mirror of https://github.com/kubernetes/kops.git
hack/update-expected.sh
This commit is contained in:
parent
656b3a6956
commit
f3574c914f
|
@ -226,7 +226,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: disabled
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nodeTerminationHandler:
|
||||
cpuRequest: 50m
|
||||
enableRebalanceDraining: false
|
||||
|
|
|
@ -105,8 +105,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: cbf85fa595d03844fafb8ec97ec50991e23707cd08ab01002633d86a3cb2994d
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: bcc977da60fb16ad50f906d51d4bf623e99fc253286d71690e526f4101d94f27
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -550,7 +550,7 @@ spec:
|
|||
value: api.internal.minimal-ipv6.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
preStop:
|
||||
|
@ -647,7 +647,7 @@ spec:
|
|||
value: api.internal.minimal-ipv6.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -666,7 +666,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -687,7 +687,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -717,7 +717,7 @@ spec:
|
|||
value: api.internal.minimal-ipv6.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -734,7 +734,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -889,7 +889,7 @@ spec:
|
|||
value: api.internal.minimal-ipv6.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
|
|
@ -944,7 +944,7 @@ resource "aws_s3_object" "minimal-ipv6-example-com-addons-limit-range-addons-k8s
|
|||
resource "aws_s3_object" "minimal-ipv6-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -151,7 +151,7 @@ ConfigServer:
|
|||
- https://kops-controller.internal.minimal-warmpool.example.com:3988/
|
||||
InstanceGroupName: nodes
|
||||
InstanceGroupRole: Node
|
||||
NodeupConfigHash: 6kTfJQ6yLcxGIGsuwVUBRcHKggh7GlzSCb7AnSvJIO0=
|
||||
NodeupConfigHash: 5Ce/EF8HWNsDqPr1g5h9y/CqYhDGQ0fIaojWkfmYM/o=
|
||||
|
||||
__EOF_KUBE_ENV
|
||||
|
||||
|
|
|
@ -218,7 +218,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: vxlan
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nodeTerminationHandler:
|
||||
cpuRequest: 50m
|
||||
enableRebalanceDraining: false
|
||||
|
|
|
@ -98,8 +98,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: 2f93b30904260d1ec3b6767a3a9588da2bb210358d1b04896e4278351bc2d931
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: d706711e81a214a90815115470eb9f0c6ee8d5aa67402b64178dfed3802a692f
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -551,7 +551,7 @@ spec:
|
|||
value: api.internal.minimal-warmpool.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
preStop:
|
||||
|
@ -648,7 +648,7 @@ spec:
|
|||
value: api.internal.minimal-warmpool.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -667,7 +667,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -688,7 +688,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -718,7 +718,7 @@ spec:
|
|||
value: api.internal.minimal-warmpool.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -735,7 +735,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -890,7 +890,7 @@ spec:
|
|||
value: api.internal.minimal-warmpool.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
|
|
@ -60,7 +60,7 @@ containerdConfig:
|
|||
usesLegacyGossip: false
|
||||
usesNoneDNS: false
|
||||
warmPoolImages:
|
||||
- quay.io/cilium/cilium:v1.14.5
|
||||
- quay.io/cilium/operator:v1.14.5
|
||||
- quay.io/cilium/cilium:v1.15.0
|
||||
- quay.io/cilium/operator:v1.15.0
|
||||
- registry.k8s.io/kube-proxy:v1.26.0
|
||||
- registry.k8s.io/provider-aws/cloud-controller-manager:v1.26.6
|
||||
|
|
|
@ -712,7 +712,7 @@ resource "aws_s3_object" "minimal-warmpool-example-com-addons-limit-range-addons
|
|||
resource "aws_s3_object" "minimal-warmpool-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/minimal-warmpool.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "clusters.example.com/minimal-warmpool.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -199,7 +199,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: vxlan
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nonMasqueradeCIDR: 100.64.0.0/10
|
||||
podCIDR: 100.96.0.0/11
|
||||
secretStore: memfs://tests/scw-minimal.k8s.local/secrets
|
||||
|
|
|
@ -54,8 +54,8 @@ spec:
|
|||
k8s-addon: scaleway-csi-driver.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: 10c38ce4e002e3ec8ce1b5b8295345b6ac0ea3c119f9d58b916bf38f1bd1b9e1
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 96ff7a35d4c953b7cba928eb52b7ce5265782e18eeadf258f78f372c22abe97a
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -551,7 +551,7 @@ spec:
|
|||
value: api.internal.scw-minimal.k8s.local
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
preStop:
|
||||
|
@ -648,7 +648,7 @@ spec:
|
|||
value: api.internal.scw-minimal.k8s.local
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -667,7 +667,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -688,7 +688,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -718,7 +718,7 @@ spec:
|
|||
value: api.internal.scw-minimal.k8s.local
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -735,7 +735,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -890,7 +890,7 @@ spec:
|
|||
value: api.internal.scw-minimal.k8s.local
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
|
|
@ -149,7 +149,7 @@ resource "aws_s3_object" "scw-minimal-k8s-local-addons-limit-range-addons-k8s-io
|
|||
resource "aws_s3_object" "scw-minimal-k8s-local-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "tests/scw-minimal.k8s.local/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "tests/scw-minimal.k8s.local/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -220,7 +220,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: disabled
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nodeTerminationHandler:
|
||||
cpuRequest: 50m
|
||||
enableRebalanceDraining: false
|
||||
|
|
|
@ -98,8 +98,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: ae82c21f5fc8e0885ceedf83050da9d0c733d50cedd7d145a806294338ec25f1
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 175fd5607aa768302886721f5a20a84184f680b7e557a65d2846dac93adcc5dc
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -553,7 +553,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
postStart:
|
||||
|
@ -675,7 +675,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -694,7 +694,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -715,7 +715,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -745,7 +745,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -762,7 +762,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -917,7 +917,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
|
|
@ -1032,7 +1032,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
|
|||
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -228,7 +228,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: vxlan
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nodeTerminationHandler:
|
||||
cpuRequest: 50m
|
||||
enableRebalanceDraining: false
|
||||
|
|
|
@ -98,8 +98,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: 25e0a4c6c9a226bb3a53cfb812bea651cd454f3ea8de08a6035e9a5bcebd3e7f
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 1d4124ce424cd174dfa1f478d073535158bf7f9f145675105f8005528ee3c3db
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -555,7 +555,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
preStop:
|
||||
|
@ -652,7 +652,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -671,7 +671,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -692,7 +692,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -722,7 +722,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -739,7 +739,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -898,7 +898,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
|
|
@ -1032,7 +1032,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
|
|||
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -229,7 +229,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: vxlan
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nodeTerminationHandler:
|
||||
cpuRequest: 50m
|
||||
enableRebalanceDraining: false
|
||||
|
|
|
@ -161,8 +161,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: b1031b2a99a5d029d69e119fed152af22f194927b03631d87baf1cc97fd07e20
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: f7c5f2689c97258b25dbfd34f2c015bad0b809feaa48dfce07440c1549e0ebc5
|
||||
name: networking.cilium.io
|
||||
needsPKI: true
|
||||
needsRollingUpdate: all
|
||||
|
|
|
@ -774,7 +774,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
preStop:
|
||||
|
@ -878,7 +878,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -897,7 +897,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -918,7 +918,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -948,7 +948,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -965,7 +965,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -1127,7 +1127,7 @@ spec:
