-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump github.com/gardener/gardener to 1.86.0 #675
Conversation
|
GitGuardian id | Secret | Commit | Filename | |
---|---|---|---|---|
- | RSA Private Key | 7b91753 | example/admission-gcp-certs/tls.key | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Our GitHub checks need improvements? Share your feedbacks!
1642a62
to
2fdadf1
Compare
2fdadf1
to
b57a91b
Compare
b57a91b
to
af12082
Compare
@timuthy You need rebase this pull request with latest master branch. Please check. |
af12082
to
8706432
Compare
8706432
to
0fe6c86
Compare
10d8b72
to
ea8434f
Compare
Since admission controllers now run the certificate controller, leader election must be enabled to prevent any interference.
This change is mostly relevant for deployments without a virtual Garden cluster: In this case, the admission controller needed cluster-wide list/watch permissions for secrets. Restricting the cache to the `--webhook-config-namespace` namespace eliminates this requirement.
Address review comments from similar PR gardener/gardener-extension-networking-calico#327.
2874ebe
to
4feca36
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
How to categorize this PR?
/area open-source
/kind enhancement
/platform gcp
What this PR does / why we need it:
This PR updates the
github.com/gardener/gardener
dependency tov1.86.0
. As a consequence, admission CA and service certificates are now managed automatically. The vendor directory is removed as well.Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Release note: