Skip to content

Commit 1e7263b

Browse files
authored
[release/v1.2] fix lint (#4659)
Signed-off-by: Arko Dasgupta <[email protected]>
1 parent 046bfd6 commit 1e7263b

File tree

2 files changed

+142
-0
lines changed

2 files changed

+142
-0
lines changed
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
---
2+
title: "v1.2.0"
3+
publishdate: 2024-11-06
4+
---
5+
6+
Date: November 6, 2024
7+
8+
## Breaking changes
9+
- Gateway API GRPCRoute and ReferenceGrant v1alpha2 have been removed
10+
- Please refer to the [Gateway API v1.2.0 documentation](https://github.com/kubernetes-sigs/gateway-api/releases) for more information
11+
- Removed default CPU limit of the Envoy Gateway deployment, to eliminate CPU throttling
12+
- Changed default Envoy shutdown settings: drain strategy has been changed to immediate, default minDrainDuration, drainTimeout and terminationGracePeriodSeconds have been set to 10s, 60s and 360s respectively
13+
- Set ignore_health_on_host_removal to true for clusters with static endpoints This was done to speed up removal of static endpoints by the control plane when active health check is configured
14+
- Xds and Infra IR logs are logged at Debug level instead of Info level. They will now not be seen by default in Envoy Gateway logs. You can change the logging level to default: debug to view them
15+
16+
## New features
17+
- Added support for Gateway-API v1.2.0
18+
- Added support for IPv4/IPv6 Dual Stack for EnvoyProxy fleet and BackendRef resources
19+
- Added experimental support for EG standalone(host deployment) mode
20+
- Added support for JWT claims based Authorization in SecurityPolicy CRD
21+
- Added support for Response Override in BackendTrafficPolicy CRD
22+
- Added support for RequestTimeout in BackendTrafficPolicy CRD
23+
- Added support for inverting header matches for Rate Limit in BackendTrafficPolicy CRD
24+
- Added support for client TLS session resumption in ClientTrafficPolicy CRD
25+
- Added support for HTTPRouteFilter and path regex rewrite
26+
- Added support for host header rewrite in HTTPRouteFilter CRD
27+
- Added support for Listener Access Log in EnvoyProxy CRD
28+
- Added support for Datadog tracing support in EnvoyProxy CRD
29+
- Added support for request response sizes stats in EnvoyProxy CRD
30+
- Added support for modifying container SecurityContext for Envoy Gateway deployment in Helm
31+
- Added support for wildcard matching for CORS AllowMethods and AllowHeaders settings in SecurityPolicy CRD
32+
- Added support for match conditions for access log in EnvoyProxy CRD
33+
- Added support for using BackendCluster to represent OIDCProvider
34+
- Added support for RecomputeRoute for ExtAuth in SecurityPolicy CRD
35+
- Added support for sharing token cookies between multiple domains in SecurityPolicy CRD
36+
- Added support for JSONPatches for proxy bootstrap modifications in EnvoyProxy CRD
37+
- Added support for Active Passive Failover Backends
38+
- Added support for configuring the GRPC Health Checker in the BackendTrafficPolicy CRD
39+
- Added support for early request header mutation in the ClientTrafficPolicy CRD
40+
- Added support for JsonPath in the EnvoyPatchPolicy CRD
41+
- Added support for cluster settings for tracing and access log backends in EnvoyProxy CRD
42+
- Added support for cluster settings for non xRoute-generated backend refs
43+
- Added support for socket buffer limit field in ClientTrafficPolicy and BackendTrafficPolicy CRD
44+
- Added support for http2 upstream settings in BackendTrafficPolicy CRD
45+
- Added support for DNS resolution settings in BackendTrafficPolicy CRD
46+
- Added support for configuring service annotations in the Envoy Gateway helm chart
47+
- Added support for configuring priorityClassName to Envoy Gateway helm chart
48+
- Added support for ratelimit metrics monitoring in grafana in the addons helm chart
49+
- Added support for default user group and user id for the SecurityContexts in the Envoy Gateway helm chart
50+
- Added support for maxUnavailable in the PodDisruptionBudget in the Envoy Gateway helm chart
51+
- Added support for configuring NodeSelector in the Envoy Gateway helm chart
52+
- Added support for nonce in the OIDC auth flow
53+
- Added support for choosing an HTTPRoute's non-wildcard hostname as the default Host
54+
- Added support for returning 500 when EnvoyExtensionTrafficPolicy translation fails
55+
- Added support for returning 500 when SecurityPolicy translation fails
56+
- Added support for multiple backendRefs for ExtAuth and ExtProc
57+
- Added support for session persistence in HTTPRoute rules
58+
- Added support for the Backend resource for ExtAuth
59+
- Added support for target selectors on Envoy Gateway Extension Server policies
60+
- Added support for non-Kubernetes Backends for TLSRoute
61+
- Added support for fallback to the Backend API
62+
- Added support for reloadable EnvoyGateway configuration
63+
- Added support for adding Labels to the Envoy Service
64+
- Added support for custom name for ratelimit deployment
65+
- Added default SecurityContext for EG components
66+
- Added startupProbe to all provisioned containers
67+
- Added support for local validations for egctl translate and file provider
68+
- Added support for egctl x collect to collect information from the cluster for debugging
69+
- Added support for a native prometheus metrics endpoint in the ratelimit server
70+
71+
## Bug fixes
72+
- Fixed xDS translation failing when the WASM HTTP code source was configured without an SHA
73+
- Fixed unsupported listener protocol types causing errors while updating Gateway status
74+
- Fixed unsupported listener protocol types causing errors while updating Gateway status
75+
- Fixed invalid sectionName in BackendTLSPolicy for Backend
76+
- Fixed Delay in SecurityPolicy change propagation for HTTPRoute when using targetSelectors
77+
- Fixed JSONPath not being correctly translated to JSONPatch paths
78+
- Fixed allowing an empty slowStart value when using LeastRequest
79+
- Fixed updating the HTTPRoute status correctly when the linked Backend resource is invalid
80+
- Fixed timeout settings originating from the route being lost when translating the backend traffic policy
81+
- Fixed Backend resources not receiving status updates
82+
- Fixed active health checks requiring the expectedStatuses field to function correctly
83+
- Fixed HTTPHeaderFilter processing not correctly supporting multiple header values
84+
- Fixed reconciling multiple ReferenceGrants within the same namespace
85+
- Fixed unwanted / appearing in the Path when using Prefix Rewrites
86+
- Fixed incorrect gateway being selected as the HTTPRoute parent
87+
- Fixed override issues for EnvoyExtensionPolicy
88+
- Fixed nil pointer error when translating hash load balancing
89+
- Fixed nil pointer if backedtls.minVersion is set but backedtls.maxVersion is not
90+
- Fixed empty connection limits causing xDS rejection
91+
- Fixed rate limiting not working with both headers and CIDR matches
92+
- Fixed EDS not updating when deployments were created after services
93+
- Fixed RBAC issue for deleting infrastructure resources
94+
- Fixed gateways never reaching ready/programmed status when running Envoy as a Daemonset
95+
- Fixed rate limit deployment ignoring pod labels and annotation merges
96+
- Fixed the API Server receives unnecessary requests
97+
- Fixed egctl experimental translate using an incorrect namespace
98+
- Fixed reconciliation not being triggered for Secret updates referenced by a BackendTLSPolicy
99+
- Fixed xDS translation failure when WASM HTTP code source was configured without an SHA
100+
- Fixed HTTPRoute status displaying only one parent when targeting multiple gateways from different GatewayClasses
101+
- Fixed Route with multiple parents having an incorrect namespace in the parentRef status
102+
- Fixed BackendTlsPolicy specifying multiple targetRefs for the same service, to work
103+
104+
## Performance improvements
105+
- Optimize memory usage by only storing distinct resources
106+
107+
## Other changes
108+
- Upgraded Envoy Proxy to v1.32.1
109+
- Reduced the amount of configuration logging, and make it line-delimited friendly
110+
- Made watching alpha CRDs optional, so that Envoy Gateway can run with older Gateway Api versions
111+
- Removed grafana test framework from the addons helm chart
112+
- Disabled ALPN for non-HTTP routes
113+
- Added statPrefix for HCM and TCPProxy
114+
- Enabled GatewayHTTPListenerIsolation conformance test
115+
- Enabled GRPC conformance profile
116+
- Enabled HTTPRouteBackendRequestHeaderModifier conformance test
117+
- Added e2e test for Daemonset mode
118+
- Fixed OVS scanner wrong license warnings
119+
- Added e2e test for Gateway with EnvoyProxy
120+
- Added e2e test for TLS session resumption
121+
- Added heap profile into benchmark report
122+
- Added e2e test for RecomputeRoute in ExtAuth
123+
- Added benchmark memory profiles into report
124+
- Fixed flaky gateway_with_conflicted_listener_cannot_be_merged e2e test
125+
- Fixed flaky Zipkin Tracing e2e test
126+
- Added e2e test for cookie based consistent hash load balancing
127+
- Added e2e test for load balancing
128+
- Fixed flaky authorization tests
129+
- Enabled upgrade test
130+
- Fixed flaky basic auth e2e test
131+
- Enabled use-client-protocol e2e test
132+
- Added performance benchmarking test for 1000 HTTPRoutes
133+
- Added e2e test for Datadog tracing
134+
- Added e2e tests for ratelimit invert matching headers
135+
- Reduced readinessProbe failureThreshold and periodSeconds
136+
- Bumped go-control-plane to v0.13.1
137+
- Enabled e2e tests for dual stack
138+
- Use grafana alloy instead of fluent-bit for e2e tests
139+
- Push tags without the v prefix for helm charts to support Flux HelmReleases
140+
- Use a stable label selector when creating Envoy Proxy fleet pods
141+

site/content/en/news/releases/notes/v1.2.1.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,4 @@ Date: November 7, 2024
77

88
## Bug fixes
99
- Fixed a panic in the provider goroutine when the body in the direct response configuration was nil.
10+

0 commit comments

Comments
 (0)