From 94b3b9f196da0e14679148c27a6bf2b2aee31db2 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 16 Sep 2024 08:44:21 +0000 Subject: [PATCH 01/40] Setting latest tag in intents-operator helm chart repo to v2.0.21 --- intents-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 624a5f43..21083bba 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -3,7 +3,7 @@ name: intents-operator description: Otterize intents operator type: application version: 3.0.35 -appVersion: v2.0.20 +appVersion: v2.0.21 home: https://github.com/otterize/intents-operator sources: - https://github.com/otterize/intents-operator From 81f168a8f7f5ef3a73ede6ec5483666c8f35a26a Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 16 Sep 2024 08:44:34 +0000 Subject: [PATCH 02/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 21083bba..5fbe8a00 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.35 +version: 3.0.36 appVersion: v2.0.21 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index b8f08002..dd54c1c3 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.34 +version: 4.0.35 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 43d198c892593406c26ba5d6192cec566d4f46a3 Mon Sep 17 00:00:00 2001 From: omris94 <46892443+omris94@users.noreply.github.com> Date: Thu, 19 Sep 2024 11:06:44 +0300 Subject: [PATCH 03/40] Enable access to Otterize webhooks using network policy to avoid blockages when default deny rules are applied (#246) --- .../credentials-operator-webhook-service.yaml | 30 +++++++++++++++++++ ...or-controller-manager-metrics-service.yaml | 26 ++++++++++++++++ .../templates/validation-webhook-service.yaml | 28 +++++++++++++++++ 3 files changed, 84 insertions(+) diff --git a/credentials-operator/templates/credentials-operator-webhook-service.yaml b/credentials-operator/templates/credentials-operator-webhook-service.yaml index bc424136..7df57908 100644 --- a/credentials-operator/templates/credentials-operator-webhook-service.yaml +++ b/credentials-operator/templates/credentials-operator-webhook-service.yaml @@ -23,4 +23,34 @@ spec: targetPort: 9443 selector: app: credentials-operator +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: allow-access-to-credentials-operator-webhook-and-metrics + namespace: {{ .Release.Namespace }} + labels: + {{- with .Values.global.commonLabels }} + {{- toYaml . | nindent 4 }} + {{- end }} + app.kubernetes.io/version: {{ .Chart.Version }} + annotations: + {{- with .Values.global.commonAnnotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + app.kubernetes.io/version: {{ .Chart.Version }} +spec: + podSelector: + matchLabels: + app: intents-operator + policyTypes: + - Ingress + ingress: + - ports: + - protocol: TCP + port: 443 + - protocol: TCP + port: 9443 + - protocol: TCP + port: 8443 {{ end }} \ No newline at end of file diff --git a/intents-operator/templates/intents-operator-controller-manager-metrics-service.yaml b/intents-operator/templates/intents-operator-controller-manager-metrics-service.yaml index d6c1f039..0edbb055 100644 --- a/intents-operator/templates/intents-operator-controller-manager-metrics-service.yaml +++ b/intents-operator/templates/intents-operator-controller-manager-metrics-service.yaml @@ -22,3 +22,29 @@ spec: targetPort: 2112 selector: app: intents-operator +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: allow-access-to-intents-operator-metrics-server + namespace: {{ .Release.Namespace }} + labels: + {{- with .Values.global.commonLabels }} + {{- toYaml . | nindent 4 }} + {{- end }} + app.kubernetes.io/version: {{ .Chart.Version }} + annotations: + {{- with .Values.global.commonAnnotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + app.kubernetes.io/version: {{ .Chart.Version }} +spec: + podSelector: + matchLabels: + app: intents-operator + policyTypes: + - Ingress + ingress: + - ports: + - protocol: TCP + port: 2112 \ No newline at end of file diff --git a/intents-operator/templates/validation-webhook-service.yaml b/intents-operator/templates/validation-webhook-service.yaml index 82596f20..6df108bb 100644 --- a/intents-operator/templates/validation-webhook-service.yaml +++ b/intents-operator/templates/validation-webhook-service.yaml @@ -20,3 +20,31 @@ spec: targetPort: 9443 selector: app: intents-operator +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: allow-access-to-intents-operator-webhook + namespace: {{ .Release.Namespace }} + labels: + {{- with .Values.global.commonLabels }} + {{- toYaml . | nindent 4 }} + {{- end }} + app.kubernetes.io/version: {{ .Chart.Version }} + annotations: + {{- with .Values.global.commonAnnotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + app.kubernetes.io/version: {{ .Chart.Version }} +spec: + podSelector: + matchLabels: + app: intents-operator + policyTypes: + - Ingress + ingress: + - ports: + - protocol: TCP + port: 443 + - protocol: TCP + port: 9443 \ No newline at end of file From 6b149ca55693ab535910655de648dc8baa437230 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Thu, 19 Sep 2024 08:06:56 +0000 Subject: [PATCH 04/40] Bump chart versions [nobump] --- credentials-operator/Chart.yaml | 2 +- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index d081885d..c0096d48 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: credentials-operator description: credentials-operator type: application -version: 3.0.8 +version: 3.0.9 appVersion: v3.0.4 home: https://github.com/otterize/credentials-operator sources: diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 5fbe8a00..eb80db8c 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.36 +version: 3.0.37 appVersion: v2.0.21 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index dd54c1c3..28d5334f 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.35 +version: 4.0.36 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From d75f0496bd631efba603980a548c01ca7a4aa07a Mon Sep 17 00:00:00 2001 From: Amit Lichtenberg Date: Thu, 19 Sep 2024 13:25:17 +0300 Subject: [PATCH 05/40] Remove 'experimental' warning from allowExternalTraffic='always' option (#247) --- intents-operator/README.md | 44 +++++++++++++++++------------------ otterize-kubernetes/README.md | 26 ++++++++++----------- 2 files changed, 35 insertions(+), 35 deletions(-) diff --git a/intents-operator/README.md b/intents-operator/README.md index 60c9871e..98428c82 100644 --- a/intents-operator/README.md +++ b/intents-operator/README.md @@ -24,28 +24,28 @@ ## Operator parameters -| Key | Description | Default | -|----------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------| -| `operator.repository` | Intents Operator image repository. | `otterize` | -| `operator.image` | Intents Operator image. | `intents-operator` | -| `operator.tag` | Intents Operator image tag. | `(pinned to latest version as of this Helm chart version's publish)` | -| `operator.pullPolicy` | Intents Operator image pull policy. | `(none)` | -| `operator.containerSecurityContext` | Security context for the containers. | `(consult values.yaml)` | -| `operator.podSecurityContext` | Security context for the pod. | `(consult values.yaml)` | -| `operator.mode` | `defaultActive` or `defaultShadow`. When `defaultActive` is set, enforcement is enabled by default. When `defaultShadow` is set, enforcement is disabled by default, but can be enabled per-service using a ProtectedService resource. | `defaultActive` | -| `operator.enableEnforcement` | (deprecated, use mode instead) If set to false, enforcement is disabled globally (both for network policies and Kafka ACL). If true, you may use the other flags for more granular enforcement settings | `true` | -| `operator.enableNetworkPolicyCreation` | Whether the operator should create network policies according to ClientIntents | `true` | -| `operator.enableKafkaACLCreation` | Whether the operator should create Kafka ACL rules according to ClientIntents of type Kafka | `true` | -| `operator.enableIstioPolicyCreation` | Whether the operator should create Istio authorization policies according to ClientIntents | `true` | -| `operator.ingressControllerConfigs` | Restricts the automatically created external traffic network policies to only allow access to an ingress controller within the cluster. Only relevant if you use an in-cluster ingress controller, such as nginx or HAProxy. A list of objects with keys `name`, `namespace` and `kind`, such as `ingress-nginx-controller`, `nginx` and `Deployment`. | `(none)` | -| `operator.ingressControllerAWSALBExempt` | If set to true, the operator will allow all traffic if an Ingress is managed by the AWS ALB Ingress Controller. | `false` | -| `operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always` (this option is **experimental**). Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` | -| `operator.resources` | Resources override. | | -| `operator.enableDatabasePolicyCreation` | Whether the operator should create database policies according to ClientIntents | `true` | -| `operator.enableEgressNetworkPolicyCreation` | **experimental** - Enables experimental support for egress network policies (coming soon!) | `false` | -| `watchedNamespaces` | List of namespaces the intents operator should watch. The operator will be blind to any namespace not in this list. | `(nil) meaning watch all` | -| `enforcedNamespaces` | When using "shadow enforcement" mode, namespaces in this list will be treated as if the enforcement were active. | `(nil)` | -| `operator.autoGenerateTLSUsingCredentialsOperator` | If set to true, adds the necessary pod annotations in order to integrate with credentials-operator, and get tls certificate. | `false` | +| Key | Description | Default | +|----------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------| +| `operator.repository` | Intents Operator image repository. | `otterize` | +| `operator.image` | Intents Operator image. | `intents-operator` | +| `operator.tag` | Intents Operator image tag. | `(pinned to latest version as of this Helm chart version's publish)` | +| `operator.pullPolicy` | Intents Operator image pull policy. | `(none)` | +| `operator.containerSecurityContext` | Security context for the containers. | `(consult values.yaml)` | +| `operator.podSecurityContext` | Security context for the pod. | `(consult values.yaml)` | +| `operator.mode` | `defaultActive` or `defaultShadow`. When `defaultActive` is set, enforcement is enabled by default. When `defaultShadow` is set, enforcement is disabled by default, but can be enabled per-service using a ProtectedService resource. | `defaultActive` | +| `operator.enableEnforcement` | (deprecated, use mode instead) If set to false, enforcement is disabled globally (both for network policies and Kafka ACL). If true, you may use the other flags for more granular enforcement settings | `true` | +| `operator.enableNetworkPolicyCreation` | Whether the operator should create network policies according to ClientIntents | `true` | +| `operator.enableKafkaACLCreation` | Whether the operator should create Kafka ACL rules according to ClientIntents of type Kafka | `true` | +| `operator.enableIstioPolicyCreation` | Whether the operator should create Istio authorization policies according to ClientIntents | `true` | +| `operator.ingressControllerConfigs` | Restricts the automatically created external traffic network policies to only allow access to an ingress controller within the cluster. Only relevant if you use an in-cluster ingress controller, such as nginx or HAProxy. A list of objects with keys `name`, `namespace` and `kind`, such as `ingress-nginx-controller`, `nginx` and `Deployment`. | `(none)` | +| `operator.ingressControllerAWSALBExempt` | If set to true, the operator will allow all traffic if an Ingress is managed by the AWS ALB Ingress Controller. | `false` | +| `operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always`. Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` | +| `operator.resources` | Resources override. | | +| `operator.enableDatabasePolicyCreation` | Whether the operator should create database policies according to ClientIntents | `true` | +| `operator.enableEgressNetworkPolicyCreation` | **experimental** - Enables experimental support for egress network policies (coming soon!) | `false` | +| `watchedNamespaces` | List of namespaces the intents operator should watch. The operator will be blind to any namespace not in this list. | `(nil) meaning watch all` | +| `enforcedNamespaces` | When using "shadow enforcement" mode, namespaces in this list will be treated as if the enforcement were active. | `(nil)` | +| `operator.autoGenerateTLSUsingCredentialsOperator` | If set to true, adds the necessary pod annotations in order to integrate with credentials-operator, and get tls certificate. | `false` | ## Cloud parameters diff --git a/otterize-kubernetes/README.md b/otterize-kubernetes/README.md index 531ffc73..1b3a1b01 100644 --- a/otterize-kubernetes/README.md +++ b/otterize-kubernetes/README.md @@ -72,19 +72,19 @@ These parameters are used by multiple charts, and must be kept the same for the All configurable parameters of intents-operator can be configured under the alias `intentsOperator`. Further information about intents-operator parameters can be found [in the Intents Operator's helm chart](https://github.com/otterize/helm-charts/tree/main/intents-operator). -| Key | Description | Default | -|-----------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------| -| `intentsOperator.autoGenerateTLSUsingCredentialsOperator` | Use credentials-operator to create TLS cert for intents-operator. | `true` | -| `operator.mode` | `defaultActive` or `defaultShadow`. When `defaultActive` is set, enforcement is enabled by default. When `defaultShadow` is set, enforcement is disabled by default, but can be enabled per-service using a ProtectedService resource. | `defaultActive` | -| `intentsOperator.operator.enableEnforcement` | (deprecated, use mode instead) If set to false, enforcement is disabled globally (both for network policies and Kafka ACL). If true, you may use the other flags for more granular enforcement settings | `true` | -| `intentsOperator.operator.enableNetworkPolicyCreation` | Whether the operator should create network policies according to the ClientIntents | `true` | -| `intentsOperator.operator.enableKafkaACLCreation` | Whether the operator should create Kafka ACL rules according to the ClientIntents of type Kafka | `true` | -| `intentsOperator.operator.enableIstioPolicyCreation` | Whether the operator should create Istio authorization policies according to ClientIntents | `true` | -| `intentsOperator.operator.ingressControllerConfigs` | Restricts the automatically created external traffic network policies to only allow access to an ingress controller within the cluster. Only relevant if you use an in-cluster ingress controller, such as nginx or HAProxy. A list of objects with keys `name`, `namespace` and `kind`, such as `ingress-nginx-controller`, `nginx` and `Deployment`. | `(none)` | -| `intentsOperator.operator.ingressControllerAWSALBExempt` | If set to true, the operator will allow all traffic if an Ingress is managed by the AWS ALB Ingress Controller. | `false` | -| `intentsOperator.operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always` (this option is **experimental**). Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` | -| `intentsOperator.watchedNamespaces` | List of namespaces the intents operator should watch. The operator will be blind to any namespace not in this list. | `(nil) meaning watch all` | -| `intentsOperator.enforcedNamespaces` | When using "shadow enforcement" mode, namespaces in this list will be treated as if the enforcement were active. | `(nil) means no namespace will be active on shadow mode` | +| Key | Description | Default | +|-----------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------| +| `intentsOperator.autoGenerateTLSUsingCredentialsOperator` | Use credentials-operator to create TLS cert for intents-operator. | `true` | +| `operator.mode` | `defaultActive` or `defaultShadow`. When `defaultActive` is set, enforcement is enabled by default. When `defaultShadow` is set, enforcement is disabled by default, but can be enabled per-service using a ProtectedService resource. | `defaultActive` | +| `intentsOperator.operator.enableEnforcement` | (deprecated, use mode instead) If set to false, enforcement is disabled globally (both for network policies and Kafka ACL). If true, you may use the other flags for more granular enforcement settings | `true` | +| `intentsOperator.operator.enableNetworkPolicyCreation` | Whether the operator should create network policies according to the ClientIntents | `true` | +| `intentsOperator.operator.enableKafkaACLCreation` | Whether the operator should create Kafka ACL rules according to the ClientIntents of type Kafka | `true` | +| `intentsOperator.operator.enableIstioPolicyCreation` | Whether the operator should create Istio authorization policies according to ClientIntents | `true` | +| `intentsOperator.operator.ingressControllerConfigs` | Restricts the automatically created external traffic network policies to only allow access to an ingress controller within the cluster. Only relevant if you use an in-cluster ingress controller, such as nginx or HAProxy. A list of objects with keys `name`, `namespace` and `kind`, such as `ingress-nginx-controller`, `nginx` and `Deployment`. | `(none)` | +| `intentsOperator.operator.ingressControllerAWSALBExempt` | If set to true, the operator will allow all traffic if an Ingress is managed by the AWS ALB Ingress Controller. | `false` | +| `intentsOperator.operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always`. Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` | +| `intentsOperator.watchedNamespaces` | List of namespaces the intents operator should watch. The operator will be blind to any namespace not in this list. | `(nil) meaning watch all` | +| `intentsOperator.enforcedNamespaces` | When using "shadow enforcement" mode, namespaces in this list will be treated as if the enforcement were active. | `(nil) means no namespace will be active on shadow mode` | ## Telemetry From 436a69396c6f14cab617b128bd04001eac5311ad Mon Sep 17 00:00:00 2001 From: otterizebot Date: Thu, 19 Sep 2024 10:25:31 +0000 Subject: [PATCH 06/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index eb80db8c..428a8d0d 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.37 +version: 3.0.38 appVersion: v2.0.21 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 28d5334f..e3d93806 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.36 +version: 4.0.37 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 4c21ca88b1b382c05e68c642a79b94bde1c79b6d Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 12:13:07 +0000 Subject: [PATCH 07/40] Setting latest tag in credentials-operator helm chart repo to v3.0.5 --- credentials-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index c0096d48..2017cf2e 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -3,7 +3,7 @@ name: credentials-operator description: credentials-operator type: application version: 3.0.9 -appVersion: v3.0.4 +appVersion: v3.0.5 home: https://github.com/otterize/credentials-operator sources: - https://github.com/otterize/credentials-operator From 23ecec4b1a15e47504643c247f950c523f99fdb7 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 12:13:21 +0000 Subject: [PATCH 08/40] Bump chart versions [nobump] --- credentials-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index 2017cf2e..dc3db098 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: credentials-operator description: credentials-operator type: application -version: 3.0.9 +version: 3.0.10 appVersion: v3.0.5 home: https://github.com/otterize/credentials-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index e3d93806..ba2e785c 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.37 +version: 4.0.38 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 75a1baf23fdf37f2fc8a0bc12ed5cce7c5a54823 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 13:55:02 +0000 Subject: [PATCH 09/40] Setting latest tag in intents-operator helm chart repo to v2.0.22 --- intents-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 428a8d0d..35d498cf 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -3,7 +3,7 @@ name: intents-operator description: Otterize intents operator type: application version: 3.0.38 -appVersion: v2.0.21 +appVersion: v2.0.22 home: https://github.com/otterize/intents-operator sources: - https://github.com/otterize/intents-operator From 04e968d01390de6fb0d289e85a434411357c25e6 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 13:55:17 +0000 Subject: [PATCH 10/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 35d498cf..1d40dc8f 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.38 +version: 3.0.39 appVersion: v2.0.22 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index ba2e785c..28c9b919 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.38 +version: 4.0.39 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From c380de0a52ac21148258b48ab955a1216aedb54f Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 13:56:50 +0000 Subject: [PATCH 11/40] Setting latest tag in credentials-operator helm chart repo to v3.0.6 --- credentials-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index dc3db098..401bb41c 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -3,7 +3,7 @@ name: credentials-operator description: credentials-operator type: application version: 3.0.10 -appVersion: v3.0.5 +appVersion: v3.0.6 home: https://github.com/otterize/credentials-operator sources: - https://github.com/otterize/credentials-operator From 6c39e3b7a29700623d1df0a08a1258e32ede1aa4 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 13:57:01 +0000 Subject: [PATCH 12/40] Bump chart versions [nobump] --- credentials-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index 401bb41c..47aae50c 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: credentials-operator description: credentials-operator type: application -version: 3.0.10 +version: 3.0.11 appVersion: v3.0.6 home: https://github.com/otterize/credentials-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 28c9b919..8ab009e0 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.39 +version: 4.0.40 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From c59cedb67de611a2cc9ecf19b2e3cabd09745343 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 19:47:37 +0000 Subject: [PATCH 13/40] Setting latest tag in credentials-operator helm chart repo to v3.0.7 --- credentials-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index 47aae50c..6426a847 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -3,7 +3,7 @@ name: credentials-operator description: credentials-operator type: application version: 3.0.11 -appVersion: v3.0.6 +appVersion: v3.0.7 home: https://github.com/otterize/credentials-operator sources: - https://github.com/otterize/credentials-operator From 310eb68a634bdf6b5ac75951bc7e79abd7306bb2 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 22 Sep 2024 19:47:49 +0000 Subject: [PATCH 14/40] Bump chart versions [nobump] --- credentials-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index 6426a847..55b04b1e 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: credentials-operator description: credentials-operator type: application -version: 3.0.11 +version: 3.0.12 appVersion: v3.0.7 home: https://github.com/otterize/credentials-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 8ab009e0..45b8c8a2 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.40 +version: 4.0.41 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From c189ecfb4eaaccdd70d69a0a0daaafa9fc6141d8 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 23 Sep 2024 15:56:16 +0000 Subject: [PATCH 15/40] Setting latest tag in network-mapper helm chart repo to v2.0.9 --- network-mapper/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index 47e74cad..76451b78 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: network-mapper type: application version: 2.0.21 -appVersion: v2.0.7 +appVersion: v2.0.9 home: https://github.com/otterize/network-mapper sources: - https://github.com/otterize/network-mapper From 76d95e8f1a23727ad04b8b2c41a9fccde23b38f5 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 23 Sep 2024 15:56:30 +0000 Subject: [PATCH 16/40] Bump chart versions [nobump] --- network-mapper/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index 76451b78..bfe95446 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: network-mapper type: application -version: 2.0.21 +version: 2.0.22 appVersion: v2.0.9 home: https://github.com/otterize/network-mapper sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 45b8c8a2..974fb7fb 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.41 +version: 4.0.42 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 1c32ad982c330834e45b31b3ae6986339c1df8f8 Mon Sep 17 00:00:00 2001 From: Amit Lichtenberg Date: Mon, 30 Sep 2024 14:30:01 +0300 Subject: [PATCH 17/40] Bump go version to 1.23.1 (#249) --- .github/workflows/e2e-test.yaml | 6 +++--- .github/workflows/lint.yml | 4 ++-- tests/base_suite.go | 2 +- tests/databases/mysql/client/Dockerfile | 2 +- tests/databases/postgresql/client/Dockerfile | 2 +- tests/go.mod | 4 +--- 6 files changed, 9 insertions(+), 11 deletions(-) diff --git a/.github/workflows/e2e-test.yaml b/.github/workflows/e2e-test.yaml index 1e7308a8..cdcf96ec 100644 --- a/.github/workflows/e2e-test.yaml +++ b/.github/workflows/e2e-test.yaml @@ -123,7 +123,7 @@ jobs: - name: Setup go uses: actions/setup-go@v5 with: - go-version: 1.22.1 + go-version: 1.23.1 cache-dependency-path: tests/go.sum - name: Install go-junit-report @@ -214,7 +214,7 @@ jobs: - name: Setup go uses: actions/setup-go@v5 with: - go-version: 1.22.1 + go-version: 1.23.1 cache-dependency-path: tests/go.sum - name: Install go-junit-report @@ -332,7 +332,7 @@ jobs: - name: Setup go uses: actions/setup-go@v5 with: - go-version: 1.22.1 + go-version: 1.23.1 cache-dependency-path: tests/go.sum - name: Install go-junit-report diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml index 8828c546..b43375f8 100644 --- a/.github/workflows/lint.yml +++ b/.github/workflows/lint.yml @@ -24,7 +24,7 @@ jobs: - name: Setup go uses: actions/setup-go@v5 with: - go-version: 1.22.1 + go-version: 1.23.1 cache-dependency-path: tests/go.sum - name: go vet @@ -42,7 +42,7 @@ jobs: uses: golangci/golangci-lint-action@v3 with: # Optional: version of golangci-lint to use in form of v1.2 or v1.2.3 or `latest` to use the latest version - version: v1.55.2 + version: v1.61.0 # Optional: working directory, useful for monorepos working-directory: tests diff --git a/tests/base_suite.go b/tests/base_suite.go index 22bc0efa..c4ab8e54 100644 --- a/tests/base_suite.go +++ b/tests/base_suite.go @@ -366,7 +366,7 @@ func (s *BaseSuite) ReadPodLogsUntilSubstring(ctx context.Context, pod *corev1.P default: for reader.Scan() { line = reader.Text() - logger.Debugf(line) + logger.Debugf("%s", line) if strings.Contains(line, substring) { logger.Infof("Matched log line: %s", line) return diff --git a/tests/databases/mysql/client/Dockerfile b/tests/databases/mysql/client/Dockerfile index f23a5122..d95205d5 100644 --- a/tests/databases/mysql/client/Dockerfile +++ b/tests/databases/mysql/client/Dockerfile @@ -1,4 +1,4 @@ -FROM golang:1.22.1-alpine +FROM golang:1.23.1-alpine WORKDIR /app ADD tests/go.mod . ADD tests/go.sum . diff --git a/tests/databases/postgresql/client/Dockerfile b/tests/databases/postgresql/client/Dockerfile index 2e2c03e2..bb62d2e0 100644 --- a/tests/databases/postgresql/client/Dockerfile +++ b/tests/databases/postgresql/client/Dockerfile @@ -1,4 +1,4 @@ -FROM golang:1.22.1-alpine +FROM golang:1.23.1-alpine WORKDIR /app ADD tests/go.mod . ADD tests/go.sum . diff --git a/tests/go.mod b/tests/go.mod index 5505d830..c333cd81 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -1,8 +1,6 @@ module helm_tests -go 1.22.1 - -toolchain go1.22.3 +go 1.23.1 require ( github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.6.0 From a1fec16599d90c517ef41032f3edb4f9ecf96e60 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 30 Sep 2024 11:30:18 +0000 Subject: [PATCH 18/40] Bump chart versions [nobump] --- otterize-kubernetes/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 974fb7fb..ccb6933f 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.42 +version: 4.0.43 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 6119727b26291840586b99ad78f423f149aa14f9 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 30 Sep 2024 13:04:15 +0000 Subject: [PATCH 19/40] Setting latest tag in intents-operator helm chart repo to v2.0.23 --- intents-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 1d40dc8f..6d97a675 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -3,7 +3,7 @@ name: intents-operator description: Otterize intents operator type: application version: 3.0.39 -appVersion: v2.0.22 +appVersion: v2.0.23 home: https://github.com/otterize/intents-operator sources: - https://github.com/otterize/intents-operator From 8860848c1b3a3cf0483e114c790f8a78258b152a Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 30 Sep 2024 13:04:30 +0000 Subject: [PATCH 20/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 6d97a675..5d31e1e9 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.39 +version: 3.0.40 appVersion: v2.0.23 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index ccb6933f..40c89331 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.43 +version: 4.0.44 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 21b25a797467186d6d15e413bf3169620eb9b0a0 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 30 Sep 2024 13:12:09 +0000 Subject: [PATCH 21/40] Setting latest tag in network-mapper helm chart repo to v2.0.10 --- network-mapper/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index bfe95446..aec3d4d8 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: network-mapper type: application version: 2.0.22 -appVersion: v2.0.9 +appVersion: v2.0.10 home: https://github.com/otterize/network-mapper sources: - https://github.com/otterize/network-mapper From ee24334065a22069e8b595d55db674ca481f3ecb Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 30 Sep 2024 13:12:28 +0000 Subject: [PATCH 22/40] Bump chart versions [nobump] --- network-mapper/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index aec3d4d8..e52eb69c 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: network-mapper type: application -version: 2.0.22 +version: 2.0.23 appVersion: v2.0.10 home: https://github.com/otterize/network-mapper sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 40c89331..38fb32bb 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.44 +version: 4.0.45 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 2120c45f753024c67dc6ac3e3d026dfa1c1085b1 Mon Sep 17 00:00:00 2001 From: Evyatar Meged Date: Sun, 6 Oct 2024 13:57:39 +0300 Subject: [PATCH 23/40] rm expired tfstate (#250) --- .../files/terraform/terraform.tfstate | 292 ------------------ 1 file changed, 292 deletions(-) delete mode 100644 tests/azureiam/files/terraform/terraform.tfstate diff --git a/tests/azureiam/files/terraform/terraform.tfstate b/tests/azureiam/files/terraform/terraform.tfstate deleted file mode 100644 index 03280112..00000000 --- a/tests/azureiam/files/terraform/terraform.tfstate +++ /dev/null @@ -1,292 +0,0 @@ -{ - "version": 4, - "terraform_version": "1.7.0", - "serial": 5, - "lineage": "5d373ac5-bdcc-5dca-1d79-72d333cd2db9", - "outputs": {}, - "resources": [ - { - "module": "module.otterize-azure-iam", - "mode": "data", - "type": "azurerm_kubernetes_cluster", - "name": "current_aks_cluster", - "provider": "module.otterize-azure-iam.provider[\"registry.terraform.io/hashicorp/azurerm\"]", - "instances": [ - { - "schema_version": 0, - "attributes": { - "aci_connector_linux": null, - "agent_pool_profile": [ - { - "count": 1, - "enable_auto_scaling": false, - "enable_node_public_ip": false, - "max_count": 0, - "max_pods": 110, - "min_count": 0, - "name": "nodepool1", - "node_labels": {}, - "node_public_ip_prefix_id": "", - "node_taints": [], - "orchestrator_version": "1.28", - "os_disk_size_gb": 128, - "os_type": "Linux", - "tags": {}, - "type": "VirtualMachineScaleSets", - "upgrade_settings": [ - { - "max_surge": "10%" - } - ], - "vm_size": "Standard_DS2_v2", - "vnet_subnet_id": "", - "zones": [] - } - ], - "api_server_authorized_ip_ranges": [], - "azure_active_directory_role_based_access_control": [], - "azure_policy_enabled": null, - "current_kubernetes_version": "1.28.9", - "custom_ca_trust_certificates_base64": [], - "disk_encryption_set_id": "", - "dns_prefix": "otterizeAz-otterizeGitHubAc-ef54c9", - "fqdn": "otterizeaz-otterizegithubac-ef54c9-cddjdix3.hcp.eastus.azmk8s.io", - "http_application_routing_enabled": null, - "http_application_routing_zone_name": null, - "id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.ContainerService/managedClusters/otterizeAzureIAME2EAKSCluster", - "identity": [ - { - "identity_ids": [], - "principal_id": "6f6f9209-1bbe-4eee-bfb4-8f4ed405e03a", - "tenant_id": "f8b92b88-e477-41ad-a5af-079de8dc8210", - "type": "SystemAssigned" - } - ], - "ingress_application_gateway": null, - "key_management_service": [], - "key_vault_secrets_provider": null, - "kube_admin_config": [], - "kube_admin_config_raw": "", - "kube_config": [ - { - "client_certificate": "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", - "client_key": "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", - "cluster_ca_certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUU2RENDQXRDZ0F3SUJBZ0lRRGF1UzFYOFl6ZXFzMkdvU2NRNXB0VEFOQmdrcWhraUc5dzBCQVFzRkFEQU4KTVFzd0NRWURWUVFERXdKallUQWdGdzB5TkRBMk1ETXdPREE1TkRsYUdBOHlNRFUwTURZd016QTRNVGswT1ZvdwpEVEVMTUFrR0ExVUVBeE1DWTJFd2dnSWlNQTBHQ1NxR1NJYjNEUUVCQVFVQUE0SUNEd0F3Z2dJS0FvSUNBUUNyCmF3dnhWRytwYWhYaW11S2lvVzdZNjByYUd2Qnd2TTdwSk1UTnBMNlZGcFpTNTErZngwbjErRm9MV0Q5d1ZIVHcKeGR6YW1IU2ZxYkl4SU4yUi9HNGcyTENWaloxcG0waE0vaGpqLzRQNnA3WnVjTEdqK21hYTQwR3VMYWVKZDNjOApnK2V0MlJpUlV0NUJINC8vbnE1ZnpPRStEdzV4V1RuM01yR0pYY3d3bXpEUUpRMEFvNzB3U256WldvSTdjcXFxCllXbU9vWlUrT1FzZnpFSW8rWHBsa3l2VzNYeXpVSlAxU2M0ci8zMGgvVCszWWVEU0trVFQxbjc3MWNTRTVuUm8KZzhLUEdzSVBpZnlaZHY2Q2g2OU1nQTJjMTJENDRvNTBUZUlhakhUdC9oVnE3QmRzdngweC9FR1RSK2ZmNEFkcAprZGhMNmh4NHpCQmU5Rkg0WGNveXY3RXg0QkprcjFqUU8yMnVSeWhNN2RmT0tkV01aL1VveGdZYlVwQXhzeEdLCnZaZm5md2h5eThTMjlPN29UNEhaSHJHU0dDMk8vNHhNcVNwUzVoYnFYaUdMSzM2OFZORHRCRE9CVk5kcVpVRHUKaWNmazMzbTE0VDR5QmJmbkRkUnNDVHpPLzFTZ2lGTk5kYTV0ZTlhU1I1OUl0bDdkOXVScmFReVpnMGVvYXZCQwpTeEJ6SGlZVHd4b3dFTjJzRTlUR1pYRDRBZVBmbm5GVy9qWWVBMW5XU2FqbHg2UVJwMmU3eTZLTDlqRnVTTjJMCnZ2TEMzRE9VYkFlYVB6TlAwbmlLOEEwZjY5N1hrTUQwa2VIZ2NtV1lxYTd6S2pRSUlpanphajQwTngzLzJmZHcKaVZlVkI4TEZCRVhpdURmTFNhNlpCUURQdFh1ZFYzV0Yxa0hBMUFJRlp3SURBUUFCbzBJd1FEQU9CZ05WSFE4QgpBZjhFQkFNQ0FxUXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QWRCZ05WSFE0RUZnUVVRaTJ6am92RkN5bHdTdGFwClBhNm1MNm5waG0wd0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dJQkFFU0MwQVc3YkdIdVVqaDZSbGozYWwxR1k3OGIKTWk5YmM4cVpId0JNcEY2cnJmSDlMTDREcTR1SWZCTUZBUzJjMVUzN0RrdG82UzgrTVc3UkVrNVNydmw0dzZocgpmMGZyVXNScTZnTTJiczRWWndCNFZWeHFDd1FuRVhVb2Erd3dWK3RGUjF3QXM4bUFFTElxY3ZjbDAxSTBxTmVwCkF4dkVHQVNXVmNzZEF1SEdYeDNMdVVRKy8ycHI4TGFtOEx5bERKMmtRS1lFTWJjRFRqVk5iRjc0TlF1U0w1eHkKS1pWSjBGQUhRR2ozL3owelA2TVUvNElZWUJlRzlhcWNjcDMxSEo5UkFEai9WM2tMWmFZOUwrRlpBMkdCMzYwYgpwSE9mcysxVnJEdGxnZmh5MDdPbUo2TFVPNG5KTzNqNTZNQUwwRWNkYlJZN3g0elJZQmpUMys2WXU1a3lGQVBHClpDVnlNa29JQkQ4VTNNMlVWSzRtbjFNajlwMzhObnpRRFlTUGl2QVpKSTZMeDBacytDREJGekRpSzZhY0k5eHUKVnFDc3NIYmFDd05jUlgvTHdzZHNoeHpVZzBtZTVLN3hrRzBpNFp5TXpmSnlkcmdMOEM5UmlTbHk1eGZrRndMbQpZdXdPRGlBYS9MaitFQ25tVTA0dXJqRzlacVowQnVkcVhESGFBTERGUUJRVzlqa0U3Y1RocUpxTi9JUGdVRnlkCjZrd1NZUDZIUXAxRXJFV2diemdoTHlZK0FFUlljakFTU2c1Z0dhNzNFeGdYcHVQTzgwbGtHeExNaEsxVUpLMzIKMHUwNk4wTmNJcThZNmEvQVdmRGQxTHB4Rk5TT0w5bXRQc0NBLzlmUmxOWmJIMDNZbEhPdHRNdGU3ZmtPYk1uaQplRFFLUDVwQTF1OWt5bGxJCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", - "host": "https://otterizeaz-otterizegithubac-ef54c9-cddjdix3.hcp.eastus.azmk8s.io:443", - "password": "d076e0f9to6npbjap86ab9w5fsgksllz9u4n7vv8q6e7id6pcehnyw18p8k0q69j66z6qiemr7shnvq3ldshbu5it888dctyzzhko9hpdr1n0e3puuvvjwhnx1octamp", - "username": "clusterUser_otterizeGitHubActionsResourceGroup_otterizeAzureIAME2EAKSCluster" - } - ], - "kube_config_raw": "apiVersion: v1\nclusters:\n- cluster:\n certificate-authority-data: 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\n server: https://otterizeaz-otterizegithubac-ef54c9-cddjdix3.hcp.eastus.azmk8s.io:443\n name: otterizeAzureIAME2EAKSCluster\ncontexts:\n- context:\n cluster: otterizeAzureIAME2EAKSCluster\n user: clusterUser_otterizeGitHubActionsResourceGroup_otterizeAzureIAME2EAKSCluster\n name: otterizeAzureIAME2EAKSCluster\ncurrent-context: otterizeAzureIAME2EAKSCluster\nkind: Config\npreferences: {}\nusers:\n- name: clusterUser_otterizeGitHubActionsResourceGroup_otterizeAzureIAME2EAKSCluster\n user:\n client-certificate-data: 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\n client-key-data: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlKS1FJQkFBS0NBZ0VBeFBRNTl0aGZIeDZwaE4rcDRwMnRJalRuMC94NWREMEExUEdGQnp3bmlLL1p6WFNYClpqYjNjRk5GdDVLKzlMN2FPS0k4Z1VFOHEwSHNQR3JQNmk4TmhzUWhVTm54eGoxcGZQUmdvZ2M5aFNaNjZOajIKZGgzV04zTy9xWmNJSCsycnc3aFEvU1lKVW10Zy94T0pCVjJYNEI3ck9xd2lhY3R5TE1Ma1VUdE5ZYXRrRm5mTApKN1N3RWRGaWx2bmJMSjM3dTE4bUIyNmlOUHplN3lzZ3p2WFRoc0tUOUs3b0NTVzYreU5LUW0wejFZZWYyeHA1ClFYSUZDd2tFdTE3TlNPTmt4RHdlZVY2TDdUblRQZGJBTllSZXJEellxZWEwNjRnSklpdmZLY0pJWHhCT3BlaU8KMmpXdG8zL2NPS3pqTE41aHRHWExxc2g1Ulo0U2FKQU5KZHdJeG1zejRDV0VheitCUjZIRWw5c2E2b3FFeGQ3UQpDbUg4bWFxeEJzbyttMnNodUpXc3MrQ0V5NGd3V1c3RjNOVmoxRERXS3VDTHk1Zit3WVNPNXk4TWx0eUN3cGFZCm5Vbmw5WUwwcFVJYm9kcHgwZS91UUdpRURaaUFsS2VlNlpmUWNteWp6bkpRNDFMNTB0OG5xY3RnUDRrTmo5R2EKVlc4empQc2l0N09WN1I3aTR5YlZsMFlYNEF1cm5LUGg0MXV2bThaYy8waTM3am9rWTdjcmZwUThXcEI2clRYaApjUnA2K3hNWEFlMXFrSVJoYUhRdkV1Y1FvYzdmb0x4K1pMNHFzc0J2SmFzS0pTMHNRU0E4aUs5Ym04VjhLbmkrClpIVnlpRFl3M3lBMlp1WThKSFZBMW14L0NCYXhqTkZ0dTFrQklzVUpRSXJCR29JM0g2dzJtcWpYcHVFQ0F3RUEKQVFLQ0FnQkRaNFlTNmRnY0VXVll1U2N1REdKOWEzZlB2LzljL2FlME9QZ2JFc1pBN0ZYeEQ2N2s1M2psYzBwUAoyaVFLSk9zUUtNM21Pb3BsM2dqWVlJSEpsdExkUlhCVmVGRmJWQmN2RVgrazFDK0V5emVUU3ZXR1ZRM0VLcFAwCm1XREpkSkN0U2Y1RnRPZkowai8rN0JPZngzazcxYmtSZW1uSXBUenMvc0llM3RuTHpGbFRxeW5XNitxNkhsdk0KYWJSTjM3K1FUNjczS2pEUFM1K01ZTWs0cXo3NlJzdFdHU29HUDJodm5KTkVpcFVMeGYrNmY2UHg5dkNzNXlnOAphK1I3eG43cy9kbzhGVlIwR3E4bDRjSWtUcW9MN2tNRVdwV2VhZzhlSjcrWFRndHdwV2NWTnJMMUVSdmM4ZHhQCmRUUEdYbEUzNlFLNzd5STU1akJNb3NndEpkSEdaSHF2YU5YTW1PTmZXaW4yTGZUSHQvSkFNeFlhTWtIRHVhVEcKVmMyTzBrdkRZcmRxWmpjK21YaEdoajVNeDl5SWJYYjZMYkl3bGFpWGpJZWNCVEhWSHpGK0RPaHpvOGZzRkJodQpBUlVLQStQamFlTDluQ1Y5b1c4YTFwOWphT29QcnR5UjRzR2pMTzQ2cnFNbndxS0xFdHVWbHovcTNBTEVBdkJhCjA4S1VXdGdPL2hVbU1XVzF1Q3o2K0NicEtCT0RCNFlnaGtnZHlJYXgyT1lqbGpWNTR0QWlBVTJQZFBack0rS20KNmdya3FZa0szZC9iaVRJSHBPRUlQY2tjMUlUamM2ZWY2NWkxT3gwclc3VXp4QUczOC9uVVd6YmMvMzNTQjk5aApPSzBoeWRrZnNVV0dOQnAwRmJwTGRNSHBjRVdjWThnSTN0Z1VRVWs2cEhselJDbVFOUUtDQVFFQTYwN3UvdnRsCjNYQTdOU3VGK3U3RU9oOGlDT3FEd3ozRVVFVVZMTmNLY2F3aTVCc3U3Tm80Nm03SHZYRjZqcWtRVXN1dm9ZTE0KeW96RVo4SGJGNHZ1VnIzaUlEdHlTUUErTFNOeFBHVlYwRlIyRzdZNjJCUVFrWVUxSnQ5eVJRaVdXeWxkeitkeApHMWZjK21EVUEwTERSSkdqaXhaSWZGSTZPeVFmdEJmazBPZEU5VExCSWdoV2Y5RVBDejFjOG1FOElDOTZ0VHI4CllnckNic2tOYnlYZ1ozVFhwR1NoY0hKc1VCWmlXbkhBaStJeUJnT2lHR0Q4NzQwVWgvcmZTU1Y1djRaNmVuWnYKUXFQWWxXOVh3ZERYeGZqa29lYkxnR1dBQzl1b29xSUFPcmFTcVRmVUdvMkZpNTZDNWp3RlVZTG91U2M0NmZ6WQpnR0lvaGhhQ3BnZ0ZEd0tDQVFFQTFrWGtYSE9kZjQ5b2JMaExSczVHWU9iWHJGTDRNZFhneVFFVG9mNSt4V2ZlCmRtYk92d2VxYmIxZWNGZHJjSkdtT2NxMGlTbmRKUnpUK2MzeFVUbExyclFNMHIzUVVYam8rVDdhdWZKanVWUTEKdm1RYmlNRTcvSk5ZT1ZvZlprSTRXWVR1b0tqY3F0UFU4WXp6Z1cvL3d1SmtFS3ZRbzVxdTJld20xeURsQWlJcwo5TDNyRkRWQ01FWGFQL0tMMVVMNFZNQUFnS0FLbCtSZWRhbkl1QTBWSWlteXp1N1dkZm45NVBYTFB5eU44c3NjCkdZUkg3Q3hDL1JyUUQrMnlZdEdRYlZEek1tVmlUUHZSdTY0dmxDVElxSTIyYjVGU0FVbmZkTE5SaW1TeWo0QjcKOVRtZ1hCZ2I5eVd5dlZSUXdLaVRab213NVYwMmhVMUhiOXQvOWZqMUR3S0NBUUFaZWxwMlVWSWVQK0NwU1NVZwpubW13d1Y0MkNPNXJYV3k4SkQ2K3RDbjFWT1lTUEw4LzlnRGpvVXNQUUJJOUVDRXNWZEdXYzBzcFEwU2cxMlNaCmtCVW1YemowdEhzVFhHdGZCODlpOHJYdjhMVTVHdW9VSzFmLzZhUnZxUkgrVjRld0p6SjVLRjRlejh5bGI0YUYKTTkxZ3QwUTE4eHUyR2xFanhpMkltbTIwRU5adWxpaERQeFBla3d4RjgwYjFGNElqR2dEM1RvTzFPZVVEaWRGaQpqMzlVdEZvRStzQmdKSU9GeUdhdDFGTTgwaWtJYmF4SFozajdseEw2QmpmVys2L0xCUXlONWZUMkNqZVJOcFVSCjcwTHR0SjFNeW1pT1ptOE8yYUhRdWltOE1iaC9pZ1AxUEEyUnFJQVQzYnZWcjQ3elBVUDBVZVEvUW1HUTR5OFMKT3h3UkFvSUJBUUNLRTgvc283UkNseTg3b0NjaUlacklwdmtrV3ZNRmFrWElRYUZkS3BxV3F6QjRMQmZla2hvSgpUWmFsM2krbUFyV1RXRVN1ZndPNi9yQzZzVE5vbS90aFFUVmlPRjhkb1VUQUdQanFDb0NvMU5NdE5XVm80dHk5CkRsWXozeGVNMWU5cUFIZWxvQ3RUQ2Q2WEtiVmhHOE04MnBhUkI2Y1RSb0tXZTg4cm9rN3c2UVQvVWNOQzZtOFUKbkc3ZjluU1ZvT3BWOHNSZ0hzRzB6N3p2SmRIcWlNT3RtQ0ZacUI4Yk4xV2RUYWNEdHJwaVV2QndvUVdYODQzWApmSWZITysxUU1LdFpSbWp4ZU5PM3VDNlhPcy8rTHhYL1NCTGdJazB0OTJTLzF5NGNlSGQ0Y2R0dlV3czdUVzMzCi9ac0kxbVNUUWc1NmJSQkpQWi84bHFnS05QQm9tVjJSQW9JQkFRQ3RFSnRiZEpWT2ZCaW9QWGQ1emNIdjRiYmgKaVMwaks4NDJ6SWxCZytmekRCekdZbEhGWE92dFVBbEZUL0p4bHFkamxKVjJiREs0clRGWTE1YjFvenFOZ2owbQpqSGNTRUlXbjhTZEovK3VHQTk5Mm1uTmdmbytSdGh2K3RjbytGTVloSWJoVkd2TGQwVXpxMWNyUlRxYUREeTBoCjhPQ21zdy9DS1REZDR3UDdNZGsxc1NBZHJWemVFY21mbDlKV3ZsUitNQzU4UkZtblVBRkdHMzJkd2UwMDBnbWIKTGNncS96ZzEvb0hBSThLTXNQeHp0bnlzVEx4ZytYN01HaWxicjBMd0V3QWVyYXovZzc1bG16MnIrdCtybFY0TApXUytGdXllTzd5UCs3cGRPejRkSzh3eW1jcXNseFZnK0RCZjF6Q0xNN0UvRTYvempvWXMzMlRwRDN1ck4KLS0tLS1FTkQgUlNBIFBSSVZBVEUgS0VZLS0tLS0K\n token: d076e0f9to6npbjap86ab9w5fsgksllz9u4n7vv8q6e7id6pcehnyw18p8k0q69j66z6qiemr7shnvq3ldshbu5it888dctyzzhko9hpdr1n0e3puuvvjwhnx1octamp\n", - "kubelet_identity": [ - { - "client_id": "dc3a760b-4b6f-40d0-a071-53e462f63a3e", - "object_id": "317ae46a-456e-4e69-a64b-d46f8d76f251", - "user_assigned_identity_id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/MC_otterizeGitHubActionsResourceGroup_otterizeAzureIAME2EAKSCluster_eastus/providers/Microsoft.ManagedIdentity/userAssignedIdentities/otterizeAzureIAME2EAKSCluster-agentpool" - } - ], - "kubernetes_version": "1.28", - "linux_profile": [ - { - "admin_username": "azureuser", - "ssh_key": [ - { - "key_data": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5V/ABHgUMNgEdfn5Kz9ywq6XV95Rw2w93AinwX3/5M20oxhxWHsxsB1S2P4AytmGy206RMvEoya1oNcNUOmx7uq9nPIzNpyF+7yJh/hHIviXn9PMhhmBPbHQS1GQSfO/VT/COgx1HgQogSKiDsEHir1JJyKfZv91ZvTAHpWFgQDA2LseG2UVbmzQO4oy8hBKZ30QlA7ctgZnwLwnIjreGgoHlBxS61WLMOJMLW0fhATQHdVXmbwsXJ0rAzmkzhRtfXA0i9jFjDzIz53ylVkSE7LEa+h52gKm7FYE7swsdSlByCSAgBaQGJ5MB6zf3QjznpXs30FYO0NKabtWaiPrt" - } - ] - } - ], - "location": "eastus", - "microsoft_defender": [], - "name": "otterizeAzureIAME2EAKSCluster", - "network_profile": [ - { - "dns_service_ip": "10.0.0.10", - "docker_bridge_cidr": "", - "load_balancer_sku": "standard", - "network_plugin": "kubenet", - "network_policy": "", - "pod_cidr": "10.244.0.0/16", - "service_cidr": "10.0.0.0/16" - } - ], - "node_resource_group": "MC_otterizeGitHubActionsResourceGroup_otterizeAzureIAME2EAKSCluster_eastus", - "node_resource_group_id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/MC_otterizeGitHubActionsResourceGroup_otterizeAzureIAME2EAKSCluster_eastus", - "oidc_issuer_enabled": true, - "oidc_issuer_url": "https://eastus.oic.prod-aks.azure.com/f8b92b88-e477-41ad-a5af-079de8dc8210/4400566d-ed60-49ae-9dd1-677aa33a5b1d/", - "oms_agent": null, - "open_service_mesh_enabled": null, - "private_cluster_enabled": null, - "private_fqdn": "", - "resource_group_name": "otterizeGitHubActionsResourceGroup", - "role_based_access_control_enabled": true, - "service_mesh_profile": [], - "service_principal": [ - { - "client_id": "msi" - } - ], - "storage_profile": [ - { - "blob_driver_enabled": false, - "disk_driver_enabled": true, - "disk_driver_version": "v1", - "file_driver_enabled": true, - "snapshot_controller_enabled": true - } - ], - "tags": {}, - "timeouts": null, - "windows_profile": [] - }, - "sensitive_attributes": [] - } - ] - }, - { - "module": "module.otterize-azure-iam", - "mode": "data", - "type": "azurerm_resource_group", - "name": "current_resource_group", - "provider": "module.otterize-azure-iam.provider[\"registry.terraform.io/hashicorp/azurerm\"]", - "instances": [ - { - "schema_version": 0, - "attributes": { - "id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup", - "location": "eastus", - "managed_by": "", - "name": "otterizeGitHubActionsResourceGroup", - "tags": {}, - "timeouts": null - }, - "sensitive_attributes": [] - } - ] - }, - { - "module": "module.otterize-azure-iam", - "mode": "managed", - "type": "azurerm_federated_identity_credential", - "name": "credentials_operator_federated_identity_credential", - "provider": "module.otterize-azure-iam.provider[\"registry.terraform.io/hashicorp/azurerm\"]", - "instances": [ - { - "schema_version": 0, - "attributes": { - "audience": [ - "api://AzureADTokenExchange" - ], - "id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ottr-k8s-operator-managed-identity-otterizeAzureIAME2EAKSCluster/federatedIdentityCredentials/ottr-k8s-operator-credentials-federated-identity-credential-otterizeAzureIAME2EAKSCluster", - "issuer": "https://eastus.oic.prod-aks.azure.com/f8b92b88-e477-41ad-a5af-079de8dc8210/4400566d-ed60-49ae-9dd1-677aa33a5b1d/", - "name": "ottr-k8s-operator-credentials-federated-identity-credential-otterizeAzureIAME2EAKSCluster", - "parent_id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ottr-k8s-operator-managed-identity-otterizeAzureIAME2EAKSCluster", - "resource_group_name": "otterizeGitHubActionsResourceGroup", - "subject": "system:serviceaccount:otterize-system:credentials-operator-controller-manager", - "timeouts": null - }, - "sensitive_attributes": [], - "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19", - "dependencies": [ - "module.otterize-azure-iam.azurerm_user_assigned_identity.otterize_operator_managed_identity", - "module.otterize-azure-iam.data.azurerm_kubernetes_cluster.current_aks_cluster", - "module.otterize-azure-iam.data.azurerm_resource_group.current_resource_group" - ] - } - ] - }, - { - "module": "module.otterize-azure-iam", - "mode": "managed", - "type": "azurerm_federated_identity_credential", - "name": "intents_operator_federated_identity_credential", - "provider": "module.otterize-azure-iam.provider[\"registry.terraform.io/hashicorp/azurerm\"]", - "instances": [ - { - "schema_version": 0, - "attributes": { - "audience": [ - "api://AzureADTokenExchange" - ], - "id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ottr-k8s-operator-managed-identity-otterizeAzureIAME2EAKSCluster/federatedIdentityCredentials/ottr-k8s-operator-intents-federated-identity-credential-otterizeAzureIAME2EAKSCluster", - "issuer": "https://eastus.oic.prod-aks.azure.com/f8b92b88-e477-41ad-a5af-079de8dc8210/4400566d-ed60-49ae-9dd1-677aa33a5b1d/", - "name": "ottr-k8s-operator-intents-federated-identity-credential-otterizeAzureIAME2EAKSCluster", - "parent_id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ottr-k8s-operator-managed-identity-otterizeAzureIAME2EAKSCluster", - "resource_group_name": "otterizeGitHubActionsResourceGroup", - "subject": "system:serviceaccount:otterize-system:intents-operator-controller-manager", - "timeouts": null - }, - "sensitive_attributes": [], - "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19", - "dependencies": [ - "module.otterize-azure-iam.azurerm_user_assigned_identity.otterize_operator_managed_identity", - "module.otterize-azure-iam.data.azurerm_kubernetes_cluster.current_aks_cluster", - "module.otterize-azure-iam.data.azurerm_resource_group.current_resource_group" - ] - } - ] - }, - { - "module": "module.otterize-azure-iam", - "mode": "managed", - "type": "azurerm_role_assignment", - "name": "assign_otterize_operator_resource_group_owner", - "provider": "module.otterize-azure-iam.provider[\"registry.terraform.io/hashicorp/azurerm\"]", - "instances": [ - { - "schema_version": 0, - "attributes": { - "condition": "", - "condition_version": "", - "delegated_managed_identity_resource_id": "", - "description": "", - "id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.Authorization/roleAssignments/60c1c86c-27c7-8797-c9ed-60dbf59001f1", - "name": "60c1c86c-27c7-8797-c9ed-60dbf59001f1", - "principal_id": "9059a45d-962d-473b-9f7b-376056e878d5", - "principal_type": "ServicePrincipal", - "role_definition_id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635", - "role_definition_name": "Owner", - "scope": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup", - "skip_service_principal_aad_check": null, - "timeouts": null - }, - "sensitive_attributes": [], - "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMH19", - "dependencies": [ - "module.otterize-azure-iam.azurerm_user_assigned_identity.otterize_operator_managed_identity", - "module.otterize-azure-iam.data.azurerm_resource_group.current_resource_group" - ] - } - ] - }, - { - "module": "module.otterize-azure-iam", - "mode": "managed", - "type": "azurerm_user_assigned_identity", - "name": "otterize_operator_managed_identity", - "provider": "module.otterize-azure-iam.provider[\"registry.terraform.io/hashicorp/azurerm\"]", - "instances": [ - { - "schema_version": 1, - "attributes": { - "client_id": "d183701c-e593-4da5-ba1e-ec14a37ac924", - "id": "/subscriptions/ef54c90c-5351-4c8f-a126-16a6d789104f/resourceGroups/otterizeGitHubActionsResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ottr-k8s-operator-managed-identity-otterizeAzureIAME2EAKSCluster", - "location": "eastus", - "name": "ottr-k8s-operator-managed-identity-otterizeAzureIAME2EAKSCluster", - "principal_id": "9059a45d-962d-473b-9f7b-376056e878d5", - "resource_group_name": "otterizeGitHubActionsResourceGroup", - "tags": null, - "tenant_id": "f8b92b88-e477-41ad-a5af-079de8dc8210", - "timeouts": null - }, - "sensitive_attributes": [], - "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInJlYWQiOjMwMDAwMDAwMDAwMCwidXBkYXRlIjoxODAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", - "dependencies": [ - "module.otterize-azure-iam.data.azurerm_resource_group.current_resource_group" - ] - } - ] - } - ], - "check_results": null -} From 8474100ead907e8eb71892a7165628c3f241f9b8 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 6 Oct 2024 10:57:55 +0000 Subject: [PATCH 24/40] Bump chart versions [nobump] --- otterize-kubernetes/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 38fb32bb..f9b89114 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.45 +version: 4.0.46 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From b9524ba098ee52001426a65736bf4edd6bbc0769 