Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm): update intel-device-plugins group ( 0.31.1 → 0.32.0 ) #49

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 1, 2025

This PR contains the following updates:

Package Update Change
intel-device-plugins-gpu minor 0.31.1 -> 0.32.0
intel-device-plugins-operator minor 0.31.1 -> 0.32.0

Release Notes

intel/helm-charts (intel-device-plugins-gpu)

v0.32.0

Compare Source

A Helm chart for Intel GPU Device Plugin


Configuration

📅 Schedule: Branch creation - "every weekend" in timezone Europe/Lisbon, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Feb 1, 2025

--- kubernetes/apps/kube-system/intel-device-plugin/app Kustomization: flux-system/intel-device-plugin-operator HelmRelease: kube-system/intel-device-plugin-operator

+++ kubernetes/apps/kube-system/intel-device-plugin/app Kustomization: flux-system/intel-device-plugin-operator HelmRelease: kube-system/intel-device-plugin-operator

@@ -13,9 +13,9 @@

     spec:
       chart: intel-device-plugins-operator
       sourceRef:
         kind: HelmRepository
         name: intel
         namespace: flux-system
-      version: 0.31.1
+      version: 0.32.0
   interval: 30m
 
--- kubernetes/apps/kube-system/intel-device-plugin/gpu Kustomization: flux-system/intel-device-plugin-gpu HelmRelease: kube-system/intel-device-plugin-gpu

+++ kubernetes/apps/kube-system/intel-device-plugin/gpu Kustomization: flux-system/intel-device-plugin-gpu HelmRelease: kube-system/intel-device-plugin-gpu

@@ -13,13 +13,13 @@

     spec:
       chart: intel-device-plugins-gpu
       sourceRef:
         kind: HelmRepository
         name: intel
         namespace: flux-system
-      version: 0.31.1
+      version: 0.32.0
   interval: 30m
   values:
     name: intel-gpu-plugin
     nodeFeatureRule: false
     sharedDevNum: 1
 

Copy link

github-actions bot commented Feb 1, 2025

--- HelmRelease: kube-system/intel-device-plugin-gpu GpuDevicePlugin: kube-system/intel-gpu-plugin

+++ HelmRelease: kube-system/intel-device-plugin-gpu GpuDevicePlugin: kube-system/intel-gpu-plugin

@@ -1,13 +1,13 @@

 ---
 apiVersion: deviceplugin.intel.com/v1
 kind: GpuDevicePlugin
 metadata:
   name: intel-gpu-plugin
 spec:
-  image: intel/intel-gpu-plugin:0.31.1
+  image: intel/intel-gpu-plugin:0.32.0
   logLevel: 2
   sharedDevNum: 1
   resourceManager: false
   enableMonitoring: true
   preferredAllocationPolicy: none
   nodeSelector:
--- HelmRelease: kube-system/intel-device-plugin-operator ClusterRole: kube-system/inteldeviceplugins-proxy-role

+++ HelmRelease: kube-system/intel-device-plugin-operator ClusterRole: kube-system/inteldeviceplugins-proxy-role

@@ -1,19 +0,0 @@

----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
-metadata:
-  name: inteldeviceplugins-proxy-role
-rules:
-- apiGroups:
-  - authentication.k8s.io
-  resources:
-  - tokenreviews
-  verbs:
-  - create
-- apiGroups:
-  - authorization.k8s.io
-  resources:
-  - subjectaccessreviews
-  verbs:
-  - create
-
--- HelmRelease: kube-system/intel-device-plugin-operator ClusterRoleBinding: kube-system/inteldeviceplugins-proxy-rolebinding

+++ HelmRelease: kube-system/intel-device-plugin-operator ClusterRoleBinding: kube-system/inteldeviceplugins-proxy-rolebinding

