Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm): update chart ingress-nginx ( 4.11.3 → 4.12.0 ) #1674

Merged
merged 1 commit into from
Jan 1, 2025

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Dec 30, 2024

This PR contains the following updates:

Package Update Change
ingress-nginx minor 4.11.3 -> 4.12.0

Release Notes

kubernetes/ingress-nginx (ingress-nginx)

v4.12.0

Changelog

This file documents all notable changes to ingress-nginx Helm Chart. The release numbering uses semantic versioning.

4.12.0
  • CI: Fix chart testing. (#​12258)
  • Update Ingress-Nginx version controller-v1.12.0

Full Changelog: kubernetes/ingress-nginx@helm-chart-4.11.0...helm-chart-4.12.0

v4.11.4

Changelog

This file documents all notable changes to ingress-nginx Helm Chart. The release numbering uses semantic versioning.

4.11.4
  • CI: Fix chart testing. (#​12259)
  • Update Ingress-Nginx version controller-v1.11.4

Full Changelog: kubernetes/ingress-nginx@helm-chart-4.11.3...helm-chart-4.11.4


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

--- kubernetes/main/apps/network/ingress-nginx/internal Kustomization: flux-system/ingress-nginx-internal HelmRelease: network/ingress-nginx-internal

+++ kubernetes/main/apps/network/ingress-nginx/internal Kustomization: flux-system/ingress-nginx-internal HelmRelease: network/ingress-nginx-internal

@@ -13,13 +13,13 @@

     spec:
       chart: ingress-nginx
       sourceRef:
         kind: HelmRepository
         name: ingress-nginx
         namespace: flux-system
-      version: 4.11.3
+      version: 4.12.0
   interval: 30m
   values:
     controller:
       admissionWebhooks:
         objectSelector:
           matchExpressions:
--- kubernetes/main/apps/network/ingress-nginx/external Kustomization: flux-system/ingress-nginx-external HelmRelease: network/ingress-nginx-external

+++ kubernetes/main/apps/network/ingress-nginx/external Kustomization: flux-system/ingress-nginx-external HelmRelease: network/ingress-nginx-external

@@ -13,13 +13,13 @@

     spec:
       chart: ingress-nginx
       sourceRef:
         kind: HelmRepository
         name: ingress-nginx
         namespace: flux-system
-      version: 4.11.3
+      version: 4.12.0
   interval: 30m
   values:
     controller:
       admissionWebhooks:
         objectSelector:
           matchExpressions:

Copy link

--- HelmRelease: network/ingress-nginx-internal Deployment: network/ingress-nginx-internal-controller

+++ HelmRelease: network/ingress-nginx-internal Deployment: network/ingress-nginx-internal-controller

@@ -30,13 +30,13 @@

         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: controller
     spec:
       dnsPolicy: ClusterFirst
       containers:
       - name: controller
-        image: registry.k8s.io/ingress-nginx/controller:v1.11.3@sha256:d56f135b6462cfc476447cfe564b83a45e8bb7da2774963b00d12161112270b7
+        image: registry.k8s.io/ingress-nginx/controller:v1.12.0@sha256:e6b8de175acda6ca913891f0f727bca4527e797d52688cbe9fec9040d6f6b6fa
         imagePullPolicy: IfNotPresent
         lifecycle:
           preStop:
             exec:
               command:
               - /wait-shutdown
@@ -47,17 +47,17 @@

         - --controller-class=k8s.io/ingress-internal
         - --ingress-class=nginx
         - --configmap=$(POD_NAMESPACE)/ingress-nginx-internal-controller
         - --validating-webhook=:8443
         - --validating-webhook-certificate=/usr/local/certificates/cert
         - --validating-webhook-key=/usr/local/certificates/key
-        - --enable-metrics=false
         - --default-ssl-certificate=network/main-domain-tls
         securityContext:
           runAsNonRoot: true
           runAsUser: 101
+          runAsGroup: 82
           allowPrivilegeEscalation: false
           seccompProfile:
             type: RuntimeDefault
           capabilities:
             drop:
             - ALL
--- HelmRelease: network/ingress-nginx-internal Job: network/ingress-nginx-internal-admission-create

