Skip to content

Update module sigs.k8s.io/cluster-api-provider-aws/v2 to v2.8.4 #218

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 9, 2024

This PR contains the following updates:

Package Change Age Confidence
sigs.k8s.io/cluster-api-provider-aws/v2 v2.6.1 -> v2.8.4 age confidence

Release Notes

kubernetes-sigs/cluster-api-provider-aws (sigs.k8s.io/cluster-api-provider-aws/v2)

v2.8.4

Compare Source

Release notes for Cluster API Provider AWS (CAPA) v2.8.4

Documentation

Changelog since v2.8.3

Urgent Upgrade Notes

(No, really, you MUST read this before you upgrade)

Add missing permissions for controller. Its recommended that you update your CloudFormation stack. (#​5539, @​k8s-infra-cherrypick-robot)

Changes by Kind

Uncategorized

The images for this release are:

registry.k8s.io/cluster-api-aws/cluster-api-aws-controller:v2.8.4

Thanks to all our contributors.

v2.8.3

Compare Source

Release notes for Cluster API Provider AWS (CAPA) v2.8.3

Documentation

Changelog since v2.8.2

Changes by Kind

Support
Uncategorized

The images for this release are:
registry.k8s.io/cluster-api-aws/cluster-api-aws-controller:v2.8.3

Thanks to all our contributors.

v2.8.2

Compare Source

Release notes for Cluster API Provider AWS (CAPA) v2.8.2

Documentation

Changelog since v2.8.1

Changes by Kind

Support

The images for this release are:
registry.k8s.io/cluster-api-aws/cluster-api-aws-controller:v2.8.2

Thanks to all our contributors.

v2.8.1

Release notes for Cluster API Provider AWS (CAPA) v2.8.1

Documentation

There is no v2.8.0 GitHub release due to issues during the release process.

Changelog since v2.7.1

Urgent Upgrade Notes

(No, really, you MUST read this before you upgrade)
  • Action required
    Bump CAPI to v1.9.z
    !! ACTION REQUIRED BEFORE UPGRADING !!
    If you are using the AWSManagedControlPlane to provision EKS clusters and you do not have a spec.Version specified in such resource (meaning you are relying on the default that AWS provides), you will need to either:
    a) explicitly set such spec.Version field before upgrading CAPA
    or b) disable the MachineSetPreflightChecks in your cluster either:
    b1) by setting this core CAPI feature gate to false
    b2) or by disabling it via the relevant annotation on all the machineSets belonging to said cluster (follow this guide on how to do this: https://cluster-api.sigs.k8s.io/tasks/experimental-features/machineset-preflight-checks).
    This is necessary as core CAPI 1.9 introduces a feature gate change, setting MachineSetPreflightChecks=true, which in turn relies on the presence of spec.Version and status.Version on the AWSManagedControlPlane object.
    We are planning a future refactor of these API fields in v1bhttps://github.com/kubernetes-sigs/cluster-api-provider-aws/issues/3853s/3853).
    Other places where you can find details on this are:
  • Action required
    From this release onwards we recommend not creating clusters using the classic ELB (which is the default for the API). Classic ELB support is deprected and support will be removed in a future version.
    For new & existing clusters that use a classic elb AND do not specify the health check protocol then the protocol will be changed/set to TCP instead of SSL.
    If you want to use a classic elb with an SSL healthcheck then you will need to specify the cipher suites to use in the KubeadmControlPlane:
apiVersion: controlplane.cluster.x-k8s.io/v1beta1
kind: KubeadmControlPlane
metadata:
  name: "${CLUSTER_NAME}-control-plane"
spec:
  kubeadmConfigSpec:
    clusterConfiguration:
      apiServer:
        extraArgs:
          cloud-provider: external

### This is needed for Kubernetes v1.30+ since else it uses the Go defaults which don't
### work with AWS classic load balancers, see

### https://github.com/kubernetes-sigs/cluster-api-provider-aws/issues/5139. If you use
### another load balancer type such as NLB, this is not needed.
          #

### The list consists of the secure ciphers from Go 1.23.3, plus some less secure
### RSA ciphers which the AWS classic load balancer instance health check supports.
          tls-cipher-suites: TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256

(#​5346, @​richardcase)

  • If deploying clusters to an existing VPC (not managed by the AWS provider), the provider will no longer automatically create a security group rule allowing traffic from all addresses (0.0.0.0/0). You may need to update AWSCluster.spec.controlPlaneLoadBalancer.ingressRules with the source address of your Management Cluster. (#​5198, @​sl1pm4t)

Changes by Kind

Support
API Change
  • Adds optional Conditions field to Status for AWSManagedCluster, ROSACluster. Sets Paused condition when reconciliation is paused (Contract change) (#​5394, @​theobarberbany)
Feature
  • Add AWSMachines to back the EC2 instances in AWSMachinePools and AWSManagedMachinePools (#​5319, @​AndiDog)
  • Add ROSA-HCP version channel group for Machine Pools (#​5332, @​PanSpagetka)
  • Add VolumeSize parameter for RosaMachinePool. (#​5270, @​PanSpagetka)
  • Add flag to support BootstrapSelfManagedAddons to provision Bare EKS cluster without default addons (coreDNS, kube-proxy, aws-vpc-cni) (#​5222, @​jas-nik)
  • Add support for creating instances with elastic fabric adapter interface type. (#​5275, @​RadekManak)
  • Avoid reconciling AWSMachinePools when only the status field has changed (#​5333, @​fiunchinho)
  • Introduce the --disable-controllers argument to the controller manager binary. (#​5395, @​nrb)
  • Log AWS account being used when the e2e tests run. (#​5250, @​richardcase)
  • Support running EC2 instances from a reserved capacity block (new API field marketType). i.e, marketType: capacity-block (#​5211, @​athiruma)
  • Templates: start explicitly using NLB (Network Load Balancer) + HTTPS checks for the Control Plane Load Balancer (#​5345, @​damdo)
  • Wait for AWSCluster dependent object to be deleted (#​5365, @​alexander-demicev)
Documentation
Failing Test
Bug or Regression
Other (Cleanup or Flake)
Uncategorized

The images for this release are:
docker pull registry.k8s.io/cluster-api-aws/cluster-api-aws-controller:v2.8.1

Thanks to all our contributors.

v2.7.2

Compare Source

Release notes for Cluster API Provider AWS (CAPA) v2.7.2

Documentation

Changelog since v2.7.1

Changes by Kind

Support
Uncategorized

The images for this release are:

registry.k8s.io/cluster-api-aws/cluster-api-aws-controller:v2.7.2

Thanks to all our contributors.

v2.7.1

Compare Source

Release notes for Cluster API Provider AWS (CAPA) v2.7.1

Documentation

Changelog since v2.6.1

NOTE: there is no v2.7.0 release available due to an issue encountered during the release process.

Urgent Upgrade Notes

(No, really, you MUST read this before you upgrade)
  • A new community owned AWS account is now being used for publishing AMIs. The old account owner by a company is no longer accessible and the images are being automatically deleted by AWS. Support for ubuntu 18.04 & 20.04 has been dropped and ubuntu 24.04 is now the default OS if no OS is supplied. (#​5133, @​richardcase)
  • View the projects policy on publishing AMIs here.
  • There is known issue creating clusters with Kubernetes v1.30 or greater when the load balancer is an ELB (which is the default). Its recommended for new clusters that you use an NLB instead, See #​5139 for further details.

Changes by Kind

Support
Feature
Bug or Regression
Uncategorized
  • Add versionGate Acknowledgement for upgrading ROSA-HCP y-stream versions (#​5166, @​serngawy)
  • Fix: Fargate: Standardize cluster name in role names to avoid errors on mismatch between Cluster CR and EKS cluster name (#​5111, @​alam0rt)
  • Update Flatcar template to use external CCM. (#​5099, @​ader1990)

The images for this release are:

registry.k8s.io/cluster-api-aws/cluster-api-aws-controller:v2.7.1

Thanks to all our contributors.

v2.7.0

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner October 9, 2024 08:34
@renovate renovate bot added dependencies Pull requests that update a dependency file renovate This is an automated PR by RenovateBot labels Oct 9, 2024
@renovate renovate bot enabled auto-merge (squash) October 9, 2024 08:34
@renovate renovate bot force-pushed the renovate/capi-modules branch 3 times, most recently from 5e83926 to ff9d808 Compare October 15, 2024 17:53
@renovate renovate bot force-pushed the renovate/capi-modules branch from ff9d808 to 76903aa Compare October 28, 2024 17:32
@renovate renovate bot changed the title Update module sigs.k8s.io/cluster-api to v1.8.4 Update capi modules Oct 28, 2024
Copy link
Contributor Author

renovate bot commented Oct 28, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 11 additional dependencies were updated

Details:

Package Change
k8s.io/api v0.31.2 -> v0.31.3
k8s.io/apimachinery v0.31.2 -> v0.31.3
k8s.io/client-go v0.31.2 -> v0.31.3
k8s.io/kubectl v0.31.2 -> v0.31.3
sigs.k8s.io/cluster-api v1.8.3 -> v1.9.4
sigs.k8s.io/controller-runtime v0.19.3 -> v0.19.4
github.com/gobuffalo/flect v1.0.2 -> v1.0.3
github.com/google/gnostic-models v0.6.8 -> v0.6.9-0.20230804172637-c7be7c783f49
k8s.io/apiextensions-apiserver v0.31.0 -> v0.31.3
k8s.io/cluster-bootstrap v0.30.3 -> v0.31.3
k8s.io/component-base v0.31.2 -> v0.31.3

@renovate renovate bot force-pushed the renovate/capi-modules branch 2 times, most recently from 5c248fb to f7aae9b Compare October 29, 2024 09:26
@renovate renovate bot force-pushed the renovate/capi-modules branch 2 times, most recently from 37ec497 to f2dbf24 Compare November 11, 2024 10:14
@renovate renovate bot force-pushed the renovate/capi-modules branch 2 times, most recently from fe1b3a7 to 909d00d Compare November 25, 2024 12:57
@renovate renovate bot force-pushed the renovate/capi-modules branch from 909d00d to 87d50c1 Compare December 3, 2024 09:47
@renovate renovate bot force-pushed the renovate/capi-modules branch 2 times, most recently from 7f3d99d to f88ddbd Compare December 10, 2024 19:25
@renovate renovate bot force-pushed the renovate/capi-modules branch 3 times, most recently from e045c6b to d085b44 Compare December 23, 2024 13:28
@renovate renovate bot force-pushed the renovate/capi-modules branch 3 times, most recently from eef6fb3 to 35acbf4 Compare January 21, 2025 22:29
@renovate renovate bot force-pushed the renovate/capi-modules branch from 35acbf4 to 0b8796a Compare February 18, 2025 20:49
@renovate renovate bot force-pushed the renovate/capi-modules branch 3 times, most recently from 8edd2f6 to 8935a4b Compare March 21, 2025 20:21
@renovate renovate bot force-pushed the renovate/capi-modules branch from 8935a4b to 07db659 Compare March 25, 2025 08:27
@renovate renovate bot force-pushed the renovate/capi-modules branch from 07db659 to 1977e14 Compare April 22, 2025 18:11
@renovate renovate bot force-pushed the renovate/capi-modules branch from 1977e14 to 5efddbc Compare April 29, 2025 18:57
@renovate renovate bot force-pushed the renovate/capi-modules branch from 5efddbc to 1c3799a Compare May 7, 2025 09:21
@renovate renovate bot force-pushed the renovate/capi-modules branch from 1c3799a to 0982d72 Compare May 20, 2025 18:35
@renovate renovate bot force-pushed the renovate/capi-modules branch from 0982d72 to 164d59a Compare May 29, 2025 12:00
@renovate renovate bot force-pushed the renovate/capi-modules branch 3 times, most recently from 8fc5bf2 to 14c14dc Compare June 18, 2025 12:49
@renovate renovate bot changed the title Update capi modules Update module sigs.k8s.io/cluster-api-provider-aws/v2 to v2.8.3 Jun 18, 2025
@renovate renovate bot force-pushed the renovate/capi-modules branch 2 times, most recently from 9c446b1 to 5ee554c Compare June 26, 2025 18:25
@renovate renovate bot changed the title Update module sigs.k8s.io/cluster-api-provider-aws/v2 to v2.8.3 Update module sigs.k8s.io/cluster-api-provider-aws/v2 to v2.8.4 Jun 26, 2025
@renovate renovate bot force-pushed the renovate/capi-modules branch from 5ee554c to 60307e7 Compare July 16, 2025 15:42
@renovate renovate bot force-pushed the renovate/capi-modules branch from 60307e7 to eb59448 Compare July 23, 2025 21:31
@renovate renovate bot force-pushed the renovate/capi-modules branch from eb59448 to 0bd7ce9 Compare July 29, 2025 09:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file renovate This is an automated PR by RenovateBot
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants