Skip to content

Releases: hashicorp/packer-plugin-googlecompute

v1.1.4

27 Nov 19:25
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

  • relax GoogleCompute auth file loading to allow OIDC creds by @msarahan in #186
  • feat: add image_source_disk configuration setting by @ericnorris in #190

Bug fixes🧑‍🔧 🐞

Other Changes

New Contributors

Full Changelog: v1.1.3...v1.1.4

v1.1.3

24 Oct 14:21
Compare
Choose a tag to compare

What's Changed

Other Changes

Full Changelog: v1.1.2...v1.1.3

v1.1.2

11 Oct 16:31
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

  • Add architecture support to googlecompute-import post-processor by @anish in #147
  • change default machine type to e2-standard-2 by @ledmonster in #171
  • feat: adds image_project_id parameter for pushing images to a different GCP project by @opdude in #170

Bug fixes🧑‍🔧 🐞

Doc improvements 📚

Other Changes

New Contributors

Full Changelog: v1.1.1...v1.1.2

v1.1.1

19 Apr 18:51
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

Doc improvements 📚

  • Docs: invert comment lines for ImageSignatureDB and ImageForbiddenSignaturesDB by @zuc in #148
  • docs/builder: Fix reference to SSH partial by @nywilken in #154

Other Changes

New Contributors

  • @zuc made their first contribution in #148

Full Changelog: v1.1.0...v1.1.1

v1.1.0

11 Jan 21:09
Compare
Choose a tag to compare

Note

In this release the the logic for the wrapper script has been changed so that it sets the metadata status to "error",
when the startup_script_file exits with a non-zero exit code. Since this is treated as an error the builder will fail the build like any other failed provisioner run. Previously when using the wrapped startup script if the executing script failed due to some runtime error the metadata would ignore the non-zero exit code and still mark the status as done. Resulting in a build even though the start script may have failed.

What's Changed

Breaking Changes 🛠

  • [HPR-864] Error on wrapped startup script errors by @nywilken in #135

Exciting New Features 🎉

  • Support for enabling nested virtualization on intermediate instance by @atpons in #123

Doc improvements 📚

  • We should suggest users to use above v1.0.0 by @officer in #130

Other Changes

New Contributors

  • @hashicorp-copywrite made their first contribution in #124
  • @officer made their first contribution in #130
  • @whiteley made their first contribution in #122
  • @atpons made their first contribution in #123

Full Changelog: v1.0.16...v1.1.0

v1.0.16

29 Sep 19:39
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

  • Add support for AlamaLinux, FreeBSD, and HPC cloud images by @maguec in #120

Other Changes

  • Add GHA for running acceptance test nightly by @nywilken in #112
  • Update Plugin binary releases to match Packer by @nywilken in #116

New Contributors

Full Changelog: v1.0.15...v1.0.16

v1.0.15

19 Aug 19:52
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

  • Add ml-images project to list of supported images by @rueian in #107

Other Changes

  • Bump github.com/hashicorp/packer-plugin-sdk from 0.3.0 to 0.3.1 by @dependabot in #106

New Contributors

Full Changelog: v1.0.14...v1.0.15

v1.0.14

27 Jul 20:41
1dfa194
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

  • Migrate to new Google Cloud impersonation API by @fgateuil in #84
  • Added support for node affinity labels by @rosmo in #94

Bug fixes🧑‍🔧 🐞

  • Fix OsLogin authentication when running Packer with GCE service account by @nywilken in #105

Other Changes

New Contributors

Full Changelog: v1.0.13...v1.0.14

v1.0.13

25 May 15:10
44065a0
Compare
Choose a tag to compare

Note

This release contains the latest golang.org/x/crypto/ssh module which implements client authentication support for signature algorithms based on SHA-2 for use with existing RSA keys. Previously, a client would fail to authenticate with RSA keys to servers that reject signature algorithms based on SHA-1.

What's Changed

Bug fixes🧑‍🔧 🐞

  • Bump packer-plugin-sdk to address legacy SSH key algorithms in SSH communicator

Full Changelog: v1.0.12...v1.0.13

v1.0.12

05 May 16:49
Compare
Choose a tag to compare

Note

This release contains the latest golang.org/x/crypto/ssh module which implements client authentication support for signature algorithms based on SHA-2 for use with existing RSA keys. Previously, a client would fail to authenticate with RSA keys to servers that reject signature algorithms based on SHA-1.

What's Changed

Bug fixes🧑‍🔧 🐞

  • Bump packer-plugin-sdk to address legacy SSH key algorithms in SSH communicator

Full Changelog: v1.0.11...v1.0.12