@@ -1,14 +0,0 @@

----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
-metadata:
-  name: inteldeviceplugins-proxy-rolebinding
-roleRef:
-  apiGroup: rbac.authorization.k8s.io
-  kind: ClusterRole
-  name: inteldeviceplugins-proxy-role
-subjects:
-- kind: ServiceAccount
-  name: default
-  namespace: kube-system
-
--- HelmRelease: kube-system/intel-device-plugin-operator Deployment: kube-system/inteldeviceplugins-controller-manager

+++ HelmRelease: kube-system/intel-device-plugin-operator Deployment: kube-system/inteldeviceplugins-controller-manager

@@ -14,20 +14,36 @@

   template:
     metadata:
       labels:
         control-plane: controller-manager
     spec:
       containers:
-      - args: null
+      - args:
+        - --metrics-bind-address=:8443
+        - --metrics-secure
+        - --health-probe-bind-address=:8081
+        - --leader-elect
         env:
         - name: DEVICEPLUGIN_NAMESPACE
           valueFrom:
             fieldRef:
               fieldPath: metadata.namespace
-        image: intel/intel-deviceplugin-operator:0.31.1
+        image: intel/intel-deviceplugin-operator:0.32.0
         imagePullPolicy: IfNotPresent
+        livenessProbe:
+          httpGet:
+            path: /healthz
+            port: 8081
+          initialDelaySeconds: 15
+          periodSeconds: 20
+        readinessProbe:
+          httpGet:
+            path: /readyz
+            port: 8081
+          initialDelaySeconds: 5
+          periodSeconds: 10
         name: manager
         ports:
         - containerPort: 9443
           name: webhook-server
           protocol: TCP
         resources:
@@ -49,35 +65,17 @@

           seccompProfile:
             type: RuntimeDefault
         volumeMounts:
         - mountPath: /tmp/k8s-webhook-server/serving-certs
           name: cert
           readOnly: true
-      - args:
-        - --secure-listen-address=0.0.0.0:8443
-        - --upstream=http://127.0.0.1:8080/
-        - --logtostderr=true
-        - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
-        - --v=10
-        image: quay.io/brancz/kube-rbac-proxy:v0.18.1
-        name: kube-rbac-proxy
-        ports:
-        - containerPort: 8443
-          name: https
-        securityContext:
-          allowPrivilegeEscalation: false
-          readOnlyRootFilesystem: true
-          runAsGroup: 1000
-          runAsNonRoot: true
-          runAsUser: 1000
-          seccompProfile:
-            type: RuntimeDefault
       nodeSelector:
         kubernetes.io/arch: amd64
       serviceAccountName: default
       terminationGracePeriodSeconds: 10
       volumes:
       - name: cert
         secret:
           defaultMode: 420
           secretName: webhook-server-cert
+      tolerations: []
 
--- HelmRelease: kube-system/intel-device-plugin-operator ClusterRole: kube-system/inteldeviceplugins-auth-role

+++ HelmRelease: kube-system/intel-device-plugin-operator ClusterRole: kube-system/inteldeviceplugins-auth-role

@@ -0,0 +1,19 @@

+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+  name: inteldeviceplugins-auth-role
+rules:
+- apiGroups:
+  - authentication.k8s.io
+  resources:
+  - tokenreviews
+  verbs:
+  - create
+- apiGroups:
+  - authorization.k8s.io
+  resources:
+  - subjectaccessreviews
+  verbs:
+  - create
+
--- HelmRelease: kube-system/intel-device-plugin-operator ClusterRoleBinding: kube-system/inteldeviceplugins-auth-rolebinding

+++ HelmRelease: kube-system/intel-device-plugin-operator ClusterRoleBinding: kube-system/inteldeviceplugins-auth-rolebinding

@@ -0,0 +1,14 @@

+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+  name: inteldeviceplugins-auth-rolebinding
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: ClusterRole
+  name: inteldeviceplugins-auth-role
+subjects:
+- kind: ServiceAccount
+  name: default
+  namespace: kube-system
+

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants