Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency gateway-api to v1.1.0 #248

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 19, 2024

Mend Renovate

This PR contains the following updates:

Package Update Change
gateway-api minor v1.0.0 -> v1.1.0

Release Notes

kubernetes-sigs/gateway-api (gateway-api)

v1.1.0

Compare Source

v1.1.0

On behalf of Kubernetes SIG Network, we are pleased to announce the v1.1 release!
This release includes the graduation of several features to GA, including both
GRPCRoute and Service Mesh. We are also introducing several new experimental
features, including Session Persistence and Gateway Client Cert Verification.

The following represents the changes since v1.0.0:

Standard Channel

GRPCRoute has Graduated to GA 🎉

GRPCRoute has graduated to GA (v1) and is now part of the Standard Channel. If
you are already using the experimental version GRPCRoute, we recommend holding
off on upgrading to the standard channel version of GRPCRoute until the
controllers you're using have been updated to support GRPCRoute v1. Until then,
it is safe to upgrade to the experimental channel version of GRPCRoute in v1.1
that includes both v1alpha2 and v1 API versions.

Leading Contributor: @​gnossen

Service Mesh Support has Graduated to GA 🎉

The standard for using Gateway API for Mesh has formally graduated to GA (v1)
and is now part of the Standard Channel.

Service mesh support in Gateway API allows service mesh users to use the same
API to manage ingress traffic and mesh traffic, reusing the same policy and
routing interfaces. In Gateway API v1.1, routes (such as HTTPRoute) can now have
a Service as a parentRef, to control how traffic to specific services
behave. For more information, read the service
mesh
documentation or see the list of
implementations.

Leading Contributors: @​howardjohn, @​keithmattix, @​kflynn, @​mikemorris

Conformance Profiles and Reports

The Conformance Reports API and the corresponding test suite have been graduated
to GA. The Conformance report API has been expanded with the mode field
(intended to specify the working mode of the implementation), and the
gatewayAPIChannel (standard or experimental). The gatewayAPIVersion and
gatewayAPIChannel are now filled in automatically by the suite machinery,
along with a brief description of the testing outcome. The Reports have been
reorganized in a more structured way, and the implementations can now add
information on how the tests have been run and provide reproduction steps.

Leading Contributors: @​mlavacca, @​shaneutt

ParentRef Port field Graduated to GA

The port field in ParentRefs has graduated to GA (v1) and is now part of the
Standard Channel. You can use the port field to attach resources to Gateways,
Services, or other parent resources. For example, you can attach an HTTPRoute to
one or more specific Listeners of a Gateway based on the Listener port,
instead of name field.

Leading Contributor: @​frankbu

Experimental Channel

Session Persistence + BackendLBPolicy

Session Persistence is being introduced to Gateway API via a new policy
(BackendLBPolicy) for Service-level configuration and as fields within HTTPRoute
and GRPCRoute for Route-level configuration. The BackendLBPolicy and Route-level
APIs provide the same session persistence configuration, including session
timeouts, session name, session type, and cookie lifetime type.

Leading Contributors: @​gcs278, @​ginayeh

Gateway Client Cert Verification

Gateways can now configure client cert verification for each Gateway Listener by
introducing a new field frontendValidation field within tls. This field
supports configuring a list of CA Certificates that can be used as a trust
anchor to validate the certificates presented by the client.

Leading Contributors: @​arkodg

BackendTLSPolicy

As part of a broader goal of making our TLS terminology more consistent
throughout the API, we've introduced some breaking changes to BackendTLSPolicy.
This has resulted in a new API version (v1alpha3) and will require any existing
users of this policy to uninstall the v1alpha2 version before installing this
newer version.

Any references to v1alpha2 BackendTLSPolicy fields will need to be updated.
Specific changes include:

  • the targetRef field is now a targetRefs list and these references no
    longer include a namespace field.
  • the tls field has been renamed to validation
  • the caCertRefs field has been renamed to caCertificateRefs
  • the wellKnownCACerts field has been renamed to wellKnownCACertificates

Leading Contributors: @​candita

Gateway Params

Gateways now feature a new field that allows references to
implementation-specific parameters, similar to GatewayClass.

Leading Contributors: @​howardjohn

Everything Else

gwctl
Validation Changes
  • TLS Configuration is no longer required on Gateway Listeners to enable more
    flexible TLS configuration. (#​2721, @​robscott)
Conformance Tests
  • Conformance Profiles have been renamed and a new Mesh-GRPC profile has been
    added (#​3019, @​mlavacca):
    • HTTP -> Gateway-HTTP
    • GRPC -> Gateway-GRPC
    • TLS -> Gateway-TLS
    • Mesh -> Mesh-HTTP
  • Fixed GatewayWithAttachedRoutes conformance test to not check that the
    HTTPRoute status includes an "Accepted: False" condition because this is not
    required by the specification. (#​2548, @​frankbu)
  • A new comparison view has been added to our documentation that shows the
    extended features supported by every implementation that has submitted a
    conformance report (#​2874, @​xtineskim)
  • Added SupportMeshConsumerRoute and SupportMeshClusterIPMatching supported
    features to more clearly communicate the purpose of existing Mesh conformance
    tests (#​3035, @​howardjohn)
  • Add conformance test for HTTP listener isolation (#​3047, @​arkodg, @​pleshakov)
Dependencies
Cleanup
  • The validating webhook has been removed. CEL validation is now built-in to
    CRDs and replaces the webhook. (#​2595, @​robscott)
  • BackendTLSPolicy WellKnownCACerts field has been updated to
    implementation-specific support (#​2741, @​sunjayBhatia)
  • Clarify policy attachment by two of the same policy types when using section
    names. (#​2442, @​maleck13)
  • Remove v1alpha2 directory from docs: (#​2965, @​robscott)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link
Contributor

PR Description updated to latest commit (1e57660)

Copy link
Contributor

PR Review 🔍

⏱️ Estimated effort to review [1-5]

1, because the PR involves a simple version update in a dependency configuration file, which is straightforward to verify and does not involve complex code changes.

🧪 Relevant tests

No

⚡ Possible issues

No

🔒 Security concerns

No

Code feedback:

Copy link
Contributor

PR Code Suggestions ✨

CategorySuggestion                                                                                                                                    Score
Best practice
Verify compatibility of the updated dependency version

Ensure that the updated tag version 'v1.1.0' is compatible with other dependencies and the
current system configuration to avoid potential conflicts or deprecated features that
might not be supported.

crds/base/gateway-api/source.yaml [9]

-tag: v1.1.0
+tag: v1.1.0  # Ensure compatibility with system and dependencies
 
Suggestion importance[1-10]: 4

Why: The suggestion to ensure compatibility is a good practice, but it does not directly improve the code itself. Adding a comment about compatibility is minor and does not address any major issues or bugs.

4

@Smana
Copy link
Owner

Smana commented May 19, 2024

Waiting for cilium/cilium#32492 before considering upgrading Gateway API

@Smana
Copy link
Owner

Smana commented Jul 25, 2024

closing in favor of #346

@Smana Smana closed this Jul 25, 2024
Copy link
Contributor Author

renovate bot commented Jul 25, 2024

Renovate Ignore Notification

Because you closed this PR without merging, Renovate will ignore this update (v1.1.0). You will get a PR once a newer version is released. To ignore this dependency forever, add it to the ignoreDeps array of your Renovate config.

If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR.

@renovate renovate bot deleted the renovate/gateway-api-1.x branch July 25, 2024 17:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant