Skip to content

Commit

Permalink
Merge branch 'main' into dependabot/go_modules/tests/github.com/docke…
Browse files Browse the repository at this point in the history
…r/docker-25.0.6incompatible
  • Loading branch information
amitlicht authored Sep 15, 2024
2 parents c8d1d9f + 5d35349 commit c5f5521
Show file tree
Hide file tree
Showing 6 changed files with 9 additions and 7 deletions.
4 changes: 2 additions & 2 deletions credentials-operator/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@ apiVersion: v2
name: credentials-operator
description: credentials-operator
type: application
version: 3.0.6
appVersion: v3.0.2
version: 3.0.8
appVersion: v3.0.4
home: https://github.com/otterize/credentials-operator
sources:
- https://github.com/otterize/credentials-operator
4 changes: 2 additions & 2 deletions intents-operator/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@ apiVersion: v2
name: intents-operator
description: Otterize intents operator
type: application
version: 3.0.32
appVersion: v2.0.18
version: 3.0.35
appVersion: v2.0.20
home: https://github.com/otterize/intents-operator
sources:
- https://github.com/otterize/intents-operator
1 change: 1 addition & 0 deletions intents-operator/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,7 @@
| `operator.enableKafkaACLCreation` | Whether the operator should create Kafka ACL rules according to ClientIntents of type Kafka | `true` |
| `operator.enableIstioPolicyCreation` | Whether the operator should create Istio authorization policies according to ClientIntents | `true` |
| `operator.ingressControllerConfigs` | Restricts the automatically created external traffic network policies to only allow access to an ingress controller within the cluster. Only relevant if you use an in-cluster ingress controller, such as nginx or HAProxy. A list of objects with keys `name`, `namespace` and `kind`, such as `ingress-nginx-controller`, `nginx` and `Deployment`. | `(none)` |
| `operator.ingressControllerAWSALBExempt` | If set to true, the operator will allow all traffic if an Ingress is managed by the AWS ALB Ingress Controller. | `false` |
| `operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always` (this option is **experimental**). Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` |
| `operator.resources` | Resources override. | |
| `operator.enableDatabasePolicyCreation` | Whether the operator should create database policies according to ClientIntents | `true` |
Expand Down
4 changes: 2 additions & 2 deletions network-mapper/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v2
name: network-mapper
type: application
version: 2.0.20
appVersion: v2.0.8
version: 2.0.21
appVersion: v2.0.7
home: https://github.com/otterize/network-mapper
sources:
- https://github.com/otterize/network-mapper
2 changes: 1 addition & 1 deletion otterize-kubernetes/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ name: otterize-kubernetes
description: |
This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper.
type: application
version: 4.0.28
version: 4.0.34
home: https://github.com/otterize/helm-charts
kubeVersion: ">=1.19.0-0"
dependencies:
Expand Down
1 change: 1 addition & 0 deletions otterize-kubernetes/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,7 @@ Further information about intents-operator parameters can be found [in the Inten
| `intentsOperator.operator.enableKafkaACLCreation` | Whether the operator should create Kafka ACL rules according to the ClientIntents of type Kafka | `true` |
| `intentsOperator.operator.enableIstioPolicyCreation` | Whether the operator should create Istio authorization policies according to ClientIntents | `true` |
| `intentsOperator.operator.ingressControllerConfigs` | Restricts the automatically created external traffic network policies to only allow access to an ingress controller within the cluster. Only relevant if you use an in-cluster ingress controller, such as nginx or HAProxy. A list of objects with keys `name`, `namespace` and `kind`, such as `ingress-nginx-controller`, `nginx` and `Deployment`. | `(none)` |
| `intentsOperator.operator.ingressControllerAWSALBExempt` | If set to true, the operator will allow all traffic if an Ingress is managed by the AWS ALB Ingress Controller. | `false` |
| `intentsOperator.operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always` (this option is **experimental**). Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` |
| `intentsOperator.watchedNamespaces` | List of namespaces the intents operator should watch. The operator will be blind to any namespace not in this list. | `(nil) meaning watch all` |
| `intentsOperator.enforcedNamespaces` | When using "shadow enforcement" mode, namespaces in this list will be treated as if the enforcement were active. | `(nil) means no namespace will be active on shadow mode` |
Expand Down

0 comments on commit c5f5521

Please sign in to comment.