-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update helm release amazon-eks-pod-identity-webhook to v2.4.1 #512
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- kubernetes/aws-identity-webhook Kustomization: flux-system/1-aws-identity-webhook HelmRelease: aws-identity-webhook/aws-identity-webhook
+++ kubernetes/aws-identity-webhook Kustomization: flux-system/1-aws-identity-webhook HelmRelease: aws-identity-webhook/aws-identity-webhook
@@ -11,13 +11,13 @@
chart:
spec:
chart: amazon-eks-pod-identity-webhook
sourceRef:
kind: HelmRepository
name: jkroepke
- version: 2.3.0
+ version: 2.4.1
interval: 1h
maxHistory: 1
values:
config:
annotationPrefix: eks.amazonaws.com
defaultAwsRegion: '' |
--- HelmRelease: aws-identity-webhook/aws-identity-webhook ServiceAccount: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook ServiceAccount: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -4,8 +4,7 @@
metadata:
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
namespace: aws-identity-webhook
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
- app.kubernetes.io/managed-by: Helm
--- HelmRelease: aws-identity-webhook/aws-identity-webhook ClusterRole: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook ClusterRole: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -3,17 +3,25 @@
kind: ClusterRole
metadata:
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
- app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:
- ''
resources:
- serviceaccounts
verbs:
- get
- watch
- list
+- apiGroups:
+ - certificates.k8s.io
+ resources:
+ - certificatesigningrequests
+ verbs:
+ - create
+ - get
+ - list
+ - watch
--- HelmRelease: aws-identity-webhook/aws-identity-webhook ClusterRoleBinding: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook ClusterRoleBinding: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -3,13 +3,12 @@
kind: ClusterRoleBinding
metadata:
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
- app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
subjects:
- kind: ServiceAccount
--- HelmRelease: aws-identity-webhook/aws-identity-webhook Service: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook Service: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -4,22 +4,23 @@
metadata:
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
namespace: aws-identity-webhook
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
- app.kubernetes.io/managed-by: Helm
spec:
type: ClusterIP
ports:
- port: 8443
targetPort: https
protocol: TCP
+ appProtocol: https
name: https
- port: 9999
targetPort: metrics
+ appProtocol: http
protocol: TCP
name: metrics
selector:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
--- HelmRelease: aws-identity-webhook/aws-identity-webhook Deployment: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook Deployment: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -4,13 +4,12 @@
metadata:
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
namespace: aws-identity-webhook
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
- app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
@@ -19,64 +18,74 @@
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
spec:
containers:
- name: amazon-eks-pod-identity-webhook
+ image: docker.io/amazon/amazon-eks-pod-identity-webhook:v0.6.1
+ imagePullPolicy: IfNotPresent
+ command:
+ - /webhook
+ - --annotation-prefix=eks.amazonaws.com
+ - --aws-default-region=
+ - --in-cluster=false
+ - --logtostderr
+ - --namespace=$(POD_NAMESPACE)
+ - --metrics-port=9999
+ - --port=8443
+ - --service-name=aws-identity-webhook-amazon-eks-pod-identity-webhook
+ - --sts-regional-endpoint=false
+ - --token-audience=sts.amazonaws.com
+ - --token-expiration=86400
+ - --token-mount-path=/var/run/secrets/eks.amazonaws.com/serviceaccount
+ - --tls-cert=/etc/webhook/certs/tls.crt
+ - --tls-key=/etc/webhook/certs/tls.key
+ ports:
+ - name: https
+ containerPort: 8443
+ protocol: TCP
+ - name: metrics
+ containerPort: 9999
+ protocol: TCP
+ env:
+ - name: POD_NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ livenessProbe:
+ httpGet:
+ path: /healthz
+ port: https
+ scheme: HTTPS
+ readinessProbe:
+ httpGet:
+ path: /healthz
+ port: https
+ scheme: HTTPS
+ resources:
+ limits: {}
+ requests: {}
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 65534
runAsNonRoot: true
runAsUser: 65534
seccompProfile:
type: RuntimeDefault
- image: docker.io/amazon/amazon-eks-pod-identity-webhook:v0.6.1
- imagePullPolicy: IfNotPresent
- command:
- - /webhook
- - --annotation-prefix=eks.amazonaws.com
- - --aws-default-region=
- - --in-cluster=false
- - --logtostderr
- - --namespace=aws-identity-webhook
- - --metrics-port=9999
- - --port=8443
- - --sts-regional-endpoint=false
- - --token-audience=sts.amazonaws.com
- - --token-expiration=86400
- - --token-mount-path=/var/run/secrets/eks.amazonaws.com/serviceaccount
- - --tls-cert=/etc/webhook/certs/tls.crt
- - --tls-key=/etc/webhook/certs/tls.key
volumeMounts:
- name: cert
mountPath: /etc/webhook/certs
readOnly: true
- ports:
- - name: https
- containerPort: 8443
- protocol: TCP
- - name: metrics
- containerPort: 9999
- protocol: TCP
- livenessProbe:
- httpGet:
- path: /healthz
- port: https
- readinessProbe:
- httpGet:
- path: /healthz
- port: https
- resources:
- limits: {}
- requests: {}
hostNetwork: false
serviceAccountName: aws-identity-webhook-amazon-eks-pod-identity-webhook
- securityContext: {}
+ securityContext:
+ seccompProfile:
+ type: RuntimeDefault
volumes:
- name: cert
secret:
secretName: aws-identity-webhook-amazon-eks-pod-identity-webhook-cert
--- HelmRelease: aws-identity-webhook/aws-identity-webhook Issuer: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook Issuer: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -4,10 +4,9 @@
metadata:
name: aws-identity-webhook-amazon-eks-pod-identity-webhook
namespace: aws-identity-webhook
labels:
app.kubernetes.io/name: amazon-eks-pod-identity-webhook
app.kubernetes.io/instance: aws-identity-webhook
- app.kubernetes.io/managed-by: Helm
spec:
selfSigned: {}
--- HelmRelease: aws-identity-webhook/aws-identity-webhook MutatingWebhookConfiguration: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
+++ HelmRelease: aws-identity-webhook/aws-identity-webhook MutatingWebhookConfiguration: aws-identity-webhook/aws-identity-webhook-amazon-eks-pod-identity-webhook
@@ -22,12 +22,15 @@
apiVersions:
- v1
resources:
- pods
objectSelector:
matchExpressions:
+ - key: eks.amazonaws.com/skip-pod-identity-webhook
+ operator: DoesNotExist
+ values: []
- key: app.kubernetes.io/name
operator: NotIn
values:
- amazon-eks-pod-identity-webhook
sideEffects: None
admissionReviewVersions: |
timtor-bot
changed the title
chore(deps): update helm release amazon-eks-pod-identity-webhook to v2.3.2
chore(deps): update helm release amazon-eks-pod-identity-webhook to v2.4.0
Dec 26, 2024
timtor-bot
force-pushed
the
renovate/amazon-eks-pod-identity-webhook-2.x
branch
from
December 26, 2024 00:13
e090572
to
95a1347
Compare
timtor-bot
changed the title
chore(deps): update helm release amazon-eks-pod-identity-webhook to v2.4.0
chore(deps): update helm release amazon-eks-pod-identity-webhook to v2.4.1
Jan 16, 2025
timtor-bot
force-pushed
the
renovate/amazon-eks-pod-identity-webhook-2.x
branch
from
January 16, 2025 00:12
95a1347
to
1eb4cd1
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.3.0
->2.4.1
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
jkroepke/helm-charts (amazon-eks-pod-identity-webhook)
v2.4.1
Compare Source
A Kubernetes webhook for pods that need AWS IAM access
v2.4.0
Compare Source
A Kubernetes webhook for pods that need AWS IAM access
v2.3.2
Compare Source
A Kubernetes webhook for pods that need AWS IAM access
v2.3.1
Compare Source
A Kubernetes webhook for pods that need AWS IAM access
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.