From f43ff2cea32ef9c99580040a84022e46f95d262a Mon Sep 17 00:00:00 2001 From: Dave Cheney Date: Thu, 15 Mar 2018 19:14:38 +1100 Subject: [PATCH] remove release notes and update deployment files for v0.4.0 Signed-off-by: Dave Cheney --- deployment/deployment-grpc-v2/02-contour.yaml | 4 +- deployment/ds-grpc-v2/02-contour.yaml | 4 +- deployment/ds-hostnet/02-contour.yaml | 4 +- deployment/render/daemonset-norbac.yaml | 4 +- deployment/render/daemonset-rbac.yaml | 4 +- deployment/render/deployment-norbac.yaml | 4 +- deployment/render/deployment-rbac.yaml | 4 +- release-0.4.md | 95 ------------------- 8 files changed, 14 insertions(+), 109 deletions(-) delete mode 100644 release-0.4.md diff --git a/deployment/deployment-grpc-v2/02-contour.yaml b/deployment/deployment-grpc-v2/02-contour.yaml index 54109ba8d83..2971ad2b3da 100644 --- a/deployment/deployment-grpc-v2/02-contour.yaml +++ b/deployment/deployment-grpc-v2/02-contour.yaml @@ -33,13 +33,13 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: contour command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/deployment/ds-grpc-v2/02-contour.yaml b/deployment/ds-grpc-v2/02-contour.yaml index afafc9001a7..2079207d46b 100644 --- a/deployment/ds-grpc-v2/02-contour.yaml +++ b/deployment/ds-grpc-v2/02-contour.yaml @@ -34,13 +34,13 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: contour command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/deployment/ds-hostnet/02-contour.yaml b/deployment/ds-hostnet/02-contour.yaml index 990813246d0..f6cfa354686 100644 --- a/deployment/ds-hostnet/02-contour.yaml +++ b/deployment/ds-hostnet/02-contour.yaml @@ -33,7 +33,7 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always ports: - containerPort: 8000 @@ -42,7 +42,7 @@ spec: command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/deployment/render/daemonset-norbac.yaml b/deployment/render/daemonset-norbac.yaml index 1d7e544c278..5479fd75344 100644 --- a/deployment/render/daemonset-norbac.yaml +++ b/deployment/render/daemonset-norbac.yaml @@ -48,13 +48,13 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: contour command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/deployment/render/daemonset-rbac.yaml b/deployment/render/daemonset-rbac.yaml index 2f19dcede34..b4bd97611cc 100644 --- a/deployment/render/daemonset-rbac.yaml +++ b/deployment/render/daemonset-rbac.yaml @@ -48,13 +48,13 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: contour command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/deployment/render/deployment-norbac.yaml b/deployment/render/deployment-norbac.yaml index cca59535fff..bc3f4dd400d 100644 --- a/deployment/render/deployment-norbac.yaml +++ b/deployment/render/deployment-norbac.yaml @@ -47,13 +47,13 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: contour command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/deployment/render/deployment-rbac.yaml b/deployment/render/deployment-rbac.yaml index b704b980b61..65d529928c7 100644 --- a/deployment/render/deployment-rbac.yaml +++ b/deployment/render/deployment-rbac.yaml @@ -47,13 +47,13 @@ spec: volumeMounts: - name: contour-config mountPath: /config - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: contour command: ["contour"] args: ["serve", "--incluster"] initContainers: - - image: gcr.io/heptio-images/contour:master + - image: gcr.io/heptio-images/contour:v0.4.0 imagePullPolicy: Always name: envoy-initconfig command: ["contour"] diff --git a/release-0.4.md b/release-0.4.md deleted file mode 100644 index 4157bb3801e..00000000000 --- a/release-0.4.md +++ /dev/null @@ -1,95 +0,0 @@ -# Contour 0.4 - -Heptio is pleased to announce the release of Contour 0.4. - -I'd like to extend a warm thanks to [all of the contributors][6], you're awesome. - -## New and improved - -In Contour 0.4 the JSON v1 bootstrap configuration option is removed. -The corresponding v1 JSON API is also removed from the Contour codebase. -Consult the [upgrade notes][0] for how to update your Deployment or Daemonset manifests to the YAML bootstrap configuration format. - -### Many general improvements made to the Contour -> Envoy transmission path - -Much effort has been expended on the Contour to Envoy gRPC API, including a set of end to end tests to improve the robustness of configurations that are transfered to Envoy. - -### Additional annotations - -Contour now supports the following annotations to control Envoy's retry behaviour: -- `contour.heptio.com/request-timeout` to control the amount of time Envoy will wait for a backend to respond. -- `contour.heptio.com/retry-on` to control under which conditions Envoy should retry a request. -- `contour.heptio.com/num-retries` to control the number of retries Envoy will perform. -- `contour.heptio.com/per-try-timeout` to control the request timeout per attempt. -For more information please consult the [annotation documentation][4]. -Thanks @cmaloney. -Fixes #164 and #221. - -### Ingress class now configurable - -By default Contour responds to the ingress class annotation `kubernetes.io/ingress.class: contour` where present. -However, if required while migrating from another ingress controller, you can pass the flag `--ingress-class-name` to adjust the `ingress.class` name that Contour will respond to. -Thanks @Nikkau. -Fixes #255 - -### TLS 1.1 is now mandatory - -Following the [advice of the PCI Security Standards Council][5] Contour 0.4 will configure Envoy to require TLS 1.1 or later. -Thanks @sevein -Fixes #185 - -### Certificate information is now sent in-line in the gRPC message - -Due to a limitation in Envoy Contour 0.3 exchanged certificate data with Envoy via a shared file system. -This limitation has been addressed and Contour 0.4 transmits certificate data directly to Envoy in gRPC API response messages. -Thanks @sevein -Fixes #158 - -### Contour and Envoy can now live in separate pods - -Although not currently utilised, Contour and Envoy can now exist in separate pods. -This is acomplished by the `--xds-address` and `--xds-port` flags passed to both `contour bootstrap` and `contour serve` which can be used to deploy Contour as a ReplicaSet which Envoy is a Daemonset. Thanks to @sevein. Fixes #165 - -### `ingress.kubernetes.io/force-ssl-redirect: "true"` annotation now applies on a per Ingress basis - -In Contour version 0.3 and earlier, if any Ingress for a virtual host specified the `ingress.kubernetes.io/force-ssl-redirect: "true"` annotation, then all routes for the virtual host were redirected with a 301. - -In Contour 0.4 this behaviour is applied per Ingress, that is, to all routes in an Ingress object. -This allows a split Ingress setup in which some routes on a virtual host are redirected with a 301, and others are not. -Fixes #250. - -### Tutorial for Prometheus metrics - -A [tutorial for configuring Prometheus to scrape Envoy metrics][8] was added. Envoy provides very rich metrics, for -example you can get requests grouped by service and status code or the amount of retries and timeout for a given -service. - -### Other bug fixes and improvements in this release - -- The Contour Docker image no longer bundles the `ocid` and `gcp` authentication plugins, because they are not required for `-incluster` deployments. -- Daemonset or Deployment examples now specify the `--v2-config-only` flag to instruct Envoy to not fall back to parsing an invalid configuration file as the deprecated v1 JSON format. This should aid debugging `contour bootstrap` issues. Thanks @cmaloney -- Updated to the latest `envoyproxy/go-control-plane` library. Thanks @vaamarnath. Fixes #225 -- Contour has switched to sirupsen/logrus as its logging library. Fixes #162. -- Our [troubleshooting][3] documentation now includes a simple way to access Envoy's Admin interface which is useful for examining the state of its route and cluster tables. -- Issues related to updating Service and Ingress objects in place with `kubectl edit` are fixed with a new caching layer in the translator package. - -## Upgrading - -Until Envoy 1.6 is released it is recommended to pin the version of Envoy used in your deployments to a known hash. -The recommended hash is -``` -spec: - containers: - - image: docker.io/envoyproxy/envoy-alpine:e6ff690611b8a3373f6d66066b52d613873e446e -``` -Consult the [upgrade notes][0] for how to update your Deployment or Daemonset manifests to the YAML bootstrap configuration format. - -[0]: docs/upgrade.md -[1]: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls -[2]: docs/tls.md -[3]: docs/troubleshooting.md -[4]: annotations.md -[5]: https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls -[6]: https://github.com/heptio/contour/graphs/contributors -[7]: https://www.ephemera-inc.com/You-re-Awesome-p/6401.htm -[8]: docs/prometheus.md