Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(helm): update istiod ( 1.22.1 β†’ 1.22.2 ) #4959

Merged
merged 1 commit into from
Jun 27, 2024

Conversation

lumiere-bot[bot]
Copy link
Contributor

@lumiere-bot lumiere-bot bot commented Jun 27, 2024

This PR contains the following updates:

Package Update Change
istiod patch 1.22.1 -> 1.22.2

Configuration

πŸ“… Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

β™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

πŸ”• Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@lumiere-bot lumiere-bot bot requested a review from coolguy1771 as a code owner June 27, 2024 01:34
@lumiere-bot lumiere-bot bot added type/patch area/kubernetes Changes made in the kubernetes directory cluster/sol labels Jun 27, 2024
@lumiere-bot
Copy link
Contributor Author

lumiere-bot bot commented Jun 27, 2024

--- kubernetes/sol/apps/istio-system/istiod/app Kustomization: flux-system/istiod HelmRelease: istio-system/istiod

+++ kubernetes/sol/apps/istio-system/istiod/app Kustomization: flux-system/istiod HelmRelease: istio-system/istiod

@@ -13,13 +13,13 @@

     spec:
       chart: istiod
       sourceRef:
         kind: HelmRepository
         name: istio
         namespace: flux-system
-      version: 1.22.1
+      version: 1.22.2
   install:
     remediation:
       retries: 5
   interval: 15m
   upgrade:
     remediation:

@lumiere-bot
Copy link
Contributor Author

lumiere-bot bot commented Jun 27, 2024

--- HelmRelease: istio-system/istiod ConfigMap: istio-system/istio-sidecar-injector

+++ HelmRelease: istio-system/istiod ConfigMap: istio-system/istio-sidecar-injector

@@ -9,12 +9,15 @@

     install.operator.istio.io/owning-resource: unknown
     operator.istio.io/component: Pilot
     release: istiod
 data:
   values: |-
     {
+      "gateways": {
+        "securityContext": {}
+      },
       "global": {
         "autoscalingv2API": true,
         "caAddress": "",
         "caName": "",
         "certSigners": [],
         "configCluster": false,
@@ -104,13 +107,13 @@

             "aud": "istio-ca"
           }
         },
         "sts": {
           "servicePort": 0
         },
-        "tag": "1.22.1",
+        "tag": "1.22.2",
         "variant": "distroless"
       },
       "istio_cni": {
         "chained": true,
         "provider": "default"
       },
@@ -468,27 +471,29 @@

