Skip to content
This repository has been archived by the owner on Feb 19, 2025. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: aws-samples/eks-cluster-upgrade
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 0.6.2
Choose a base ref
...
head repository: aws-samples/eks-cluster-upgrade
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 0.6.3
Choose a head ref
  • 2 commits
  • 4 files changed
  • 1 contributor

Commits on Feb 27, 2023

  1. Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    020c3cc View commit details

Commits on Mar 6, 2023

  1. Copy the full SHA
    371fdd9 View commit details
Showing with 291 additions and 289 deletions.
  1. +1 −1 eksupgrade/__init__.py
  2. +8 −5 eksupgrade/src/preflight_module.py
  3. +273 −274 poetry.lock
  4. +9 −9 pyproject.toml
2 changes: 1 addition & 1 deletion eksupgrade/__init__.py
Original file line number Diff line number Diff line change
@@ -5,4 +5,4 @@
"""

__version__: str = "0.6.2"
__version__: str = "0.6.3"
13 changes: 8 additions & 5 deletions eksupgrade/src/preflight_module.py
Original file line number Diff line number Diff line change
@@ -8,7 +8,6 @@
import urllib3
import yaml
from kubernetes import client
from kubernetes.client import *

from eksupgrade.utils import get_package_dict

@@ -260,9 +259,13 @@ def pod_security_policies(
"""Check for pod security policies."""
loading_config(cluster_name, region)
try:
policy_v1_api = PolicyV1beta1Api()
logger.info("Pod Security Policies .....")
ret = policy_v1_api.list_pod_security_policy(field_selector="metadata.name=eks.privileged")
try:
policy_v1_api = client.PolicyV1beta1Api()
logger.info("Pod Security Policies .....")
ret = policy_v1_api.list_pod_security_policy(field_selector="metadata.name=eks.privileged")
except AttributeError:
logger.info("Current kubernetes python client version doesn't support PSP - continuing...")
return

if not ret.items:
customer_report["pod security policy"] = "Pod Security Policy with eks.privileged role doesnt exists."
@@ -699,7 +702,7 @@ def pod_disruption_budget(
loading_config(cluster_name, region)
logger.info("Fetching Pod Disruption Budget Details....")
try:
policy_v1_api = PolicyV1beta1Api()
policy_v1_api = client.PolicyV1Api()
ret = policy_v1_api.list_pod_disruption_budget_for_all_namespaces()
if not ret.items:
customer_report["pod disruption budget"] = "No Pod Disruption Budget exists in cluster"
Loading