@@ -5,31 +5,16 @@ All notable changes to this project will be documented in this file.
55The format is based on [ Keep a Changelog] ( https://keepachangelog.com/en/1.0.0/ ) ,
66and this project adheres to [ Semantic Versioning] ( https://semver.org/spec/v2.0.0.html ) .
77
8- ## [ Unreleased]
9-
10- ### Changed
11- - ` secret.yaml ` now reads credentials exclusively from ` secrets.* ` values
12- - ` deployment.yaml ` uses ` plik.secretName ` helper for consistent Secret name resolution
13- and adds ` optional: true ` on ` envFrom.secretRef ` so pods start cleanly without a Secret
14- - Sensitive fields removed from ` plikd: ` in ` values.yaml ` so they no longer leak into
15- the ConfigMap-rendered ` plikd.cfg `
8+ ## [ 1.4-RC4] — Initial Release
169
1710### Added
18- - New top-level ` secrets: ` block in ` values.yaml ` to hold all sensitive credentials
11+ - Helm chart for deploying Plik on Kubernetes
12+ - ` secrets: ` top-level block in ` values.yaml ` for all sensitive credentials
1913 (` googleApiSecret ` , ` ovhApiKey ` , ` ovhApiSecret ` , ` oidcClientSecret ` , ` dataBackend ` , ` metadataBackend ` )
20- - ` secrets.existingSecret ` — bring-your-own Secret support (replaces top-level ` existingSecret ` )
14+ - ` secrets.existingSecret ` — bring-your-own Secret support
2115- ` plik.secretName ` Helm helper for consistent Secret name resolution
16+ - ` secret.yaml ` reads credentials exclusively from ` secrets.* ` values
17+ - ` deployment.yaml ` with ` optional: true ` on ` envFrom.secretRef ` so pods start cleanly without a Secret
2218- ` dbPersistence ` — dedicated PVC for the SQLite metadata database
2319- Ingress template, post-install notes, Kubernetes deployment guide
24- - Explicit key ordering in ` configmap.yaml ` (fixes non-deterministic rendering)
25-
26- ### Removed
27- - Top-level ` existingSecret ` value (replaced by ` secrets.existingSecret ` )
28- - Sensitive fields from under ` plikd.* ` in ` values.yaml ` :
29- ` GoogleApiSecret ` , ` OvhApiKey ` , ` OvhApiSecret ` , ` OIDCClientSecret ` ,
30- ` DataBackendConfig.SecretAccessKey ` , ` DataBackendConfig.ApiKey ` ,
31- ` MetadataBackendConfig.Password `
32-
33- > [ !IMPORTANT]
34- > ** Migration from previous chart versions** : All sensitive credentials must now be
35- > placed under the ` secrets: ` top-level block in ` values.yaml ` , not under ` plikd: ` .
20+ - Explicit key ordering in ` configmap.yaml ` for deterministic rendering
0 commit comments