Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm)!: Update chart traefik to 28.3.0 #1755

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

rmcd-bot[bot]
Copy link
Contributor

@rmcd-bot rmcd-bot bot commented Apr 30, 2024

This PR contains the following updates:

Package Update Change
traefik (source) major 26.0.0 -> 28.3.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

traefik/traefik-helm-chart (traefik)

v28.3.0

Compare Source

Features
  • allow setting permanent on redirectTo (1b454e9)
Bug Fixes
New Contributors

Full Changelog: traefik/traefik-helm-chart@v28.2.0...v28.3.0

v28.2.0

Compare Source

⚠️ This release align to Kubernetes default (Always) for podSecurityContext.fsGroupChangePolicy. It was OnRootMismatch in previous release of this chart. It can easily be set (back) to OnRootMismatch if needed, see EXAMPLES.

Features
Bug Fixes
  • IngressClass: provides annotation on IngressRoutes when it's enabled (f5de0c3)
New Contributors

Full Changelog: traefik/traefik-helm-chart@v28.1.0...v28.2.0

v28.1.0

Compare Source

Features
  • Traefik Hub: add initial support for API Gateway (dc5c68d)
  • Traefik Hub: use Traefik Proxy otlp config (a910db4)
Bug Fixes
  • Traefik Hub: refine support (60d210d)
  • Traefik Hub: do not deploy mutating webhook when enabling only API Gateway (cb2a98d)
Documentation
  • example: Update Digital Ocean PROXY Protocol (9850319)
  • 📚️ improve UPGRADING section (54ec665)

v28.0.0

Compare Source

⚠ BREAKING CHANGES
Features
  • podtemplate: set GOMEMLIMIT, GOMAXPROCS when limits are defined (e4f2aa8)
  • 💥 initial support of Traefik Proxy v3 (536059d)
  • ✨ add support of experimental-v3.0 unstable version (579984c)
  • ✨ fail gracefully when required port number is not set (f8be5e1)
  • ports: add transport options (47e0f28)
  • ability to override liveness and readiness probe paths (ea95df0)
Bug Fixes
  • 🐛 logs filters on status codes (c204014)
  • 🐛 only expose http3 port on service when TCP variant is exposed (2d6243d)
Styles
  • 🎨 consistent capitalization on --entryPoints CLI flag (b1f6f96)
Documentation
  • 📚️ improve EXAMPLES on acme resolver (2252aba)
New Contributors

v27.0.2

Compare Source

27.0.2 (2024-04-12)
Upgrade Notes

This release comes with an important fix for https://github.com/traefik/traefik/issues/10598 introduced in v2.11.1, see upstream release notes.

Features
  • feat: ✨ update Traefik Proxy to v2.11.2 (#​1034)

v27.0.1

Compare Source

27.0.1 (2024-04-11)
Upgrade notes

🚨 Traefik Proxy v2.11.1 introduces lingeringTimeout, see https://github.com/traefik/traefik/pull/10569, that can be breaking for server-first protocols. This new setting can be set with additionalArguments.

Features
  • release v27.0.1 with Traefik Proxy to v2.11.1 (4dadd66)

v27.0.0

Compare Source

⚠ BREAKING CHANGES
  • 💥 refactor custom services and port exposure (7e349d4)

Upgrade notes

Custom services and port exposure have been redesigned, requiring the following changes:

  • if you were overriding port exposure behavior using the expose or exposeInternal flags, you should replace them with a service name to boolean mapping, i.e. replace this:
ports:
   web:
      port: 80
      expose: false
      exposeInternal: true

with this:

ports:
   web:
      port: 80
      expose:
         default: false
         internal: true
  • if you were previously using the service.internal value, you should migrate the values to the service.additionalServices.internal value instead; this should yield the same results, but make sure to carefully check for any changes!
Features
  • restrict access to secrets (8fbae97)
Bug Fixes
  • rbac: do not create clusterrole for namespace deployment on Traefik v3 (d0f3442)
  • remove null annotations on dashboard IngressRoute (606ab52)
  • use hostIP also on entrypoint and healthChecks when set (82a3cab)

New Contributors

Full Changelog: traefik/traefik-helm-chart@v26.1.0...v27.0.0

v26.1.0

Compare Source

Important notice

ℹ️ CRDs has been updated in this release. On Traefik v2, there is no new or removed field, just description format update by upstream library.

⚠️ This Chart does not support Traefik v3 beta and rc versions.

Features
  • update traefik docker tag to v2.11.0 (843d1d7)
  • allow exposure of ports on internal service only (d9f4731)
  • create v1 Gateway and GatewayClass Version for Traefik v3 (85697f0)
  • set runtimeClassName on pod spec (c07d55c)
Bug Fixes
  • 🐛 missing quote on experimental plugin args (e7ce1b4)
  • 🐛 set runtimeClassName at pod level (3d76d3e)
  • update traefik v3 serverstransporttcps CRD (e404db9)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@rmcd-bot rmcd-bot bot requested a review from ryan-mcd as a code owner April 30, 2024 08:20
@rmcd-bot rmcd-bot bot changed the title feat(helm)!: Update chart traefik to 28.0.0 feat(helm)!: Update chart traefik to 28.1.0 May 22, 2024
@rmcd-bot rmcd-bot bot changed the title feat(helm)!: Update chart traefik to 28.1.0 feat(helm)!: Update chart traefik to 28.2.0 May 31, 2024
@rmcd-bot rmcd-bot bot changed the title feat(helm)!: Update chart traefik to 28.2.0 feat(helm)!: Update chart traefik to 28.3.0 Jun 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

0 participants