Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update helm release amazon-eks-pod-identity-webhook to v2.3.0 #503

Merged
merged 1 commit into from
Dec 21, 2024

Conversation

timtor-bot
Copy link
Collaborator

This PR contains the following updates:

Package Update Change
amazon-eks-pod-identity-webhook (source) minor 2.1.3 -> 2.3.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

jkroepke/helm-charts (amazon-eks-pod-identity-webhook)

v2.3.0

Compare Source

A Kubernetes webhook for pods that need AWS IAM access


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@timtor-bot timtor-bot force-pushed the renovate/amazon-eks-pod-identity-webhook-2.x branch from 8c98d3b to ec09ace Compare December 18, 2024 10:50
Copy link

--- HelmRelease: aws-identity-webhook/aws-identity-webhook Deployment: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook

+++ HelmRelease: aws-identity-webhook/aws-identity-webhook Deployment: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook

@@ -30,13 +30,13 @@

           readOnlyRootFilesystem: true
           runAsGroup: 65534
           runAsNonRoot: true
           runAsUser: 65534
           seccompProfile:
             type: RuntimeDefault
-        image: docker.io/amazon/amazon-eks-pod-identity-webhook:v0.5.2
+        image: docker.io/amazon/amazon-eks-pod-identity-webhook:v0.6.1
         imagePullPolicy: IfNotPresent
         command:
         - /webhook
         - --annotation-prefix=eks.amazonaws.com
         - --aws-default-region=
         - --in-cluster=false
@@ -61,17 +61,17 @@

         - name: metrics
           containerPort: 9999
           protocol: TCP
         livenessProbe:
           httpGet:
             path: /healthz
-            port: metrics
+            port: https
         readinessProbe:
           httpGet:
             path: /healthz
-            port: metrics
+            port: https
         resources:
           limits: {}
           requests: {}
       hostNetwork: false
       serviceAccountName: aws-identity-webhook-amazon-eks-pod-identity-webhook
       securityContext: {}

Copy link

--- kubernetes/aws-identity-webhook Kustomization: flux-system/1-aws-identity-webhook HelmRelease: aws-identity-webhook/aws-identity-webhook

+++ kubernetes/aws-identity-webhook Kustomization: flux-system/1-aws-identity-webhook HelmRelease: aws-identity-webhook/aws-identity-webhook

@@ -11,13 +11,13 @@

   chart:
     spec:
       chart: amazon-eks-pod-identity-webhook
       sourceRef:
         kind: HelmRepository
         name: jkroepke
-      version: 2.1.3
+      version: 2.3.0
   interval: 1h
   maxHistory: 1
   values:
     config:
       annotationPrefix: eks.amazonaws.com
       defaultAwsRegion: ''

@timtor-bot timtor-bot force-pushed the renovate/amazon-eks-pod-identity-webhook-2.x branch from ec09ace to b1e2301 Compare December 20, 2024 18:46
@timtorChen timtorChen merged commit 4d36f8e into main Dec 21, 2024
4 checks passed
@timtorChen timtorChen deleted the renovate/amazon-eks-pod-identity-webhook-2.x branch December 21, 2024 07:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants