From c164cff96610134c9f17d8baf39e84e72d790208 Mon Sep 17 00:00:00 2001 From: Frank Jogeleit Date: Mon, 29 May 2023 15:06:21 +0200 Subject: [PATCH] release Helm Chart v2.19.1 Signed-off-by: Frank Jogeleit --- CHANGELOG.md | 5 +++++ charts/policy-reporter/Chart.yaml | 4 ++-- charts/policy-reporter/README.md | 2 +- charts/policy-reporter/values.yaml | 2 +- manifest/policy-reporter-kyverno-ui-ha/install.yaml | 2 +- manifest/policy-reporter-kyverno-ui/install.yaml | 2 +- manifest/policy-reporter-ui/install.yaml | 2 +- manifest/policy-reporter/install.yaml | 2 +- manifest/violations-email-report/cronjob.yaml | 2 +- 9 files changed, 14 insertions(+), 9 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index dab20e8e..074a05d8 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,10 @@ # Changelog +# 2.19.0 +* Policy Reporter + * AWS IRSA Authentication Support + * Add `source` attribute to JSON ouput [[#311](https://github.com/kyverno/policy-reporter/pull/311) by [nikolay-o](https://github.com/nikolay-o)] + # 2.19.0 * Policy Reporter * New AWS SecurityHub push target - See [values.yaml](https://github.com/kyverno/policy-reporter/blob/main/charts/policy-reporter/values.yaml#L550) for available configurations diff --git a/charts/policy-reporter/Chart.yaml b/charts/policy-reporter/Chart.yaml index 747eac03..f259aaef 100644 --- a/charts/policy-reporter/Chart.yaml +++ b/charts/policy-reporter/Chart.yaml @@ -5,8 +5,8 @@ description: | It creates Prometheus Metrics and can send rule validation events to different targets like Loki, Elasticsearch, Slack or Discord type: application -version: 2.19.0 -appVersion: 2.15.0 +version: 2.19.1 +appVersion: 2.15.1 icon: https://github.com/kyverno/kyverno/raw/main/img/logo.png home: https://kyverno.github.io/policy-reporter diff --git a/charts/policy-reporter/README.md b/charts/policy-reporter/README.md index e1559fff..60c67cce 100644 --- a/charts/policy-reporter/README.md +++ b/charts/policy-reporter/README.md @@ -1,6 +1,6 @@ # Policy Reporter -![Version: v2.19.0](https://img.shields.io/badge/Version-v2.19.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v2.15.0](https://img.shields.io/badge/AppVersion-v2.15.0-informational?style=flat-square) +![Version: v2.19.1](https://img.shields.io/badge/Version-v2.19.1-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v2.15.1](https://img.shields.io/badge/AppVersion-v2.15.1-informational?style=flat-square) ## Motivation diff --git a/charts/policy-reporter/values.yaml b/charts/policy-reporter/values.yaml index a985ff25..a4db86e7 100644 --- a/charts/policy-reporter/values.yaml +++ b/charts/policy-reporter/values.yaml @@ -5,7 +5,7 @@ image: registry: ghcr.io repository: kyverno/policy-reporter pullPolicy: IfNotPresent - tag: 2.15.0 + tag: 2.15.1 imagePullSecrets: [] diff --git a/manifest/policy-reporter-kyverno-ui-ha/install.yaml b/manifest/policy-reporter-kyverno-ui-ha/install.yaml index b2bd0fb0..f15b3e90 100644 --- a/manifest/policy-reporter-kyverno-ui-ha/install.yaml +++ b/manifest/policy-reporter-kyverno-ui-ha/install.yaml @@ -372,7 +372,7 @@ spec: fsGroup: 1234 containers: - name: policy-reporter - image: "ghcr.io/kyverno/policy-reporter:2.15.0" + image: "ghcr.io/kyverno/policy-reporter:2.15.1" imagePullPolicy: IfNotPresent securityContext: allowPrivilegeEscalation: false diff --git a/manifest/policy-reporter-kyverno-ui/install.yaml b/manifest/policy-reporter-kyverno-ui/install.yaml index 6170fa96..87bade6d 100644 --- a/manifest/policy-reporter-kyverno-ui/install.yaml +++ b/manifest/policy-reporter-kyverno-ui/install.yaml @@ -260,7 +260,7 @@ spec: fsGroup: 1234 containers: - name: policy-reporter - image: "ghcr.io/kyverno/policy-reporter:2.15.0" + image: "ghcr.io/kyverno/policy-reporter:2.15.1" imagePullPolicy: IfNotPresent securityContext: allowPrivilegeEscalation: false diff --git a/manifest/policy-reporter-ui/install.yaml b/manifest/policy-reporter-ui/install.yaml index 909dc3f6..b2a7b678 100644 --- a/manifest/policy-reporter-ui/install.yaml +++ b/manifest/policy-reporter-ui/install.yaml @@ -148,7 +148,7 @@ spec: fsGroup: 1234 containers: - name: policy-reporter - image: "ghcr.io/kyverno/policy-reporter:2.15.0" + image: "ghcr.io/kyverno/policy-reporter:2.15.1" imagePullPolicy: IfNotPresent securityContext: allowPrivilegeEscalation: false diff --git a/manifest/policy-reporter/install.yaml b/manifest/policy-reporter/install.yaml index eacbbfb2..a280e85e 100644 --- a/manifest/policy-reporter/install.yaml +++ b/manifest/policy-reporter/install.yaml @@ -82,7 +82,7 @@ spec: automountServiceAccountToken: true containers: - name: policy-reporter - image: "ghcr.io/kyverno/policy-reporter:2.15.0" + image: "ghcr.io/kyverno/policy-reporter:2.15.1" imagePullPolicy: IfNotPresent securityContext: allowPrivilegeEscalation: false diff --git a/manifest/violations-email-report/cronjob.yaml b/manifest/violations-email-report/cronjob.yaml index c729a1bc..b90ea149 100644 --- a/manifest/violations-email-report/cronjob.yaml +++ b/manifest/violations-email-report/cronjob.yaml @@ -26,7 +26,7 @@ spec: restartPolicy: Never containers: - name: policy-reporter - image: "ghcr.io/kyverno/policy-reporter:2.15.0" + image: "ghcr.io/kyverno/policy-reporter:2.15.1" imagePullPolicy: IfNotPresent securityContext: allowPrivilegeEscalation: false