mirror of
https://github.com/we-promise/sure
synced 2026-04-25 17:15:07 +02:00
- Helm chart default pipelock.image.tag bumped from 2.0.0 to 2.2.0 (three minor releases behind latest) - README: pipelock CI scan status badge added to the existing badge row - charts/sure/README.md, docs/hosting/pipelock.md, pipelock.example.yaml: refreshed feature notes to reference the upstream changelog rather than pinning to a single version - compose.example.ai.yml: pin example comment bumped to :2.2.0 - Workflow pin (@v2) unchanged — floating major tag picks up 2.2.x
6.2 KiB
6.2 KiB
Changelog
All notable changes to the Sure Helm chart will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
[Unreleased]
Changed
- Bumped
pipelock.image.tagfrom2.0.0to2.2.0(three minor releases behind latest). Floating@v2CI action pin picks up patch/minor updates automatically. - Refreshed pipelock feature notes in the chart README,
docs/hosting/pipelock.md, andpipelock.example.yamlto reference the upstream changelog instead of a single version.
Added
- README: CI scan status badge for the pipelock workflow.
[0.6.9-alpha] - 2026-03-24
Changed
- Bumped
pipelock.image.tagfrom1.5.0to2.0.0 - CI: Pipelock GitHub Action updated from
@v1to@v2 - Compose example image changed from pinned
1.5.0tolatestwith pin comment - Bumped
pipelock.image.tagfrom0.3.1to0.3.2 - Consolidated
compose.example.pipelock.ymlintocompose.example.ai.yml— Pipelock now runs alongside Ollama in one compose file with health checks, config volume mount, and MCP env vars (MCP_API_TOKEN,MCP_USER_EMAIL) - CI: Pipelock scan
fail-on-findingschanged fromfalsetotrue; addedexclude-pathsfor locale help text false positives
Added
- Pipelock v2.0 features:
pipelock.trustedDomains: first-class support for allowing internal services whose public DNS resolves to private IPs (prevents SSRF false positives)pipelock.mcpToolPolicy.redirectProfiles: route matched MCP tool calls to audited handler programs instead of blocking- Updated
pipelock.example.yamlwith v2.0 feature documentation (trusted domains, redirect profiles, attack simulation, security scoring) - Updated
extraConfigcomment to mention new v2.0 sections (sandbox, reverse_proxy)
- Pipelock v2.0 highlights available via
extraConfig: process sandbox (Linux/macOS), generic HTTP reverse proxy, adaptive enforcement exempt domains, kill switch API port isolation - Bumped
pipelock.image.tagfrom0.3.2to1.5.0 - Pipelock security proxy (
pipelock.enabled=true): Separate Deployment + Service that provides two scanning layers- Forward proxy (port 8888): Scans outbound HTTPS from Faraday-based clients (e.g. ruby-openai). Auto-injects
HTTPS_PROXY/HTTP_PROXY/NO_PROXYenv vars into app pods - MCP reverse proxy (port 8889): Scans inbound MCP traffic for DLP, prompt injection, and tool poisoning. Auto-computes upstream URL via
sure.pipelockUpstreamhelper - WebSocket proxy configuration support (disabled by default)
- ConfigMap with scanning config (DLP, prompt injection detection, MCP input/tool scanning, response scanning)
- ConfigMap checksum annotation for automatic pod restart on config changes
- Helm helpers:
sure.pipelockImage,sure.pipelockUpstream - Health and readiness probes on the Pipelock deployment
imagePullSecretswith fallback to app-level secrets- Boolean safety: uses
hasKeyto prevent Helm'sdefaultfrom swallowing explicitfalse - Configurable ports via
forwardProxy.portandmcpProxy.port(single source of truth across Service, Deployment, and env vars)
- Forward proxy (port 8888): Scans outbound HTTPS from Faraday-based clients (e.g. ruby-openai). Auto-injects
pipelock.example.yamlreference config for Docker Compose deployments- Pipelock operational hardening:
pipelock.serviceMonitor: Prometheus Operator ServiceMonitor for /metrics on the proxy portpipelock.ingress: Ingress template for MCP reverse proxy (external AI assistant access in k8s)pipelock.pdb: PodDisruptionBudget with minAvailable/maxUnavailable mutual exclusion guardpipelock.topologySpreadConstraints: Pod spread across nodespipelock.logging: Structured logging config (format, output, include_allowed, include_blocked)pipelock.extraConfig: Escape hatch for additional pipelock.yaml config sectionspipelock.requireForExternalAssistant: Helm guard that fails when externalAssistant is enabled without pipelock- Component label (
app.kubernetes.io/component: pipelock) on Service metadata for selector targeting - NOTES.txt: Pipelock health check commands, MCP access info, security notes, metrics status
Fixed
- Renamed
_asserts.tpltoasserts.tpl— Helm's_prefix convention prevented guards from executing
[0.6.7-alpha] - 2026-01-10
Added
- Redis Sentinel support for Sidekiq high availability: Application now automatically detects and configures Sidekiq to use Redis Sentinel when
redisOperator.mode=sentinelandredisOperator.sentinel.enabled=true- New Helm template helpers (
sure.redisSentinelEnabled,sure.redisSentinelHosts,sure.redisSentinelMaster) for Sentinel configuration detection - Automatic injection of
REDIS_SENTINEL_HOSTSandREDIS_SENTINEL_MASTERenvironment variables when Sentinel mode is enabled - Sidekiq configuration supports Sentinel authentication with
sentinel_username(defaults to "default") andsentinel_password - Robust validation of Sentinel endpoints with port range checking (1-65535) and graceful fallback to direct Redis URL on invalid configuration
- Production-ready HA timeouts: 200ms connect, 1s read/write, 3 reconnection attempts
- Backward compatible with existing
REDIS_URLdeployments
- New Helm template helpers (
[0.6.6] - 2025-12-31
Added
- First version/release that aligns versions with monorepo
- CNPG: render
Cluster.spec.backupfromcnpg.cluster.backup.- If
backup.methodis omitted andbackup.volumeSnapshotis present, the chart will infermethod: volumeSnapshot. - For snapshot backups,
backup.volumeSnapshot.classNameis required (template fails early if missing). - Example-only keys like
backup.ttlandbackup.volumeSnapshot.enabledare stripped to avoid CRD warnings.
- If
- CNPG: render
Cluster.spec.pluginsfromcnpg.cluster.plugins(enables barman-cloud plugin / WAL archiver configuration).
[0.0.0], [0.6.5]
Added
- First (nightly/test) releases via https://we-promise.github.io/sure/index.yaml
Notes
- Chart version and application version are kept in sync
- Requires Kubernetes >= 1.25.0
- When upgrading from pre-Sentinel configurations, existing deployments using
REDIS_URLcontinue to work unchanged