Skip to content

Commit 6d01444

Browse files
hco-botnunnatsa
andauthored
Bump MIGRATION_OPERATOR to v0.2.0-rc.0 (#4116)
Signed-off-by: HCO Bump Bot <noreply@github.com> Co-authored-by: nunnatsa <60659093+nunnatsa@users.noreply.github.com>
1 parent f3a6775 commit 6d01444

File tree

16 files changed

+862
-22
lines changed

16 files changed

+862
-22
lines changed

deploy/cluster_role.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4052,6 +4052,7 @@ rules:
40524052
- list
40534053
- update
40544054
- watch
4055+
- delete
40554056
- apiGroups:
40564057
- ""
40574058
resources:

deploy/crds/migration-operator00.crd.yaml

Lines changed: 150 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1037,6 +1037,156 @@ spec:
10371037
priorityClass:
10381038
description: PriorityClass of the control plane
10391039
type: string
1040+
tlsSecurityProfile:
1041+
description: TLSSecurityProfile is used by operators to apply cluster-wide
1042+
TLS security settings to operands.
1043+
properties:
1044+
custom:
1045+
description: |-
1046+
custom is a user-defined TLS security profile. Be extremely careful using a custom
1047+
profile as invalid configurations can be catastrophic. An example custom profile
1048+
looks like this:
1049+
1050+
ciphers:
1051+
- ECDHE-ECDSA-CHACHA20-POLY1305
1052+
- ECDHE-RSA-CHACHA20-POLY1305
1053+
- ECDHE-RSA-AES128-GCM-SHA256
1054+
- ECDHE-ECDSA-AES128-GCM-SHA256
1055+
minTLSVersion: VersionTLS11
1056+
nullable: true
1057+
properties:
1058+
ciphers:
1059+
description: |-
1060+
ciphers is used to specify the cipher algorithms that are negotiated
1061+
during the TLS handshake. Operators may remove entries their operands
1062+
do not support. For example, to use DES-CBC3-SHA (yaml):
1063+
1064+
ciphers:
1065+
- DES-CBC3-SHA
1066+
items:
1067+
type: string
1068+
type: array
1069+
minTLSVersion:
1070+
description: |-
1071+
minTLSVersion is used to specify the minimal version of the TLS protocol
1072+
that is negotiated during the TLS handshake. For example, to use TLS
1073+
versions 1.1, 1.2 and 1.3 (yaml):
1074+
1075+
minTLSVersion: VersionTLS11
1076+
1077+
NOTE: currently the highest minTLSVersion allowed is VersionTLS12
1078+
enum:
1079+
- VersionTLS10
1080+
- VersionTLS11
1081+
- VersionTLS12
1082+
- VersionTLS13
1083+
type: string
1084+
required:
1085+
- ciphers
1086+
- minTLSVersion
1087+
type: object
1088+
intermediate:
1089+
description: |-
1090+
intermediate is a TLS security profile based on:
1091+
1092+
https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29
1093+
1094+
and looks like this (yaml):
1095+
1096+
ciphers:
1097+
- TLS_AES_128_GCM_SHA256
1098+
- TLS_AES_256_GCM_SHA384
1099+
- TLS_CHACHA20_POLY1305_SHA256
1100+
- ECDHE-ECDSA-AES128-GCM-SHA256
1101+
- ECDHE-RSA-AES128-GCM-SHA256
1102+
- ECDHE-ECDSA-AES256-GCM-SHA384
1103+
- ECDHE-RSA-AES256-GCM-SHA384
1104+
- ECDHE-ECDSA-CHACHA20-POLY1305
1105+
- ECDHE-RSA-CHACHA20-POLY1305
1106+
- DHE-RSA-AES128-GCM-SHA256
1107+
- DHE-RSA-AES256-GCM-SHA384
1108+
minTLSVersion: VersionTLS12
1109+
nullable: true
1110+
type: object
1111+
modern:
1112+
description: |-
1113+
modern is a TLS security profile based on:
1114+
1115+
https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility
1116+
1117+
and looks like this (yaml):
1118+
1119+
ciphers:
1120+
- TLS_AES_128_GCM_SHA256
1121+
- TLS_AES_256_GCM_SHA384
1122+
- TLS_CHACHA20_POLY1305_SHA256
1123+
minTLSVersion: VersionTLS13
1124+
1125+
NOTE: Currently unsupported.
1126+
nullable: true
1127+
type: object
1128+
old:
1129+
description: |-
1130+
old is a TLS security profile based on:
1131+
1132+
https://wiki.mozilla.org/Security/Server_Side_TLS#Old_backward_compatibility
1133+
1134+
and looks like this (yaml):
1135+
1136+
ciphers:
1137+
- TLS_AES_128_GCM_SHA256
1138+
- TLS_AES_256_GCM_SHA384
1139+
- TLS_CHACHA20_POLY1305_SHA256
1140+
- ECDHE-ECDSA-AES128-GCM-SHA256
1141+
- ECDHE-RSA-AES128-GCM-SHA256
1142+
- ECDHE-ECDSA-AES256-GCM-SHA384
1143+
- ECDHE-RSA-AES256-GCM-SHA384
1144+
- ECDHE-ECDSA-CHACHA20-POLY1305
1145+
- ECDHE-RSA-CHACHA20-POLY1305
1146+
- DHE-RSA-AES128-GCM-SHA256
1147+
- DHE-RSA-AES256-GCM-SHA384
1148+
- DHE-RSA-CHACHA20-POLY1305
1149+
- ECDHE-ECDSA-AES128-SHA256
1150+
- ECDHE-RSA-AES128-SHA256
1151+
- ECDHE-ECDSA-AES128-SHA
1152+
- ECDHE-RSA-AES128-SHA
1153+
- ECDHE-ECDSA-AES256-SHA384
1154+
- ECDHE-RSA-AES256-SHA384
1155+
- ECDHE-ECDSA-AES256-SHA
1156+
- ECDHE-RSA-AES256-SHA
1157+
- DHE-RSA-AES128-SHA256
1158+
- DHE-RSA-AES256-SHA256
1159+
- AES128-GCM-SHA256
1160+
- AES256-GCM-SHA384
1161+
- AES128-SHA256
1162+
- AES256-SHA256
1163+
- AES128-SHA
1164+
- AES256-SHA
1165+
- DES-CBC3-SHA
1166+
minTLSVersion: VersionTLS10
1167+
nullable: true
1168+
type: object
1169+
type:
1170+
description: |-
1171+
type is one of Old, Intermediate, Modern or Custom. Custom provides
1172+
the ability to specify individual TLS security profile parameters.
1173+
Old, Intermediate and Modern are TLS security profiles based on:
1174+
1175+
https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
1176+
1177+
The profiles are intent based, so they may change over time as new ciphers are developed and existing ciphers
1178+
are found to be insecure. Depending on precisely which ciphers are available to a process, the list may be
1179+
reduced.
1180+
1181+
Note that the Modern profile is currently not supported because it is not
1182+
yet well adopted by common software libraries.
1183+
enum:
1184+
- Old
1185+
- Intermediate
1186+
- Modern
1187+
- Custom
1188+
type: string
1189+
type: object
10401190
type: object
10411191
status:
10421192
description: MigControllerStatus defines the observed state of MigController.