     \ (index .ObjectMeta.Labels `app.kubernetes.io/version`) | default (index .ObjectMeta.Labels\
     \ `version`) | default \"latest\"  | quote }}\n      annotations: {\n        istio.io/rev:\
     \ {{ .Revision | default \"default\" | quote }},\n        {{- if eq (len $containers)\
     \ 1 }}\n        kubectl.kubernetes.io/default-logs-container: \"{{ index $containers\
     \ 0 }}\",\n        kubectl.kubernetes.io/default-container: \"{{ index $containers\
     \ 0 }}\",\n        {{ end }}\n      }\n    spec:\n      securityContext:\n   \
-    \     sysctls:\n        - name: net.ipv4.ip_unprivileged_port_start\n        \
-    \  value: \"0\"\n      containers:\n      - name: istio-proxy\n      {{- if contains\
-    \ \"/\" .Values.global.proxy.image }}\n        image: \"{{ annotation .ObjectMeta\
-    \ `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}\"\n      {{- else\
-    \ }}\n        image: \"{{ .ProxyImage }}\"\n      {{- end }}\n        ports:\n\
-    \        - containerPort: 15090\n          protocol: TCP\n          name: http-envoy-prom\n\
-    \        args:\n        - proxy\n        - router\n        - --domain\n      \
-    \  - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain }}\n        -\
-    \ --proxyLogLevel={{ annotation .ObjectMeta `sidecar.istio.io/logLevel` .Values.global.proxy.logLevel\
-    \ }}\n        - --proxyComponentLogLevel={{ annotation .ObjectMeta `sidecar.istio.io/componentLogLevel`\
-    \ .Values.global.proxy.componentLogLevel }}\n        - --log_output_level={{ annotation\
-    \ .ObjectMeta `sidecar.istio.io/agentLogLevel` .Values.global.logging.level }}\n\
-    \      {{- if .Values.global.sts.servicePort }}\n        - --stsPort={{ .Values.global.sts.servicePort\
-    \ }}\n      {{- end }}\n      {{- if .Values.global.logAsJson }}\n        - --log_as_json\n\
-    \      {{- end }}\n      {{- if .Values.global.proxy.lifecycle }}\n        lifecycle:\n\
+    \   {{- if .Values.gateways.securityContext }}\n        {{- toYaml .Values.gateways.securityContext\
+    \ | nindent 4 }}\n      {{- else }}\n        sysctls:\n        - name: net.ipv4.ip_unprivileged_port_start\n\
+    \          value: \"0\"\n      {{- end }}\n      containers:\n      - name: istio-proxy\n\
+    \      {{- if contains \"/\" .Values.global.proxy.image }}\n        image: \"\
+    {{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image\
+    \ }}\"\n      {{- else }}\n        image: \"{{ .ProxyImage }}\"\n      {{- end\
+    \ }}\n        ports:\n        - containerPort: 15090\n          protocol: TCP\n\
+    \          name: http-envoy-prom\n        args:\n        - proxy\n        - router\n\
+    \        - --domain\n        - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain\
+    \ }}\n        - --proxyLogLevel={{ annotation .ObjectMeta `sidecar.istio.io/logLevel`\
+    \ .Values.global.proxy.logLevel }}\n        - --proxyComponentLogLevel={{ annotation\
+    \ .ObjectMeta `sidecar.istio.io/componentLogLevel` .Values.global.proxy.componentLogLevel\
+    \ }}\n        - --log_output_level={{ annotation .ObjectMeta `sidecar.istio.io/agentLogLevel`\
+    \ .Values.global.logging.level }}\n      {{- if .Values.global.sts.servicePort\
+    \ }}\n        - --stsPort={{ .Values.global.sts.servicePort }}\n      {{- end\
+    \ }}\n      {{- if .Values.global.logAsJson }}\n        - --log_as_json\n    \
+    \  {{- end }}\n      {{- if .Values.global.proxy.lifecycle }}\n        lifecycle:\n\
     \          {{ toYaml .Values.global.proxy.lifecycle | indent 6 }}\n      {{- end\
     \ }}\n        securityContext:\n          runAsUser: {{ .ProxyUID | default \"\
     1337\" }}\n          runAsGroup: {{ .ProxyGID | default \"1337\" }}\n        env:\n\
     \        - name: PILOT_CERT_PROVIDER\n          value: {{ .Values.global.pilotCertProvider\
     \ }}\n        - name: CA_ADDR\n        {{- if .Values.global.caAddress }}\n  \
     \        value: {{ .Values.global.caAddress }}\n        {{- else }}\n        \
@@ -883,32 +888,33 @@

     \ 1\n              periodSeconds: 1\n              successThreshold: 1\n     \
     \         timeoutSeconds: 1\n            readinessProbe:\n              failureThreshold:\
     \ 4\n              httpGet:\n                path: /healthz/ready\n          \
     \      port: 15021\n                scheme: HTTP\n              initialDelaySeconds:\
     \ 0\n              periodSeconds: 15\n              successThreshold: 1\n    \
     \          timeoutSeconds: 1\n            securityContext:\n              privileged:\
-    \ false\n              runAsGroup: 1337\n              runAsUser: 0\n        \
-    \      capabilities:\n                drop:\n                - ALL\n         \
-    \   volumeMounts:\n            - name: workload-socket\n              mountPath:\
-    \ /var/run/secrets/workload-spiffe-uds\n            - mountPath: /var/run/secrets/istio\n\
-    \              name: istiod-ca-cert\n            - mountPath: /var/lib/istio/data\n\
-    \              name: istio-data\n            - mountPath: /etc/istio/proxy\n \
-    \             name: istio-envoy\n            - mountPath: /var/run/secrets/tokens\n\
-    \              name: istio-token\n            - mountPath: /etc/istio/pod\n  \
-    \            name: istio-podinfo\n          volumes:\n          - emptyDir: {}\n\
-    \            name: workload-socket\n          - emptyDir:\n              medium:\
-    \ Memory\n            name: istio-envoy\n          - emptyDir:\n             \
-    \ medium: Memory\n            name: go-proxy-envoy\n          - emptyDir: {}\n\
-    \            name: istio-data\n          - emptyDir: {}\n            name: go-proxy-data\n\
-    \          - downwardAPI:\n              items:\n              - fieldRef:\n \
-    \                 fieldPath: metadata.labels\n                path: labels\n \
-    \             - fieldRef:\n                  fieldPath: metadata.annotations\n\
-    \                path: annotations\n            name: istio-podinfo\n        \
-    \  - name: istio-token\n            projected:\n              sources:\n     \
-    \         - serviceAccountToken:\n                  audience: istio-ca\n     \
-    \             expirationSeconds: 43200\n                  path: istio-token\n\
+    \ false\n              runAsGroup: 1337\n              runAsUser: 1337\n     \
+    \         allowPrivilegeEscalation: false\n              readOnlyRootFilesystem:\
+    \ true\n              runAsNonRoot: true\n              capabilities:\n      \
+    \          drop:\n                - ALL\n            volumeMounts:\n         \
+    \   - name: workload-socket\n              mountPath: /var/run/secrets/workload-spiffe-uds\n\
+    \            - mountPath: /var/run/secrets/istio\n              name: istiod-ca-cert\n\
+    \            - mountPath: /var/lib/istio/data\n              name: istio-data\n\
+    \            - mountPath: /etc/istio/proxy\n              name: istio-envoy\n\
+    \            - mountPath: /var/run/secrets/tokens\n              name: istio-token\n\
+    \            - mountPath: /etc/istio/pod\n              name: istio-podinfo\n\
+    \          volumes:\n          - emptyDir: {}\n            name: workload-socket\n\
+    \          - emptyDir:\n              medium: Memory\n            name: istio-envoy\n\
+    \          - emptyDir:\n              medium: Memory\n            name: go-proxy-envoy\n\
+    \          - emptyDir: {}\n            name: istio-data\n          - emptyDir:\
+    \ {}\n            name: go-proxy-data\n          - downwardAPI:\n            \
+    \  items:\n              - fieldRef:\n                  fieldPath: metadata.labels\n\
+    \                path: labels\n              - fieldRef:\n                  fieldPath:\
+    \ metadata.annotations\n                path: annotations\n            name: istio-podinfo\n\
+    \          - name: istio-token\n            projected:\n              sources:\n\
+    \              - serviceAccountToken:\n                  audience: istio-ca\n\
+    \                  expirationSeconds: 43200\n                  path: istio-token\n\
     \          - configMap:\n              name: istio-ca-root-cert\n            name:\
     \ istiod-ca-cert\n          {{- if .Values.global.imagePullSecrets }}\n      \
     \    imagePullSecrets:\n            {{- range .Values.global.imagePullSecrets\
     \ }}\n            - name: {{ . }}\n            {{- end }}\n          {{- end }}\n\
     \    ---\n    apiVersion: v1\n    kind: Service\n    metadata:\n      annotations:\n\
     \        {{ toJsonMap (omit .InfrastructureAnnotations \"kubectl.kubernetes.io/last-applied-configuration\"\
@@ -958,22 +964,24 @@

     \ \"false\"\n                \"service.istio.io/canonical-name\" .DeploymentName\n\
     \                \"service.istio.io/canonical-revision\" \"latest\"\n        \
     \       )\n              .InfrastructureLabels\n              (strdict\n     \
     \           \"gateway.networking.k8s.io/gateway-name\" .Name\n               \
     \ \"istio.io/gateway-name\" .Name\n              ) | nindent 8 }}\n        spec:\n\
[Diff truncated by flux-local]
--- HelmRelease: istio-system/istiod Deployment: istio-system/istiod

+++ HelmRelease: istio-system/istiod Deployment: istio-system/istiod

@@ -37,13 +37,13 @@

       tolerations:
       - key: cni.istio.io/not-ready
         operator: Exists
       serviceAccountName: istiod
       containers:
       - name: discovery
-        image: docker.io/istio/pilot:1.22.1-distroless
+        image: docker.io/istio/pilot:1.22.2-distroless
         args:
         - discovery
         - --monitoringAddr=:15014
         - --log_output_level=default:info
         - --domain
         - cluster.local

@lumiere-bot lumiere-bot bot merged commit 73ca3e0 into main Jun 27, 2024
11 of 12 checks passed
@lumiere-bot lumiere-bot bot deleted the renovate/sol-istiod-1.x branch June 27, 2024 19:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/kubernetes Changes made in the kubernetes directory cluster/sol renovate/helm type/patch
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants