All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
- Dynamically calculate CAPI and CAPA versions from go cache, so that we use the right path when installing the CRDs during tests.
0.28.0 - 2024-09-20
- Support new, plural
aws.giantswarm.io/irsa-trust-domains
annotation on the AWSCluster object that centrally defines which service account issuer domains to use. The previous annotation is supported for backward compatibility.
0.27.1 - 2024-08-21
- Disable logger development mode to avoid panicking, use zap as logger
0.27.0 - 2024-07-11
- IRSA bucket versioning on CAPA is "v3"
0.26.0 - 2024-07-09
- Add
ec2:DescribeAvailabilityZones
to control plane template.
0.25.0 - 2024-06-06
- Update CAPA CR version to
v1beta2
0.24.1 - 2024-06-05
- Ignore not found errors when deleting IAM roles. This is to avoid blocking deletion of the CRs.
0.24.0 - 2024-04-29
- Update all IRSA roles trusted policy.
0.23.0 - 2024-04-26
- Changed service account matching
StringLike
to accommodate wildcard full names.
0.22.0 - 2024-04-15
- Add toleration for
node.cluster.x-k8s.io/uninitialized
taint. - Remove toleration for old
node-role.kubernetes.io/master
taint. - Allow ALB controller to be installed on any namespace.
0.21.1 - 2024-04-11
- Add retry logic for removing the finalizer to all reconcilers. This fixes the same bug as in 0.17.1 but for all reconcilers.
0.21.0 - 2024-03-20
- Add finalizer to AWSCluster when reconciling AWSClusterTemplates. The AWSClusterTemplate won't block deletion of the AWSCluster, without which the operator cannot proceed with deletion
0.20.0 - 2024-03-20
- Use a more relaxed trust identity policy for
Route53Manager
IAM role to allow running multiple external-dns instances in the same cluster.
0.19.0 - 2024-03-19
- Use S3 bucket domain instead of CloundFront domain fo China regions.
0.18.0 - 2024-03-13
- Change trust policy attach logic to recreate it for Route53 role.
0.17.1 - 2024-03-12
- Add retry logic for removing the finalizer. This fixes a bug where if another controller removes it's finalizer before reconciliation finishes, capa-iam-operator will not be able to remove its own.
0.17.0 - 2024-03-07
- Create a IAM client with specific Region in order to work with AWS China partition.
- Adjust all IAM policies to include all AWS partitions.
- Change inline policy document attach logic to recreate it if it's already attached to the role.
0.16.0 - 2024-02-28
- Use
cert-manager-app
as service account name for Cert Manager (changed in recent version of cert-manager-app).
- Use
/aws/
asAWS_SHARED_CREDENTIALS_FILE
to overcome changes in base images.
0.15.0 - 2024-01-10
- Configure
gsoci.azurecr.io
as the default container image registry.
- Remove unnecessary finalizers from configmap and AWSCluster.
0.14.0 - 2023-11-23
- Add IRSA role for
aws-efs-csi-driver
app.
0.13.2 - 2023-11-15
- Fix not deleting all IRSA roles.
0.13.1 - 2023-11-10
- Fix malformed cluster-autoscaler policy.
0.13.0 - 2023-11-10
- Add new IAM role for cluster-autoscaler.
0.12.0 - 2023-11-02
- Add tags from
AWSCluster.Spec.AdditionalTags
andAWSManagedControlPlane.Spec.AdditionalTags
to all created resources. - Add IRSA role for EBS CSI driver.
0.11.0 - 2023-11-01
- Add
global.podSecurityStandards.enforced
value for PSS migration.
- Remove SecretReconciler.
- Refactor Reconcilers.
- Do not panic when OIDC setting is missing for EKS cluster.
- Add new role for AWS Load Balancer Controller.
- Add tests for iam package.
0.10.0 - 2023-08-11
- Create
external-dns
andcert-manager
IAM roles for IRSA for EKS clusters.
- Remove cloudfront secret dependency from reconcilers.
0.9.0 - 2023-06-08
- Fetch IRSA secret resource just right befire creating IRSA role to avoid locking node role creation for control plane and workers.
- Add necessary values for PSS policy warnings.
0.8.0 - 2023-05-08
- Add
control-plane
finalizer to IRSA cloudfront secret.
0.7.0 - 2023-03-10
- Add finalizer to the IRSA cloudfront secret.
- Add deletion logic for the IRSA roles.
- Add IRSA support for
cert-manager-controller
service account
- Allow required volume types in PSP so that pods can still be admitted
- Make controllers consistently put the "allow both KIAM and IRSA" IAM policy
- Retry policy creation if referenced principal (the role ARN) is not available yet
0.6.0 - 2023-02-17
- Statements and actions to
route53
trust policy to supportcert-manager
with IRSA - Added the use of the runtime/default seccomp profile.
0.5.1 - 2023-01-30
- Increased cpu & memory resources limits/requests.
0.5.0 - 2023-01-13
- Secrets reconciler for IRSA to support
external-dns
0.4.5 - 2023-01-09
- Fix resources left behind on deletion
- Avoid distracting error logs for expected situations
0.4.4 - 2022-11-29
- Add
ec2:DescribeVolumesModifications
to the control-plane role so that resizing volumes work.
0.4.3 - 2022-11-24
- Check for other resources using the same IAM instance profile as the resource being deleted and skip deleting the IAM role if others found.
0.4.2 - 2022-11-01
PodSecurityPolicy
are removed on newer k8s versions, so only apply it if object is registered in the k8s API.
- Tolerate running on control-plane nodes if workers unavailable
0.4.1 - 2022-07-13
0.4.0 - 2022-04-19
- Add VerticalPodAutoscaler CR.
- Add IAM role creation for bastion node.
0.3.2 - 2022-03-03
- Added to
aws-app-collection
.
0.3.0 - 2021-10-06
- Renamed from
capa-iam-controller
tocapa-iam-operator
0.2.0 - 2021-07-23
- Restrict
secretmanager
service permissions to access secrets with CAPI prefix. - Only watch for CRs with capi watch filter.
- AWSMachinteTemplate controller - only watch for CRs with control plane role.
0.1.1 - 2021-07-15
- Rename Route53 and KIAM role names to match previous naming scheme.
0.1.0 - 2021-07-14
- Implement
AWSMachineTemplate
reconciler. - Implement
AWSMachinePool
reconciler.