chore(deps): update dependency kubernetes-sigs/aws-alb-ingress-controller to v2.10.0 #767
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.7.1->v2.10.0Release Notes
kubernetes-sigs/aws-alb-ingress-controller (kubernetes-sigs/aws-alb-ingress-controller)
v2.10.0Compare Source
v2.10.0 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.10.0
Thanks to all our contributors!
Action required
🚨 🚨 🚨 We’ve added the multiClusterTargetGroup field to the TargetGroupBinding which users can set in order to share target groups among different Kubernetes clusters. Make sure to update the CRD definition in your cluster. If you're upgrading the charts using helm upgrade, you need to update CRDs manually:
kubectl apply -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller/crds?ref=master"ELB has updated their managed policy to include
ec2:GetSecurityGroupsForVpc. We have updated the Load Balancer Controller policy to reflect that change. Please be sure to apply the latest IAM policy when upgrading.What’s new
Enhancement and Fixes
Changelog since v2.9.2
v2.9.2Compare Source
v2.9.2 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.9.2
Thanks to all our contributors! 😊
Action required
N/A
What’s New
N/A
Enhancement and Fixes
ChangeLog since v2.9.0
v2.9.1Compare Source
v2.9.1 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.9.1
Thanks to all our contributors! 😊
Action required
🚨 🚨 🚨 The v2.9.1 contains a bug which will crash controllers with the account subscribed to AWS shield advanced service as described in https://github.com/kubernetes-sigs/aws-load-balancer-controller/issues/3888, please upgrade to v2.9.2+ for the bug fix if your account has subscribed to AWS shield and your controller has shield service enabled.
What’s New
Enhancement and Fixes
ChangeLog since v2.9.0
v2.9.0Compare Source
v2.9.0 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.9.0
Thanks to all our contributors! 😊
Action required
🚨 🚨 🚨 The v2.9.0 contains a bug which will crash controllers with the account subscribed to AWS shield advanced service as described in #3888, please upgrade to v2.9.2+ for the bug fix if your account has subscribed to AWS shield and your controller has shield service enabled.
We've added a
listenerAttributesfield toIngressClassParamsto support listener attributes for load balancers in the future. Note that there are no listener attributes supported on Application Load Balancers (ALBs) yet. Therefore, this field is currently not used. However, updating CRDs is necessary for future compatibility. If you're upgrading the charts using helm upgrade, you need to update CRDs manually:kubectl apply -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller/crds?ref=master"AWS NLB now supports configurable TCP idle timeout. We've updated the reference IAM policies to explicitly add the
elasticloadbalancing:DescribeListenerAttributesandelasticloadbalancing:ModifyListenerAttributespermissions for describing and modifying this listener attribute for NLB's TCP listener resources on controller.What's new
Enhancement and Fixes
Changelog since v2.8.3
Full Changelog: kubernetes-sigs/aws-load-balancer-controller@v2.8.3...v2.9.0
v2.8.3Compare Source
v2.8.3 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.8.3
Thanks to all our contributors! 😊
What's new
Patch CVE
CVE-2024-39689ofca-certificatesintroduced by base image.What's Changed
Full Changelog: kubernetes-sigs/aws-load-balancer-controller@v2.8.2...v2.8.3
v2.8.2Compare Source
v2.8.2 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.8.2
Thanks to all our contributors! 😊
What's new
Enhancements
alb.ingress.kubernetes.io/waf-acl-idalb.ingress.kubernetes.io/wafv2-acl-arnalb.ingress.kubernetes.io/shield-advanced-protectionmanaged by aws-load-balancer-controller) on Application LoadBalancer will be disassociated.managed by aws-load-balancer-controller) will be created and associated with Application LoadBalancer.Changelog since v2.8.1
What's Changed
Full Changelog: kubernetes-sigs/aws-load-balancer-controller@v2.8.1...v2.8.2
v2.8.1Compare Source
v2.8.1 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.8.1
Thanks to all our contributors! 😊
What's new
Dependencies Upgrade:
controller-runtimefrom 0.14.6 to v0.18.2k8s.iodeps from v0.26.x to v0.30.0Bug fixes
restartPolicyfield for k8s 1.29+MutualAuthenticationif the feature is not enabled by cx explicitly. As this object is not supported by ELB API in outposts and local zones currently.resolveViaVPCENIs()to fargate nodes onlyEnhancement
envFromparameter; addcreatorparameter to disable default helm labelsChangelog since v2.8.0
What's Changed
Full Changelog: kubernetes-sigs/aws-load-balancer-controller@v2.8.0...v2.8.1
v2.8.0Compare Source
v2.8.0 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.8.0
Thanks to all our contributors! 😊
Action required
We have added
certificateArnand updatedipAddressTypefields in IngressClassParams, and addedvpcIDfield in TargetGroupBinding. If you are upgrading the charts using helm upgrade, you need to update CRDs manuallykubectl apply -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller/crds?ref=master"ALB mTLS is now available in the China partition. We've updated the reference IAM policies to explicitly add the
elasticloadbalancing:DescribeTrustStorespermission for describing the trust stores resources to use the new mTLS feature for ingresses on controller. If you want to use the ALB mTLS feature in China region, updating your controller IAM policies with the new permissions.Whats new
certificateArnfor Ingress at the IngressClass level. This feature adds newcertificateArnto the IngressClassParams Spec to configure the ARN of the certificates for all Ingresses that belong to IngressClass with this IngressClassParams.dualstack-without-public-ipv4to allow customers to provision load balancers without IPv4s for clients that can connect using just IPv6s. For example, users can choose a dualstack ALB without public IPv4 when setting up a new internet facing ALB, or switch to dualstack without public IPv4 for an existing internet facing ALB by specifyingalb.ingress.kubernetes.io/ip-address-type: dualstack-without-public-ipv4. To set theipAddressTypefor ingress at the IngressClass level, addipAddressType: dualstack-without-public-ipv4to the IngressClassParams Spec. See AWS Launch What’s New Post about this feature.aws-load-balancer-inbound-sg-rules-on-private-link-trafficto configure whether to apply security group rules to traffic sent to the load balancer through AWS PrivateLink.vpcIDto the TargetGroupBinding Spec to allow registration in target groups that are created with in a VPC that is different from the cluster VPC. If thevpcIDis unspecified, the controller will fetch the clustervpcIDby default.alb.ingress.kubernetes.io/security-group-prefix-listsandservice.beta.kubernetes.io/aws-load-balancer-security-group-prefix-liststo ensure the security group attached to the load balancer can allow access from the specified Managed Prefix List. The annotation will be ignored ifalb.ingress.kubernetes.io/security-groupsorservice.beta.kubernetes.io/aws-load-balancer-security-groupsis present.Enhancement and Fixes
Changelog since v2.7.2
v2.7.2Compare Source
v2.7.2 (requires Kubernetes 1.22+)
Documentation
Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.7.2
Thanks to all our contributors! 😊
Enhancement and Fixes
Changelog since v2.7.1
Configuration
📅 Schedule: Branch creation - "* * 1,15 * *" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.