Files
sure/charts/sure/CHANGELOG.md
LPW b457514c31 chore(pipelock): bump chart default to v2.2.0, add CI scan badge (#1494)
- Helm chart default pipelock.image.tag bumped from 2.0.0 to 2.2.0
  (three minor releases behind latest)
- README: pipelock CI scan status badge added to the existing badge row
- charts/sure/README.md, docs/hosting/pipelock.md, pipelock.example.yaml:
  refreshed feature notes to reference the upstream changelog rather than
  pinning to a single version
- compose.example.ai.yml: pin example comment bumped to :2.2.0
- Workflow pin (@v2) unchanged — floating major tag picks up 2.2.x
2026-04-18 09:32:23 +02:00

6.2 KiB

Changelog

All notable changes to the Sure Helm chart will be documented in this file.

The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.

[Unreleased]

Changed

  • Bumped pipelock.image.tag from 2.0.0 to 2.2.0 (three minor releases behind latest). Floating @v2 CI action pin picks up patch/minor updates automatically.
  • Refreshed pipelock feature notes in the chart README, docs/hosting/pipelock.md, and pipelock.example.yaml to reference the upstream changelog instead of a single version.

Added

  • README: CI scan status badge for the pipelock workflow.

[0.6.9-alpha] - 2026-03-24

Changed

  • Bumped pipelock.image.tag from 1.5.0 to 2.0.0
  • CI: Pipelock GitHub Action updated from @v1 to @v2
  • Compose example image changed from pinned 1.5.0 to latest with pin comment
  • Bumped pipelock.image.tag from 0.3.1 to 0.3.2
  • Consolidated compose.example.pipelock.yml into compose.example.ai.yml — Pipelock now runs alongside Ollama in one compose file with health checks, config volume mount, and MCP env vars (MCP_API_TOKEN, MCP_USER_EMAIL)
  • CI: Pipelock scan fail-on-findings changed from false to true; added exclude-paths for locale help text false positives

Added

  • Pipelock v2.0 features:
    • pipelock.trustedDomains: first-class support for allowing internal services whose public DNS resolves to private IPs (prevents SSRF false positives)
    • pipelock.mcpToolPolicy.redirectProfiles: route matched MCP tool calls to audited handler programs instead of blocking
    • Updated pipelock.example.yaml with v2.0 feature documentation (trusted domains, redirect profiles, attack simulation, security scoring)
    • Updated extraConfig comment to mention new v2.0 sections (sandbox, reverse_proxy)
  • Pipelock v2.0 highlights available via extraConfig: process sandbox (Linux/macOS), generic HTTP reverse proxy, adaptive enforcement exempt domains, kill switch API port isolation
  • Bumped pipelock.image.tag from 0.3.2 to 1.5.0
  • Pipelock security proxy (pipelock.enabled=true): Separate Deployment + Service that provides two scanning layers
    • Forward proxy (port 8888): Scans outbound HTTPS from Faraday-based clients (e.g. ruby-openai). Auto-injects HTTPS_PROXY/HTTP_PROXY/NO_PROXY env vars into app pods
    • MCP reverse proxy (port 8889): Scans inbound MCP traffic for DLP, prompt injection, and tool poisoning. Auto-computes upstream URL via sure.pipelockUpstream helper
    • WebSocket proxy configuration support (disabled by default)
    • ConfigMap with scanning config (DLP, prompt injection detection, MCP input/tool scanning, response scanning)
    • ConfigMap checksum annotation for automatic pod restart on config changes
    • Helm helpers: sure.pipelockImage, sure.pipelockUpstream
    • Health and readiness probes on the Pipelock deployment
    • imagePullSecrets with fallback to app-level secrets
    • Boolean safety: uses hasKey to prevent Helm's default from swallowing explicit false
    • Configurable ports via forwardProxy.port and mcpProxy.port (single source of truth across Service, Deployment, and env vars)
  • pipelock.example.yaml reference config for Docker Compose deployments
  • Pipelock operational hardening:
    • pipelock.serviceMonitor: Prometheus Operator ServiceMonitor for /metrics on the proxy port
    • pipelock.ingress: Ingress template for MCP reverse proxy (external AI assistant access in k8s)
    • pipelock.pdb: PodDisruptionBudget with minAvailable/maxUnavailable mutual exclusion guard
    • pipelock.topologySpreadConstraints: Pod spread across nodes
    • pipelock.logging: Structured logging config (format, output, include_allowed, include_blocked)
    • pipelock.extraConfig: Escape hatch for additional pipelock.yaml config sections
    • pipelock.requireForExternalAssistant: Helm guard that fails when externalAssistant is enabled without pipelock
    • Component label (app.kubernetes.io/component: pipelock) on Service metadata for selector targeting
    • NOTES.txt: Pipelock health check commands, MCP access info, security notes, metrics status

Fixed

  • Renamed _asserts.tpl to asserts.tpl — Helm's _ prefix convention prevented guards from executing

[0.6.7-alpha] - 2026-01-10

Added

  • Redis Sentinel support for Sidekiq high availability: Application now automatically detects and configures Sidekiq to use Redis Sentinel when redisOperator.mode=sentinel and redisOperator.sentinel.enabled=true
    • New Helm template helpers (sure.redisSentinelEnabled, sure.redisSentinelHosts, sure.redisSentinelMaster) for Sentinel configuration detection
    • Automatic injection of REDIS_SENTINEL_HOSTS and REDIS_SENTINEL_MASTER environment variables when Sentinel mode is enabled
    • Sidekiq configuration supports Sentinel authentication with sentinel_username (defaults to "default") and sentinel_password
    • Robust validation of Sentinel endpoints with port range checking (1-65535) and graceful fallback to direct Redis URL on invalid configuration
    • Production-ready HA timeouts: 200ms connect, 1s read/write, 3 reconnection attempts
    • Backward compatible with existing REDIS_URL deployments

[0.6.6] - 2025-12-31

Added

  • First version/release that aligns versions with monorepo
  • CNPG: render Cluster.spec.backup from cnpg.cluster.backup.
    • If backup.method is omitted and backup.volumeSnapshot is present, the chart will infer method: volumeSnapshot.
    • For snapshot backups, backup.volumeSnapshot.className is required (template fails early if missing).
    • Example-only keys like backup.ttl and backup.volumeSnapshot.enabled are stripped to avoid CRD warnings.
  • CNPG: render Cluster.spec.plugins from cnpg.cluster.plugins (enables barman-cloud plugin / WAL archiver configuration).

[0.0.0], [0.6.5]

Added

Notes

  • Chart version and application version are kept in sync
  • Requires Kubernetes >= 1.25.0
  • When upgrading from pre-Sentinel configurations, existing deployments using REDIS_URL continue to work unchanged