Skip to content

Commit

Permalink
aws-load-balancer-controller: v2.4.1 (aws#713)
Browse files Browse the repository at this point in the history
Co-authored-by: eks-bot <[email protected]>
  • Loading branch information
kishorj and eks-bot authored Mar 17, 2022
1 parent dc44b27 commit be1958e
Show file tree
Hide file tree
Showing 4 changed files with 19 additions and 4 deletions.
4 changes: 2 additions & 2 deletions stable/aws-load-balancer-controller/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v2
name: aws-load-balancer-controller
description: AWS Load Balancer Controller Helm chart for Kubernetes
version: 1.4.0
appVersion: v2.4.0
version: 1.4.1
appVersion: v2.4.1
home: https://github.com/aws/eks-charts
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
sources:
Expand Down
1 change: 1 addition & 0 deletions stable/aws-load-balancer-controller/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -234,3 +234,4 @@ The default values set by the application itself can be confirmed [here](https:/
| `serviceMonitor.enabled` | Specifies whether a service monitor should be created, requires the ServiceMonitor CRD to be installed | `false` |
| `serviceMonitor.additionalLabels` | Labels to add to the service account | `{}` |
| `serviceMonitor.interval` | Prometheus scrape interval | `1m` |
| `clusterSecretsPermissions.allowAllSecrets` | If `true`, controller has access to all secrets in the cluster. | `false` |
7 changes: 6 additions & 1 deletion stable/aws-load-balancer-controller/templates/rbac.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,8 +57,13 @@ rules:
resources: [services, ingresses]
verbs: [get, list, patch, update, watch]
- apiGroups: [""]
resources: [nodes, secrets, namespaces, endpoints]
resources: [nodes, namespaces, endpoints]
verbs: [get, list, watch]
{{- if .Values.clusterSecretsPermissions.allowAllSecrets }}
- apiGroups: [""]
resources: [secrets]
verbs: [get, list, watch]
{{- end }}
- apiGroups: ["elbv2.k8s.aws", "", "extensions", "networking.k8s.io"]
resources: [targetgroupbindings/status, pods/status, services/status, ingresses/status]
verbs: [update, patch]
Expand Down
11 changes: 10 additions & 1 deletion stable/aws-load-balancer-controller/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ replicaCount: 2

image:
repository: 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-load-balancer-controller
tag: v2.4.0
tag: v2.4.1
pullPolicy: IfNotPresent

imagePullSecrets: []
Expand Down Expand Up @@ -266,3 +266,12 @@ serviceMonitor:
additionalLabels: {}
# Prometheus scrape interval
interval: 1m

# clusterSecretsPermissions lets you configure RBAC permissions for secret resources
# Access to secrets resource is required only if you use the OIDC feature, and instead of
# enabling access to all secrets, we recommend configuring namespaced role/rolebinding.
# This option is for backwards compatibility only, and will potentially be deprecated in future.
clusterSecretsPermissions:
# allowAllSecrets allows the controller to access all secrets in the cluster.
# This is to get backwards compatible behavior, but *NOT* recommended for security reasons
allowAllSecrets: false

0 comments on commit be1958e

Please sign in to comment.