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Wed, 9 Oct 2024 13:48:39 +0000 Subject: [PATCH 25/40] Setting latest tag in intents-operator helm chart repo to v2.0.24 --- intents-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 5d31e1e9..73e9b830 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -3,7 +3,7 @@ name: intents-operator description: Otterize intents operator type: application version: 3.0.40 -appVersion: v2.0.23 +appVersion: v2.0.24 home: https://github.com/otterize/intents-operator sources: - https://github.com/otterize/intents-operator From c99be49897aca45d3d3f0f4f8ecce3b8e00f12a6 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Wed, 9 Oct 2024 13:48:52 +0000 Subject: [PATCH 26/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 73e9b830..aec453ab 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.40 +version: 3.0.41 appVersion: v2.0.24 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index f9b89114..86ca97db 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.46 +version: 4.0.47 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 3192e6adbaede8a3a192c60ec818c71076caf7ba Mon Sep 17 00:00:00 2001 From: omris94 <46892443+omris94@users.noreply.github.com> Date: Wed, 9 Oct 2024 16:51:01 +0300 Subject: [PATCH 27/40] Support creating separate network policies for ingress and egress by setting the value of `intentsOperator.operator.separateNetpolsForIngressAndEgress` to `true` (#251) --- intents-operator/README.md | 3 ++- intents-operator/templates/intents-operator-deployment.yaml | 6 +++++- intents-operator/values.yaml | 6 ++++++ 3 files changed, 13 insertions(+), 2 deletions(-) diff --git a/intents-operator/README.md b/intents-operator/README.md index 98428c82..3d9f57a0 100644 --- a/intents-operator/README.md +++ b/intents-operator/README.md @@ -42,7 +42,8 @@ | `operator.allowExternalTraffic` | `ifBlockedByOtterize`, `off` or `always`. Specify how the operator handles external traffic for Ingress/Service resources: `ifBlockedByOtterize` automatically create network policies to enable internet traffic for services that would be blocked by Otterize network policies when protecting a server. Choosing `off` may necessitate manual network policy creation to allow external traffic, while `always` automatically creates policies for all such resource that are visible to the operator. | `ifBlockedByOtterize` | | `operator.resources` | Resources override. | | | `operator.enableDatabasePolicyCreation` | Whether the operator should create database policies according to ClientIntents | `true` | -| `operator.enableEgressNetworkPolicyCreation` | **experimental** - Enables experimental support for egress network policies (coming soon!) | `false` | +| `operator.enableEgressNetworkPolicyCreation` | Enables support for egress network policies | `false` | +| `operator.separateNetpolsForIngressAndEgress` | If set to true, the operator will create separate network policies for ingress and egress traffic. | `false` | | `watchedNamespaces` | List of namespaces the intents operator should watch. The operator will be blind to any namespace not in this list. | `(nil) meaning watch all` | | `enforcedNamespaces` | When using "shadow enforcement" mode, namespaces in this list will be treated as if the enforcement were active. | `(nil)` | | `operator.autoGenerateTLSUsingCredentialsOperator` | If set to true, adds the necessary pod annotations in order to integrate with credentials-operator, and get tls certificate. | `false` | diff --git a/intents-operator/templates/intents-operator-deployment.yaml b/intents-operator/templates/intents-operator-deployment.yaml index 1155f5db..9709c3f3 100644 --- a/intents-operator/templates/intents-operator-deployment.yaml +++ b/intents-operator/templates/intents-operator-deployment.yaml @@ -200,7 +200,11 @@ spec: value: "false" {{- end }} {{- if eq true .Values.operator.enableEgressNetworkPolicyCreation }} - - name: OTTERIZE_EXP_ENABLE_EGRESS_NETWORK_POLICIES + - name: OTTERIZE_ENABLE_EGRESS_NETWORK_POLICIES + value: "true" + {{- end }} + {{- if eq true .Values.operator.separateNetpolsForIngressAndEgress }} + - name: OTTERIZE_SEPARATE_NETPOLS_FOR_INGRESS_AND_EGRESS value: "true" {{- end }} {{- if .Values.global.aws.rolesAnywhere.enabled }} diff --git a/intents-operator/values.yaml b/intents-operator/values.yaml index 1f3017bd..06bb95f8 100644 --- a/intents-operator/values.yaml +++ b/intents-operator/values.yaml @@ -50,7 +50,13 @@ operator: allowExternalTraffic: ifBlockedByOtterize enableIstioPolicyCreation: true enableDatabasePolicyCreation: true + + # If set to true, the operator will create network policies for egress traffic. enableEgressNetworkPolicyCreation: false + + # If set to true, the operator will create separate network policies for ingress and egress traffic. + # (Only available with enableEgressNetworkPolicyCreation set to true) + separateNetpolsForIngressAndEgress: false ingressControllerAWSALBExempt: false extraEnvVars: From 180e58a3309d9c4e88c1b5bcd6d58ab479babb01 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Wed, 9 Oct 2024 13:51:15 +0000 Subject: [PATCH 28/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index aec453ab..5df11290 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.41 +version: 3.0.42 appVersion: v2.0.24 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 86ca97db..dfb03823 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.47 +version: 4.0.48 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 666c0600cb3d7314858d796f0e6001d379b1a272 Mon Sep 17 00:00:00 2001 From: omris94 <46892443+omris94@users.noreply.github.com> Date: Sun, 13 Oct 2024 20:19:31 +0300 Subject: [PATCH 29/40] Support sniffer extended procfs resolution (#252) --- network-mapper/templates/sniffer-daemonset.yaml | 4 ++++ network-mapper/values.yaml | 1 + 2 files changed, 5 insertions(+) diff --git a/network-mapper/templates/sniffer-daemonset.yaml b/network-mapper/templates/sniffer-daemonset.yaml index 3846373d..8d071e56 100644 --- a/network-mapper/templates/sniffer-daemonset.yaml +++ b/network-mapper/templates/sniffer-daemonset.yaml @@ -110,6 +110,10 @@ spec: - name: OTTERIZE_CLIENT_ID value: "{{ .Values.global.otterizeCloud.credentials.clientId }}" {{- end }} + {{- if eq true .Values.sniffer.useExtendedProcfsResolution }} + - name: OTTERIZE_USE_EXTENDED_PROCFS_RESOLUTION + value: "true" + {{- end }} livenessProbe: httpGet: path: /healthz diff --git a/network-mapper/values.yaml b/network-mapper/values.yaml index bf8a3e0e..cfe4b5e6 100644 --- a/network-mapper/values.yaml +++ b/network-mapper/values.yaml @@ -72,6 +72,7 @@ sniffer: # requests: # cpu: 100m # memory: 128Mi + useExtendedProcfsResolution: false kafkawatcher: enable: false # enable/disable entire installation of the kafka-watcher From 7af823ff58165cd457e4b8d20ccb78c2095cc36c Mon Sep 17 00:00:00 2001 From: otterizebot Date: Sun, 13 Oct 2024 17:19:42 +0000 Subject: [PATCH 30/40] Bump chart versions [nobump] --- network-mapper/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index e52eb69c..7a7076be 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: network-mapper type: application -version: 2.0.23 +version: 2.0.24 appVersion: v2.0.10 home: https://github.com/otterize/network-mapper sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index dfb03823..7d349824 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.48 +version: 4.0.49 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 9fc35a81d9ba1cb22cc8e4bf5d87b5e58b2436d9 Mon Sep 17 00:00:00 2001 From: Amit Lichtenberg Date: Mon, 14 Oct 2024 12:07:24 +0300 Subject: [PATCH 31/40] Fix CI issue with testing MySQL & PostgreSQL integration on forks - add missing permissions to test workflows (#254) --- .github/workflows/e2e-test.yaml | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/.github/workflows/e2e-test.yaml b/.github/workflows/e2e-test.yaml index cdcf96ec..91c8c088 100644 --- a/.github/workflows/e2e-test.yaml +++ b/.github/workflows/e2e-test.yaml @@ -105,6 +105,10 @@ jobs: helm install otterize ./otterize-kubernetes -n otterize-system --wait --create-namespace $OPERATOR_FLAGS $TELEMETRY_FLAG test-postgresql-integration: + permissions: + id-token: write + contents: read + checks: write runs-on: ubuntu-latest steps: - name: Checkout @@ -196,6 +200,10 @@ jobs: if: always() && github.event.pull_request.user.login != 'dependabot[bot]' test-mysql-integration: + permissions: + id-token: write + contents: read + checks: write runs-on: ubuntu-latest steps: - name: Checkout From a370ac3593844dceaa912f1ef5d462e23926542f Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 09:07:38 +0000 Subject: [PATCH 32/40] Bump chart versions [nobump] --- otterize-kubernetes/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 7d349824..151dd573 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.49 +version: 4.0.50 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From ed1820e20430cf45432a30b510599c2ba467022c Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 09:52:10 +0000 Subject: [PATCH 33/40] Setting latest tag in network-mapper helm chart repo to v2.0.11 --- network-mapper/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index 7a7076be..6eceef3d 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: network-mapper type: application version: 2.0.24 -appVersion: v2.0.10 +appVersion: v2.0.11 home: https://github.com/otterize/network-mapper sources: - https://github.com/otterize/network-mapper From bfd8e03474c30fae6af6a9517bd08cfec0d91436 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 09:52:23 +0000 Subject: [PATCH 34/40] Bump chart versions [nobump] --- network-mapper/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index 6eceef3d..52fcc3ab 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: network-mapper type: application -version: 2.0.24 +version: 2.0.25 appVersion: v2.0.11 home: https://github.com/otterize/network-mapper sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 151dd573..8d4f3ada 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.50 +version: 4.0.51 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 3e8038d2b37f4d02bd4643aa857c802292ea447a Mon Sep 17 00:00:00 2001 From: Cronix Date: Mon, 14 Oct 2024 12:45:54 +0200 Subject: [PATCH 35/40] fix client secret keyref value key in readme (#253) --- network-mapper/README.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/network-mapper/README.md b/network-mapper/README.md index 2befb1c6..36a70b74 100644 --- a/network-mapper/README.md +++ b/network-mapper/README.md @@ -93,14 +93,14 @@ Deployed only when `aws.visibility.enabled` is set to `true`. ## Cloud parameters -| Key | Description | Default | -|------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------| -| `global.otterizeCloud.credentials.clientId` | Client ID for connecting to Otterize Cloud. | `(none)` | -| `global.otterizeCloud.credentials.clientSecret` | Client secret for connecting to Otterize Cloud. | `(none)` | -| `global.otterizeCloud.credentials.secretKeyRef.secretName` | If specified, the name of a pre-created Kubernetes Secret to be used instead of creating a secret with the value of clientSecret. | `(none)` | -| `global.otterizeCloud.credentials.secretKeyRef.secretKey` | If specified, the key for the clientSecret in a pre-created Kubernetes Secret to be used instead of creating a secret with the value of clientSecret. | `(none)` | -| `global.otterizeCloud.apiAddress` | Overrides Otterize Cloud default API address. | `(none)` | -| `global.otterizeCloud.apiExtraCAPEMSecret` | The name of a secret containing a single `CA.pem` file for an extra root CA used to connect to Otterize Cloud. The secret should be placed in the same namespace as the Otterize deployment. | `(none)` | +| Key | Description | Default | +|------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------| +| `global.otterizeCloud.credentials.clientId` | Client ID for connecting to Otterize Cloud. | `(none)` | +| `global.otterizeCloud.credentials.clientSecret` | Client secret for connecting to Otterize Cloud. | `(none)` | +| `global.otterizeCloud.credentials.clientSecretKeyRef.secretName` | If specified, the name of a pre-created Kubernetes Secret to be used instead of creating a secret with the value of clientSecret. | `(none)` | +| `global.otterizeCloud.credentials.clientSecretKeyRef.secretKey` | If specified, the key for the clientSecret in a pre-created Kubernetes Secret to be used instead of creating a secret with the value of clientSecret. | `(none)` | +| `global.otterizeCloud.apiAddress` | Overrides Otterize Cloud default API address. | `(none)` | +| `global.otterizeCloud.apiExtraCAPEMSecret` | The name of a secret containing a single `CA.pem` file for an extra root CA used to connect to Otterize Cloud. The secret should be placed in the same namespace as the Otterize deployment. | `(none)` | ## Global parameters From 3ad533467ec99cc62ee9a0071798339d31c3e58e Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 10:46:06 +0000 Subject: [PATCH 36/40] Bump chart versions [nobump] --- network-mapper/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/network-mapper/Chart.yaml b/network-mapper/Chart.yaml index 52fcc3ab..5ac2d89e 100644 --- a/network-mapper/Chart.yaml +++ b/network-mapper/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: network-mapper type: application -version: 2.0.25 +version: 2.0.26 appVersion: v2.0.11 home: https://github.com/otterize/network-mapper sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 8d4f3ada..5615523e 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.51 +version: 4.0.52 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 8fb6d42c3dfeb0d5ebac54e8813d660dd18e72e4 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 11:02:46 +0000 Subject: [PATCH 37/40] Setting latest tag in intents-operator helm chart repo to v2.0.25 --- intents-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index 5df11290..a1c450ed 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -3,7 +3,7 @@ name: intents-operator description: Otterize intents operator type: application version: 3.0.42 -appVersion: v2.0.24 +appVersion: v2.0.25 home: https://github.com/otterize/intents-operator sources: - https://github.com/otterize/intents-operator From bf556780d915b3f380e344d6dc9ec1a259a98f57 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 11:03:01 +0000 Subject: [PATCH 38/40] Bump chart versions [nobump] --- intents-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/intents-operator/Chart.yaml b/intents-operator/Chart.yaml index a1c450ed..0e2ce184 100644 --- a/intents-operator/Chart.yaml +++ b/intents-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: intents-operator description: Otterize intents operator type: application -version: 3.0.42 +version: 3.0.43 appVersion: v2.0.25 home: https://github.com/otterize/intents-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index 5615523e..f79f8db7 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.52 +version: 4.0.53 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: From 9fc7cb6609946672af7b11c428e54cae896f3bc8 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 11:05:54 +0000 Subject: [PATCH 39/40] Setting latest tag in credentials-operator helm chart repo to v3.0.8 --- credentials-operator/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index 55b04b1e..860292dc 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -3,7 +3,7 @@ name: credentials-operator description: credentials-operator type: application version: 3.0.12 -appVersion: v3.0.7 +appVersion: v3.0.8 home: https://github.com/otterize/credentials-operator sources: - https://github.com/otterize/credentials-operator From 772ea14e3eb819db68d3d9510a0da2133a21c808 Mon Sep 17 00:00:00 2001 From: otterizebot Date: Mon, 14 Oct 2024 11:06:10 +0000 Subject: [PATCH 40/40] Bump chart versions [nobump] --- credentials-operator/Chart.yaml | 2 +- otterize-kubernetes/Chart.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/credentials-operator/Chart.yaml b/credentials-operator/Chart.yaml index 860292dc..34889bd1 100644 --- a/credentials-operator/Chart.yaml +++ b/credentials-operator/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: credentials-operator description: credentials-operator type: application -version: 3.0.12 +version: 3.0.13 appVersion: v3.0.8 home: https://github.com/otterize/credentials-operator sources: diff --git a/otterize-kubernetes/Chart.yaml b/otterize-kubernetes/Chart.yaml index f79f8db7..a20d0d3c 100644 --- a/otterize-kubernetes/Chart.yaml +++ b/otterize-kubernetes/Chart.yaml @@ -3,7 +3,7 @@ name: otterize-kubernetes description: | This chart contains the Otterize credentials-operator, SPIRE (server+agent), the Otterize intents operator, and the Otterize network mapper. type: application -version: 4.0.53 +version: 4.0.54 home: https://github.com/otterize/helm-charts kubeVersion: ">=1.19.0-0" dependencies: