Skip to content
This repository has been archived by the owner on Aug 25, 2021. It is now read-only.

Commit

Permalink
Release Consul 1.10.0 beta3 (#976)
Browse files Browse the repository at this point in the history
Co-authored-by: Luke Kysow <[email protected]>
  • Loading branch information
ndhanushkodi and lkysow authored May 27, 2021
1 parent e35a940 commit a465fe7
Show file tree
Hide file tree
Showing 7 changed files with 22 additions and 15 deletions.
7 changes: 6 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,14 @@
## Unreleased
## 0.32.0-beta3 (May 27, 2021)
KNOWN ISSUES:
* This beta release does not work when Pod Security Policies are enabled. This will be fixed in the upcoming release.

IMPROVEMENTS:
* Connect: Allow overwriting Kubernetes HTTP probes when running with transparent proxy enabled.
[[GH-953](https://github.com/hashicorp/consul-helm/pull/953)]
* Connect: Enable OpenShift for the connect-injector so that we can support running with transparent
proxy enabled. [[GH-972](https://github.com/hashicorp/consul-helm/pull/972)]
* Updated the default envoy image to `envoyproxy/envoy-alpine:v1.18.3`.


FEATURES:
* License Autoloading [Enterprise]: Consul Enterprise 1.10+ now requires the enterprise license for Consul to be provided as a Kubernetes secret. Once created, the secret can be
Expand Down
18 changes: 10 additions & 8 deletions Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: consul
version: 0.32.0-beta2
appVersion: 1.10.0-beta2
version: 0.32.0-beta3
appVersion: 1.10.0-beta3
kubeVersion: ">=1.16.0-0"
description: Official HashiCorp Consul Chart
home: https://www.consul.io
Expand All @@ -14,16 +14,18 @@ annotations:
artifacthub.io/prerelease: true
artifacthub.io/images: |
- name: consul
image: hashicorp/consul:1.10.0-beta2
image: hashicorp/consul:1.10.0-beta3
- name: consul-k8s
image: hashicorp/consul-k8s:0.26.0-beta2
image: hashicorp/consul-k8s:0.26.0-beta3
- name: envoy
image: envoyproxy/envoy-alpine:v1.16.0
image: envoyproxy/envoy-alpine:v1.18.3
artifacthub.io/license: MPL-2.0
artifacthub.io/links: |
- name: Consul Homepage
url: https://www.consul.io
- name: Documentation
url: https://www.consul.io/docs/k8s
- name: Chart GitHub Repository
- name: hashicorp/consul-helm
url: https://github.com/hashicorp/consul-helm
- name: hashicorp/consul
url: https://github.com/hashicorp/consul
- name: hashicorp/consul-k8s
url: https://github.com/hashicorp/consul-k8s
2 changes: 1 addition & 1 deletion test/terraform/gke/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ resource "google_container_cluster" "cluster" {
node_version = data.google_container_engine_versions.main.latest_master_version

pod_security_policy_config {
enabled = true
enabled = false # Helm does not currently work with pod security policies enabled, the acceptance tests fail with this enabled. Re-enable after fixing.
}

resource_labels = var.labels
Expand Down
2 changes: 1 addition & 1 deletion test/unit/ingress-gateways-deployment.bats
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ load _helpers
--set 'connectInject.enabled=true' \
. | tee /dev/stderr |
yq -s -r '.[0].spec.template.spec.containers[0].image' | tee /dev/stderr)
[ "${actual}" = "envoyproxy/envoy-alpine:v1.16.0" ]
[ "${actual}" = "envoyproxy/envoy-alpine:v1.18.3" ]
}

@test "ingressGateways/Deployment: envoy image can be set using the global value" {
Expand Down
2 changes: 1 addition & 1 deletion test/unit/mesh-gateway-deployment.bats
Original file line number Diff line number Diff line change
Expand Up @@ -335,7 +335,7 @@ key2: value2' \
--set 'connectInject.enabled=true' \
. | tee /dev/stderr |
yq -r '.spec.template.spec.containers[0].image' | tee /dev/stderr)
[ "${actual}" = "envoyproxy/envoy-alpine:v1.16.0" ]
[ "${actual}" = "envoyproxy/envoy-alpine:v1.18.3" ]
}

@test "meshGateway/Deployment: setting meshGateway.imageEnvoy fails" {
Expand Down
2 changes: 1 addition & 1 deletion test/unit/terminating-gateways-deployment.bats
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ load _helpers
--set 'connectInject.enabled=true' \
. | tee /dev/stderr |
yq -s -r '.[0].spec.template.spec.containers[0].image' | tee /dev/stderr)
[ "${actual}" = "envoyproxy/envoy-alpine:v1.16.0" ]
[ "${actual}" = "envoyproxy/envoy-alpine:v1.18.3" ]
}

@test "terminatingGateways/Deployment: envoy image can be set using the global value" {
Expand Down
4 changes: 2 additions & 2 deletions values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ global:
# Docker image that is used for functionality such the catalog sync.
# This can be overridden per component.
# @default: hashicorp/consul-k8s:<latest version>
imageK8S: "hashicorp/consul-k8s:0.26.0-beta2"
imageK8S: "hashicorp/consul-k8s:0.26.0-beta3"

# The name of the datacenter that the agents should
# register as. This can't be changed once the Consul cluster is up and running
Expand Down Expand Up @@ -272,7 +272,7 @@ global:
# connect-injected sidecar proxies and mesh, terminating, and ingress gateways.
# See https://www.consul.io/docs/connect/proxies/envoy for full compatibility matrix between Consul and Envoy.
# @default: envoyproxy/envoy-alpine:<latest supported version>
imageEnvoy: "envoyproxy/envoy-alpine:v1.16.0"
imageEnvoy: "envoyproxy/envoy-alpine:v1.18.3"

# Configuration for running this Helm chart on the Red Hat OpenShift platform.
# This Helm chart currently supports OpenShift v4.x+.
Expand Down

0 comments on commit a465fe7

Please sign in to comment.