Skip to content

Commit aef3a53

Browse files
author
ci-robot
committed
Update to ACK runtime v0.43.0, code-generator v0.43.1
1 parent 5250291 commit aef3a53

File tree

9 files changed

+100
-228
lines changed

9 files changed

+100
-228
lines changed

Diff for: apis/v1alpha1/ack-generate-metadata.yaml

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
ack_generate_info:
2-
build_date: "2025-02-18T01:07:06Z"
3-
build_hash: 66c0f840b0bcf6f552be46cf5ee0fb95ad57053e
4-
go_version: go1.23.6
5-
version: v0.43.0
6-
api_directory_checksum: 78a5d23ba8b0c12225d1afd2506d5524d9a7aa68
2+
build_date: "2025-02-19T23:31:41Z"
3+
build_hash: 8b426c490ff1984d8ce5577e11d6dabe1b6373b8
4+
go_version: go1.24.0
5+
version: v0.43.1
6+
api_directory_checksum: d47552708cce6913653d845ed96e31d27957b6ad
77
api_version: v1alpha1
88
aws_sdk_go_version: v1.32.6
99
generator_config_info:

Diff for: apis/v1alpha1/certificate.go

+36-14
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: config/controller/kustomization.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ kind: Kustomization
66
images:
77
- name: controller
88
newName: public.ecr.aws/aws-controllers-k8s/acm-controller
9-
newTag: 1.0.4
9+
newTag: 1.0.5

