Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm)!: Update chart traefik to 33.2.1 #1072

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 30, 2024

This PR contains the following updates:

Package Update Change
traefik (source) major 31.0.0 -> 33.2.1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

traefik/traefik-helm-chart (traefik)

v33.2.1

Compare Source

33.2.1 (2024-12-13)
Bug Fixes
  • Gateway API: CRDs should only be defined once (75f622f)

v33.2.0

Compare Source

Features
  • deps: update traefik docker tag to v3.2.2 (7076b78)
  • Gateway API: update sigs.k8s.io/gateway-api to v1.2.1 (f139bd9)
  • Traefik Proxy: 🎨 harmonize semverCompare calls (2aad522)
  • Traefik Proxy: add tracingparameters to helm chart values (b2c0628)
  • Traefik Proxy: support NativeLB option in GatewayAPI provider (9749d01)
Bug Fixes
  • Traefik Proxy: 🐛 abortOnPluginFailure not released yet (9ee6231)

v33.1.0

Compare Source

Upgrade Notes

Traefik Hub users should update the CRDs following UPGRADING instructions.

Features
  • deps: update traefik docker tag to v3.2.1 (8e991f3)
  • Traefik Hub: add APICatalogItem and ManagedSubscription support (6bfdd50)
  • Traefik Proxy: add abortOnPluginFailure field (b932958)
Bug Fixes
  • KubernetesCRD: 🐛 IngressClass should be readable even when kubernetesIngress is disabled (30012c0)
  • Traefik: support for entrypoint option on allowACMEByPass (18fcb8c)
  • 🐛 support specifying plugins storage (ae13d4b)
  • Traefik Hub: compatibility with Traefik Proxy v3.2 (40473e8)
  • Traefik Proxy: allowEmptyServices not disabled when set to false (4c2a65e)
Documentation
  • 📚️ fix typos in values and readme (d41869e)
  • Gateway API: detail upgrade instruction (218333c)
  • Plugins: 📝 detail behavior and expected values on plugin storage (9a5b396)

New Contributors

v33.0.0

Compare Source

Upgrade Notes

There are multiple breaking changes in this release:

  1. The default port of traefik entrypoint has changed from 9000 to 8080, just like the Traefik Proxy default port
    • You may have to update probes accordingly (or set this port back to 9000)
  2. publishedService is enabled by default on Ingress provider
    • You can disable it, if needed
  3. The POD_NAME and POD_NAMESPACE environment variables are now set by default, without values.
    • It is no longer necessary to add them in values and so, it can be removed from user values.
  4. In values, certResolvers specific syntax has been reworked to align with Traefik Proxy syntax.
    • PR #​1214 contains a complete before / after example on how to update values
  5. Traefik Proxy 3.2 supports Gateway API v1.2 (standard channel)
    • It is recommended to check that other software using Gateway API on your cluster are compatible
    • The Gateway API CRD upgrade may fail even with Flux, Argo or other CD tool
    • See release notes of gateway API v1.2 on how to upgrade their CRDs and avoid issues about invalid values on v1alpha2 version

The CRDs needs to be updated, as documented in the README.

ℹ️ A separate helm chart, just for CRDs, is being considered for a future release. See PR #​1123

⚠ BREAKING CHANGES
  • Env Variables: allow extending env without overwrite
  • certificateResolvers: 💥 🐛 use same syntax in Chart and in Traefik
  • Kubernetes Ingress: 💥 ✨ enable publishedService by default
  • Traefik: 💥 set 8080 as default port for traefik entrypoint
Features
  • Gateway API: ✨ add infrastructure in the values (2b28f7b)
  • Gateway API: ✨ standard install CRD v1.2.0 (4432f3c)
  • Traefik Proxy: update traefik docker tag to v3.2.0 (323e139)
  • Traefik Proxy: ✨ support Gateway API statusAddress (e7dcac1)
  • Traefik Proxy: CRDs for v3.2+ (d3c6d4c)
Bug Fixes
  • certificateResolvers: 💥 🐛 use same syntax in Chart and in Traefik (016822d)
  • Env Variables: allow extending env without overwrite (20f54b6)
  • Gateway API: 🐛 add missing required RBAC for v3.2 with experimental Channel (b872549)
  • schema: 🐛 targetPort can also be a string (12fee7e)
  • use correct children indentation for logs.access.filters (59073ef)
  • Kubernetes Ingress: 💥 ✨ enable publishedService by default (f7a96da)
  • Traefik: 💥 set 8080 as default port for traefik entrypoint (2b32ce7)
  • Traefik Hub: RBAC for distributedAcme (74abfee)
  • 🐛 http3 with internal service (7558e63)

New Contributors

v32.1.1

Compare Source

32.1.1 (2024-10-11)
Features
  • deps: update traefik docker tag to v3.1.6 (37f9f12)
Bug Fixes
  • schema: 🐛 targetPort can also be a string (c64c50a)

v32.1.0

Compare Source

Features
  • deps: update traefik docker tag to v3.1.5 (3b1860c)
  • Traefik Proxy: update rbac following v3.2 migration guide (cae906e)
Bug Fixes
  • 🐛 set disableIngressClassLookup until 3.1.4 (7c81ff5)

v32.0.0

Compare Source

⚠ BREAKING CHANGES

  • Traefik Hub. See release notes for more details.
    • CRD has to be updated before upgrading the Chart
    • There is a breaking change on how Redis is configured
Fixes
Features
  • Traefik Hub: add APIPlans and APIBundles CRDs (87d206e)
New Contributors

Full Changelog: traefik/traefik-helm-chart@v31.1.1...v32.0.0

v31.1.1

Compare Source

31.1.1 (2024-09-20)
Features
  • deps: update traefik docker tag to v3.1.4 (51b46ba)
Bug Fixes
  • 🐛 updateStrategy behavior (6c1c8c3)

v31.1.0

Compare Source

Features
  • ✨ input validation using schema (cf703c7)
  • ✨ add AllowACMEByPass and improve schema/doc on ports values (458cab9)
  • Traefik Hub: add new webhooks and removes unnecessary ones (d7c3622)
  • deps: update traefik docker tag to v3.1.3 (1ecf803)
Bug Fixes
  • 🐛 update CRD to v3.1 (2dc2253)

Configuration

📅 Schedule: Branch creation - "after 9am,before 5pm" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Oct 30, 2024

--- kubernetes/apps/networking/traefik/app Kustomization: flux-system/cluster-apps-traefik HelmRelease: networking/traefik

+++ kubernetes/apps/networking/traefik/app Kustomization: flux-system/cluster-apps-traefik HelmRelease: networking/traefik

@@ -12,13 +12,13 @@

     spec:
       chart: traefik
       sourceRef:
         kind: HelmRepository
         name: traefik
         namespace: flux-system
-      version: 31.0.0
+      version: 33.2.1
   install:
     createNamespace: true
     remediation:
       retries: 3
   interval: 15m
   maxHistory: 3

@renovate renovate bot changed the title feat(helm)!: Update chart traefik to 33.0.0 feat(helm)!: Update chart traefik to 33.1.0 Dec 2, 2024
@renovate renovate bot force-pushed the renovate/traefik-33.x branch from 8487d4d to b95f30d Compare December 2, 2024 12:15
@renovate renovate bot changed the title feat(helm)!: Update chart traefik to 33.1.0 feat(helm)!: Update chart traefik to 33.2.0 Dec 11, 2024
@renovate renovate bot force-pushed the renovate/traefik-33.x branch from b95f30d to 3c430a0 Compare December 11, 2024 15:14
@renovate renovate bot changed the title feat(helm)!: Update chart traefik to 33.2.0 feat(helm)!: Update chart traefik to 33.2.1 Dec 13, 2024
@renovate renovate bot force-pushed the renovate/traefik-33.x branch from 3c430a0 to d4bd870 Compare December 13, 2024 17:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants