Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/kyverno/kyverno from 1.12.5 to 1.13.0 #22

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 24, 2025

Bumps github.com/kyverno/kyverno from 1.12.5 to 1.13.0.

Release notes

Sourced from github.com/kyverno/kyverno's releases.

v1.13.0

Overview of 1.13 highlights - Kyverno release blog.

❗ Breaking Changes ❗

This release contains the following breaking configuration changes:

  • Removal of wildcard permissions: prior versions contained wildcard view permissions, which allowed Kyverno controllers to view all resources including secrets and other sensitive information. In 1.13 the wildcard view permission was removed and a role binding to the default view role was added. See the documentation section on Role Based Access Controls for more details. This change will not impact policies during admission controls but may impact reports, and may impact users with mutate and generate policies on custom resources as the controller may no longer be able to view these custom resources.
  • Default exception settings: the Helm chart values of the prior versions enabled exceptions by default for all namespaces. This creates a potential security issue. See CVE-2024-48921 for more details. This change will impact users who were relying on policy exceptions to be enabled in all namespaces.

For upgrade guidance see here.

✨ Added ✨

  • Added control names and images to policy reports for validate.podSecurity sub-rule (#9869)
  • Support condition validations across multiple attestations or context entries for image verification (#9960)
  • Added TSA cert chain support in Cosign for image verification (#9961)
  • Added support to generate Policy Exceptions from policyreports (#9987)
  • Supported the CLI apply command to continue on failure (#10036)
  • Added support for signature algorithm in Cosign cert and KMS verification for image verification (#10086)
  • Supported inline exceptions in CLI apply command (#10133)
  • Enabled warnings for policy violations and mutations upon admission reviews (#10214)
  • Advance supports for generating validatingadmissionpolicies (#9981, #10100, #10162, #10181, #10187, #10205, #10208, #10215, #10771)
  • Supported Cosign experimental OCI 1.1 signatures (#10228)
  • Supported background scanning of existing resource in image verification (#10287)
  • Added the report-controller flag to configure aggregation workers (#10331)
  • Updated default metrics in the Helm chart (#10459)
  • Supported the default value for apiCall in policy context (#10594)
  • Optimized Kyverno performance (#10700, #10701, #10702, #10703, #10723)
  • Add an option to configure updateRequestThreshold (#10739)
  • Added a new validate.assert sub-rule (#10763, #10777, #10780)
  • Added a finalizer-based option for webhookconfigurations cleanup upon kyverno un-installation (#10782)
  • Added full regexp support to Cosign (#10815)
  • Supported explicit protocol selection with appProtocol (#10864)
  • Enhanced logging (#10560, #10790, #10822, #10874, #10867)
  • Supported Sigstore bundle verification (#10567, #10901)
  • Supported custom data in policy reports (#10933)
  • Added OpenAPI validation for Kyverno policy (#10990, #10993, #10997, #10998, #11013)
  • Added the support for HTTP headers in service API calls (#11041)
  • Supported shallow variables substitution (#11058)
  • Added a flag to pass tuf root directly (#11103)
  • Supported foreach for generate policies (#10875, #10888, #11140, #10963, #10964)
  • Added Kyverno upgrade tests (#11163)
  • Supported labelSelectors for mutate targets (#11208)
  • Added dumpPatch flag for mutate policies (#11237)
  • Added reporting to mutate and generate rules (#11265, #11339)
  • Added a circuit breaker for the reports controller (#11329, #11271)
  • Added --backgroundReports flag to disable background controller reports (#11361)

Helm

  • Supported configurable hostNetwork settings for admission-controller and cleanup-controller (#9864)
  • Supported configurable webhook pod annotations (#9875)

... (truncated)

Changelog

Sourced from github.com/kyverno/kyverno's changelog.

v1.13.0

Note

  • Removed deprecated flag reportsChunkSize.
  • Added --tufRootRaw flag to pass tuf root for custom sigstore deployments.

