-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency projectcontour/contour to v1.30.0 - autoclosed #2811
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.26.0
chore(deps): update dependency projectcontour/contour to v1.26.0
Sep 26, 2023
renovate
bot
changed the title
chore(deps): update dependency projectcontour/contour to v1.26.0
Update dependency projectcontour/contour to v1.26.0
Oct 15, 2023
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
October 17, 2023 18:10
ef8b4b9
to
c594480
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.26.0
Update dependency projectcontour/contour to v1.26.1
Oct 17, 2023
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.26.1
Update dependency projectcontour/contour to v1.27.0
Oct 30, 2023
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
October 30, 2023 18:29
c594480
to
d20082a
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.27.0
chore(deps): update dependency projectcontour/contour to v1.27.0
Nov 26, 2023
renovate
bot
changed the title
chore(deps): update dependency projectcontour/contour to v1.27.0
Update dependency projectcontour/contour to v1.27.0
Nov 27, 2023
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
February 12, 2024 17:08
d20082a
to
436ee77
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.27.0
Update dependency projectcontour/contour to v1.28.0
Feb 12, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
February 13, 2024 19:40
436ee77
to
d2aec47
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.28.0
Update dependency projectcontour/contour to v1.28.1
Feb 13, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
March 19, 2024 17:45
d2aec47
to
6ffd779
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.28.1
Update dependency projectcontour/contour to v1.28.2
Mar 19, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
April 10, 2024 15:39
6ffd779
to
c17555a
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.28.2
Update dependency projectcontour/contour to v1.28.3
Apr 10, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
May 7, 2024 20:31
c17555a
to
d876fdd
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.28.3
Update dependency projectcontour/contour to v1.29.0
May 7, 2024
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.29.0
chore(deps): update dependency projectcontour/contour to v1.29.0
Jun 8, 2024
renovate
bot
changed the title
chore(deps): update dependency projectcontour/contour to v1.29.0
Update dependency projectcontour/contour to v1.29.0
Jun 9, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
June 12, 2024 19:42
d876fdd
to
0df4899
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.29.0
Update dependency projectcontour/contour to v1.29.1
Jun 12, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
July 31, 2024 19:30
0df4899
to
2851219
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.29.1
Update dependency projectcontour/contour to v1.29.2
Jul 31, 2024
renovate
bot
force-pushed
the
renovate/projectcontour-contour-1.x
branch
from
July 31, 2024 22:45
2851219
to
5c415d5
Compare
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.29.2
Update dependency projectcontour/contour to v1.30.0
Jul 31, 2024
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.30.0
chore(deps): update dependency projectcontour/contour to v1.30.0
Aug 12, 2024
renovate
bot
changed the title
chore(deps): update dependency projectcontour/contour to v1.30.0
Update dependency projectcontour/contour to v1.30.0
Aug 25, 2024
renovate
bot
changed the title
Update dependency projectcontour/contour to v1.30.0
Update dependency projectcontour/contour to v1.30.0 - autoclosed
Oct 20, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.25.0
->v1.30.0
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
projectcontour/contour (projectcontour/contour)
v1.30.0
: Contour v1.30.0Compare Source
We are delighted to present version v1.30.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
A big thank you to everyone who contributed to the release.
Minor Changes
Gateway API: Implement Listener/Route hostname isolation
Gateway API spec update in this GEP. Updates logic on finding intersecting route and Listener hostnames to factor in the other Listeners on a Gateway that the route in question may not actually be attached to. Requests should be "isolated" to the most specific Listener and it's attached routes.
(#6162, @sunjayBhatia)
Update examples for monitoring Contour and Envoy
Updates the documentation and examples for deploying a monitoring stack (Prometheus and Grafana) to scrape metrics from Contour and Envoy. Adds a metrics port to the Envoy DaemonSet/Deployment in the example YAMLs to expose port
8002
so thatPodMonitor
resources can be used to find metrics endpoints.(#6269, @sunjayBhatia)
Update to Gateway API v1.1.0
Gateway API CRD compatibility has been updated to release v1.1.0.
Notable changes for Contour include:
BackendTLSPolicy
resource has undergone some breaking changes and has been updated to thev1alpha3
API version. This will require any existing users of this policy to uninstall the v1alpha2 version before installing this newer version.GRPCRoute
has graduated to GA and is now in thev1
API version.Full release notes for this Gateway API release can be found here.
(#6398, @sunjayBhatia)
Add Circuit Breaker support for Extension Services
This change enables the user to configure the Circuit breakers for extension services either via the global Contour config or on an individual Extension Service.
NOTE: The
PerHostMaxConnections
is now also configurable via the global settings.(#6539, @clayton-gonsalves)
Fallback Certificate: Add Global Ext Auth support
Applies Global Auth filters to Fallback certificate
(#6558, @erikflores7)
Gateway API: handle Route conflicts with GRPCRoute.Matches
It's possible that multiple GRPCRoutes will define the same Match conditions. In this case the following logic is applied to resolve the conflict:
With above ordering, any GRPCRoute that ranks lower, will be marked with below conditions accordingly:
Accepted: True
andPartiallyInvalid: true
Conditions and Reason:RuleMatchPartiallyConflict
.Accepted: False
Condition and ReasonRuleMatchConflict
.(#6566, @lubronzhan)
Other Changes
deny-by-default
approach on theadmin
listener by matching on exact paths and onGET
requests (#6447, @davinci26)ECDHE-ECDSA-CHACHA20-POLY1305
andECDHE-RSA-CHACHA20-POLY1305
to be used separately. (#6461, @tsaarni)/stats/prometheus
route on theadmin
listener. (#6503, @clayton-gonsalves)Deprecation and Removal Notices
Contour sample YAML manifests no longer use
prometheus.io/
annotationsThe annotations for notifying a Prometheus instance on how to scrape metrics from Contour and Envoy pods have been removed from the deployment YAMLs and the Gateway provisioner. The suggested mechanism for doing so now is to use kube-prometheus and the
PodMonitor
resource.(#6269, @sunjayBhatia)
xDS server type fields in config file and ContourConfiguration CRD are deprecated
These fields are officially deprecated now that the
contour
xDS server implementation is deprecated. They are planned to be removed in the 1.31 release, along with thecontour
xDS server implementation.(#6561, @skriss)
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.30.0 is tested against Kubernetes 1.28 through 1.30.
Community Thanks!
We’re immensely grateful for all the community contributions that help make Contour even better! For this release, special thanks go out to the following contributors:
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.29.2
: Contour v1.29.2Compare Source
We are delighted to present version v1.29.2 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.29.2 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.29.1
: Contour v1.29.1Compare Source
We are delighted to present version v1.29.1 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.29.1 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.29.0
: Contour v1.29.0Compare Source
We are delighted to present version v1.29.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
A big thank you to everyone who contributed to the release.
Major Changes
Default xDS Server Implementation is now Envoy
As of this release, Contour now uses the
envoy
xDS server implementation by default. This xDS server implementation is based on Envoy's go-control-plane project and will eventually be the only supported xDS server implementation in Contour. This change is expected to be transparent to users.I'm seeing issues after upgrading, how do I revert to the contour xDS server?
If you encounter any issues, you can easily revert to the
contour
xDS server with the following configuration:(if using Contour config file)
(if using ContourConfiguration CRD)
You will need to restart Contour for the changes to take effect.
(#6146, @skriss)
Gateway API: Inform on v1 types
Contour no longer informs on v1beta1 resources that have graduated to v1. This includes the "core" resources GatewayClass, Gateway, and HTTPRoute. This means that users should ensure they have updated CRDs to Gateway API v1.0.0 or newer, which introduced the v1 version with compatibility with v1beta1.
(#6153, @sunjayBhatia)
Minor Changes
Use EndpointSlices by default
Contour now uses the Kubernetes EndpointSlices API by default to determine the endpoints to configure Envoy, instead of the Endpoints API. Note: if you need to continue using the Endpoints API, you can disable the feature flag via
featureFlags: ["useEndpointSlices=false"]
in the Contour config file or ContourConfiguration CRD.(#6149, @izturn)
Gateway API: handle Route conflicts with HTTPRoute.Matches
It's possible that multiple HTTPRoutes will define the same Match conditions. In this case the following logic is applied to resolve the conflict:
With above ordering, any HTTPRoute that ranks lower, will be marked with below conditions accordionly
Accepted: True
andPartiallyInvalid: true
Conditions and Reason:RuleMatchPartiallyConflict
.Accepted: False
Condition and ReasonRuleMatchConflict
.(#6188, @lubronzhan)
Spawn Upstream Span is now enabled in tracing
As described in Envoy documentations,
spawn_upstream_span
should be true when envoy is working as an independent proxy and from now on contour tracing spans will show up as a parent span to upstream spans.(#6271, @SamMHD)
Other Changes
envoyproxy/ratelimit
image tag to19f2079f
, for multi-arch support and other improvements. (#6246, @skriss)envoy
go-control-plane xDS server, use a separate snapshot cache for Endpoints, to minimize the amount of unnecessary xDS traffic generated. (#6250, @skriss)0s
disables the timeout. (#6375, @skriss)--disable-feature
flags on Contour Deployment for each disabled feature. Previously a comma separated list was passed which was incorrect. (#6413, @sunjayBhatia)Deprecation and Removal Notices
Configuring Contour with a GatewayClass controller name is no longer supported
Contour can no longer be configured with a GatewayClass controller name (gateway.controllerName in the config file or ContourConfiguration CRD), as the config field has been removed. Instead, either use a specific Gateway reference (gateway.gatewayRef), or use the Gateway provisioner.
(#6145, @skriss)
Contour xDS server implementation is now deprecated
As of this release, the
contour
xDS server implementation is now deprecated. Once the go-control-plane basedenvoy
xDS server has had sufficient production bake time, thecontour
implementation will be removed from Contour. Notification of removal will occur at least one release in advance.(#6146, @skriss)
Use of Endpoints API is deprecated
Contour now uses the EndpointSlices API by default, and its usage of the Endpoints API is deprecated as of this release. Support for Endpoints, and the associated
useEndpointSlices
feature flag, will be removed in a future release.(#6149, @izturn)
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.29.0 is tested against Kubernetes 1.27 through 1.29.
Community Thanks!
We’re immensely grateful for all the community contributions that help make Contour even better! For this release, special thanks go out to the following contributors:
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.6
: Contour v1.28.6Compare Source
We are delighted to present version v1.28.6 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.6 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.5
: Contour v1.28.5Compare Source
We are delighted to present version v1.28.5 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.5 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.4
: Contour v1.28.4Compare Source
We are delighted to present version v1.28.4 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
0s
now disables the timeout (#6379).Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.4 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.3
: Contour v1.28.3Compare Source
We are delighted to present version v1.28.3 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Update Envoy to v1.29.3
See the release notes for v1.29.3 here.
Note that this Envoy version retains the hop-by-hop TE header when set to
trailers
, fixing a regression seen in v1.29.0-v1.29.2 for HTTP/2, particularly gRPC. However, this version of Contour continues to set theenvoy.reloadable_features.sanitize_te
Envoy runtime setting tofalse
to ensure seamless upgrades. This runtime setting will be removed in Contour v1.29.0.Update Go to v1.21.9
See the release notes for v1.21.9 here.
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.3 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.2
: Contour v1.28.2Compare Source
We are delighted to present version v1.28.2 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Update Envoy to v1.29.2
See the release notes here.
Note that this Envoy version reverts the HTTP/2 codec back to
nghttp2
fromoghttp2
.Disable Envoy removing TE header
As of version v1.29.0, Envoy removes the hop-by-hop TE header.
However, this causes issues with HTTP/2, particularly gRPC, with implementations expecting the header to be present (and set to
trailers
).Contour disables this via Envoy runtime setting and reverts to the v1.28.x and prior behavior of allowing the header to be proxied.
Once this Envoy PR that enables the TE header including
trailers
to be forwarded is backported to a release or a new minor is cut, Contour will no longer set the aforementioned runtime key.Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.2 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.1
: Contour v1.28.1Compare Source
We are delighted to present version v1.28.1 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.1 is tested against Kubernetes 1.27 through 1.29.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.28.0
: Contour v1.28.0Compare Source
We are delighted to present version v1.28.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
A big thank you to everyone who contributed to the release.
Major Changes
Upstream TLS now supports TLS 1.3 and TLS parameters can be configured
The default maximum TLS version for upstream connections is now 1.3, instead of the Envoy default of 1.2.
In a similar way to how Contour users can configure Min/Max TLS version and
Cipher Suites for Envoy's listeners, users can now specify the
same information for upstream connections. In the ContourConfiguration, this is
available under
spec.envoy.cluster.upstreamTLS
. The equivalent config fileparameter is
cluster.upstream-tls
.(#5828, @KauzClay)
Update to Gateway API 1.0
Contour now uses Gateway API 1.0, which graduates the core resources GatewayClass, Gateway and HTTPRoute to the
v1
API version.For backwards compatibility, this version of Contour continues to watch for
v1beta1
versions of these resources, to ease the migration process for users.However, future versions of Contour will move to watching for
v1
versions of these resources.Note that if you are using Gateway API 1.0 and the
v1
API group, the resources you create will also be available from the API server asv1beta1
resources so Contour will correctly reconcile them as well.(#5898, @skriss)
Support for Gateway API BackendTLSPolicy
The BackendTLSPolicy CRD can now be used with HTTPRoute to configure a Contour gateway to connect to a backend Service with TLS. This will give users the ability to use Gateway API to configure their routes to securely connect to backends that use TLS with Contour.
The BackendTLSPolicy spec requires you to specify a
targetRef
, which can currently only be a Kubernetes Service within the same namespace as the BackendTLSPolicy. The targetRef is what Service should be watched to apply the BackendTLSPolicy to. ASectionName
can also be configured to the port name of a Service to reference a specific section of the Service.The spec also requires you to specify
caCertRefs
, which can either be a ConfigMap or Secret with aca.crt
key in the data map containing a PEM-encoded TLS certificate. The CA certificates referenced will be configured to be used by the gateway to perform TLS to the backend Service. You will also need to specify aHostname
, which will be used to configure the SNI the gateway will use for the connection.See Gateway API's GEP-1897 for the proposal for BackendTLSPolicy.
(#6119, @flawedmatrix, @christianang)
Minor Changes
JWT Authentication happens before External Authorization
Fixes a bug where when the external authorization filter and JWT authentication filter were both configured, the external authorization filter was executed before the JWT authentication filter. Now, JWT authentication happens before external authorization when they are both configured.
(#5840, @izturn)
Allow Multiple SANs in Upstream Validation section of HTTPProxy
This change introduces a max length of 250 characters to the field
subjectName
in the UpstreamValidation block.Allow multiple SANs in Upstream Validation by adding a new field
subjectNames
to the UpstreamValidtion block. This will exist side by side with the previoussubjectName
field. Using CEL validation, we can enforce that when both are present, the first entry insubjectNames
must match the value ofsubjectName
.(#5849, @KauzClay)
Gateway API Backend Protocol Selection
For Gateway API, Contour now enables end-users to specify backend protocols by setting the backend Service's ServicePort.AppProtocol parameter. The accepted values are
kubernetes.io/h2c
andkubernetes.io/ws
. Note that websocket upgrades are already enabled by default for Gateway API. IfAppProtocol
is set, any other configurations, such as the annotation:projectcontour.io/upstream-protocol.{protocol}
will be disregarded.(#5934, @izturn)
Gateway API: support HTTPRoute request timeouts
Contour now enables end-users to specify request timeouts by setting the HTTPRouteRule.Timeouts.Request parameter. Note that
BackendRequest
is not yet implemented because without Gateway API support for retries, it's functionally equivalent toRequest
.(#5997, @izturn)
Support for Global Circuit Breaker Policy
The way circuit-breaker-annotations work currently is that when not present they are being defaulted to Envoy defaults. The Envoy defaults can be quite low for larger clusters with more traffic so if a user accidentally deletes them or unset them this cause an issue. With this change we are providing contour administrators the ability to provide global defaults that are good. In that case even if the user forgets to set them or deletes them they can have the safety net of good defaults. They can be configured via cluster.circuit-breakers or via `ContourConfiguration`` CRD in spec.envoy.cluster.circuitBreakers
(#6013, @davinci26)
Allow setting connection limit per listener
Adds a
listeners.max-connections-per-listener
config option to Contour config file andspec.envoy.listener.maxConnectionsPerListener
to the ContourConfiguration CRD.Setting the max connection limit per listener field limits the number of active connections to a listener. The default, if unset, is unlimited.
(#6058, @flawedmatrix, @christianang)
Upstream TLS validation and client certificate for TCPProxy
TCPProxy now supports validating server certificate and using client certificate for upstream TLS connections.
Set
httpproxy.spec.tcpproxy.services.validation.caSecret
andsubjectName
to enable optional validation andtls.envoy-client-certificate
configuration file field orContourConfiguration.spec.envoy.clientCertificate
to set the optional client certificate.(#6079, @tsaarni)
Remove Contour container readiness probe initial delay
The Contour Deployment Contour server container previously had its readiness probe
initialDelaySeconds
field set to 15.This has been removed from the example YAML manifests and Gateway Provisioner generated Contour Deployment since as of PR #5672 Contour's xDS server will not start or serve any configuration (and the readiness probe will not succeed) until the existing state of the cluster is synced.
In clusters with few resources this will improve the Contour Deployment's update/rollout time as initial startup time should be low.
(#6099, @sunjayBhatia)
Add anti-affinity rule for envoy deployed by provisioner
The envoy deployment created by the gateway provisioner now includes a default anti-affinity rule. The anti-affinity rule in the example envoy deployment manifest is also updated to
preferredDuringSchedulingIgnoredDuringExecution
to be consistent with the contour deployment and the gateway provisioner anti-affinity rule.(#6148, @lubronzhan)
Add DisabledFeatures to ContourDeployment for gateway provisioner
A new flag DisabledFeatures is added to ContourDeployment so that user can configure contour which is deployed by the provisioner to skip reconciling CRDs which are specified inside the flag.
Accepted values are
grpcroutes|tlsroutes|extensionservices|backendtlspolicies
.(#6152, @lubronzhan)
Other Changes
gateway.networking.k8s.io/gateway-name
label to generated resources. (#5969, @skriss)envoy
xDS server where at startup, xDS configuration would not be generated and served until a subsequent configuration change. (#5972, @skriss)projectcontour.io/per-host-max-connections
. (#6016, @relu)gateway.networking.k8s.io/bundle-version
annotation on Gateway CRDs and sets SupportedVersion status condition on GatewayClass if annotation value matches supported Gateway API version. Best-effort support is provided if version does not match. (#6147, @sunjayBhatia)Docs Changes
Deprecation and Removal Notices
Deprecate
subjectName
field on UpstreamValidationThe
subjectName
field is being deprecated in favor ofsubjectNames
, which isan list of subjectNames.
subjectName
will continue to behave as it has. Ifusing
subjectNames
, the first entry insubjectNames
must match the value ofsubjectName
. this will be enforced by CEL validation.(#5849, @KauzClay)
ContourDeployment.Spec.ResourceLabels is deprecated
The
ContourDeployment.Spec.ResourceLabels
field is now deprecated. You should useGateway.Spec.Infrastructure.Labels
instead. TheResourceLabels
field will be removed in a future release.(#5968, @skriss)
Configuring Contour with a GatewayClass controller name is deprecated
Contour should no longer be configured with a GatewayClass controller name (
gateway.controllerName
in the config file or ContourConfiguration CRD).Instead, either use a specific Gateway reference (
gateway.gatewayRef
), or use the Gateway provisioner.gateway.controllerName
will be removed in a future release.(#6144, @skriss)
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.28.0 is tested against Kubernetes 1.27 through 1.29.
