Changelog¶
v0.3.13 Release¶
- Fix sync with pre-existing namespaces of the same name in K8S
- Fix sync with illegal namespace names after approval
v0.3.12 Release¶
v0.3.8 Release¶
- Fix a problem with ‘next=’ parameter forwarding on OIDC login from web applications.
- Fix some small glitches in the user administration backend.
- The documentation now reflects the latest features (web apps, user groups, installation methods).
v0.3.7 Release¶
- Fix a problem with existing users not seing the new portal group and web app admin pages.
v0.3.6 Release¶
- User groups and web applications were added as new concept, and replace the former direct OpenID connect handling. Check the documentation for details (#4, #6)
- Backend permissions are now solely handled by group membership (#52).
- The Kubernetes namespace list in the backend now has some usage statistics, in order to find zombie namespaces (#43).
- The Kubernetes namespace list in the backend now supports some bulk actions (#24, #18).
- The welcome page is now mobile-friendly (#46).
- The test coverage was greatly extended (#34).
- Sub-authentication can now be separately enabled / disabled per web application. The overview pages were updated accordingly.
- User names for active directory logins are now converted to lower case.
v0.2.7 Release¶
- Fix broken auth providers
- Allow override of auto-detected API server, because generated config file needs the world-visible IP address in production.
v0.2.4 Release¶
- Fixen broken dependencies
v0.2.2 Release¶
- Database migrations squashed, outdated dependencies removed - attempt to fix #12
- Show approving person in backend overview list
v0.2.1 Release¶
- API access for the portal user list (see API)
- Support for storing comments about particular users in the backend (#20)
- Support for fine-grained log level configuration (#37)
- eMail address is shown in user backend (#21)
- Kubernetes API server is now automatically detected
- Portal shows some generic statistics about the cluster
- Generic support for OIDC login (thanks to @cultcom)