chore(deps): update ghcr.io/projectcontour/contour docker tag to v1.29.0 #106

Merged
prskr merged 1 commit from renovate/ghcr.io-projectcontour-contour-1.x into main 2024-05-08 16:30:03 +00:00
Owner

This PR contains the following updates:

Package Type Update Change
ghcr.io/projectcontour/contour (source) Kustomization minor v1.28.3 -> v1.29.0

Release Notes

projectcontour/contour (ghcr.io/projectcontour/contour)

v1.29.0: Contour v1.29.0

Compare Source

We are delighted to present version v1.29.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.

A big thank you to everyone who contributed to the release.

Major Changes

Default xDS Server Implementation is now Envoy

As of this release, Contour now uses the envoy xDS server implementation by default. This xDS server implementation is based on Envoy's go-control-plane project and will eventually be the only supported xDS server implementation in Contour. This change is expected to be transparent to users.

I'm seeing issues after upgrading, how do I revert to the contour xDS server?

If you encounter any issues, you can easily revert to the contour xDS server with the following configuration:

(if using Contour config file)

server:
  xds-server-type: contour

(if using ContourConfiguration CRD)

...
spec:
  xdsServer:
    type: contour

You will need to restart Contour for the changes to take effect.

(#​6146, @​skriss)

Gateway API: Inform on v1 types

Contour no longer informs on v1beta1 resources that have graduated to v1. This includes the "core" resources GatewayClass, Gateway, and HTTPRoute. This means that users should ensure they have updated CRDs to Gateway API v1.0.0 or newer, which introduced the v1 version with compatibility with v1beta1.

(#​6153, @​sunjayBhatia)

Minor Changes

Use EndpointSlices by default

Contour now uses the Kubernetes EndpointSlices API by default to determine the endpoints to configure Envoy, instead of the Endpoints API. Note: if you need to continue using the Endpoints API, you can disable the feature flag via featureFlags: ["useEndpointSlices=false"] in the Contour config file or ContourConfiguration CRD.

(#​6149, @​izturn)

Gateway API: handle Route conflicts with HTTPRoute.Matches

It's possible that multiple HTTPRoutes will define the same Match conditions. In this case the following logic is applied to resolve the conflict:

  • The oldest Route based on creation timestamp. For example, a Route with a creation timestamp of “2020-09-08 01:02:03” is given precedence over a Route with a creation timestamp of “2020-09-08 01:02:04”.
  • The Route appearing first in alphabetical order (namespace/name) for example, foo/bar is given precedence over foo/baz.

With above ordering, any HTTPRoute that ranks lower, will be marked with below conditions accordionly

  1. If only partial rules under this HTTPRoute are conflicted, it's marked with Accepted: True and PartiallyInvalid: true Conditions and Reason: RuleMatchPartiallyConflict.
  2. If all the rules under this HTTPRoute are conflicted, it's marked with Accepted: False Condition and Reason RuleMatchConflict.

(#​6188, @​lubronzhan)

Spawn Upstream Span is now enabled in tracing

As described in Envoy documentations, spawn_upstream_span should be true when envoy is working as an independent proxy and from now on contour tracing spans will show up as a parent span to upstream spans.

(#​6271, @​SamMHD)

Other Changes

  • Fix data race in BackendTLSPolicy status update logic. (#​6185, @​sunjayBhatia)
  • Fix for specifying a health check port with an ExternalName Service. (#​6230, @​yangyy93)
  • Updates the example envoyproxy/ratelimit image tag to 19f2079f, for multi-arch support and other improvements. (#​6246, @​skriss)
  • In the envoy go-control-plane xDS server, use a separate snapshot cache for Endpoints, to minimize the amount of unnecessary xDS traffic generated. (#​6250, @​skriss)
  • If there were no relevant resources for Contour in the watched namespaces during the startup of a follower instance of Contour, it did not reach a ready state. (#​6295, @​tsaarni)
  • Added support for enabling circuit breaker statistics tracking. (#​6297, @​rajatvig)
  • Updates to Go 1.22.2. See the Go release notes for more information. (#​6327, @​skriss)
  • Gateway API: add support for HTTPRoute's Timeouts.BackendRequest field. (#​6335, @​skriss)
  • Updates Envoy to v1.30.1. See the v1.30.0 release notes here and the v1.30.1 release notes here. (#​6353, @​tico88612)
  • Gateway API: a timeout value of 0s disables the timeout. (#​6375, @​skriss)
  • Fix provisioner to use separate --disable-feature flags on Contour Deployment for each disabled feature. Previously a comma separated list was passed which was incorrect. (#​6413, @​sunjayBhatia)

Deprecation and Removal Notices

Configuring Contour with a GatewayClass controller name is no longer supported

Contour can no longer be configured with a GatewayClass controller name (gateway.controllerName in the config file or ContourConfiguration CRD), as the config field has been removed. Instead, either use a specific Gateway reference (gateway.gatewayRef), or use the Gateway provisioner.

(#​6145, @​skriss)

Contour xDS server implementation is now deprecated

As of this release, the contour xDS server implementation is now deprecated. Once the go-control-plane based envoy xDS server has had sufficient production bake time, the contour implementation will be removed from Contour. Notification of removal will occur at least one release in advance.

(#​6146, @​skriss)

Use of Endpoints API is deprecated

Contour now uses the EndpointSlices API by default, and its usage of the Endpoints API is deprecated as of this release. Support for Endpoints, and the associated useEndpointSlices feature flag, will be removed in a future release.

(#​6149, @​izturn)

Installing and Upgrading

For a fresh install of Contour, consult the getting started documentation.

To upgrade an existing Contour installation, please consult the upgrade documentation.

Compatible Kubernetes Versions

Contour v1.29.0 is tested against Kubernetes 1.27 through 1.29.

Community Thanks!

We’re immensely grateful for all the community contributions that help make Contour even better! For this release, special thanks go out to the following contributors:

Are you a Contour user? We would love to know!

If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.

v1.28.4: Contour v1.28.4

Compare Source

We are delighted to present version v1.28.4 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.

All Changes

  • Updates Envoy to v1.29.4. See the release notes for v1.29.4 here (#​6377).
  • Gateway API: an HTTPRoute timeout of 0s now disables the timeout (#​6379).
  • Gateway provisioner: disabled features are now correctly applied to the Contour controller (#​6414).

Installing and Upgrading

For a fresh install of Contour, consult the getting started documentation.

To upgrade an existing Contour installation, please consult the upgrade documentation.

Compatible Kubernetes Versions

Contour v1.28.4 is tested against Kubernetes 1.27 through 1.29.

Are you a Contour user? We would love to know!

If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

This PR contains the following updates: | Package | Type | Update | Change | |---|---|---|---| | [ghcr.io/projectcontour/contour](https://projectcontour.io/) ([source](https://github.com/projectcontour/contour)) | Kustomization | minor | `v1.28.3` -> `v1.29.0` | --- ### Release Notes <details> <summary>projectcontour/contour (ghcr.io/projectcontour/contour)</summary> ### [`v1.29.0`](https://github.com/projectcontour/contour/releases/tag/v1.29.0): Contour v1.29.0 [Compare Source](https://github.com/projectcontour/contour/compare/v1.28.4...v1.29.0) We are delighted to present version v1.29.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters. A big thank you to everyone who contributed to the release. ### Major Changes #### Default xDS Server Implementation is now Envoy As of this release, Contour now uses the `envoy` xDS server implementation by default. This xDS server implementation is based on Envoy's [go-control-plane project](https://github.com/envoyproxy/go-control-plane) and will eventually be the only supported xDS server implementation in Contour. This change is expected to be transparent to users. ##### I'm seeing issues after upgrading, how do I revert to the contour xDS server? If you encounter any issues, you can easily revert to the `contour` xDS server with the following configuration: (if using Contour config file) ```yaml server: xds-server-type: contour ``` (if using ContourConfiguration CRD) ```yaml ... spec: xdsServer: type: contour ``` You will need to restart Contour for the changes to take effect. ([#&#8203;6146](https://github.com/projectcontour/contour/issues/6146), [@&#8203;skriss](https://github.com/skriss)) #### Gateway API: Inform on v1 types Contour no longer informs on v1beta1 resources that have graduated to v1. This includes the "core" resources GatewayClass, Gateway, and HTTPRoute. This means that users should ensure they have updated CRDs to Gateway API v1.0.0 or newer, which introduced the v1 version with compatibility with v1beta1. ([#&#8203;6153](https://github.com/projectcontour/contour/issues/6153), [@&#8203;sunjayBhatia](https://github.com/sunjayBhatia)) ### Minor Changes #### Use EndpointSlices by default Contour now uses the Kubernetes EndpointSlices API by default to determine the endpoints to configure Envoy, instead of the Endpoints API. Note: if you need to continue using the Endpoints API, you can disable the feature flag via `featureFlags: ["useEndpointSlices=false"]` in the Contour config file or ContourConfiguration CRD. ([#&#8203;6149](https://github.com/projectcontour/contour/issues/6149), [@&#8203;izturn](https://github.com/izturn)) #### Gateway API: handle Route conflicts with HTTPRoute.Matches It's possible that multiple HTTPRoutes will define the same Match conditions. In this case the following logic is applied to resolve the conflict: - The oldest Route based on creation timestamp. For example, a Route with a creation timestamp of “2020-09-08 01:02:03” is given precedence over a Route with a creation timestamp of “2020-09-08 01:02:04”. - The Route appearing first in alphabetical order (namespace/name) for example, foo/bar is given precedence over foo/baz. With above ordering, any HTTPRoute that ranks lower, will be marked with below conditions accordionly 1. If only partial rules under this HTTPRoute are conflicted, it's marked with `Accepted: True` and `PartiallyInvalid: true` Conditions and Reason: `RuleMatchPartiallyConflict`. 2. If all the rules under this HTTPRoute are conflicted, it's marked with `Accepted: False` Condition and Reason `RuleMatchConflict`. ([#&#8203;6188](https://github.com/projectcontour/contour/issues/6188), [@&#8203;lubronzhan](https://github.com/lubronzhan)) #### Spawn Upstream Span is now enabled in tracing As described in [Envoy documentations](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-tracing), `spawn_upstream_span` should be true when envoy is working as an independent proxy and from now on contour tracing spans will show up as a parent span to upstream spans. ([#&#8203;6271](https://github.com/projectcontour/contour/issues/6271), [@&#8203;SamMHD](https://github.com/SamMHD)) ### Other Changes - Fix data race in BackendTLSPolicy status update logic. ([#&#8203;6185](https://github.com/projectcontour/contour/issues/6185), [@&#8203;sunjayBhatia](https://github.com/sunjayBhatia)) - Fix for specifying a health check port with an ExternalName Service. ([#&#8203;6230](https://github.com/projectcontour/contour/issues/6230), [@&#8203;yangyy93](https://github.com/yangyy93)) - Updates the example `envoyproxy/ratelimit` image tag to `19f2079f`, for multi-arch support and other improvements. ([#&#8203;6246](https://github.com/projectcontour/contour/issues/6246), [@&#8203;skriss](https://github.com/skriss)) - In the `envoy` go-control-plane xDS server, use a separate snapshot cache for Endpoints, to minimize the amount of unnecessary xDS traffic generated. ([#&#8203;6250](https://github.com/projectcontour/contour/issues/6250), [@&#8203;skriss](https://github.com/skriss)) - If there were no relevant resources for Contour in the watched namespaces during the startup of a follower instance of Contour, it did not reach a ready state. ([#&#8203;6295](https://github.com/projectcontour/contour/issues/6295), [@&#8203;tsaarni](https://github.com/tsaarni)) - Added support for enabling circuit breaker statistics tracking. ([#&#8203;6297](https://github.com/projectcontour/contour/issues/6297), [@&#8203;rajatvig](https://github.com/rajatvig)) - Updates to Go 1.22.2. See the [Go release notes](https://go.dev/doc/devel/release#go1.22.minor) for more information. ([#&#8203;6327](https://github.com/projectcontour/contour/issues/6327), [@&#8203;skriss](https://github.com/skriss)) - Gateway API: add support for HTTPRoute's Timeouts.BackendRequest field. ([#&#8203;6335](https://github.com/projectcontour/contour/issues/6335), [@&#8203;skriss](https://github.com/skriss)) - Updates Envoy to v1.30.1. See the v1.30.0 release notes [here](https://www.envoyproxy.io/docs/envoy/v1.30.1/version_history/v1.30/v1.30.0) and the v1.30.1 release notes [here](https://www.envoyproxy.io/docs/envoy/v1.30.1/version_history/v1.30/v1.30.1). ([#&#8203;6353](https://github.com/projectcontour/contour/issues/6353), [@&#8203;tico88612](https://github.com/tico88612)) - Gateway API: a timeout value of `0s` disables the timeout. ([#&#8203;6375](https://github.com/projectcontour/contour/issues/6375), [@&#8203;skriss](https://github.com/skriss)) - Fix provisioner to use separate `--disable-feature` flags on Contour Deployment for each disabled feature. Previously a comma separated list was passed which was incorrect. ([#&#8203;6413](https://github.com/projectcontour/contour/issues/6413), [@&#8203;sunjayBhatia](https://github.com/sunjayBhatia)) ### Deprecation and Removal Notices #### Configuring Contour with a GatewayClass controller name is no longer supported Contour can no longer be configured with a GatewayClass controller name (gateway.controllerName in the config file or ContourConfiguration CRD), as the config field has been removed. Instead, either use a specific Gateway reference (gateway.gatewayRef), or use the Gateway provisioner. ([#&#8203;6145](https://github.com/projectcontour/contour/issues/6145), [@&#8203;skriss](https://github.com/skriss)) #### Contour xDS server implementation is now deprecated As of this release, the `contour` xDS server implementation is now deprecated. Once the go-control-plane based `envoy` xDS server has had sufficient production bake time, the `contour` implementation will be removed from Contour. Notification of removal will occur at least one release in advance. ([#&#8203;6146](https://github.com/projectcontour/contour/issues/6146), [@&#8203;skriss](https://github.com/skriss)) #### Use of Endpoints API is deprecated Contour now uses the EndpointSlices API by default, and its usage of the Endpoints API is deprecated as of this release. Support for Endpoints, and the associated `useEndpointSlices` feature flag, will be removed in a future release. ([#&#8203;6149](https://github.com/projectcontour/contour/issues/6149), [@&#8203;izturn](https://github.com/izturn)) ### Installing and Upgrading For a fresh install of Contour, consult the [getting started documentation](https://projectcontour.io/getting-started/). To upgrade an existing Contour installation, please consult the [upgrade documentation](https://projectcontour.io/resources/upgrading/). ### Compatible Kubernetes Versions Contour v1.29.0 is tested against Kubernetes 1.27 through 1.29. ### Community Thanks! We’re immensely grateful for all the community contributions that help make Contour even better! For this release, special thanks go out to the following contributors: - [@&#8203;SamMHD](https://github.com/SamMHD) - [@&#8203;izturn](https://github.com/izturn) - [@&#8203;lubronzhan](https://github.com/lubronzhan) - [@&#8203;rajatvig](https://github.com/rajatvig) - [@&#8203;tico88612](https://github.com/tico88612) - [@&#8203;yangyy93](https://github.com/yangyy93) ### Are you a Contour user? We would love to know! If you're using Contour and want to add your organization to our adopters list, please visit this [page](https://projectcontour.io/resources/adopters/). If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this [GitHub thread](https://github.com/projectcontour/contour/issues/1269). ### [`v1.28.4`](https://github.com/projectcontour/contour/releases/tag/v1.28.4): Contour v1.28.4 [Compare Source](https://github.com/projectcontour/contour/compare/v1.28.3...v1.28.4) We are delighted to present version v1.28.4 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters. ### All Changes - Updates Envoy to v1.29.4. See the release notes for v1.29.4 [here](https://www.envoyproxy.io/docs/envoy/v1.29.4/version_history/v1.29/v1.29.4) ([#&#8203;6377](https://github.com/projectcontour/contour/pull/6377)). - Gateway API: an HTTPRoute timeout of `0s` now disables the timeout ([#&#8203;6379](https://github.com/projectcontour/contour/pull/6379)). - Gateway provisioner: disabled features are now correctly applied to the Contour controller ([#&#8203;6414](https://github.com/projectcontour/contour/pull/6414)). ### Installing and Upgrading For a fresh install of Contour, consult the [getting started documentation](https://projectcontour.io/getting-started/). To upgrade an existing Contour installation, please consult the [upgrade documentation](https://projectcontour.io/resources/upgrading/). ### Compatible Kubernetes Versions Contour v1.28.4 is tested against Kubernetes 1.27 through 1.29. ### Are you a Contour user? We would love to know! If you're using Contour and want to add your organization to our adopters list, please visit this [page](https://projectcontour.io/resources/adopters/). If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this [GitHub thread](https://github.com/projectcontour/contour/issues/1269). </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4zNDkuMyIsInVwZGF0ZWRJblZlciI6IjM3LjM0OS4zIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
prskr added 1 commit 2024-05-08 03:33:48 +00:00
prskr merged commit e62f32e977 into main 2024-05-08 16:30:03 +00:00
prskr deleted branch renovate/ghcr.io-projectcontour-contour-1.x 2024-05-08 16:30:03 +00:00
Sign in to join this conversation.
No reviewers
No labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: infrastructure/apps#106
No description provided.