Releases: gardener/gardener-extension-networking-calico
Releases · gardener/gardener-extension-networking-calico
v1.20.0
[gardener-extension-networking-calico]
✨ New Features
- [OPERATOR] The Calico extension does now support seed clusters with Kubernetes version 1.22. You should consider the Kubernetes release notes before upgrading to 1.22. (gardener/gardener-extension-networking-calico#110, @timuthy)
🏃 Others
- [OPERATOR] Update calico to
v3.20.2
. (gardener/gardener-extension-networking-calico#116, @DockToFuture) - [OPERATOR] The extension does no longer depend on a list of supported Kubernetes versions (coming from the
github.com/gardener/gardener
dependency). This was preventing the extension to start against Seed clusters running on K8s versions that were not present in the mentioned list. (gardener/gardener-extension-networking-calico#111, @ialidzhikov) - [OPERATOR] Update calico to
v3.20.0
. (gardener/gardener-extension-networking-calico#109, @DockToFuture) - [OPERATOR] Vendor to gardener
v1.28.1
and grmv0.25.0
. (gardener/gardener-extension-networking-calico#107, @DockToFuture) - [OPERATOR] Calico can now be run in ebpf dataplane mode. To enable it set
spec.networking.providerConfig.ebpfDataplane.enabled: true
. It is recommended to run in a pure networking mode withspec.networking.providerConfig.ipv4.mode: Never
when using the ebpf dataplane. (gardener/gardener-extension-networking-calico#106, @DockToFuture) - [OPERATOR] Added (optional) validating admission webhook for the calico network extension. (gardener/gardener-extension-networking-calico#95, @ScheererJ)
v1.19.1
[gardener-extension-networking-calico]
🏃 Others
- [OPERATOR] The extension does no longer depend on a list of supported Kubernetes versions (coming from the
github.com/gardener/gardener
dependency). This was preventing the extension to start against Seed clusters running on K8s versions that were not present in the mentioned list. (#112, @ialidzhikov)
v1.19.0
[gardener-extension-networking-calico]
⚠️ Breaking Changes
- [OPERATOR] Drop support for
k8s<v1.15.0
. (#100, @DockToFuture) - [OPERATOR] The default leader election resource lock of
gardener-extension-networking-calico
has been changed fromconfigmapsleases
toleases
. (#98, @ialidzhikov)- Please make sure, that you had at least
gardener-extension-networking-calico@v1.16
running before upgrading tov1.19.0
, so that it has successfully required leadership with the hybrid resource lock (configmapsleases
) at least once.
- Please make sure, that you had at least
✨ New Features
- [OPERATOR] It is now possible to specify the leader election resource lock via the chart value
leaderElection.resourceLock
(defaults toleases
). (#98, @ialidzhikov)
🏃 Others
- [OPERATOR] Revendored to gardener v1.26.0 (#103, @ScheererJ)
- [OPERATOR] The kubeconfig used by cni (/etc/cni/net.d/calico-kubeconfig) will be automatically updated if the service account token changes. (#92, @ScheererJ)
- [OPERATOR] adds artifacts for Landscaper integration (#83, @jschicktanz)
v1.18.0
[gardener-extension-networking-calico]
🏃 Others
- [OPERATOR] Update calico-cpa to verison 1.8.3 (#87, @DockToFuture)
- [OPERATOR] Update calico version to
1.19.1
. (#86, @DockToFuture) - [OPERATOR] Updated calico to 3.18.2. (#81, @ScheererJ)
v1.17.0
[gardener-extension-networking-calico]
⚠️ Breaking Changes
- [USER] Extension resource configs (
NetworkConfig
) are now deserialized in "strict" mode. This means that deserializing resources with fields that are not allowed by the API schema will result in errors. Shoots containing such resources will fail with an appropriate error until you manually update the shoot to make sure any extension resource configs contained in it are valid. (#76, @stoyanr)
🏃 Others
- [OPERATOR] Update calico to
v3.18.1
. (#77, @DockToFuture) - [OPERATOR] Add VPA for calico-kube-controllers deployment. (#75, @danielfoehrKn)
v1.16.0
[gardener-extension-networking-calico]
🏃 Others
- [OPERATOR] Calico is configured to use
IP_AUTODETECTION_METHOD=cidr=cidrRange
with the nodeCidr as cidrRange to prevent the using the wrong interface on the node. (#72, @DockToFuture) - [OPERATOR] Add security context to install-cni container (#68, @DockToFuture)
- [OPERATOR] Vendor to gardener v1.16.0 and update controller runtime to v0.7.1 (#67, @DockToFuture)
v1.15.0
[gardener-extension-networking-calico]
🏃 Others
- [OPERATOR] Update calico version to
v3.17.1
for cluster >=1.16
kubernetesVersion. (#64, @DockToFuture)
v1.14.0
v1.13.0
[gardener-extension-networking-calico]
Improvements
- [OPERATOR] Fix a bug in calico pod security policies that was preventing node bootstrap for shoot with disabled privileged mode. (#62, @vpnachev)
Docker Images
gardener-extension-networking-calico: eu.gcr.io/gardener-project/gardener/extensions/networking-calico:v1.13.0
v1.12.0
[gardener-extension-networking-calico]
Improvements
- [OPERATOR] Vendor calico to gardener
v1.12.6
and update golang to1.15
and alpine image to3.12.1
. (#60, @DockToFuture) - [OPERATOR] Update calico version to
v3.16.4
for cluster >=1.16
kubernetesVersion (#59, @DockToFuture)