|
|||
value: api.internal.privatecilium.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
@ -1221,7 +1221,7 @@ spec:
|
|||
- serve
|
||||
command:
|
||||
- hubble-relay
|
||||
image: quay.io/cilium/hubble-relay:v1.14.5
|
||||
image: quay.io/cilium/hubble-relay:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
tcpSocket:
|
||||
|
|
|
@ -1048,7 +1048,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
|
|||
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -232,7 +232,7 @@ spec:
|
|||
sidecarIstioProxyImage: cilium/istio_proxy
|
||||
toFqdnsDnsRejectResponseCode: refused
|
||||
tunnel: disabled
|
||||
version: v1.14.5
|
||||
version: v1.15.0
|
||||
nodeTerminationHandler:
|
||||
cpuRequest: 50m
|
||||
enableRebalanceDraining: false
|
||||
|
|
|
@ -98,8 +98,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: e58b7a1c93353dabd67ee86769b6408009712bbe5747739c7950995a34c68f02
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 4ad29cbfd6b1ed71d0e656493c0d23fa06883574faafa169319055c28f88997f
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -52,7 +52,6 @@ data:
|
|||
enable-ipv4-masquerade: "true"
|
||||
enable-ipv6: "false"
|
||||
enable-ipv6-masquerade: "false"
|
||||
enable-k8s-event-handover: "true"
|
||||
enable-l7-proxy: "true"
|
||||
enable-node-port: "true"
|
||||
enable-remote-node-identity: "true"
|
||||
|
@ -564,7 +563,7 @@ spec:
|
|||
value: api.internal.privateciliumadvanced.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
postStart:
|
||||
|
@ -692,7 +691,7 @@ spec:
|
|||
value: api.internal.privateciliumadvanced.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: config
|
||||
terminationMessagePolicy: FallbackToLogsOnError
|
||||
|
@ -711,7 +710,7 @@ spec:
|
|||
value: /run/cilium/cgroupv2
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: mount-cgroup
|
||||
securityContext:
|
||||
|
@ -732,7 +731,7 @@ spec:
|
|||
env:
|
||||
- name: BIN_PATH
|
||||
value: /opt/cni/bin
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: apply-sysctl-overwrites
|
||||
securityContext:
|
||||
|
@ -762,7 +761,7 @@ spec:
|
|||
value: api.internal.privateciliumadvanced.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: clean-cilium-state
|
||||
securityContext:
|
||||
|
@ -779,7 +778,7 @@ spec:
|
|||
name: cilium-run
|
||||
- command:
|
||||
- /install-plugin.sh
|
||||
image: quay.io/cilium/cilium:v1.14.5
|
||||
image: quay.io/cilium/cilium:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: install-cni-binaries
|
||||
resources:
|
||||
|
@ -945,7 +944,7 @@ spec:
|
|||
value: api.internal.privateciliumadvanced.example.com
|
||||
- name: KUBERNETES_SERVICE_PORT
|
||||
value: "443"
|
||||
image: quay.io/cilium/operator:v1.14.5
|
||||
image: quay.io/cilium/operator:v1.15.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
|
|
|
@ -1065,7 +1065,7 @@ resource "aws_s3_object" "privateciliumadvanced-example-com-addons-limit-range-a
|
|||
resource "aws_s3_object" "privateciliumadvanced-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/privateciliumadvanced.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||
key = "clusters.example.com/privateciliumadvanced.example.com/addons/networking.cilium.io/k8s-1.16-v1.15.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
|
|
@ -98,8 +98,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: bea39c087cdd515eee7f7a490bf94c8f16c493db8d528312775f3afb46ede821
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 5487313f24c613cab9c2aa5683dfcdfe869fec16cb6775435d55310c28a28c54
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -112,8 +112,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: bea39c087cdd515eee7f7a490bf94c8f16c493db8d528312775f3afb46ede821
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 5487313f24c613cab9c2aa5683dfcdfe869fec16cb6775435d55310c28a28c54
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
|
@ -169,8 +169,8 @@ spec:
|
|||
k8s-addon: storage-aws.addons.k8s.io
|
||||
version: 9.99.0
|
||||
- id: k8s-1.16
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||
manifestHash: bea39c087cdd515eee7f7a490bf94c8f16c493db8d528312775f3afb46ede821
|
||||
manifest: networking.cilium.io/k8s-1.16-v1.15.yaml
|
||||
manifestHash: 5487313f24c613cab9c2aa5683dfcdfe869fec16cb6775435d55310c28a28c54
|
||||
name: networking.cilium.io
|
||||
needsRollingUpdate: all
|
||||
selector:
|
||||
|
|
Loading…
Reference in New Issue