubernetes using kubesecret.