v1.11.0

v1.11.0-rc.1

Note

  • Added --tufRoot and --tufMirror flags to configure tuf for custom sigstore deployments.
  • Remove description from deprecated fields in CRDs
  • Remove CLI kyverno test manifest ... commands (replaced by kyverno create ...).
  • Added --caSecretName and --tlsSecretName flags to control names of certificate related secrets.
  • Added match conditions support in kyverno config map.
  • Deprecated flag --imageSignatureRepository. Will be removed in 1.12. Use per rule configuration verifyImages.Repository instead.
  • Added --aggregateReports flag for reports controller to enable/disable aggregated reports (default value is true).
  • Added --policyReports flag for reports controller to enable/disable policy reports (default value is true).
  • Renamed CLI flag --compact to --detailed-results (and changed default value from true to false).
  • Changed the default value of --enablePolicyException from false to true.

v1.10.0

v1.10.0-rc.1

Note

  • Removed GenerateRequest CRD.
  • Refactored kyverno chart, migration instructions are available in chart README.md.
  • Image references in the json context are not mutated to canonical form anymore, do not assume a registry domain is always present.
  • Added support for configuring webhook annotations in the config map through webhookAnnotations stanza.
  • Added excludeRoles and excludeClusterRoles support in configuration.
  • Added new flag skipResourceFilters to reports controller to enable/disable considering resource filters in the background (default value is true)
  • Removed hardcoded defaults for excludeGroups and excludeUsernames. They are always read from the config map.

v1.9.0-rc.1

Note

  • Flag backgroundScanInterval was added to force background scans at regular intervals (default value is 1h).
  • Flag splitPolicyReport was removed, was unused and marked for removal in 1.9.
  • Webhook is no longer updated to match pods/ephemeralcontainers when policy only specifies pods. If users want to match on pods/ephemeralcontainers, they must specify pods/ephemeralcontainers in the policy.
  • Webhook is no longer updated to match services/status when policy only specifies services. If users want to match on services/status, they must specify services/status in the policy.
  • Flag autogenInternals was removed, policy mutation has been removed.
  • Flag leaderElectionRetryPeriod was added to control leader election renewal frequency (default value is 2s).
  • Support upper case Audit and Enforce in .spec.validationFailureAction of the Kyverno policy, failure actions audit and enforce are deprecated and will be removed in v1.11.0.
  • Flag profileAddress was added to configure address of profiling server (default value is "").

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 24, 2025
Bumps [github.com/kyverno/kyverno](https://github.com/kyverno/kyverno) from 1.12.5 to 1.13.0.
- [Release notes](https://github.com/kyverno/kyverno/releases)
- [Changelog](https://github.com/kyverno/kyverno/blob/main/CHANGELOG.md)
- [Commits](kyverno/kyverno@v1.12.5...v1.13.0)

---
updated-dependencies:
- dependency-name: github.com/kyverno/kyverno
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/kyverno/kyverno-1.13.0 branch from b405353 to 4e05b44 Compare January 29, 2025 16:13
@jpower432
Copy link
Member

jpower432 commented Jan 30, 2025

Closing in favor of #35

EDITED - PR 35 is actually for v1 and this is for main.

@jpower432 jpower432 closed this Jan 30, 2025
Copy link
Contributor Author

dependabot bot commented on behalf of github Jan 30, 2025

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@dependabot dependabot bot deleted the dependabot/go_modules/github.com/kyverno/kyverno-1.13.0 branch January 30, 2025 21:20
@jpower432
Copy link
Member

@dependabot recreate

Copy link
Contributor Author

dependabot bot commented on behalf of github Jan 30, 2025

Looks like this PR is closed. If you re-open it I'll rebase it as long as no-one else has edited it (you can use @dependabot reopen if the branch has been deleted).

@jpower432
Copy link
Member

@dependabot reopen

@dependabot dependabot bot reopened this Jan 30, 2025
@dependabot dependabot bot restored the dependabot/go_modules/github.com/kyverno/kyverno-1.13.0 branch January 30, 2025 21:57
@jpower432
Copy link
Member

@dependabot rebase

Copy link
Contributor Author

dependabot bot commented on behalf of github Jan 30, 2025

The dependabot.yml entry that created this PR has been deleted so this PR can't be rebased. Please close the PR so Dependabot can create a new one with the current dependabot.yml.

@jpower432 jpower432 added v2 Relates to Go module v2 go Pull requests that update Go code labels Jan 30, 2025
@jpower432 jpower432 closed this Jan 30, 2025
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/kyverno/kyverno-1.13.0 branch January 30, 2025 21:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code v2 Relates to Go module v2
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant