Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions stable/aws-load-balancer-controller/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v2
name: aws-load-balancer-controller
description: AWS Load Balancer Controller Helm chart for Kubernetes
version: 1.14.1
appVersion: v2.14.1
version: 1.15.0
appVersion: v2.15.0
home: https://github.com/aws/eks-charts
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
sources:
Expand Down
22 changes: 4 additions & 18 deletions stable/aws-load-balancer-controller/crds/aga-crds.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.19.0
name: globalaccelerators.aga.k8s.aws
spec:
group: aga.k8s.aws
Expand Down Expand Up @@ -196,7 +196,6 @@ spec:
For example, you can create a port override in which the listener receives user traffic on ports 80 and 443,
but your accelerator routes that traffic to ports 1080 and 1443, respectively, on the endpoints.


For more information, see Port overrides in the AWS Global Accelerator Developer Guide:
https://docs.aws.amazon.com/global-accelerator/latest/dg/about-endpoint-groups-port-override.html
properties:
Expand Down Expand Up @@ -303,16 +302,8 @@ spec:
conditions:
description: Conditions represent the current conditions of the GlobalAccelerator.
items:
description: "Condition contains details for one aspect of the current
state of this API Resource.\n---\nThis struct is intended for
direct use as an array at the field path .status.conditions. For
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
observations of a foo's current state.\n\t // Known .status.conditions.type
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
\ // other fields\n\t}"
description: Condition contains details for one aspect of the current
state of this API Resource.
properties:
lastTransitionTime:
description: |-
Expand Down Expand Up @@ -353,12 +344,7 @@ spec:
- Unknown
type: string
type:
description: |-
type of condition in CamelCase or in foo.example.com/CamelCase.
---
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
useful (see .node.status.conditions), the ability to deconflict is important.
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
description: type of condition in CamelCase or in foo.example.com/CamelCase.
maxLength: 316
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
type: string
Expand Down
6 changes: 4 additions & 2 deletions stable/aws-load-balancer-controller/crds/crds.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.19.0
name: ingressclassparams.elbv2.k8s.aws
spec:
group: elbv2.k8s.aws
Expand Down Expand Up @@ -301,7 +301,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.19.0
name: targetgroupbindings.elbv2.k8s.aws
spec:
group: elbv2.k8s.aws
Expand Down Expand Up @@ -729,6 +729,8 @@ spec:
- TLS
- UDP
- TCP_UDP
- QUIC
- TCP_QUIC
type: string
targetType:
description: targetType is the TargetType of TargetGroup. If unspecified,
Expand Down
30 changes: 15 additions & 15 deletions stable/aws-load-balancer-controller/crds/gateway-crds.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.19.0
name: listenerruleconfigurations.gateway.k8s.aws
spec:
group: gateway.k8s.aws
Expand Down Expand Up @@ -50,11 +50,9 @@ spec:
Actions defines the set of actions to be performed when conditions match.
This CRD implementation currently supports only authenticate-oidc, authenticate-cognito, and fixed-response action types fully and forward and redirect actions partially


For other fields in forward and redirect actions, please use the standard Gateway API HTTPRoute or other route resources, which provide
native support for those conditions through the Gateway API specification.


At most one authentication action can be specified (either authenticate-oidc or authenticate-cognito).
items:
description: Action defines an action for a listener rule
Expand Down Expand Up @@ -84,7 +82,6 @@ spec:
description: |-
The set of user claims to be requested from the IdP. The default is openid .


To verify which scope values your IdP supports and how to separate multiple
values, see the documentation for your IdP.
type: string
Expand Down Expand Up @@ -155,7 +152,6 @@ spec:
description: |-
The set of user claims to be requested from the IdP. The default is openid .


To verify which scope values your IdP supports and how to separate multiple
values, see the documentation for your IdP.
type: string
Expand Down Expand Up @@ -313,7 +309,6 @@ spec:
Conditions defines the circumstances under which the rule actions will be performed.
This CRD implementation currently supports only the source-ip condition type


For other condition types (such as path-pattern, host-header, http-header, etc.),
please use the standard Gateway API HTTPRoute or other route resources, which provide
native support for those conditions through the Gateway API specification.
Expand Down Expand Up @@ -402,7 +397,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.19.0
name: loadbalancerconfigurations.gateway.k8s.aws
spec:
group: gateway.k8s.aws
Expand Down Expand Up @@ -449,6 +444,12 @@ spec:
customerOwnedIpv4Pool [Application LoadBalancer]
is the ID of the customer-owned address for Application Load Balancers on Outposts pool.
type: string
disableSecurityGroup:
description: |-
disableSecurityGroup provisions a load balancer with no security groups.
Allows an NLB to be provisioned with no security groups.
[Network Load Balancer]
type: boolean
enableICMP:
description: |-
EnableICMP [Network LoadBalancer]
Expand Down Expand Up @@ -736,7 +737,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.19.0
name: targetgroupconfigurations.gateway.k8s.aws
spec:
group: gateway.k8s.aws
Expand Down Expand Up @@ -815,9 +816,9 @@ spec:
with the target. The GENEVE, TLS, UDP, and TCP_UDP protocols
are not supported for health checks.
enum:
- http
- https
- tcp
- HTTP
- HTTPS
- TCP
type: string
healthCheckTimeout:
description: healthCheckTimeout The amount of time, in seconds,
Expand Down Expand Up @@ -1008,9 +1009,9 @@ spec:
and TCP_UDP protocols are not supported for health
checks.
enum:
- http
- https
- tcp
- HTTP
- HTTPS
- TCP
type: string
healthCheckTimeout:
description: healthCheckTimeout The amount of time,
Expand Down Expand Up @@ -1174,7 +1175,6 @@ spec:
Kind is the Kubernetes resource kind of the referent. For example
"Service".


Defaults to "Service" when not specified.
type: string
name:
Expand Down
44 changes: 44 additions & 0 deletions stable/aws-load-balancer-controller/templates/cert-manager.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{{- if and .Values.enableCertManager (not .Values.certManager.issuerRef) -}}
# Create a selfsigned Issuer, in order to create a root CA certificate for
# signing webhook serving certificates
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-selfsigned-issuer
namespace: {{ .Release.Namespace }}
labels:
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
spec:
selfSigned: {}
---
# Generate a CA Certificate used to sign certificates for the webhook
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-cert
namespace: {{ .Release.Namespace }}
labels:
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
spec:
secretName: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-cert
duration: {{ .Values.certManager.rootCert.duration | default "43800h0m0s" | quote }}
issuerRef:
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-selfsigned-issuer
commonName: "ca.webhook.aws-load-balancer-controller"
isCA: true
subject:
organizations:
- aws-load-balancer-controller
---
# Create an Issuer that uses the above generated CA certificate to issue certs
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-issuer
namespace: {{ .Release.Namespace }}
labels:
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
spec:
ca:
secretName: {{ template "aws-load-balancer-controller.namePrefix" . }}-root-cert
{{- end -}}
Loading