Skip to content

Commit

Permalink
Release artifacts for release v1.5.0
Browse files Browse the repository at this point in the history
  • Loading branch information
a-hilaly committed Oct 9, 2024
1 parent b6f5ba5 commit 79ab804
Show file tree
Hide file tree
Showing 15 changed files with 39 additions and 243 deletions.
2 changes: 1 addition & 1 deletion config/controller/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@ kind: Kustomization
images:
- name: controller
newName: public.ecr.aws/aws-controllers-k8s/eks-controller
newTag: 1.4.7
newTag: 1.5.0
4 changes: 2 additions & 2 deletions helm/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v1
name: eks-chart
description: A Helm chart for the ACK service controller for Amazon Elastic Kubernetes Service (EKS)
version: 1.4.7
appVersion: 1.4.7
version: 1.5.0
appVersion: 1.5.0
home: https://github.com/aws-controllers-k8s/eks-controller
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
sources:
Expand Down
12 changes: 2 additions & 10 deletions helm/crds/eks.services.k8s.aws_accessentries.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.2
name: accessentries.eks.services.k8s.aws
spec:
group: eks.services.k8s.aws
Expand Down Expand Up @@ -60,7 +60,6 @@ spec:
description: |-
AccessEntrySpec defines the desired state of AccessEntry.
An access entry allows an IAM principal (user or role) to access your cluster.
Access entries can replace the need to maintain the aws-auth ConfigMap for
authentication. For more information about access entries, see Access entries
Expand Down Expand Up @@ -91,7 +90,7 @@ spec:
clusterRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand All @@ -112,14 +111,12 @@ spec:
confirm that the value for name exists in any bindings on your cluster. You
can specify one or more names.
Kubernetes authorizes the principalArn of the access entry to access any
cluster objects that you've specified in a Kubernetes Role or ClusterRole
object that is also specified in a binding's roleRef. For more information
about creating Kubernetes RoleBinding, ClusterRoleBinding, Role, or ClusterRole
objects, see Using RBAC Authorization in the Kubernetes documentation (https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
If you want Amazon EKS to authorize the principalArn (instead of, or in addition
to Kubernetes authorizing the principalArn), you can associate one or more
access policies to the access entry using AssociateAccessPolicy. If you associate
Expand All @@ -135,15 +132,13 @@ spec:
for each access entry. You can't specify the same ARN in more than one access
entry. This value can't be changed after access entry creation.
The valid principals differ depending on the type of the access entry in
the type field. The only valid ARN is IAM roles for the types of access entries
for nodes: . You can use every IAM principal type for STANDARD access entries.
You can't use the STS session principal type with access entries because
this is a temporary principal for each session and not a permanent identity
that can be assigned permissions.
IAM best practices (https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#bp-users-federation-idp)
recommend using IAM roles with temporary credentials, rather than IAM users
with long-term credentials.
Expand All @@ -161,7 +156,6 @@ spec:
The type of the new access entry. Valid values are Standard, FARGATE_LINUX,
EC2_LINUX, and EC2_WINDOWS.
If the principalArn is for an IAM role that's used for self-managed Amazon
EC2 nodes, specify EC2_LINUX or EC2_WINDOWS. Amazon EKS grants the necessary
permissions to the node for you. If the principalArn is for any other purpose,
Expand All @@ -171,7 +165,6 @@ spec:
entries in the aws-auth ConfigMap for the roles. You can't change this value
once you've created the access entry.
If you set the value to EC2_LINUX or EC2_WINDOWS, you can't specify values
for kubernetesGroups, or associate an AccessPolicy to the access entry.
type: string
Expand Down Expand Up @@ -203,7 +196,6 @@ spec:
when it has verified that an "adopted" resource (a resource where the
ARN annotation was set by the Kubernetes user on the CR) exists and
matches the supplied CR's Spec field values.
TODO(vijat@): Find a better strategy for resources that do not have ARN in CreateOutputResponse
https://github.com/aws/aws-controllers-k8s/issues/270
type: string
ownerAccountID:
Expand Down
13 changes: 3 additions & 10 deletions helm/crds/eks.services.k8s.aws_addons.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.2
name: addons.eks.services.k8s.aws
spec:
group: eks.services.k8s.aws
Expand Down Expand Up @@ -64,7 +64,6 @@ spec:
description: |-
AddonSpec defines the desired state of Addon.
An Amazon EKS add-on. For more information, see Amazon EKS add-ons (https://docs.aws.amazon.com/eks/latest/userguide/eks-add-ons.html)
in the Amazon EKS User Guide.
properties:
Expand All @@ -84,7 +83,7 @@ spec:
clusterRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand Down Expand Up @@ -113,25 +112,21 @@ spec:
How to resolve field value conflicts for an Amazon EKS add-on. Conflicts
are handled based on the value you choose:
- None – If the self-managed version of the add-on is installed on your
cluster, Amazon EKS doesn't change the value. Creation of the add-on might
fail.
- Overwrite – If the self-managed version of the add-on is installed
on your cluster and the Amazon EKS default value is different than the
existing value, Amazon EKS changes the value to the Amazon EKS default
value.
- Preserve – This is similar to the NONE option. If the self-managed
version of the add-on is installed on your cluster Amazon EKS doesn't
change the add-on resource properties. Creation of the add-on might fail
if conflicts are detected. This option works differently during the update
operation. For more information, see UpdateAddon (https://docs.aws.amazon.com/eks/latest/APIReference/API_UpdateAddon.html).
If you don't currently have the self-managed version of the add-on installed
on your cluster, the Amazon EKS add-on is installed. Amazon EKS sets all
values to default values, regardless of the option that you specify.
Expand All @@ -145,7 +140,6 @@ spec:
Amazon EKS node IAM role (https://docs.aws.amazon.com/eks/latest/userguide/create-node-role.html)
in the Amazon EKS User Guide.
To specify an existing IAM role, you must have an IAM OpenID Connect (OIDC)
provider created for your cluster. For more information, see Enabling IAM
roles for service accounts on your cluster (https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html)
Expand All @@ -154,7 +148,7 @@ spec:
serviceAccountRoleRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand Down Expand Up @@ -196,7 +190,6 @@ spec:
when it has verified that an "adopted" resource (a resource where the
ARN annotation was set by the Kubernetes user on the CR) exists and
matches the supplied CR's Spec field values.
TODO(vijat@): Find a better strategy for resources that do not have ARN in CreateOutputResponse
https://github.com/aws/aws-controllers-k8s/issues/270
type: string
ownerAccountID:
Expand Down
12 changes: 4 additions & 8 deletions helm/crds/eks.services.k8s.aws_clusters.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.2
name: clusters.eks.services.k8s.aws
spec:
group: eks.services.k8s.aws
Expand Down Expand Up @@ -61,7 +61,6 @@ spec:
description: |-
ClusterSpec defines the desired state of Cluster.
An object representing an Amazon EKS cluster.
properties:
accessConfig:
Expand Down Expand Up @@ -125,7 +124,6 @@ spec:
plane logs (https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html)
in the Amazon EKS User Guide .
CloudWatch Logs ingestion, archive storage, and data scanning rates apply
to exported control plane logs. For more information, see CloudWatch Pricing
(http://aws.amazon.com/cloudwatch/pricing/).
Expand Down Expand Up @@ -201,7 +199,7 @@ spec:
items:
description: "AWSResourceReferenceWrapper provides a wrapper
around *AWSResourceReference\ntype to provide more user friendly
syntax for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
syntax for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand All @@ -225,7 +223,7 @@ spec:
items:
description: "AWSResourceReferenceWrapper provides a wrapper
around *AWSResourceReference\ntype to provide more user friendly
syntax for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
syntax for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand All @@ -252,7 +250,7 @@ spec:
roleRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand All @@ -279,7 +277,6 @@ spec:
The desired Kubernetes version for your cluster. If you don't specify a value
here, the default version available in Amazon EKS is used.
The default version might not be the latest version available.
type: string
required:
Expand All @@ -303,7 +300,6 @@ spec:
when it has verified that an "adopted" resource (a resource where the
ARN annotation was set by the Kubernetes user on the CR) exists and
matches the supplied CR's Spec field values.
TODO(vijat@): Find a better strategy for resources that do not have ARN in CreateOutputResponse
https://github.com/aws/aws-controllers-k8s/issues/270
type: string
ownerAccountID:
Expand Down
10 changes: 4 additions & 6 deletions helm/crds/eks.services.k8s.aws_fargateprofiles.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.2
name: fargateprofiles.eks.services.k8s.aws
spec:
group: eks.services.k8s.aws
Expand Down Expand Up @@ -57,7 +57,6 @@ spec:
description: |-
FargateProfileSpec defines the desired state of FargateProfile.
An object representing an Fargate profile.
properties:
clientRequestToken:
Expand All @@ -71,7 +70,7 @@ spec:
clusterRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand Down Expand Up @@ -100,7 +99,7 @@ spec:
podExecutionRoleRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand Down Expand Up @@ -135,7 +134,7 @@ spec:
items:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand Down Expand Up @@ -186,7 +185,6 @@ spec:
when it has verified that an "adopted" resource (a resource where the
ARN annotation was set by the Kubernetes user on the CR) exists and
matches the supplied CR's Spec field values.
TODO(vijat@): Find a better strategy for resources that do not have ARN in CreateOutputResponse
https://github.com/aws/aws-controllers-k8s/issues/270
type: string
ownerAccountID:
Expand Down
6 changes: 2 additions & 4 deletions helm/crds/eks.services.k8s.aws_identityproviderconfigs.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.2
name: identityproviderconfigs.eks.services.k8s.aws
spec:
group: eks.services.k8s.aws
Expand Down Expand Up @@ -41,7 +41,6 @@ spec:
description: |-
IdentityProviderConfigSpec defines the desired state of IdentityProviderConfig.
An object representing an identity provider configuration.
properties:
clusterName:
Expand All @@ -50,7 +49,7 @@ spec:
clusterRef:
description: "AWSResourceReferenceWrapper provides a wrapper around
*AWSResourceReference\ntype to provide more user friendly syntax
for references using 'from' field\nEx:\nAPIIDRef:\n\n\n\tfrom:\n\t
for references using 'from' field\nEx:\nAPIIDRef:\n\n\tfrom:\n\t
\ name: my-api"
properties:
from:
Expand Down Expand Up @@ -116,7 +115,6 @@ spec:
when it has verified that an "adopted" resource (a resource where the
ARN annotation was set by the Kubernetes user on the CR) exists and
matches the supplied CR's Spec field values.
TODO(vijat@): Find a better strategy for resources that do not have ARN in CreateOutputResponse
https://github.com/aws/aws-controllers-k8s/issues/270
type: string
ownerAccountID:
Expand Down
Loading

0 comments on commit 79ab804

Please sign in to comment.