deploy/images.csv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,6 @@ AAQ_OPERATOR_IMAGE,quay.io/kubevirt/aaq-operator,AAQ_VERSION,1bcf463f0650f6a1424
3939
AAQ_SERVER_IMAGE,quay.io/kubevirt/aaq-server,AAQ_VERSION,07b744866359459fef7ff97af7a5bc7c152812ac3ad8ac9e773f3a5190d0e59a
4040
AAQ_CONTROLLER_IMAGE,quay.io/kubevirt/aaq-controller,AAQ_VERSION,49e094affa5cf6ff96bc148f0d1328d25b5777b20e4a3680fcaeb9ec7200f53e
4141
WASP_AGENT_IMAGE,quay.io/openshift-virtualization/wasp-agent,WASP_AGENT_VERSION,eabfa6a425213f520f7a9e5b81b43e8b6430779d42c5c8b1bfd48a4f1730447a
42-
MIGRATION_OPERATOR_IMAGE,quay.io/kubevirt/kubevirt-migration-operator,MIGRATION_OPERATOR_VERSION,712918a76c1f44a1afb50dbb78a253d8c649d77c4d484fed435e892bc893543f
42+
MIGRATION_OPERATOR_IMAGE,quay.io/kubevirt/kubevirt-migration-operator,MIGRATION_OPERATOR_VERSION,a70320d828a837f801f4fed03786f36529bf2865b609ce6985c2e18374811fe7
4343
MIGRATION_CONTROLLER_IMAGE,quay.io/kubevirt/kubevirt-migration-controller,MIGRATION_CONTROLLER_VERSION,c91da241e6d89220dccbda750f84e89ef2db2cd1603b706930b711b95ebc59c6
4444
AUTOPILOT_IMAGE,quay.io/openshift-virtualization/virt-platform-autopilot,AUTOPILOT_VERSION,73fc7615ecde2cd1335011b7bcfb49856d8c686dccb161d82c245a4ac7d799cf

deploy/images.env

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ AAQ_OPERATOR_IMAGE="${AAQ_OPERATOR_IMAGE:-quay.io/kubevirt/aaq-operator@sha256:1
3838
AAQ_SERVER_IMAGE="${AAQ_SERVER_IMAGE:-quay.io/kubevirt/aaq-server@sha256:07b744866359459fef7ff97af7a5bc7c152812ac3ad8ac9e773f3a5190d0e59a}"
3939
AAQ_CONTROLLER_IMAGE="${AAQ_CONTROLLER_IMAGE:-quay.io/kubevirt/aaq-controller@sha256:49e094affa5cf6ff96bc148f0d1328d25b5777b20e4a3680fcaeb9ec7200f53e}"
4040
WASP_AGENT_IMAGE="${WASP_AGENT_IMAGE:-quay.io/openshift-virtualization/wasp-agent@sha256:eabfa6a425213f520f7a9e5b81b43e8b6430779d42c5c8b1bfd48a4f1730447a}"
41-
MIGRATION_OPERATOR_IMAGE="${MIGRATION_OPERATOR_IMAGE:-quay.io/kubevirt/kubevirt-migration-operator@sha256:712918a76c1f44a1afb50dbb78a253d8c649d77c4d484fed435e892bc893543f}"
41+
MIGRATION_OPERATOR_IMAGE="${MIGRATION_OPERATOR_IMAGE:-quay.io/kubevirt/kubevirt-migration-operator@sha256:a70320d828a837f801f4fed03786f36529bf2865b609ce6985c2e18374811fe7}"
4242
MIGRATION_CONTROLLER_IMAGE="${MIGRATION_CONTROLLER_IMAGE:-quay.io/kubevirt/kubevirt-migration-controller@sha256:c91da241e6d89220dccbda750f84e89ef2db2cd1603b706930b711b95ebc59c6}"
4343
AUTOPILOT_IMAGE="${AUTOPILOT_IMAGE:-quay.io/openshift-virtualization/virt-platform-autopilot@sha256:73fc7615ecde2cd1335011b7bcfb49856d8c686dccb161d82c245a4ac7d799cf}"
4444
DIGEST_LIST="${KUBEVIRT_OPERATOR_IMAGE}"

deploy/index-image/community-kubevirt-hyperconverged/1.18.0/manifests/kubevirt-hyperconverged-operator.v1.18.0.clusterserviceversion.yaml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3374,6 +3374,7 @@ spec:
33743374
- list
33753375
- update
33763376
- watch
3377+
- delete
33773378
- apiGroups:
33783379
- ""
33793380
resources:
@@ -3846,7 +3847,7 @@ spec:
38463847
- name: AAQ_VERSION
38473848
value: v1.8.0-alpha.0
38483849
- name: MIGRATION_OPERATOR_VERSION
3849-
value: v0.1.0
3850+
value: v0.2.0-rc.0
38503851
- name: AUTOPILOT_VERSION
38513852
value: v0.0.8
38523853
- name: KV_CONSOLE_PLUGIN_IMAGE
@@ -4780,7 +4781,7 @@ spec:
47804781
- name: DEPLOY_CLUSTER_RESOURCES
47814782
value: "true"
47824783
- name: OPERATOR_VERSION
4783-
value: v0.1.0
4784+
value: v0.2.0-rc.0
47844785
- name: CONTROLLER_IMAGE
47854786
value: quay.io/kubevirt/kubevirt-migration-controller@sha256:c91da241e6d89220dccbda750f84e89ef2db2cd1603b706930b711b95ebc59c6
47864787
- name: VERBOSITY
@@ -4789,8 +4790,8 @@ spec:
47894790
value: IfNotPresent
47904791
- name: MONITORING_NAMESPACE
47914792
- name: OPERATOR_IMAGE
4792-
value: quay.io/kubevirt/kubevirt-migration-operator@sha256:712918a76c1f44a1afb50dbb78a253d8c649d77c4d484fed435e892bc893543f
4793-
image: quay.io/kubevirt/kubevirt-migration-operator@sha256:712918a76c1f44a1afb50dbb78a253d8c649d77c4d484fed435e892bc893543f
4793+
value: quay.io/kubevirt/kubevirt-migration-operator@sha256:a70320d828a837f801f4fed03786f36529bf2865b609ce6985c2e18374811fe7
4794+
image: quay.io/kubevirt/kubevirt-migration-operator@sha256:a70320d828a837f801f4fed03786f36529bf2865b609ce6985c2e18374811fe7
47944795
imagePullPolicy: IfNotPresent
47954796
livenessProbe:
47964797
httpGet:
@@ -5769,7 +5770,7 @@ spec:
57695770
name: kubevirt-apiserver-proxy
57705771
- image: quay.io/kubevirt/kubevirt-migration-controller@sha256:c91da241e6d89220dccbda750f84e89ef2db2cd1603b706930b711b95ebc59c6
57715772
name: kubevirt-migration-controller
5772-
- image: quay.io/kubevirt/kubevirt-migration-operator@sha256:712918a76c1f44a1afb50dbb78a253d8c649d77c4d484fed435e892bc893543f
5773+
- image: quay.io/kubevirt/kubevirt-migration-operator@sha256:a70320d828a837f801f4fed03786f36529bf2865b609ce6985c2e18374811fe7
57735774
name: kubevirt-migration-operator
57745775
- image: quay.io/kubevirt-ui/kubevirt-plugin@sha256:a9273d9e69662320fc6677f51ee1b05f4c62528b8a83895f8f56849de3b8b9f2
57755776
name: kubevirt-plugin

deploy/index-image/community-kubevirt-hyperconverged/1.18.0/manifests/migration-operator00.crd.yaml

Lines changed: 150 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1037,6 +1037,156 @@ spec:
10371037
priorityClass:
10381038
description: PriorityClass of the control plane
10391039
type: string
1040+
tlsSecurityProfile:
1041+
description: TLSSecurityProfile is used by operators to apply cluster-wide
1042+
TLS security settings to operands.
1043+
properties:
1044+
custom:
1045+
description: |-
1046+
custom is a user-defined TLS security profile. Be extremely careful using a custom
1047+
profile as invalid configurations can be catastrophic. An example custom profile
1048+
looks like this:
1049+
1050+
ciphers:
1051+
- ECDHE-ECDSA-CHACHA20-POLY1305
1052+
- ECDHE-RSA-CHACHA20-POLY1305
1053+
- ECDHE-RSA-AES128-GCM-SHA256
1054+
- ECDHE-ECDSA-AES128-GCM-SHA256
1055+
minTLSVersion: VersionTLS11
1056+
nullable: true
1057+
properties:
1058+
ciphers:
1059+
description: |-
1060+
ciphers is used to specify the cipher algorithms that are negotiated
1061+
during the TLS handshake. Operators may remove entries their operands
1062+
do not support. For example, to use DES-CBC3-SHA (yaml):
1063+
1064+
ciphers:
1065+
- DES-CBC3-SHA
1066+
items:
1067+
type: string
1068+
type: array
1069+
minTLSVersion:
1070+
description: |-
1071+
minTLSVersion is used to specify the minimal version of the TLS protocol
1072+
that is negotiated during the TLS handshake. For example, to use TLS
1073+
versions 1.1, 1.2 and 1.3 (yaml):
1074+
1075+
minTLSVersion: VersionTLS11
1076+
1077+
NOTE: currently the highest minTLSVersion allowed is VersionTLS12
1078+
enum:
1079+
- VersionTLS10
1080+
- VersionTLS11
1081+
- VersionTLS12
1082+
- VersionTLS13
1083+
type: string
1084+
required:
1085+
- ciphers
1086+
- minTLSVersion
1087+
type: object
1088+
intermediate:
1089+
description: |-
1090+
intermediate is a TLS security profile based on:
1091+
1092+
https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29
1093+
1094+
and looks like this (yaml):
1095+
1096+
ciphers:
1097+
- TLS_AES_128_GCM_SHA256
1098+
- TLS_AES_256_GCM_SHA384
1099+
- TLS_CHACHA20_POLY1305_SHA256
1100+
- ECDHE-ECDSA-AES128-GCM-SHA256
1101+
- ECDHE-RSA-AES128-GCM-SHA256
1102+
- ECDHE-ECDSA-AES256-GCM-SHA384
1103+
- ECDHE-RSA-AES256-GCM-SHA384
1104+
- ECDHE-ECDSA-CHACHA20-POLY1305
1105+
- ECDHE-RSA-CHACHA20-POLY1305
1106+
- DHE-RSA-AES128-GCM-SHA256
1107+
- DHE-RSA-AES256-GCM-SHA384
1108+
minTLSVersion: VersionTLS12
1109+
nullable: true
1110+
type: object
1111+
modern:
1112+
description: |-
1113+
modern is a TLS security profile based on:
1114+
1115+
https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility
1116+
1117+
and looks like this (yaml):
1118+
1119+
ciphers:
1120+
- TLS_AES_128_GCM_SHA256
1121+
- TLS_AES_256_GCM_SHA384
1122+
- TLS_CHACHA20_POLY1305_SHA256
1123+
minTLSVersion: VersionTLS13
1124+
1125+
NOTE: Currently unsupported.
1126+
nullable: true
1127+
type: object
1128+
old:
1129+
description: |-
1130+
old is a TLS security profile based on:
1131+
1132+
https://wiki.mozilla.org/Security/Server_Side_TLS#Old_backward_compatibility
1133+
1134+
and looks like this (yaml):
1135+
1136+
ciphers:
1137+
- TLS_AES_128_GCM_SHA256
1138+
- TLS_AES_256_GCM_SHA384
1139+
- TLS_CHACHA20_POLY1305_SHA256
1140+
- ECDHE-ECDSA-AES128-GCM-SHA256
1141+
- ECDHE-RSA-AES128-GCM-SHA256
1142+
- ECDHE-ECDSA-AES256-GCM-SHA384
1143+
- ECDHE-RSA-AES256-GCM-SHA384
1144+
- ECDHE-ECDSA-CHACHA20-POLY1305
1145+
- ECDHE-RSA-CHACHA20-POLY1305
1146+
- DHE-RSA-AES128-GCM-SHA256
1147+
- DHE-RSA-AES256-GCM-SHA384
1148+
- DHE-RSA-CHACHA20-POLY1305
1149+
- ECDHE-ECDSA-AES128-SHA256
1150+
- ECDHE-RSA-AES128-SHA256
1151+
- ECDHE-ECDSA-AES128-SHA
1152+
- ECDHE-RSA-AES128-SHA
1153+
- ECDHE-ECDSA-AES256-SHA384
1154+
- ECDHE-RSA-AES256-SHA384
1155+
- ECDHE-ECDSA-AES256-SHA
1156+
- ECDHE-RSA-AES256-SHA
1157+
- DHE-RSA-AES128-SHA256
1158+
- DHE-RSA-AES256-SHA256
1159+
- AES128-GCM-SHA256
1160+
- AES256-GCM-SHA384
1161+
- AES128-SHA256
1162+
- AES256-SHA256
1163+
- AES128-SHA
1164+
- AES256-SHA
1165+
- DES-CBC3-SHA
1166+
minTLSVersion: VersionTLS10
1167+
nullable: true
1168+
type: object
1169+
type:
1170+
description: |-
1171+
type is one of Old, Intermediate, Modern or Custom. Custom provides
1172+
the ability to specify individual TLS security profile parameters.
1173+
Old, Intermediate and Modern are TLS security profiles based on:
1174+
1175+
https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
1176+
1177+
The profiles are intent based, so they may change over time as new ciphers are developed and existing ciphers
1178+
are found to be insecure. Depending on precisely which ciphers are available to a process, the list may be
1179+
reduced.
1180+
1181+
Note that the Modern profile is currently not supported because it is not
1182+
yet well adopted by common software libraries.
1183+
enum:
1184+
- Old
1185+
- Intermediate
1186+
- Modern
1187+
- Custom
1188+
type: string
1189+
type: object
10401190
type: object
10411191
status:
10421192
description: MigControllerStatus defines the observed state of MigController.

0 commit comments

Comments
 (0)