Skip to content

Commit dbc141c

Browse files
authored
aws-load-balancer-controller: v2.15.0 (#1266)
1 parent f8c200d commit dbc141c

File tree

8 files changed

+151
-66
lines changed

8 files changed

+151
-66
lines changed

stable/aws-load-balancer-controller/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
apiVersion: v2
22
name: aws-load-balancer-controller
33
description: AWS Load Balancer Controller Helm chart for Kubernetes
4-
version: 1.14.1
5-
appVersion: v2.14.1
4+
version: 1.15.0
5+
appVersion: v2.15.0
66
home: https://github.com/aws/eks-charts
77
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
88
sources:

stable/aws-load-balancer-controller/crds/aga-crds.yaml

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
33
kind: CustomResourceDefinition
44
metadata:
55
annotations:
6-
controller-gen.kubebuilder.io/version: v0.14.0
6+
controller-gen.kubebuilder.io/version: v0.19.0
77
name: globalaccelerators.aga.k8s.aws
88
spec:
99
group: aga.k8s.aws
@@ -196,7 +196,6 @@ spec:
196196
For example, you can create a port override in which the listener receives user traffic on ports 80 and 443,
197197
but your accelerator routes that traffic to ports 1080 and 1443, respectively, on the endpoints.
198198
199-
200199
For more information, see Port overrides in the AWS Global Accelerator Developer Guide:
201200
https://docs.aws.amazon.com/global-accelerator/latest/dg/about-endpoint-groups-port-override.html
202201
properties:
@@ -303,16 +302,8 @@ spec:
303302
conditions:
304303
description: Conditions represent the current conditions of the GlobalAccelerator.
305304
items:
306-
description: "Condition contains details for one aspect of the current
307-
state of this API Resource.\n---\nThis struct is intended for
308-
direct use as an array at the field path .status.conditions. For
309-
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
310-
observations of a foo's current state.\n\t // Known .status.conditions.type
311-
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
312-
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
313-
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
314-
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
315-
\ // other fields\n\t}"
305+
description: Condition contains details for one aspect of the current
306+
state of this API Resource.
316307
properties:
317308
lastTransitionTime:
318309
description: |-
@@ -353,12 +344,7 @@ spec:
353344
- Unknown
354345
type: string
355346
type:
356-
description: |-
357-
type of condition in CamelCase or in foo.example.com/CamelCase.
358-
---
359-
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
360-
useful (see .node.status.conditions), the ability to deconflict is important.
361-
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
347+
description: type of condition in CamelCase or in foo.example.com/CamelCase.
362348
maxLength: 316
363349
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
364350
type: string

stable/aws-load-balancer-controller/crds/crds.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
22
kind: CustomResourceDefinition
33
metadata:
44
annotations:
5-
controller-gen.kubebuilder.io/version: v0.14.0
5+
controller-gen.kubebuilder.io/version: v0.19.0
66
name: ingressclassparams.elbv2.k8s.aws
77
spec:
88
group: elbv2.k8s.aws
@@ -301,7 +301,7 @@ apiVersion: apiextensions.k8s.io/v1
301301
kind: CustomResourceDefinition
302302
metadata:
303303
annotations:
304-
controller-gen.kubebuilder.io/version: v0.14.0
304+
controller-gen.kubebuilder.io/version: v0.19.0
305305
name: targetgroupbindings.elbv2.k8s.aws
306306
spec:
307307
group: elbv2.k8s.aws
@@ -729,6 +729,8 @@ spec:
729729
- TLS
730730
- UDP
731731
- TCP_UDP
732+
- QUIC
733+
- TCP_QUIC
732734
type: string
733735
targetType:
734736
description: targetType is the TargetType of TargetGroup. If unspecified,

stable/aws-load-balancer-controller/crds/gateway-crds.yaml

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
33
kind: CustomResourceDefinition
44
metadata:
55
annotations:
6-
controller-gen.kubebuilder.io/version: v0.14.0
6+
controller-gen.kubebuilder.io/version: v0.19.0
77
name: listenerruleconfigurations.gateway.k8s.aws
88
spec:
99
group: gateway.k8s.aws
@@ -50,11 +50,9 @@ spec:
5050
Actions defines the set of actions to be performed when conditions match.
5151
This CRD implementation currently supports only authenticate-oidc, authenticate-cognito, and fixed-response action types fully and forward and redirect actions partially
5252
53-
5453
For other fields in forward and redirect actions, please use the standard Gateway API HTTPRoute or other route resources, which provide
5554
native support for those conditions through the Gateway API specification.
5655
57-
5856
At most one authentication action can be specified (either authenticate-oidc or authenticate-cognito).
5957
items:
6058
description: Action defines an action for a listener rule
@@ -84,7 +82,6 @@ spec:
8482
description: |-
8583
The set of user claims to be requested from the IdP. The default is openid .
8684
87-
8885
To verify which scope values your IdP supports and how to separate multiple
8986
values, see the documentation for your IdP.
9087
type: string
@@ -155,7 +152,6 @@ spec:
155152
description: |-
156153
The set of user claims to be requested from the IdP. The default is openid .
157154
158-
159155
To verify which scope values your IdP supports and how to separate multiple
160156
values, see the documentation for your IdP.
161157
type: string
@@ -313,7 +309,6 @@ spec:
313309
Conditions defines the circumstances under which the rule actions will be performed.
314310
This CRD implementation currently supports only the source-ip condition type
315311
316-
317312
For other condition types (such as path-pattern, host-header, http-header, etc.),
318313
please use the standard Gateway API HTTPRoute or other route resources, which provide
319314
native support for those conditions through the Gateway API specification.
@@ -402,7 +397,7 @@ apiVersion: apiextensions.k8s.io/v1
402397
kind: CustomResourceDefinition
403398
metadata:
404399
annotations:
405-
controller-gen.kubebuilder.io/version: v0.14.0
400+
controller-gen.kubebuilder.io/version: v0.19.0
406401
name: loadbalancerconfigurations.gateway.k8s.aws
407402
spec:
408403
group: gateway.k8s.aws
@@ -449,6 +444,12 @@ spec:
449444
customerOwnedIpv4Pool [Application LoadBalancer]
450445
is the ID of the customer-owned address for Application Load Balancers on Outposts pool.
451446
type: string
447+
disableSecurityGroup:
448+
description: |-
449+
disableSecurityGroup provisions a load balancer with no security groups.
450+
Allows an NLB to be provisioned with no security groups.
451+
[Network Load Balancer]
452+
type: boolean
452453
enableICMP:
453454
description: |-
454455
EnableICMP [Network LoadBalancer]
@@ -736,7 +737,7 @@ apiVersion: apiextensions.k8s.io/v1
736737
kind: CustomResourceDefinition
737738
metadata:
738739
annotations:
739-
controller-gen.kubebuilder.io/version: v0.14.0
740+
controller-gen.kubebuilder.io/version: v0.19.0
740741
name: targetgroupconfigurations.gateway.k8s.aws
741742
spec:
742743
group: gateway.k8s.aws
@@ -815,9 +816,9 @@ spec:
815816
with the target. The GENEVE, TLS, UDP, and TCP_UDP protocols
816817
are not supported for health checks.
817818
enum:
818-
- http
819-
- https
820-
- tcp
819+
- HTTP
820+
- HTTPS
821+
- TCP
821822
type: string
822823
healthCheckTimeout:
823824
description: healthCheckTimeout The amount of time, in seconds,
@@ -1008,9 +1009,9 @@ spec:
10081009
and TCP_UDP protocols are not supported for health
10091010
checks.
10101011
enum:
1011-
- http
1012-
- https
1013-
- tcp
1012+
- HTTP
1013+
- HTTPS
1014+
- TCP
10141015
type: string
10151016
healthCheckTimeout:
10161017
description: healthCheckTimeout The amount of time,
@@ -1174,7 +1175,6 @@ spec:
11741175
Kind is the Kubernetes resource kind of the referent. For example
11751176
"Service".
11761177
1177-
11781178
Defaults to "Service" when not specified.
11791179
type: string
11801180
name:
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{{- if and .Values.enableCertManager (not .Values.certManager.issuerRef) -}}
2+
# Create a selfsigned Issuer, in order to create a root CA certificate for
3+
# signing webhook serving certificates
4+
apiVersion: cert-manager.io/v1
5+
kind: Issuer
6+
metadata:
7+
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-selfsigned-issuer
8+
namespace: {{ .Release.Namespace }}
9+
labels:
10+
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
11+
spec:
12+
selfSigned: {}
13+
---
14+
# Generate a CA Certificate used to sign certificates for the webhook
15+
apiVersion: cert-manager.io/v1
16+
kind: Certificate
17+
metadata:
18+
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-cert
19+
namespace: {{ .Release.Namespace }}
20+
labels:
21+
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
22+
spec:
23+
secretName: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-cert
24+
duration: {{ .Values.certManager.rootCert.duration | default "43800h0m0s" | quote }}
25+
issuerRef:
26+
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-selfsigned-issuer
27+
commonName: "ca.webhook.aws-load-balancer-controller"
28+
isCA: true
29+
subject:
30+
organizations:
31+
- aws-load-balancer-controller
32+
---
33+
# Create an Issuer that uses the above generated CA certificate to issue certs
34+
apiVersion: cert-manager.io/v1
35+
kind: Issuer
36+
metadata:
37+
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-issuer
38+
namespace: {{ .Release.Namespace }}
39+
labels:
40+
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
41+
spec:
42+
ca:
43+
secretName: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-cert
44+
{{- end -}}

0 commit comments

Comments
 (0)