Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🌱 bump the dependencies group across 1 directory with 8 updates #922

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: eksconfigs.bootstrap.cluster.x-k8s.io
spec:
group: bootstrap.cluster.x-k8s.io
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: eksconfigtemplates.bootstrap.cluster.x-k8s.io
spec:
group: bootstrap.cluster.x-k8s.io
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: rosacontrolplanes.controlplane.cluster.x-k8s.io
spec:
group: controlplane.cluster.x-k8s.io
Expand Down Expand Up @@ -180,9 +180,7 @@ spec:
This field is effectively required, but due to backwards compatibility is
allowed to be empty. Instances of this type with an empty value here are
almost certainly wrong.
TODO: Add other useful fields. apiVersion, kind, uid?
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Drop `kubebuilder:default` when controller-gen doesn't need it https://github.com/kubernetes-sigs/kubebuilder/issues/3896.
type: string
type: object
x-kubernetes-map-type: atomic
Expand All @@ -194,7 +192,6 @@ spec:
As these machinepool not created using ROSAMachinePool CR, they will not be visible/managed by ROSA CAPI provider.
`rosa list machinepools -c <rosaClusterName>` can be used to view those machinepools.


This field will be removed in the future once the current limitation is resolved.
properties:
autoscaling:
Expand Down Expand Up @@ -253,7 +250,6 @@ spec:
ExternalAuthProviders are external OIDC identity providers that can issue tokens for this cluster.
Can only be set if "enableExternalAuthProviders" is set to "True".


At most one provider can be configured.
items:
description: ExternalAuthProvider is an external OIDC identity provider
Expand All @@ -279,10 +275,8 @@ spec:
Prefix is a string to prefix the value from the token in the result of the
claim mapping.


By default, no prefixing occurs.


Example: if `prefix` is set to "myoidc:"" and the `claim` in JWT contains
an array of strings "a", "b" and "c", the mapping will result in an
array of string "myoidc:a", "myoidc:b" and "myoidc:c".
Expand All @@ -295,7 +289,6 @@ spec:
Username is a name of the claim that should be used to construct
usernames for the cluster identity.


Default value: "sub"
properties:
claim:
Expand All @@ -311,14 +304,11 @@ spec:
description: |-
PrefixPolicy specifies how a prefix should apply.


By default, claims other than `email` will be prefixed with the issuer URL to
prevent naming clashes with other plugins.


Set to "NoPrefix" to disable prefixing.


Example:
(1) `prefix` is set to "myoidc:" and `claim` is set to "username".
If the JWT claim `username` contains value `userA`, the resulting
Expand Down Expand Up @@ -574,8 +564,8 @@ spec:
properties:
controlPlaneOperatorARN:
description: "ControlPlaneOperatorARN is an ARN value referencing
a role appropriate for the Control Plane Operator.\n\n\nThe
following is an example of a valid policy document:\n\n\n{\n\t\"Version\":
a role appropriate for the Control Plane Operator.\n\nThe following
is an example of a valid policy document:\n\n{\n\t\"Version\":
\"2012-10-17\",\n\t\"Statement\": [\n\t\t{\n\t\t\t\"Effect\":
\"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"ec2:CreateVpcEndpoint\",\n\t\t\t\t\"ec2:DescribeVpcEndpoints\",\n\t\t\t\t\"ec2:ModifyVpcEndpoint\",\n\t\t\t\t\"ec2:DeleteVpcEndpoints\",\n\t\t\t\t\"ec2:CreateTags\",\n\t\t\t\t\"route53:ListHostedZones\",\n\t\t\t\t\"ec2:CreateSecurityGroup\",\n\t\t\t\t\"ec2:AuthorizeSecurityGroupIngress\",\n\t\t\t\t\"ec2:AuthorizeSecurityGroupEgress\",\n\t\t\t\t\"ec2:DeleteSecurityGroup\",\n\t\t\t\t\"ec2:RevokeSecurityGroupIngress\",\n\t\t\t\t\"ec2:RevokeSecurityGroupEgress\",\n\t\t\t\t\"ec2:DescribeSecurityGroups\",\n\t\t\t\t\"ec2:DescribeVpcs\",\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t},\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\":
Expand All @@ -584,8 +574,8 @@ spec:
type: string
imageRegistryARN:
description: "ImageRegistryARN is an ARN value referencing a role
appropriate for the Image Registry Operator.\n\n\nThe following
is an example of a valid policy document:\n\n\n{\n\t\"Version\":
appropriate for the Image Registry Operator.\n\nThe following
is an example of a valid policy document:\n\n{\n\t\"Version\":
\"2012-10-17\",\n\t\"Statement\": [\n\t\t{\n\t\t\t\"Effect\":
\"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"s3:CreateBucket\",\n\t\t\t\t\"s3:DeleteBucket\",\n\t\t\t\t\"s3:PutBucketTagging\",\n\t\t\t\t\"s3:GetBucketTagging\",\n\t\t\t\t\"s3:PutBucketPublicAccessBlock\",\n\t\t\t\t\"s3:GetBucketPublicAccessBlock\",\n\t\t\t\t\"s3:PutEncryptionConfiguration\",\n\t\t\t\t\"s3:GetEncryptionConfiguration\",\n\t\t\t\t\"s3:PutLifecycleConfiguration\",\n\t\t\t\t\"s3:GetLifecycleConfiguration\",\n\t\t\t\t\"s3:GetBucketLocation\",\n\t\t\t\t\"s3:ListBucket\",\n\t\t\t\t\"s3:GetObject\",\n\t\t\t\t\"s3:PutObject\",\n\t\t\t\t\"s3:DeleteObject\",\n\t\t\t\t\"s3:ListBucketMultipartUploads\",\n\t\t\t\t\"s3:AbortMultipartUpload\",\n\t\t\t\t\"s3:ListMultipartUploadParts\"\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t}\n\t]\n}"
Expand All @@ -597,11 +587,11 @@ spec:
\"Allow\",\n\t\t\t\t\"Principal\": {\n\t\t\t\t\t\"Federated\":
\"{{ .ProviderARN }}\"\n\t\t\t\t},\n\t\t\t\t\t\"Action\": \"sts:AssumeRoleWithWebIdentity\",\n\t\t\t\t\"Condition\":
{\n\t\t\t\t\t\"StringEquals\": {\n\t\t\t\t\t\t\"{{ .ProviderName
}}:sub\": {{ .ServiceAccounts }}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t]\n\t}\n\n\nIngressARN
}}:sub\": {{ .ServiceAccounts }}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t]\n\t}\n\nIngressARN
is an ARN value referencing a role appropriate for the Ingress
Operator.\n\n\nThe following is an example of a valid policy
document:\n\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
[\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"elasticloadbalancing:DescribeLoadBalancers\",\n\t\t\t\t\"tag:GetResources\",\n\t\t\t\t\"route53:ListHostedZones\"\n\t\t\t],\n\t\t\t\"Resource\":
Operator.\n\nThe following is an example of a valid policy document:\n\n{\n\t\"Version\":
\"2012-10-17\",\n\t\"Statement\": [\n\t\t{\n\t\t\t\"Effect\":
\"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"elasticloadbalancing:DescribeLoadBalancers\",\n\t\t\t\t\"tag:GetResources\",\n\t\t\t\t\"route53:ListHostedZones\"\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t},\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\":
[\n\t\t\t\t\"route53:ChangeResourceRecordSets\"\n\t\t\t],\n\t\t\t\"Resource\":
[\n\t\t\t\t\"arn:aws:route53:::PUBLIC_ZONE_ID\",\n\t\t\t\t\"arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t]\n\t\t}\n\t]\n}"
Expand All @@ -613,10 +603,8 @@ spec:
KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies


The following is an example of a valid policy document:


{
"Version": "2012-10-17",
"Statement": [
Expand Down Expand Up @@ -690,8 +678,8 @@ spec:
type: string
networkARN:
description: "NetworkARN is an ARN value referencing a role appropriate
for the Network Operator.\n\n\nThe following is an example of
a valid policy document:\n\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
for the Network Operator.\n\nThe following is an example of
a valid policy document:\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
[\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"ec2:DescribeInstances\",\n
\ \"ec2:DescribeInstanceStatus\",\n \"ec2:DescribeInstanceTypes\",\n
\ \"ec2:UnassignPrivateIpAddresses\",\n \"ec2:AssignPrivateIpAddresses\",\n
Expand All @@ -701,8 +689,8 @@ spec:
type: string
nodePoolManagementARN:
description: "NodePoolManagementARN is an ARN value referencing
a role appropriate for the CAPI Controller.\n\n\nThe following
is an example of a valid policy document:\n\n\n{\n \"Version\":
a role appropriate for the CAPI Controller.\n\nThe following
is an example of a valid policy document:\n\n{\n \"Version\":
\"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n
\ \"ec2:AssociateRouteTable\",\n \"ec2:AttachInternetGateway\",\n
\ \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateInternetGateway\",\n
Expand Down Expand Up @@ -746,8 +734,8 @@ spec:
type: string
storageARN:
description: "StorageARN is an ARN value referencing a role appropriate
for the Storage Operator.\n\n\nThe following is an example of
a valid policy document:\n\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
for the Storage Operator.\n\nThe following is an example of
a valid policy document:\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
[\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"ec2:AttachVolume\",\n\t\t\t\t\"ec2:CreateSnapshot\",\n\t\t\t\t\"ec2:CreateTags\",\n\t\t\t\t\"ec2:CreateVolume\",\n\t\t\t\t\"ec2:DeleteSnapshot\",\n\t\t\t\t\"ec2:DeleteTags\",\n\t\t\t\t\"ec2:DeleteVolume\",\n\t\t\t\t\"ec2:DescribeInstances\",\n\t\t\t\t\"ec2:DescribeSnapshots\",\n\t\t\t\t\"ec2:DescribeTags\",\n\t\t\t\t\"ec2:DescribeVolumes\",\n\t\t\t\t\"ec2:DescribeVolumesModifications\",\n\t\t\t\t\"ec2:DetachVolume\",\n\t\t\t\t\"ec2:ModifyVolume\"\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t}\n\t]\n}"
type: string
Expand Down Expand Up @@ -885,7 +873,6 @@ spec:
FailureMessage will be set in the event that there is a terminal problem
reconciling the state and will be set to a descriptive error message.


This field should not be set for transitive errors that a controller
faces that are expected to be fixed automatically over
time (like service outages), but instead indicate that something is
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: awsclustercontrolleridentities.infrastructure.cluster.x-k8s.io
spec:
group: infrastructure.cluster.x-k8s.io
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: awsclusterroleidentities.infrastructure.cluster.x-k8s.io
spec:
group: infrastructure.cluster.x-k8s.io
Expand Down
Loading
Loading