hack/update-expected.sh

This commit is contained in:
zadjadr 2024-02-02 20:29:51 +01:00
parent 656b3a6956
commit f3574c914f
No known key found for this signature in database
GPG Key ID: 0F5C56E6213A7610
33 changed files with 87 additions and 88 deletions

View File

@ -226,7 +226,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: disabled
version: v1.14.5
version: v1.15.0
nodeTerminationHandler:
cpuRequest: 50m
enableRebalanceDraining: false

View File

@ -105,8 +105,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: cbf85fa595d03844fafb8ec97ec50991e23707cd08ab01002633d86a3cb2994d
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: bcc977da60fb16ad50f906d51d4bf623e99fc253286d71690e526f4101d94f27
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -550,7 +550,7 @@ spec:
value: api.internal.minimal-ipv6.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@ -647,7 +647,7 @@ spec:
value: api.internal.minimal-ipv6.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -666,7 +666,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -687,7 +687,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -717,7 +717,7 @@ spec:
value: api.internal.minimal-ipv6.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -734,7 +734,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -889,7 +889,7 @@ spec:
value: api.internal.minimal-ipv6.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:

View File

@ -944,7 +944,7 @@ resource "aws_s3_object" "minimal-ipv6-example-com-addons-limit-range-addons-k8s
resource "aws_s3_object" "minimal-ipv6-example-com-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content")
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal-warmpool.example.com:3988/
InstanceGroupName: nodes
InstanceGroupRole: Node
NodeupConfigHash: 6kTfJQ6yLcxGIGsuwVUBRcHKggh7GlzSCb7AnSvJIO0=
NodeupConfigHash: 5Ce/EF8HWNsDqPr1g5h9y/CqYhDGQ0fIaojWkfmYM/o=
__EOF_KUBE_ENV

View File

@ -218,7 +218,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: vxlan
version: v1.14.5
version: v1.15.0
nodeTerminationHandler:
cpuRequest: 50m
enableRebalanceDraining: false

View File

@ -98,8 +98,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: 2f93b30904260d1ec3b6767a3a9588da2bb210358d1b04896e4278351bc2d931
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: d706711e81a214a90815115470eb9f0c6ee8d5aa67402b64178dfed3802a692f
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -551,7 +551,7 @@ spec:
value: api.internal.minimal-warmpool.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@ -648,7 +648,7 @@ spec:
value: api.internal.minimal-warmpool.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -667,7 +667,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -688,7 +688,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -718,7 +718,7 @@ spec:
value: api.internal.minimal-warmpool.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -735,7 +735,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -890,7 +890,7 @@ spec:
value: api.internal.minimal-warmpool.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:

View File

@ -60,7 +60,7 @@ containerdConfig:
usesLegacyGossip: false
usesNoneDNS: false
warmPoolImages:
- quay.io/cilium/cilium:v1.14.5
- quay.io/cilium/operator:v1.14.5
- quay.io/cilium/cilium:v1.15.0
- quay.io/cilium/operator:v1.15.0
- registry.k8s.io/kube-proxy:v1.26.0
- registry.k8s.io/provider-aws/cloud-controller-manager:v1.26.6

View File

@ -712,7 +712,7 @@ resource "aws_s3_object" "minimal-warmpool-example-com-addons-limit-range-addons
resource "aws_s3_object" "minimal-warmpool-example-com-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content")
key = "clusters.example.com/minimal-warmpool.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "clusters.example.com/minimal-warmpool.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -199,7 +199,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: vxlan
version: v1.14.5
version: v1.15.0
nonMasqueradeCIDR: 100.64.0.0/10
podCIDR: 100.96.0.0/11
secretStore: memfs://tests/scw-minimal.k8s.local/secrets

View File

@ -54,8 +54,8 @@ spec:
k8s-addon: scaleway-csi-driver.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: 10c38ce4e002e3ec8ce1b5b8295345b6ac0ea3c119f9d58b916bf38f1bd1b9e1
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 96ff7a35d4c953b7cba928eb52b7ce5265782e18eeadf258f78f372c22abe97a
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -551,7 +551,7 @@ spec:
value: api.internal.scw-minimal.k8s.local
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@ -648,7 +648,7 @@ spec:
value: api.internal.scw-minimal.k8s.local
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -667,7 +667,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -688,7 +688,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -718,7 +718,7 @@ spec:
value: api.internal.scw-minimal.k8s.local
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -735,7 +735,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -890,7 +890,7 @@ spec:
value: api.internal.scw-minimal.k8s.local
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:

View File

@ -149,7 +149,7 @@ resource "aws_s3_object" "scw-minimal-k8s-local-addons-limit-range-addons-k8s-io
resource "aws_s3_object" "scw-minimal-k8s-local-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content")
key = "tests/scw-minimal.k8s.local/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "tests/scw-minimal.k8s.local/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -220,7 +220,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: disabled
version: v1.14.5
version: v1.15.0
nodeTerminationHandler:
cpuRequest: 50m
enableRebalanceDraining: false

View File

@ -98,8 +98,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: ae82c21f5fc8e0885ceedf83050da9d0c733d50cedd7d145a806294338ec25f1
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 175fd5607aa768302886721f5a20a84184f680b7e557a65d2846dac93adcc5dc
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -553,7 +553,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
postStart:
@ -675,7 +675,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -694,7 +694,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -715,7 +715,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -745,7 +745,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -762,7 +762,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -917,7 +917,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:

View File

@ -1032,7 +1032,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -228,7 +228,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: vxlan
version: v1.14.5
version: v1.15.0
nodeTerminationHandler:
cpuRequest: 50m
enableRebalanceDraining: false

View File

@ -98,8 +98,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: 25e0a4c6c9a226bb3a53cfb812bea651cd454f3ea8de08a6035e9a5bcebd3e7f
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 1d4124ce424cd174dfa1f478d073535158bf7f9f145675105f8005528ee3c3db
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -555,7 +555,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@ -652,7 +652,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -671,7 +671,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -692,7 +692,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -722,7 +722,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -739,7 +739,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -898,7 +898,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:

View File

@ -1032,7 +1032,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -229,7 +229,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: vxlan
version: v1.14.5
version: v1.15.0
nodeTerminationHandler:
cpuRequest: 50m
enableRebalanceDraining: false

View File

@ -161,8 +161,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: b1031b2a99a5d029d69e119fed152af22f194927b03631d87baf1cc97fd07e20
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: f7c5f2689c97258b25dbfd34f2c015bad0b809feaa48dfce07440c1549e0ebc5
name: networking.cilium.io
needsPKI: true
needsRollingUpdate: all

View File

@ -774,7 +774,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@ -878,7 +878,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -897,7 +897,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -918,7 +918,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -948,7 +948,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -965,7 +965,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -1127,7 +1127,7 @@ spec:
value: api.internal.privatecilium.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
@ -1221,7 +1221,7 @@ spec:
- serve
command:
- hubble-relay
image: quay.io/cilium/hubble-relay:v1.14.5
image: quay.io/cilium/hubble-relay:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
tcpSocket:

View File

@ -1048,7 +1048,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -232,7 +232,7 @@ spec:
sidecarIstioProxyImage: cilium/istio_proxy
toFqdnsDnsRejectResponseCode: refused
tunnel: disabled
version: v1.14.5
version: v1.15.0
nodeTerminationHandler:
cpuRequest: 50m
enableRebalanceDraining: false

View File

@ -98,8 +98,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: e58b7a1c93353dabd67ee86769b6408009712bbe5747739c7950995a34c68f02
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 4ad29cbfd6b1ed71d0e656493c0d23fa06883574faafa169319055c28f88997f
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -52,7 +52,6 @@ data:
enable-ipv4-masquerade: "true"
enable-ipv6: "false"
enable-ipv6-masquerade: "false"
enable-k8s-event-handover: "true"
enable-l7-proxy: "true"
enable-node-port: "true"
enable-remote-node-identity: "true"
@ -564,7 +563,7 @@ spec:
value: api.internal.privateciliumadvanced.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
lifecycle:
postStart:
@ -692,7 +691,7 @@ spec:
value: api.internal.privateciliumadvanced.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: config
terminationMessagePolicy: FallbackToLogsOnError
@ -711,7 +710,7 @@ spec:
value: /run/cilium/cgroupv2
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: mount-cgroup
securityContext:
@ -732,7 +731,7 @@ spec:
env:
- name: BIN_PATH
value: /opt/cni/bin
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: apply-sysctl-overwrites
securityContext:
@ -762,7 +761,7 @@ spec:
value: api.internal.privateciliumadvanced.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: clean-cilium-state
securityContext:
@ -779,7 +778,7 @@ spec:
name: cilium-run
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.14.5
image: quay.io/cilium/cilium:v1.15.0
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
@ -945,7 +944,7 @@ spec:
value: api.internal.privateciliumadvanced.example.com
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.14.5
image: quay.io/cilium/operator:v1.15.0
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:

View File

@ -1065,7 +1065,7 @@ resource "aws_s3_object" "privateciliumadvanced-example-com-addons-limit-range-a
resource "aws_s3_object" "privateciliumadvanced-example-com-addons-networking-cilium-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content")
key = "clusters.example.com/privateciliumadvanced.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
key = "clusters.example.com/privateciliumadvanced.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

View File

@ -98,8 +98,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: bea39c087cdd515eee7f7a490bf94c8f16c493db8d528312775f3afb46ede821
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 5487313f24c613cab9c2aa5683dfcdfe869fec16cb6775435d55310c28a28c54
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -112,8 +112,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: bea39c087cdd515eee7f7a490bf94c8f16c493db8d528312775f3afb46ede821
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 5487313f24c613cab9c2aa5683dfcdfe869fec16cb6775435d55310c28a28c54
name: networking.cilium.io
needsRollingUpdate: all
selector:

View File

@ -169,8 +169,8 @@ spec:
k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0
- id: k8s-1.16
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
manifestHash: bea39c087cdd515eee7f7a490bf94c8f16c493db8d528312775f3afb46ede821
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
manifestHash: 5487313f24c613cab9c2aa5683dfcdfe869fec16cb6775435d55310c28a28c54
name: networking.cilium.io
needsRollingUpdate: all
selector: