Skip to content

Commit

Permalink
chore(release): 🚀 publish v28.1.0
Browse files Browse the repository at this point in the history
  • Loading branch information
darkweaver87 committed May 22, 2024
1 parent f285601 commit 1435fdd
Show file tree
Hide file tree
Showing 3 changed files with 71 additions and 17 deletions.
65 changes: 65 additions & 0 deletions traefik/Changelog.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,70 @@
# Change Log

## 28.1.0 ![AppVersion: v3.0.0](https://img.shields.io/static/v1?label=AppVersion&message=v3.0.0&color=success&logo=) ![Kubernetes: >=1.22.0-0](https://img.shields.io/static/v1?label=Kubernetes&message=%3E%3D1.22.0-0&color=informational&logo=kubernetes) ![Helm: v3](https://img.shields.io/static/v1?label=Helm&message=v3&color=informational&logo=helm)

* fix(Traefik Hub): do not deploy mutating webhook when enabling only API Gateway
* feat(Traefik Hub): use Traefik Proxy otlp config
* chore: 🔧 update Traefik Hub CRD to v1.3.3

### Default value changes

```diff
diff --git a/traefik/values.yaml b/traefik/values.yaml
index 70297f6..2fd9282 100644
--- a/traefik/values.yaml
+++ b/traefik/values.yaml
@@ -1010,3 +1010,49 @@
## -- This will override the default app.kubernetes.io/instance label for all Objects.
# instanceLabelOverride: traefik

+# -- Traefik Hub configuration. See https://doc.traefik.io/traefik-hub/
+hub:
+ # Name of Secret with key 'token' set to a valid license token.
+ # It enables API Gateway.
+ token:
+ apimanagement:
+ # -- Set to true in order to enable API Management. Requires a valid license token.
+ enabled:
+ admission:
+ # -- WebHook admission server listen address. Default: "0.0.0.0:9943".
+ listenAddr:
+ # -- Certificate of the WebHook admission server. Default: "hub-agent-cert".
+ secretName:
+
+ ratelimit:
+ redis:
+ # -- Enable Redis Cluster. Default: true.
+ cluster:
+ # -- Database used to store information. Default: "0".
+ database:
+ # -- Endpoints of the Redis instances to connect to. Default: "".
+ endpoints:
+ # -- The username to use when connecting to Redis endpoints. Default: "".
+ username:
+ # -- The password to use when connecting to Redis endpoints. Default: "".
+ password:
+ sentinel:
+ # -- Name of the set of main nodes to use for main selection. Required when using Sentinel. Default: "".
+ masterset:
+ # -- Username to use for sentinel authentication (can be different from endpoint username). Default: "".
+ username:
+ # -- Password to use for sentinel authentication (can be different from endpoint password). Default: "".
+ password:
+ # -- Timeout applied on connection with redis. Default: "0s".
+ timeout:
+ tls:
+ # -- Path to the certificate authority used for the secured connection.
+ ca:
+ # -- Path to the public certificate used for the secure connection.
+ cert:
+ # -- Path to the private key used for the secure connection.
+ key:
+ # -- When insecureSkipVerify is set to true, the TLS connection accepts any certificate presented by the server. Default: false.
+ insecureSkipVerify:
+ # Enable export of errors logs to the platform. Default: true.
+ sendlogs:
```

## 28.1.0-beta.3 ![AppVersion: v3.0.0](https://img.shields.io/static/v1?label=AppVersion&message=v3.0.0&color=success&logo=) ![Kubernetes: >=1.22.0-0](https://img.shields.io/static/v1?label=Kubernetes&message=%3E%3D1.22.0-0&color=informational&logo=kubernetes) ![Helm: v3](https://img.shields.io/static/v1?label=Helm&message=v3&color=informational&logo=helm)

**Release date:** 2024-05-03
Expand Down
7 changes: 4 additions & 3 deletions traefik/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: v2
name: traefik
description: A Traefik based Kubernetes ingress controller
type: application
version: 28.1.0-beta.3
version: 28.1.0
# renovate: image=traefik
appVersion: v3.0.0
kubeVersion: ">=1.22.0-0"
Expand All @@ -25,5 +25,6 @@ maintainers:
icon: https://raw.githubusercontent.com/traefik/traefik/v2.3/docs/content/assets/img/traefik.logo.png
annotations:
artifacthub.io/changes: |
- "chore: 🔧 update Traefik Hub CRD to v1.3.2"
- "chore(release): 🚀 publish v28.1.0-beta.3"
- "fix(Traefik Hub): do not deploy mutating webhook when enabling only API Gateway"
- "feat(Traefik Hub): use Traefik Proxy otlp config"
- "chore: 🔧 update Traefik Hub CRD to v1.3.3"
16 changes: 2 additions & 14 deletions traefik/VALUES.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# traefik

![Version: 28.1.0-beta.3](https://img.shields.io/badge/Version-28.1.0--beta.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v3.0.0](https://img.shields.io/badge/AppVersion-v3.0.0-informational?style=flat-square)
![Version: 28.1.0](https://img.shields.io/badge/Version-28.1.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v3.0.0](https://img.shields.io/badge/AppVersion-v3.0.0-informational?style=flat-square)

A Traefik based Kubernetes ingress controller

Expand Down Expand Up @@ -59,22 +59,10 @@ Kubernetes: `>=1.22.0-0`
| extraObjects | list | `[]` | Extra objects to deploy (value evaluated as a template) In some cases, it can avoid the need for additional, extended or adhoc deployments. See #595 for more details and traefik/tests/values/extra.yaml for example. |
| globalArguments | list | `["--global.checknewversion","--global.sendanonymoususage"]` | Global command arguments to be passed to all traefik's pods |
| hostNetwork | bool | `false` | If hostNetwork is true, runs traefik in the host network namespace To prevent unschedulabel pods due to port collisions, if hostNetwork=true and replicas>1, a pod anti-affinity is recommended and will be set if the affinity is left as default. |
| hub | object | `{"apimanagement":{"admission":{"listenAddr":null,"secretName":null},"enabled":null},"metrics":{"opentelemetry":{"address":null,"enabled":null,"explicitBoundaries":null,"grpc":null,"headers":null,"insecure":null,"path":null,"pushInterval":null,"tls":{"ca":null,"cert":null,"insecureSkipVerify":null,"key":null}}},"ratelimit":{"redis":{"cluster":null,"database":null,"endpoints":null,"password":null,"sentinel":{"masterset":null,"password":null,"username":null},"timeout":null,"tls":{"ca":null,"cert":null,"insecureSkipVerify":null,"key":null},"username":null}},"sendlogs":null,"token":null}` | Traefik Hub configuration. See https://doc.traefik.io/traefik-hub/ |
| hub | object | `{"apimanagement":{"admission":{"listenAddr":null,"secretName":null},"enabled":null},"ratelimit":{"redis":{"cluster":null,"database":null,"endpoints":null,"password":null,"sentinel":{"masterset":null,"password":null,"username":null},"timeout":null,"tls":{"ca":null,"cert":null,"insecureSkipVerify":null,"key":null},"username":null}},"sendlogs":null,"token":null}` | Traefik Hub configuration. See https://doc.traefik.io/traefik-hub/ |
| hub.apimanagement.admission.listenAddr | string | `nil` | WebHook admission server listen address. Default: "0.0.0.0:9943". |
| hub.apimanagement.admission.secretName | string | `nil` | Certificate of the WebHook admission server. Default: "hub-agent-cert". |
| hub.apimanagement.enabled | string | `nil` | Set to true in order to enable API Management. Requires a valid license token. |
| hub.metrics.opentelemetry.address | string | `nil` | Address (host:port) of the collector endpoint. Default: "localhost:4318". |
| hub.metrics.opentelemetry.enabled | string | `nil` | Set to true to enable OpenTelemetry metrics exporter of Traefik Hub. |
| hub.metrics.opentelemetry.explicitBoundaries | string | `nil` | Boundaries of latency metrics. Default: " 0.005000, 0.010000, 0.025000, 0.050000, 0.100000, 0.250000, 0.500000, 1.000000, 2.500000, 5.000000, 10.000000 " |
| hub.metrics.opentelemetry.grpc | string | `nil` | Enables gRPC for the OpenTelemetry collector. Default: false. |
| hub.metrics.opentelemetry.headers | string | `nil` | Additional headers to send to the collector. Default: {}. |
| hub.metrics.opentelemetry.insecure | string | `nil` | Enable insecure schemes on metric endpoints. Default: false. |
| hub.metrics.opentelemetry.path | string | `nil` | Collector endpoint path. Default: "". |
| hub.metrics.opentelemetry.pushInterval | string | `nil` | Interval between metric exports. Default: "10s". |
| hub.metrics.opentelemetry.tls.ca | string | `nil` | Path to the certificate authority used for the secured connection. |
| hub.metrics.opentelemetry.tls.cert | string | `nil` | Path to the public certificate used for the secure connection. |
| hub.metrics.opentelemetry.tls.insecureSkipVerify | string | `nil` | When insecureSkipVerify is set to true, the TLS connection accepts any certificate presented by the server. Default: false. |
| hub.metrics.opentelemetry.tls.key | string | `nil` | Path to the private key used for the secure connection. |
| hub.ratelimit.redis.cluster | string | `nil` | Enable Redis Cluster. Default: true. |
| hub.ratelimit.redis.database | string | `nil` | Database used to store information. Default: "0". |
| hub.ratelimit.redis.endpoints | string | `nil` | Endpoints of the Redis instances to connect to. Default: "". |
Expand Down

0 comments on commit 1435fdd

Please sign in to comment.