Diff for: config/crd/bases/acm.services.k8s.aws_certificates.yaml

+27-88
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,8 @@ spec:
4141
properties:
4242
certificate:
4343
description: |-
44-
The Certificate to import into AWS Certificate Manager (ACM) to use with services that are integrated with ACM.
45-
This field is only valid when importing an existing certificate into ACM.
44+
SecretKeyReference combines a k8s corev1.SecretReference with a
45+
specific key within the referred-to Secret
4646
properties:
4747
key:
4848
description: Key is the key within the secret
@@ -59,22 +59,19 @@ spec:
5959
- key
6060
type: object
6161
x-kubernetes-map-type: atomic
62+
x-kubernetes-validations:
63+
- message: Value is immutable once set
64+
rule: self == oldSelf
6265
certificateARN:
63-
description: |-
64-
The Amazon Resource Name (ARN) of an imported certificate to replace. This field is only valid when importing
65-
an existing certificate into ACM.
6666
type: string
67+
x-kubernetes-validations:
68+
- message: Value is immutable once set
69+
rule: self == oldSelf
6770
certificateAuthorityARN:
68-
description: |-
69-
The Amazon Resource Name (ARN) of the private certificate authority (CA)
70-
that will be used to issue the certificate. If you do not provide an ARN
71-
and you are trying to request a private certificate, ACM will attempt to
72-
issue a public certificate. For more information about private CAs, see the
73-
Amazon Web Services Private Certificate Authority (https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html)
74-
user guide. The ARN must have the following form:
75-
76-
arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
7771
type: string
72+
x-kubernetes-validations:
73+
- message: Value is immutable once set
74+
rule: self == oldSelf
7875
certificateAuthorityRef:
7976
description: "AWSResourceReferenceWrapper provides a wrapper around
8077
*AWSResourceReference\ntype to provide more user friendly syntax
@@ -112,23 +109,12 @@ spec:
112109
- key
113110
type: object
114111
x-kubernetes-map-type: atomic
112+
x-kubernetes-validations:
113+
- message: Value is immutable once set
114+
rule: self == oldSelf
115115
domainName:
116-
description: |-
117-
Fully qualified domain name (FQDN), such as www.example.com, that you want
118-
to secure with an ACM certificate. Use an asterisk (*) to create a wildcard
119-
certificate that protects several sites in the same domain. For example,
120-
*.example.com protects www.example.com, site.example.com, and images.example.com.
121-
122-
In compliance with RFC 5280 (https://datatracker.ietf.org/doc/html/rfc5280),
123-
the length of the domain name (technically, the Common Name) that you provide
124-
cannot exceed 64 octets (characters), including periods. To add a longer
125-
domain name, specify it in the Subject Alternative Name field, which supports
126-
names up to 253 octets in length.
127116
type: string
128117
domainValidationOptions:
129-
description: |-
130-
The domain name that you want ACM to use to send you emails so that you can
131-
validate domain ownership.
132118
items:
133119
description: |-
134120
Contains information about the domain names that you want ACM to use to send
@@ -141,50 +127,24 @@ spec:
141127
type: object
142128
type: array
143129
keyAlgorithm:
144-
description: |-
145-
Specifies the algorithm of the public and private key pair that your certificate
146-
uses to encrypt data. RSA is the default key algorithm for ACM certificates.
147-
Elliptic Curve Digital Signature Algorithm (ECDSA) keys are smaller, offering
148-
security comparable to RSA keys but with greater computing efficiency. However,
149-
ECDSA is not supported by all network clients. Some Amazon Web Services services
150-
may require RSA keys, or only support ECDSA keys of a particular size, while
151-
others allow the use of either RSA and ECDSA keys to ensure that compatibility
152-
is not broken. Check the requirements for the Amazon Web Services service
153-
where you plan to deploy your certificate. For more information about selecting
154-
an algorithm, see Key algorithms (https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms).
155-
156-
Algorithms supported for an ACM certificate request include:
157-
158-
* RSA_2048
159-
160-
* EC_prime256v1
161-
162-
* EC_secp384r1
163-
164-
Other listed algorithms are for imported certificates only.
165-
166-
When you request a private PKI certificate signed by a CA from Amazon Web
167-
Services Private CA, the specified signing algorithm family (RSA or ECDSA)
168-
must match the algorithm family of the CA's secret key.
169-
170-
Default: RSA_2048
171130
type: string
172131
options:
173132
description: |-
174-
Currently, you can use this parameter to specify whether to add the certificate
175-
to a certificate transparency log. Certificate transparency makes it possible
176-
to detect SSL/TLS certificates that have been mistakenly or maliciously issued.
177-
Certificates that have not been logged typically produce an error message
178-
in a browser. For more information, see Opting Out of Certificate Transparency
179-
Logging (https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency).
133+
Structure that contains options for your certificate. Currently, you can
134+
use this only to specify whether to opt in to or out of certificate transparency
135+
logging. Some browsers require that public certificates issued for your domain
136+
be recorded in a log. Certificates that are not logged typically generate
137+
a browser error. Transparency makes it possible for you to detect SSL/TLS
138+
certificates that have been mistakenly or maliciously issued for your domain.
139+
For general information, see Certificate Transparency Logging (https://docs.aws.amazon.com/acm/latest/userguide/acm-concepts.html#concept-transparency).
180140
properties:
181141
certificateTransparencyLoggingPreference:
182142
type: string
183143
type: object
184144
privateKey:
185145
description: |-
186-
The private key that matches the public key in the certificate. This field is only valid when importing
187-
an existing certificate into ACM.
146+
SecretKeyReference combines a k8s corev1.SecretReference with a
147+
specific key within the referred-to Secret
188148
properties:
189149
key:
190150
description: Key is the key within the secret
@@ -201,35 +161,14 @@ spec:
201161
- key
202162
type: object
203163
x-kubernetes-map-type: atomic
164+
x-kubernetes-validations:
165+
- message: Value is immutable once set
166+
rule: self == oldSelf
204167
subjectAlternativeNames:
205-
description: |-
206-
Additional FQDNs to be included in the Subject Alternative Name extension
207-
of the ACM certificate. For example, add the name www.example.net to a certificate
208-
for which the DomainName field is www.example.com if users can reach your
209-
site by using either name. The maximum number of domain names that you can
210-
add to an ACM certificate is 100. However, the initial quota is 10 domain
211-
names. If you need more than 10 names, you must request a quota increase.
212-
For more information, see Quotas (https://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html).
213-
214-
The maximum length of a SAN DNS name is 253 octets. The name is made up of
215-
multiple labels separated by periods. No label can be longer than 63 octets.
216-
Consider the following examples:
217-
218-
* (63 octets).(63 octets).(63 octets).(61 octets) is legal because the
219-
total length is 253 octets (63+1+63+1+63+1+61) and no label exceeds 63
220-
octets.
221-
222-
* (64 octets).(63 octets).(63 octets).(61 octets) is not legal because
223-
the total length exceeds 253 octets (64+1+63+1+63+1+61) and the first
224-
label exceeds 63 octets.
225-
226-
* (63 octets).(63 octets).(63 octets).(62 octets) is not legal because
227-
the total length of the DNS name (63+1+63+1+63+1+62) exceeds 253 octets.
228168
items:
229169
type: string
230170
type: array
231171
tags:
232-
description: One or more resource tags to associate with the certificate.
233172
items:
234173
description: A key-value pair that identifies or specifies metadata
235174
about an ACM resource.
@@ -275,7 +214,7 @@ spec:
275214
type: object
276215
conditions:
277216
description: |-
278-
All CRS managed by ACK have a common `Status.Conditions` member that
217+
All CRs managed by ACK have a common `Status.Conditions` member that
279218
contains a collection of `ackv1alpha1.Condition` objects that describe
280219
the various terminal states of the CR and its backend AWS service API
281220
resource

Diff for: helm/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
apiVersion: v1
22
name: acm-chart
33
description: A Helm chart for the ACK service controller for AWS Certificate Manager (ACM)
4-
version: 1.0.4
5-
appVersion: 1.0.4
4+
version: 1.0.5
5+
appVersion: 1.0.5
66
home: https://github.com/aws-controllers-k8s/acm-controller
77
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
88
sources:

0 commit comments

Comments
 (0)