Skip to content

Releases: getsops/sops

3.4.0

12 Sep 21:04
14a22d7
Compare
Choose a tag to compare

Features:

  • sops publish, a new command for publishing sops encrypted secrets to S3, GCS, or Hashicorp Vault
  • Support for multiple Azure authentication mechanisms
  • Azure Keyvault support to the sops config file
  • encrypted_regex option to the sops config file

Bug fixes:

  • Return non-zero exit code for invalid CLI flags
  • Broken path handling for sops editing on Windows
  • go lint/fmt violations
  • Check for pgp fingerprint before slicing it

Project changes:

  • Build container using golang 1.12
  • Switch to using go modules
  • Hashicorp Vault server in Travis CI build
  • Mozilla Publice License file to repo
  • Replaced expiring test gpg keys

3.3.1

11 Jun 20:13
3.3.1
e9e1e87
Compare
Choose a tag to compare

Bug fixes:

  • Make sure the pgp key fingerprint is longer than 16 characters before
    slicing it. (#463)
  • Allow for --set value to be a string. (#461)

Project changes:

  • Using develop as a staging branch to create releases off of. What
    is in master is now the current stable release.
  • Upgrade to using Go 1.12 to build sops
  • Updated all vendored packages

3.3.0

18 Apr 11:03
Compare
Choose a tag to compare

New features:

  • Multi-document support for YAML files
  • Support referencing AWS KMS keys by their alias
  • Support for INI files
  • Support for AWS CLI profiles
  • Comment support in .env files
  • Added vi to the list of known editors
  • Added a way to specify the GPG key server to use through the
    SOPS_GPG_KEYSERVER environment variable

Bug fixes:

  • Now uses $HOME instead of ~ (which didn't work) to find the GPG home
  • Fix panic when vim was not available as an editor, but other
    alternative editors were
  • Fix issue with AWS KMS Encryption Contexts (#445) with more than one
    context value failing to decrypt intermittently. Includes an
    automatic fix for old files affected by this issue.

Project infrastructure changes:

  • Added integration tests for AWS KMS
  • Added Code of Conduct

3.2.0

08 Nov 16:10
Compare
Choose a tag to compare
Release 3.2.0

Release 3.1.1

27 Sep 07:48
Compare
Choose a tag to compare
* Fix incorrect version number from previous release

Release 3.1.0

12 Sep 15:12
Compare
Choose a tag to compare
* Add support for Azure Key Service
* Fix bug that prevented JSON escapes in input files from working

Release 3.0.5

15 May 18:25
5430b63
Compare
Choose a tag to compare
Same as 3.0.4 but with the correct version set.

Release 3.0.4

15 May 17:09
5e6aa7f
Compare
Choose a tag to compare
* Prevent files from being encrypted twice
* Fix empty comments not being decrypted correctly
* If keyservicecmd returns an error, log it.
* Initial sops workspace auditing support (still wip)
* Refactor Store interface to reflect operations SOPS performs

Release 3.0.3

11 Apr 13:33
b8c2051
Compare
Choose a tag to compare
* --set now works with nested data structures and not just simple
  values

* Changed default log level to warn instead of info

* Avoid creating empty files when using the editor mode to create new
  files and not making any changes to the example files

* Output unformatted strings when using --extract instead of encoding
  them to yaml

* Allow forcing binary input and output types from command line flags

* Deprecate filename_regex in favor of path_regex. filename_regex had
  a bug and matched on the whole file path, when it should have only
  matched on the file name. path_regex on the other hand is documented
  to match on the whole file path.

* Add an encrypted-suffix option, the exact opposite of
  unencrypted-suffix

* Allow specifying unencrypted_suffix and encrypted_suffix rules in
  the .sops.yaml configuration file

* Introduce key service flag optionally prompting users on
  encryption/decryption

3.0.2

19 Jan 15:46
Compare
Choose a tag to compare
fix version number