From a465fe7654223d27175e188a13e0f35b5973bb22 Mon Sep 17 00:00:00 2001 From: Nitya Dhanushkodi Date: Thu, 27 May 2021 15:29:42 -0700 Subject: [PATCH] Release Consul 1.10.0 beta3 (#976) Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com> --- CHANGELOG.md | 7 ++++++- Chart.yaml | 18 ++++++++++-------- test/terraform/gke/main.tf | 2 +- test/unit/ingress-gateways-deployment.bats | 2 +- test/unit/mesh-gateway-deployment.bats | 2 +- test/unit/terminating-gateways-deployment.bats | 2 +- values.yaml | 4 ++-- 7 files changed, 22 insertions(+), 15 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 9ec2158035..fc4cbcad10 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,9 +1,14 @@ -## Unreleased +## 0.32.0-beta3 (May 27, 2021) +KNOWN ISSUES: +* This beta release does not work when Pod Security Policies are enabled. This will be fixed in the upcoming release. + IMPROVEMENTS: * Connect: Allow overwriting Kubernetes HTTP probes when running with transparent proxy enabled. [[GH-953](https://github.com/hashicorp/consul-helm/pull/953)] * Connect: Enable OpenShift for the connect-injector so that we can support running with transparent proxy enabled. [[GH-972](https://github.com/hashicorp/consul-helm/pull/972)] +* Updated the default envoy image to `envoyproxy/envoy-alpine:v1.18.3`. + FEATURES: * License Autoloading [Enterprise]: Consul Enterprise 1.10+ now requires the enterprise license for Consul to be provided as a Kubernetes secret. Once created, the secret can be diff --git a/Chart.yaml b/Chart.yaml index e7e1eadcdc..2950a21780 100644 --- a/Chart.yaml +++ b/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 name: consul -version: 0.32.0-beta2 -appVersion: 1.10.0-beta2 +version: 0.32.0-beta3 +appVersion: 1.10.0-beta3 kubeVersion: ">=1.16.0-0" description: Official HashiCorp Consul Chart home: https://www.consul.io @@ -14,16 +14,18 @@ annotations: artifacthub.io/prerelease: true artifacthub.io/images: | - name: consul - image: hashicorp/consul:1.10.0-beta2 + image: hashicorp/consul:1.10.0-beta3 - name: consul-k8s - image: hashicorp/consul-k8s:0.26.0-beta2 + image: hashicorp/consul-k8s:0.26.0-beta3 - name: envoy - image: envoyproxy/envoy-alpine:v1.16.0 + image: envoyproxy/envoy-alpine:v1.18.3 artifacthub.io/license: MPL-2.0 artifacthub.io/links: | - - name: Consul Homepage - url: https://www.consul.io - name: Documentation url: https://www.consul.io/docs/k8s - - name: Chart GitHub Repository + - name: hashicorp/consul-helm url: https://github.com/hashicorp/consul-helm + - name: hashicorp/consul + url: https://github.com/hashicorp/consul + - name: hashicorp/consul-k8s + url: https://github.com/hashicorp/consul-k8s diff --git a/test/terraform/gke/main.tf b/test/terraform/gke/main.tf index a6c294e2e6..5dccf255be 100644 --- a/test/terraform/gke/main.tf +++ b/test/terraform/gke/main.tf @@ -26,7 +26,7 @@ resource "google_container_cluster" "cluster" { node_version = data.google_container_engine_versions.main.latest_master_version pod_security_policy_config { - enabled = true + enabled = false # Helm does not currently work with pod security policies enabled, the acceptance tests fail with this enabled. Re-enable after fixing. } resource_labels = var.labels diff --git a/test/unit/ingress-gateways-deployment.bats b/test/unit/ingress-gateways-deployment.bats index a90938be1b..eb2c123b06 100644 --- a/test/unit/ingress-gateways-deployment.bats +++ b/test/unit/ingress-gateways-deployment.bats @@ -83,7 +83,7 @@ load _helpers --set 'connectInject.enabled=true' \ . | tee /dev/stderr | yq -s -r '.[0].spec.template.spec.containers[0].image' | tee /dev/stderr) - [ "${actual}" = "envoyproxy/envoy-alpine:v1.16.0" ] + [ "${actual}" = "envoyproxy/envoy-alpine:v1.18.3" ] } @test "ingressGateways/Deployment: envoy image can be set using the global value" { diff --git a/test/unit/mesh-gateway-deployment.bats b/test/unit/mesh-gateway-deployment.bats index 3feb8f863c..70001f02ec 100755 --- a/test/unit/mesh-gateway-deployment.bats +++ b/test/unit/mesh-gateway-deployment.bats @@ -335,7 +335,7 @@ key2: value2' \ --set 'connectInject.enabled=true' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].image' | tee /dev/stderr) - [ "${actual}" = "envoyproxy/envoy-alpine:v1.16.0" ] + [ "${actual}" = "envoyproxy/envoy-alpine:v1.18.3" ] } @test "meshGateway/Deployment: setting meshGateway.imageEnvoy fails" { diff --git a/test/unit/terminating-gateways-deployment.bats b/test/unit/terminating-gateways-deployment.bats index 4ba18677df..54541adfc1 100644 --- a/test/unit/terminating-gateways-deployment.bats +++ b/test/unit/terminating-gateways-deployment.bats @@ -83,7 +83,7 @@ load _helpers --set 'connectInject.enabled=true' \ . | tee /dev/stderr | yq -s -r '.[0].spec.template.spec.containers[0].image' | tee /dev/stderr) - [ "${actual}" = "envoyproxy/envoy-alpine:v1.16.0" ] + [ "${actual}" = "envoyproxy/envoy-alpine:v1.18.3" ] } @test "terminatingGateways/Deployment: envoy image can be set using the global value" { diff --git a/values.yaml b/values.yaml index 24d018c821..92c00b5a6e 100644 --- a/values.yaml +++ b/values.yaml @@ -52,7 +52,7 @@ global: # Docker image that is used for functionality such the catalog sync. # This can be overridden per component. # @default: hashicorp/consul-k8s: - imageK8S: "hashicorp/consul-k8s:0.26.0-beta2" + imageK8S: "hashicorp/consul-k8s:0.26.0-beta3" # The name of the datacenter that the agents should # register as. This can't be changed once the Consul cluster is up and running @@ -272,7 +272,7 @@ global: # connect-injected sidecar proxies and mesh, terminating, and ingress gateways. # See https://www.consul.io/docs/connect/proxies/envoy for full compatibility matrix between Consul and Envoy. # @default: envoyproxy/envoy-alpine: - imageEnvoy: "envoyproxy/envoy-alpine:v1.16.0" + imageEnvoy: "envoyproxy/envoy-alpine:v1.18.3" # Configuration for running this Helm chart on the Red Hat OpenShift platform. # This Helm chart currently supports OpenShift v4.x+.