Skip to content

Releases: argoproj/argo-cd

v1.1.0-rc6

16 Jul 16:43
Compare
Choose a tag to compare
v1.1.0-rc6 Pre-release
Pre-release

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc6/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc6/manifests/ha/install.yaml

Changes since rc5.

  • Argo CD don't handle well k8s objects which size exceeds 1mb (#1685)
  • Secret data not redacted in last-applied-configuration (#897)
  • Add Prometheus metrics for git repo interactions (#1912)
  • App controller should log additional information during app syncing (#1909)

v1.1.0-rc5

09 Jul 21:43
Compare
Choose a tag to compare
v1.1.0-rc5 Pre-release
Pre-release

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc5/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc5/manifests/ha/install.yaml

Changes since rc4.

v1.1.0-rc4

03 Jul 21:23
Compare
Choose a tag to compare
v1.1.0-rc4 Pre-release
Pre-release

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc4/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc-4/manifests/ha/install.yaml

Changes since rc3.

  • Issue #1874 - validate app spec before verifying app permissions (#1875)
  • Redacts Helm username and password. Closes #1868 (#1871)
  • Issue #1867 - Fix JS error on project role edit panel (#1869)
  • Upgrade argo-ui version to fix dropdown position calculation (#1847)

v1.1.0-rc3

28 Jun 21:09
Compare
Choose a tag to compare
v1.1.0-rc3 Pre-release
Pre-release

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc3/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc-3/manifests/ha/install.yaml

Changes since rc2.

  • Issue #1820 - Make sure api server to repo server grpc calls have timeout (#1832)
  • Adds a timeout to all external commands. Closes #1821 (#1823)
  • Running application actions should require override privileges not get (#1828)

v1.1.0-rc2

21 Jun 23:41
Compare
Choose a tag to compare
v1.1.0-rc2 Pre-release
Pre-release

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc2/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc-2/manifests/ha/install.yaml

Changes since rc1.

  • Use correct healthcheck for Rollout with empty steps list (#1776)
  • Move remarshaling to happen only during comparison, instead of manifest generation (#1788)
  • Server side rotation of cluster bearer tokens (#1744)
  • Add health check to the controller deployment (#1785)
  • Make status fields as optional fields (#1779)
  • Sync status button should be hidden if there is no sync operation (#1770)
  • UI should allow editing repo URL (#1763)
  • Fixes a bug where cluster objs could leave app is running op state. C… (#1796)

v1.1.0-rc1

14 Jun 18:42
Compare
Choose a tag to compare
v1.1.0-rc1 Pre-release
Pre-release

Release v1.1 contains 13 enhancements and 12 bug fixes.

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc1/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.1.0-rc-1/manifests/ha/install.yaml

Enhancements

  • Sync waves #1544
  • Adds Prune=false and IgnoreExtraneous options #1629
  • Forward Git credentials to config management plugins #1628
  • Improve Kustomize 2 parameters UI #1609
  • Adds argocd logout #1210
  • Make it possible to set Helm release name different from Argo CD app name. #1066
  • Add ability to specify system namespace during cluster add operation #1661
  • Make listener and metrics ports configurable #1647
  • Using SSH keys to authenticate kustomize bases from git #827
  • Adds argocd app sync APPNAME --async #1728
  • Allow users to define app specific urls to expose in the UI #1677
  • Error view instead of blank page in UI #1375
  • Project Editor: Whitelisted Cluster Resources doesn't strip whitespace #1693

Bug Fixes

  • Project Editor: Whitelisted Cluster Resources doesn't strip whitespace #1693
  • [ui small bug] menu position outside block #1711
  • UI will crash when create application without destination namespace #1701
  • ArgoCD synchronization failed due to internal error #1697
  • Replicasets ordering is not stable on app tree view #1668
  • Stuck processor on App Controller after deleting application with incomplete operation #1665
  • Role edit page fails with JS error #1662
  • failed parsing on parameters with comma #1660
  • Handle nil obj when processing custom actions #1700
  • Account for missing fields in Rollout HealthStatus #1699
  • Sync operation unnecessary waits for a healthy state of all resources #1715
  • failed parsing on parameters with comma #1660

Contributors

See also milestone v1.1

v1.0.2

14 Jun 17:23
Compare
Choose a tag to compare

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.2/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.2/manifests/ha/install.yaml

Changes since v1.0.1

  • Cluster registration was unintentionally persisting client-cert auth credentials (#1742)

Checking if Argo CD is storing unneccesry credentials.

The following instructions explain if any action is needed to remove certificate-authentication data from Argo CD:

  1. Run the following command and see if you see key data. If there is non-null output (e.g. output like the following), then Argo CD is storing unnecessary credentials and the cluster credentials should be re-added.
kubectl get secret cluster-192.168.64.66-892108214 -o json | jq -r '.data.config' | base64 --decode | jq -r '.tlsClientConfig.keyData'
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

If the secret does not contain key data (i.e. output like the following), then no action is necessary:

$ kubectl get secret cluster-192.168.64.66-892108214 -o json | jq -r '.data.config' | base64 --decode | jq -r '.tlsClientConfig.keyData'
null
  1. If key data is stored in the secret, run the following commands to re-add the cluster to Argo CD. IMPORTANT: ensure you are using argocd v1.0.2 CLI or greater.
$ argocd cluster rm CLUSTERURL
$ argocd cluster add CONTEXTNAME

v1.0.1

28 May 17:32
Compare
Choose a tag to compare

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.1/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.1/manifests/ha/install.yaml

Changes since v1.0.1

  • Public git creds (#1625)

v1.0.0

16 May 22:13
Compare
Choose a tag to compare

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.0/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.0/manifests/ha/install.yaml

New Features

Network View

A new way to visual application resources had been introduced to the Application Details page. The Network View visualizes connections between Ingresses, Services and Pods
based on ingress reference service, service's label selectors and labels. The new view is useful to understand the application traffic flow and troubleshot connectivity issues.

Custom Actions

Argo CD introduces Custom Resource Actions to allow users to provide their own Lua scripts to modify existing Kubernetes resources in their applications. These actions are exposed in the UI to allow easy, safe, and reliable changes to their resources. This functionality can be used to introduce functionality such as suspending and enabling a Kubernetes cronjob, continue a BlueGreen deployment with Argo Rollouts, or scaling a deployment.

UI Enhancements & Usability Enhancements

  • New color palette intended to highlight unhealthily and out-of-sync resources more clearly.
  • The health of more resources is displayed, so it easier to quickly zoom to unhealthy pods, replica-sets, etc.
  • Resources that do not have health no longer appear to be healthy.
  • Support for configuring Git repo credentials at a domain/org level
  • Support for configuring requested OIDC provider scopes and enforced RBAC scopes
  • Support for configuring monitored resources whitelist in addition to excluded resources

Breaking Changes

  • Remove deprecated componentParameterOverrides field #1372

Enhancements

  • argocd app wait should have --resource flag like sync #1206
  • Adds support for kustomize edit set image. Closes #1275 (#1324)
  • Allow wait to return on health or suspended (#1392)
  • Application warning when a manifest is defined twice #1070
  • Create new documentation website #1390
  • Default view should resource view instead of diff view #1354
  • Display number of errors on resource tab #1477
  • Displays resources that are being deleted as "Progressing". Closes #1410 (#1426)
  • Generate random name for grpc proxy unix socket file instead of time stamp (#1455)
  • Issue #357 - Expose application nodes networking information (#1333)
  • Issue #1404 - App controller unnecessary set namespace to cluster level resources (#1405)
  • Nils health if the resource does not provide it. Closes #1383 (#1408)
  • Perform health assessments on all resource nodes in the tree. Closes #1382 (#1422)
  • Remove deprecated componentParameterOverrides field #1372
  • Shows the health of the application. Closes #1433 (#1434)
  • Surface Service/Ingress external IPs, hostname to application #908
  • Surface pod status to tree view #1358
  • Support for customizable resource actions as Lua scripts #86
  • UI / API Errors Truncated, Time Out #1386
  • UI Enhancement Proposals Quick Wins #1274
  • Update argocd-util import/export to support proper backup and restore (#1328)
  • Whitelisting repos/clusters in projects should consider repo/cluster permissions #1432
  • Adds support for configuring repo creds at a domain/org level. (#1332)
  • Implement whitelist option analogous to resource.exclusions (#1490)
  • Added ability to sync specific labels from the command line (#1241)
  • Improve rendering app image information (#1552)
  • Add liveness probe to repo server/api servers (#1546)
  • Support configuring requested OIDC provider scopes and enforced RBAC scopes (#1471)

Bug Fixes

  • Don't compare secrets in the CLI, since argo-cd doesn't have access to their data (#1459)
  • Dropdown menu should not have sync item for unmanaged resources #1357
  • Fixes goroutine leak. Closes #1381 (#1457)
  • Improve input style #1217
  • Issue #908 - Surface Service/Ingress external IPs, hostname to application (#1347)
  • kustomization fields are all mandatory #1504
  • Resource node details is crashing if live resource is missing $1505
  • Rollback UI is not showing correct ksonnet parameters in preview #1326
  • See details of applications fails with "r.nodes is undefined" #1371
  • UI fails to load custom actions is resource is not deployed #1502
  • Unable to create app from private repo: x509: certificate signed by unknown authority (#1171)
  • Fix hardcoded 'git' user in util/git.NewClient (#1555)
  • Application controller becomes unresponsive (#1476)
  • Load target resource using K8S if conversion fails (#1414)
  • Can't ignore a non-existent pointer anymore (#1586)
  • Impossible to sync to HEAD from UI if auto-sync is enabled (#1579)
  • Application controller is unable to delete self-referenced app (#1570)
  • Prevent reconciliation loop for self-managed apps (#1533)
  • Controller incorrectly report health state of self managed application (#1557)
  • Fix kustomize manifest generation crash is manifest has image without version (#1540)
  • Supply resourceVersion to watch request to prevent reading of stale cache (#1605)

v1.0.0-rc3

09 May 17:28
Compare
Choose a tag to compare
v1.0.0-rc3 Pre-release
Pre-release

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.0-rc3/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v1.0.0-rc3/manifests/ha/install.yaml

Changes since v1.0.0-rc2

  • Can't ignore a non-existent pointer anymore (#1586)
  • SSH URLs support is partially broken (#1596)
  • Bad external URL link https://%!s(<nil>) (#1590)
  • Impossible to sync to HEAD from UI if auto-sync is enabled (#1579)
  • Application controller is unable to delete self-referenced app (#1570)
  • Prevent reconciliation loop for self-managed apps (#1533)
  • Controller incorrectly report health state of self managed application (#1557)
  • Fix kustomize manifest generation crash is manifest has image without version (#1540)
  • Fix hardcoded 'git' user in util/git.NewClient (#1555)
  • Fix UI Crash is app never been reconciled (#1589)
  • Network view crashes if any filter is set (#1563)
  • Improve rendering app image information (#1552)
  • Add liveness probe to repo server/api servers (#1546)