+++ HelmRelease: network/ingress-nginx-internal Job: network/ingress-nginx-internal-admission-create

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: create
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
         imagePullPolicy: IfNotPresent
         args:
         - create
         - --host=ingress-nginx-internal-controller-admission,ingress-nginx-internal-controller-admission.$(POD_NAMESPACE).svc
         - --namespace=$(POD_NAMESPACE)
         - --secret-name=ingress-nginx-internal-admission
@@ -41,12 +41,13 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
+          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: ingress-nginx-internal-admission
--- HelmRelease: network/ingress-nginx-internal Job: network/ingress-nginx-internal-admission-patch

+++ HelmRelease: network/ingress-nginx-internal Job: network/ingress-nginx-internal-admission-patch

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: patch
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
         imagePullPolicy: IfNotPresent
         args:
         - patch
         - --webhook-name=ingress-nginx-internal-admission
         - --namespace=$(POD_NAMESPACE)
         - --patch-mutating=false
@@ -43,12 +43,13 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
+          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: ingress-nginx-internal-admission
--- HelmRelease: network/ingress-nginx-external Deployment: network/ingress-nginx-external-controller

+++ HelmRelease: network/ingress-nginx-external Deployment: network/ingress-nginx-external-controller

@@ -30,13 +30,13 @@

         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: controller
     spec:
       dnsPolicy: ClusterFirst
       containers:
       - name: controller
-        image: registry.k8s.io/ingress-nginx/controller:v1.11.3@sha256:d56f135b6462cfc476447cfe564b83a45e8bb7da2774963b00d12161112270b7
+        image: registry.k8s.io/ingress-nginx/controller:v1.12.0@sha256:e6b8de175acda6ca913891f0f727bca4527e797d52688cbe9fec9040d6f6b6fa
         imagePullPolicy: IfNotPresent
         lifecycle:
           preStop:
             exec:
               command:
               - /wait-shutdown
@@ -46,18 +46,18 @@

         - --controller-class=k8s.io/ingress-external
         - --ingress-class=nginx
         - --configmap=$(POD_NAMESPACE)/ingress-nginx-external-controller
         - --validating-webhook=:8443
         - --validating-webhook-certificate=/usr/local/certificates/cert
         - --validating-webhook-key=/usr/local/certificates/key
-        - --enable-metrics=false
         - --default-ssl-certificate=network/main-domain-tls
         - --publish-status-address=ingress-ext...PLACEHOLDER_domain..
         securityContext:
           runAsNonRoot: true
           runAsUser: 101
+          runAsGroup: 82
           allowPrivilegeEscalation: false
           seccompProfile:
             type: RuntimeDefault
           capabilities:
             drop:
             - ALL
--- HelmRelease: network/ingress-nginx-external Job: network/ingress-nginx-external-admission-create

+++ HelmRelease: network/ingress-nginx-external Job: network/ingress-nginx-external-admission-create

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: create
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
         imagePullPolicy: IfNotPresent
         args:
         - create
         - --host=ingress-nginx-external-controller-admission,ingress-nginx-external-controller-admission.$(POD_NAMESPACE).svc
         - --namespace=$(POD_NAMESPACE)
         - --secret-name=ingress-nginx-external-admission
@@ -41,12 +41,13 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
+          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: ingress-nginx-external-admission
--- HelmRelease: network/ingress-nginx-external Job: network/ingress-nginx-external-admission-patch

+++ HelmRelease: network/ingress-nginx-external Job: network/ingress-nginx-external-admission-patch

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: patch
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
         imagePullPolicy: IfNotPresent
         args:
         - patch
         - --webhook-name=ingress-nginx-external-admission
         - --namespace=$(POD_NAMESPACE)
         - --patch-mutating=false
@@ -43,12 +43,13 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
+          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: ingress-nginx-external-admission

@cubic3d cubic3d merged commit 5035136 into main Jan 1, 2025
11 checks passed
@cubic3d cubic3d deleted the renovate/main-ingress-nginx-4.x branch January 1, 2025 16:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant