Skip to content

Commit ed77be1

Browse files
authored
Update to ACK runtime v0.28.0, code-generator v0.28.0 (#94)
### Update to ACK runtime `v0.28.0`, code-generator `v0.28.0` ---------- * ACK code-generator `v0.28.0` [release notes](https://github.com/aws-controllers-k8s/code-generator/releases/tag/v0.28.0) * ACK runtime `v0.28.0` [release notes](https://github.com/aws-controllers-k8s/runtime/releases/tag/v0.28.0) ---------- NOTE: This PR increments the release version of service controller from `v1.3.1` to `v1.3.2` Once this PR is merged, release `v1.3.2` will be automatically created for `iam-controller` **Please close this PR, if you do not want the new patch release for `iam-controller`** ---------- #### stdout for `make build-controller`: ``` building ack-generate ... ok. ==== building iam-controller ==== Copying common custom resource definitions into iam Building Kubernetes API objects for iam Generating deepcopy code for iam Generating custom resource definitions for iam Building service controller for iam Generating RBAC manifests for iam Running gofmt against generated code for iam Updating additional GitHub repository maintenance files ==== building iam-controller release artifacts ==== Building release artifacts for iam-v1.3.2 Generating common custom resource definitions Generating custom resource definitions for iam Generating RBAC manifests for iam ``` ---------- By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
1 parent a9d5991 commit ed77be1

21 files changed

+152
-68
lines changed

apis/v1alpha1/ack-generate-metadata.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
ack_generate_info:
2-
build_date: "2023-11-21T06:03:03Z"
3-
build_hash: 1cc9b5172d3d1676af578a3411e8672698ec29ce
4-
go_version: go1.21.1
5-
version: v0.27.1-5-g1cc9b51
6-
api_directory_checksum: 5f836e773a26000be60b198c9166f83ea86405e1
2+
build_date: "2023-12-14T21:38:38Z"
3+
build_hash: 1f16813c807af6889060b4ce7ded2a69dc027d8c
4+
go_version: go1.21.5
5+
version: v0.28.0
6+
api_directory_checksum: b438ffe12bca1f7e1c8ab3b0a379f1ffd302b49f
77
api_version: v1alpha1
8-
aws_sdk_go_version: v1.44.93
8+
aws_sdk_go_version: v1.49.0
99
generator_config_info:
1010
file_checksum: ee030a9c18c7fa34d8f7f4777997df355c029971
1111
original_file_name: generator.yaml

apis/v1alpha1/open_id_connect_provider.go

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

apis/v1alpha1/role.go

Lines changed: 19 additions & 5 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

apis/v1alpha1/types.go

Lines changed: 3 additions & 3 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

apis/v1alpha1/user.go

Lines changed: 12 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

config/controller/kustomization.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ kind: Kustomization
66
images:
77
- name: controller
88
newName: public.ecr.aws/aws-controllers-k8s/iam-controller
9-
newTag: 1.3.1
9+
newTag: 1.3.2

config/crd/bases/iam.services.k8s.aws_openidconnectproviders.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ spec:
8686
hash value of the certificate used by https://keys.server.example.com.
8787
\n For more information about obtaining the OIDC provider thumbprint,
8888
see Obtaining the thumbprint for an OpenID Connect provider (https://docs.aws.amazon.com/IAM/latest/UserGuide/identity-providers-oidc-obtain-thumbprint.html)
89-
in the IAM User Guide."
89+
in the IAM user Guide."
9090
items:
9191
type: string
9292
type: array

config/crd/bases/iam.services.k8s.aws_roles.yaml

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ spec:
6565
to set for the specified role. If you do not specify a value for
6666
this setting, the default value of one hour is applied. This setting
6767
can have a value from 1 hour to 12 hours. \n Anyone who assumes
68-
the role from the or API can use the DurationSeconds API parameter
68+
the role from the CLI or API can use the DurationSeconds API parameter
6969
or the duration-seconds CLI parameter to request a longer session.
7070
The MaxSessionDuration setting determines the maximum duration that
7171
can be requested using the DurationSeconds parameter. If users don't
@@ -81,7 +81,11 @@ spec:
8181
description: "The name of the role to create. \n IAM user, group,
8282
role, and policy names must be unique within the account. Names
8383
are not distinguished by case. For example, you cannot create resources
84-
named both \"MyResource\" and \"myresource\"."
84+
named both \"MyResource\" and \"myresource\". \n This parameter
85+
allows (through its regex pattern (http://wikipedia.org/wiki/regex))
86+
a string of characters consisting of upper and lowercase alphanumeric
87+
characters with no spaces. You can also include any of the following
88+
characters: _+=,.@-"
8589
type: string
8690
path:
8791
description: "The path to the role. For more information about paths,
@@ -96,8 +100,16 @@ spec:
96100
digits, and upper and lowercased letters."
97101
type: string
98102
permissionsBoundary:
99-
description: The ARN of the policy that is used to set the permissions
100-
boundary for the role.
103+
description: "The ARN of the managed policy that is used to set the
104+
permissions boundary for the role. \n A permissions boundary policy
105+
defines the maximum permissions that identity-based policies can
106+
grant to an entity, but does not grant permissions. Permissions
107+
boundaries do not define the maximum permissions that a resource-based
108+
policy can grant to an entity. To learn more, see Permissions boundaries
109+
for IAM entities (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html)
110+
in the IAM User Guide. \n For more information about policy types,
111+
see Policy types (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types)
112+
in the IAM User Guide."
101113
type: string
102114
permissionsBoundaryRef:
103115
description: "AWSResourceReferenceWrapper provides a wrapper around
@@ -237,7 +249,7 @@ spec:
237249
supporting these features within the last year. The role might have
238250
been used more than 400 days ago. For more information, see Regions
239251
where data is tracked (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#access-advisor_tracking-period)
240-
in the IAM User Guide.
252+
in the IAM user Guide.
241253
properties:
242254
lastUsedDate:
243255
format: date-time

config/crd/bases/iam.services.k8s.aws_users.yaml

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,16 @@ spec:
6161
digits, and upper and lowercased letters."
6262
type: string
6363
permissionsBoundary:
64-
description: The ARN of the policy that is used to set the permissions
65-
boundary for the user.
64+
description: "The ARN of the managed policy that is used to set the
65+
permissions boundary for the user. \n A permissions boundary policy
66+
defines the maximum permissions that identity-based policies can
67+
grant to an entity, but does not grant permissions. Permissions
68+
boundaries do not define the maximum permissions that a resource-based
69+
policy can grant to an entity. To learn more, see Permissions boundaries
70+
for IAM entities (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html)
71+
in the IAM User Guide. \n For more information about policy types,
72+
see Policy types (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types)
73+
in the IAM User Guide."
6674
type: string
6775
permissionsBoundaryRef:
6876
description: "AWSResourceReferenceWrapper provides a wrapper around

go.mod

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,9 @@ module github.com/aws-controllers-k8s/iam-controller
33
go 1.19
44

55
require (
6-
github.com/aws-controllers-k8s/runtime v0.27.1
7-
github.com/aws/aws-sdk-go v1.44.93
6+
github.com/aws-controllers-k8s/runtime v0.28.0
7+
github.com/aws/aws-sdk-go v1.49.0
88
github.com/go-logr/logr v1.2.3
9-
github.com/google/go-cmp v0.5.9
109
github.com/micahhausler/aws-iam-policy v0.4.2
1110
github.com/samber/lo v1.37.0
1211
github.com/spf13/pflag v1.0.5
@@ -36,6 +35,7 @@ require (
3635
github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
3736
github.com/golang/protobuf v1.5.2 // indirect
3837
github.com/google/gnostic v0.5.7-v3refs // indirect
38+
github.com/google/go-cmp v0.5.9 // indirect
3939
github.com/google/gofuzz v1.1.0 // indirect
4040
github.com/google/uuid v1.3.0 // indirect
4141
github.com/imdario/mergo v0.3.12 // indirect
@@ -59,11 +59,11 @@ require (
5959
go.uber.org/multierr v1.6.0 // indirect
6060
go.uber.org/zap v1.24.0 // indirect
6161
golang.org/x/exp v0.0.0-20220303212507-bbda1eaf7a17 // indirect
62-
golang.org/x/net v0.8.0 // indirect
62+
golang.org/x/net v0.17.0 // indirect
6363
golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b // indirect
64-
golang.org/x/sys v0.6.0 // indirect
65-
golang.org/x/term v0.6.0 // indirect
66-
golang.org/x/text v0.8.0 // indirect
64+
golang.org/x/sys v0.13.0 // indirect
65+
golang.org/x/term v0.13.0 // indirect
66+
golang.org/x/text v0.13.0 // indirect
6767
golang.org/x/time v0.3.0 // indirect
6868
gomodules.xyz/jsonpatch/v2 v2.2.0 // indirect
6969
google.golang.org/appengine v1.6.7 // indirect

0 commit comments

Comments
 (0)