Community Thanks!
We’re immensely grateful for all the community contributions that help make Contour even better! For this release, special thanks go out to the following contributors:
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.27.4
: Contour v1.27.4Compare Source
We are delighted to present version v1.27.4 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.27.4 is tested against Kubernetes 1.26 through 1.28.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.27.3
: Contour v1.27.3Compare Source
We are delighted to present version v1.27.3 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.27.3 is tested against Kubernetes 1.26 through 1.28.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.27.2
: Contour v1.27.2Compare Source
We are delighted to present version v1.27.2 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.27.2 is tested against Kubernetes 1.26 through 1.28.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.27.1
: Contour v1.27.1Compare Source
We are delighted to present version v1.27.1 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
All Changes
Installing and Upgrading
For a fresh install of Contour, consult the getting started documentation.
To upgrade an existing Contour installation, please consult the upgrade documentation.
Compatible Kubernetes Versions
Contour v1.27.1 is tested against Kubernetes 1.26 through 1.28.
Are you a Contour user? We would love to know!
If you're using Contour and want to add your organization to our adopters list, please visit this page. If you prefer to keep your organization name anonymous but still give us feedback into your usage and scenarios for Contour, please post on this GitHub thread.
v1.27.0
: Contour v1.27.0Compare Source
We are delighted to present version v1.27.0 of Contour, our layer 7 HTTP reverse proxy for Kubernetes clusters.
A big thank you to everyone who contributed to the release.
Major Changes
Fix bug with algorithm used to sort Envoy regex/prefix path rules
Envoy greedy matches routes and as a result the order route matches are presented to Envoy is important. Contour attempts to produce consistent routing tables so that the most specific route matches are given preference. This is done to facilitate consistency when using HTTPProxy inclusion and provide a uniform user experience for route matching to be inline with Ingress and Gateway API Conformance.
This changes fixes the sorting algorithm used for
Prefix
andRegex
based path matching. Previously the algorithm lexicographically sorted based on the path match string instead of sorting them based on the length of thePrefix
|Regex
. i.e. Longer prefix/regexes will be sorted first in order to give preference to more specific routes, then lexicographic sorting for things of the same length.Note that for prefix matching, this change is not expected to change the relative ordering of more specific prefixes vs. less specific ones when the more specific prefix match string has the less specific one as a prefix, e.g.
/foo/bar
will continue to sort before/foo
. However, relative ordering of other combinations of prefix matches may change per the above description.How to update safely
Caution is advised if you update Contour and you are operating large routing tables. We advise you to:
http://127.0.0.1:9001/config_dump
and compare the configuration of Envoy. In particular the routes and their order. The prefix routes might be changing in order, so if they are you need to verify that the route matches as expected.(#5752, @davinci26)
Minor Changes
Specific routes can now opt out of the virtual host's global rate limit policy
Setting
rateLimitPolicy.global.disabled
flag to true on a specific route now disables the global rate limit policy inherited from the virtual host for that route.Sample Configurations
In the example below,
/foo
route is opted out from the global rate limit policy defined by the virtualhost.httpproxy.yaml
(#5657, @shadialtarsha)
Contour now waits for the cache sync before starting the DAG rebuild and XDS server
Before this, we only waited for informer caches to sync but didn't wait for delivering the events to subscribed handlers.
Now contour waits for the initial list of Kubernetes objects to be cached and processed by handlers (using the returned
HasSynced
methods)and then starts building its DAG and serving XDS.
(#5672, @therealak12)
HTTPProxy: Allow Host header rewrite with dynamic headers.
This Change allows the host header to be rewritten on requests using dynamic headers on the only route level.
Example
(#5678, @clayton-gonsalves)
Add Kubernetes Endpoint Slice support
This change optionally enables Contour to consume the kubernetes endpointslice API to determine the endpoints to configure Envoy with.
Note: This change is off by
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.