Skip to content

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 28, 2025

This PR contains the following updates:

Package Type Update Change
com_github_kubernetes_sigs_aws_load_balancer_controller http_archive minor v2.12.0 -> v2.13.4
com_github_medik8s_node_maintainance_operator http_archive minor v0.17.0 -> v0.18.0
distroless_static oci_pull digest 3d0f463 -> f2ff10a
rules_oci http_archive patch v2.2.5 -> v2.2.6

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

kubernetes-sigs/aws-load-balancer-controller (com_github_kubernetes_sigs_aws_load_balancer_controller)

v2.13.4

Compare Source

v2.13.4 (requires Kubernetes 1.22+)

Documentation

Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.13.4
Thanks to all our contributors! 😊

Action required

🚨 🚨 🚨 For user who is trying out our gateway api features, we’ve created a new CRD ListenerRuleConfiguration. Make sure to update the CRD definition in your cluster. If you're upgrading the charts using helm upgrade, you need to update CRDs manually: kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/refs/heads/main/config/crd/gateway/gateway-crds.yaml also update rbac policy by applying the latest changes from rbac.yaml

What’s new

We’ve been working on ALB support in Gateway API. Some of the main additions are:

  • introduced a new ListenerRuleConfiguration CRD that lets you use those AWS ALB features that Gateway API doesn't support yet. Note: we have not complete all development on this new CRD. Therefore, it is not recommended to use it at this time.
  • added Reference Grant support
  • added mTLS support
  • weighted target group is now supported for HTTPRoutes
  • TLS listeners now accept TCP routes

Enhancement and Fixes

  • Upgraded Go to 1.24.5
  • Fixed NLB security groups not working when multiple security groups assigned
  • Added Patch permission to loadbalancerconfigurations in helm chart
  • Made the error message more clear when someone tries to use ClusterIP services with Instance targets
  • CI now runs on K8s 1.32 instead of 1.25
  • Increased E2E test coverage

Full Changelog

New Contributors

Full Changelog: kubernetes-sigs/aws-load-balancer-controller@v2.13.3...v2.13.4

v2.13.3: v.2.13.3

Compare Source

v2.13.3 (requires Kubernetes 1.22+)

Documentation

Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.13.3
Thanks to all our contributors! 😊

Action required

🚨 🚨 🚨 We’ve updated the Gateway API relevant LBC CRDs LoadBalancerConfigurations and TargetGroupConfigurations Make sure to update the CRD definition in your cluster. If you're upgrading the charts using helm upgrade, you need to update CRDs manually: kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/refs/heads/main/config/crd/gateway/gateway-crds.yaml

What’s new

  • We are pleased to announce the (Beta) of Layer 4 (L4) routing support for the Kubernetes Gateway API within the AWS Load Balancer Controller (LBC). This significant enhancement allows users to provision and manage AWS Network Load Balancers (NLBs) for TCP, UDP, and TLS traffic directly from their Kubernetes clusters, leveraging the powerful and extensible Gateway API. The LBC now fully supports the GatewayClass ,Gateway, TCPRoute, UDPRoute, and TLSRoute resources from the Gateway API. Please refer L4Routing for more info.

Enhancement and Fixes

  • Upgraded Secuirty group deletion to be more responsive.
  • Reduced the duplicated DescribeTargetGroups calls to enhance performance.
  • Docs updates

Changelog since v2.13.2

v2.13.2

Compare Source

Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.13.2

This release fixes TLS Protocol detection:
#​4183
#​4181

v2.13.1

Compare Source

v2.13.1 (requires Kubernetes 1.22+)

[PLEASE USE v2.13.2]

Documentation

Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.13.1
Thanks to all our contributors! 😊

This release fixes the v2.13.0 release that contained a bug that erroneously published reconcile error metrics

v2.13.0

Compare Source

v2.13.0 (requires Kubernetes 1.22+)

[PLEASE USE v2.13.2]

Documentation

Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.13.3
Thanks to all our contributors! 😊

Action required

🚨 🚨 🚨

We’ve added new fields to the IngressClassParams CRD. Please apply the latest CRD definitions: kubectl apply -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller/crds?ref=master"

What’s new

Enhancement and Fixes

  • Added more customization options (TargetType, PrefixListsIDs) to the IngressClassParams CRD.
  • Allow for setting PPv2 header at per target group level.
  • Refactored Subnet discovery to make LB creation easier.
  • Updated to Go 1.24.2 and AL2023 base image to resolve security vulnerabilities.
  • Lots of documentation and logging fixes!

Changelog since v2.12.0

medik8s/node-maintenance-operator (com_github_medik8s_node_maintainance_operator)

v0.18.0

Compare Source

Node Maintenance Operator v0.18.0

Notable Changes

  • Add Events for the Maintenance Process
  • Fix Fetch ETCD Quorum Check fix for Unknown Guard Pod State (follow up to #​110)
  • Reconcile Refactor
  • Update base images to CentoOS stream 9

Release Artifacts

Images
  • Operator: quay.io/medik8s/node-maintenance-operator:v0.18.0
  • Bundle: quay.io/medik8s/node-maintenance-operator-bundle:v0.18.0
  • Catalog aka Index: quay.io/medik8s/node-maintenance-operator-catalog:v0.18.0

Source code and OLM manifests

Please find the source code and the OLM manifests in the Assets section below.

What's Changed

New Contributors

Full Changelog: medik8s/node-maintenance-operator@v0.17.0...v0.18.0

bazel-contrib/rules_oci (rules_oci)

v2.2.6

Compare Source

Using bzlmod with Bazel 6 or later:

  1. Add common --enable_bzlmod to .bazelrc.

  2. Add to your MODULE.bazel file:

bazel_dep(name = "rules_oci", version = "2.2.6")

### For testing, we also recommend https://registry.bazel.build/modules/container_structure_test

oci = use_extension("@​rules_oci//oci:extensions.bzl", "oci")

### Declare external images you need to pull, for example: 
oci.pull(
    name = "distroless_base",

### 'latest' is not reproducible, but it's convenient.
### During the build we print a WARNING message that includes recommended 'digest' and 'platforms'

### values which you can use here in place of 'tag' to pin for reproducibility.
    tag = "latest",
    image = "gcr.io/distroless/base",
    platforms = ["linux/amd64"],
)

### For each oci.pull call, repeat the "name" here to expose them as dependencies.
use_repo(oci, "distroless_base")

Using WORKSPACE:

load("@​bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

http_archive(
    name = "rules_oci",
    sha256 = "5994ec0e8df92c319ef5da5e1f9b514628ceb8fc5824b4234f2fe635abb8cc2e",
    strip_prefix = "rules_oci-2.2.6",
    url = "https://github.com/bazel-contrib/rules_oci/releases/download/v2.2.6/rules_oci-v2.2.6.tar.gz",
)

load("@​rules_oci//oci:dependencies.bzl", "rules_oci_dependencies")

rules_oci_dependencies()

load("@​rules_oci//oci:repositories.bzl", "oci_register_toolchains")

oci_register_toolchains(name = "oci")

### You can pull your base images using oci_pull like this:
load("@​rules_oci//oci:pull.bzl", "oci_pull")

oci_pull(
    name = "distroless_base",
    digest = "sha256:ccaef5ee2f1850270d453fdf700a5392534f8d1a8ca2acda391fbb6a06b81c86",
    image = "gcr.io/distroless/base",
    platforms = [
        "linux/amd64",
        "linux/arm64",
    ],
)

What's Changed

New Contributors

Full Changelog: bazel-contrib/rules_oci@v2.2.5...v2.2.6


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from burgerdev as a code owner April 28, 2025 06:48
@renovate renovate bot added the dependencies Pull requests that update a dependency file label Apr 28, 2025
Copy link

netlify bot commented Apr 28, 2025

Deploy Preview for constellation-docs canceled.

Name Link
🔨 Latest commit af85cf6
🔍 Latest deploy log https://app.netlify.com/projects/constellation-docs/deploys/68adf6972fcd7e0008d55a5a

@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch from c3ce1bb to 9fcafd8 Compare May 7, 2025 06:21
@renovate renovate bot changed the title deps: update dependency rules_oci to v2.2.6 deps: update bazel (plugins) May 7, 2025
@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch 3 times, most recently from 930fef8 to adedf47 Compare May 13, 2025 22:24
@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch 2 times, most recently from 2d76560 to 618cbb4 Compare May 19, 2025 03:54
@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch 2 times, most recently from 1e81b2e to b3c115d Compare June 16, 2025 21:45
@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch from b3c115d to c062204 Compare July 6, 2025 10:02
@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch 3 times, most recently from 0f59065 to 7565322 Compare August 4, 2025 17:07
@renovate renovate bot force-pushed the renovate/bazel-(plugins) branch from 7565322 to af85cf6 Compare August 26, 2025 18:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants