chore(deps): update ghcr.io/projectcontour/contour docker tag to v1.30.0 #240
Loading…
Reference in a new issue
No description provided.
Delete branch "renovate/ghcr.io-projectcontour-contour-1.x"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR contains the following updates:
v1.29.1
->v1.30.0
Release Notes
projectcontour/contour (ghcr.io/projectcontour/contour)
v1.30.0
: Contour v1.30.0Compare Source
We are delighted to present version v1.30.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
A big thank you to everyone who contributed to the release.
Minor Changes
Gateway API: Implement Listener/Route hostname isolation
Gateway API spec update in this GEP. Updates logic on finding intersecting route and Listener hostnames to factor in the other Listeners on a Gateway that the route in question may not actually be attached to. Requests should be "isolated" to the most specific Listener and it's attached routes.
(#6162, @sunjayBhatia)
Update examples for monitoring Contour and Envoy
Updates the documentation and examples for deploying a monitoring stack (Prometheus and Grafana) to scrape metrics from Contour and Envoy. Adds a metrics port to the Envoy DaemonSet/Deployment in the example YAMLs to expose port
8002
so thatPodMonitor
resources can be used to find metrics endpoints.(#6269, @sunjayBhatia)
Update to Gateway API v1.1.0
Gateway API CRD compatibility has been updated to release v1.1.0.
Notable changes for Contour include:
BackendTLSPolicy
resource has undergone some breaking changes and has been updated to thev1alpha3
API version. This will require any existing users of this policy to uninstall the v1alpha2 version before installing this newer version.GRPCRoute
has graduated to GA and is now in thev1
API version.Full release notes for this Gateway API release can be found here.
(#6398, @sunjayBhatia)
Add Circuit Breaker support for Extension Services
This change enables the user to configure the Circuit breakers for extension services either via the global Contour config or on an individual Extension Service.
NOTE: The
PerHostMaxConnections
is now also configurable via the global settings.(#6539, @clayton-gonsalves)
Fallback Certificate: Add Global Ext Auth support
Applies Global Auth filters to Fallback certificate
(#6558, @erikflores7)
Gateway API: handle Route conflicts with GRPCRoute.Matches
It's possible that multiple GRPCRoutes will define the same Match conditions. In this case the following logic is applied to resolve the conflict:
With above ordering, any GRPCRoute that ranks lower, will be marked with below conditions accordingly:
Accepted: True
andPartiallyInvalid: true
Conditions and Reason:RuleMatchPartiallyConflict
.Accepted: False
Condition and ReasonRuleMatchConflict
.(#6566, @lubronzhan)
Other Changes
deny-by-default
approach on theadmin
listener by matching on exact paths and onGET
requests (#6447, @davinci26)ECDHE-ECDSA-CHACHA20-POLY1305
andECDHE-RSA-CHACHA20-POLY1305
to be used separately. (#6461, @tsaarni)/stats/prometheus
route on theadmin
listener. (#6503, @clayton-gonsalves)Deprecation and Removal Notices
Contour sample YAML manifests no longer use
prometheus.io/
annotationsThe annotations for notifying a Prometheus instance on how to scrape metrics from Contour and Envoy pods have been removed from the deployment YAMLs and the Gateway provisioner. The suggested mechanism for doing so now is to use kube-prometheus and the
PodMonitor
resource.(#6269, @sunjayBhatia)
xDS server type fields in config file and ContourConfiguration CRD are deprecated
These fields are officially deprecated now that the
contour
xDS server implementation is deprecated. They are planned to be removed in the 1.31 release, along with thecontour
xDS server implementation.(#6561, @skriss)
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.30.0 is tested against Kubernetes 1.28 through 1.30.
Community Thanks!
We’re immensely grateful for all the community contributions that help make Contour even better! For this release, special thanks go out to the following contributors:
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.29.2
: Contour v1.29.2Compare Source
We are delighted to present version v1.29.2 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.29.2 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.