diff --git a/charts/calico/values.yaml b/charts/calico/values.yaml index 347d29910a9..6b6a6ec1f86 100644 --- a/charts/calico/values.yaml +++ b/charts/calico/values.yaml @@ -1,5 +1,5 @@ # The Calico version to use when generating manifests. -version: v3.29.0 +version: v3.29.1 # Configure the images to use when generating manifests. node: diff --git a/charts/tigera-operator/values.yaml b/charts/tigera-operator/values.yaml index d26c5ba95f0..5122f4fd5a2 100644 --- a/charts/tigera-operator/values.yaml +++ b/charts/tigera-operator/values.yaml @@ -64,15 +64,15 @@ podLabels: {} # Image and registry configuration for the tigera/operator pod. tigeraOperator: image: tigera/operator - version: v1.36.0 + version: v1.36.2 registry: quay.io calicoctl: image: docker.io/calico/ctl - tag: v3.29.0 + tag: v3.29.1 kubeletVolumePluginPath: /var/lib/kubelet # Optionally configure the host and port used to access the Kubernetes API server. kubernetesServiceEndpoint: host: "" - port: "6443" \ No newline at end of file + port: "6443" diff --git a/manifests/alp/istio-inject-configmap-1.1.0.yaml b/manifests/alp/istio-inject-configmap-1.1.0.yaml index 0aabd155ebf..636b627ca79 100644 --- a/manifests/alp/istio-inject-configmap-1.1.0.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.0.yaml @@ -178,7 +178,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.1.yaml b/manifests/alp/istio-inject-configmap-1.1.1.yaml index 8ebf85b94bc..0f660f1ad7a 100644 --- a/manifests/alp/istio-inject-configmap-1.1.1.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.1.yaml @@ -178,7 +178,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.10.yaml b/manifests/alp/istio-inject-configmap-1.1.10.yaml index 465ccd42c23..f158c042f8f 100644 --- a/manifests/alp/istio-inject-configmap-1.1.10.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.10.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.11.yaml b/manifests/alp/istio-inject-configmap-1.1.11.yaml index 01d99a2ef15..df1f046a503 100644 --- a/manifests/alp/istio-inject-configmap-1.1.11.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.11.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.12.yaml b/manifests/alp/istio-inject-configmap-1.1.12.yaml index 60c48efd74f..9baec5b025c 100644 --- a/manifests/alp/istio-inject-configmap-1.1.12.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.12.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.13.yaml b/manifests/alp/istio-inject-configmap-1.1.13.yaml index fc2c370dd21..a619dee510e 100644 --- a/manifests/alp/istio-inject-configmap-1.1.13.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.13.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.14.yaml b/manifests/alp/istio-inject-configmap-1.1.14.yaml index f7b79235132..e2ed86754fb 100644 --- a/manifests/alp/istio-inject-configmap-1.1.14.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.14.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.15.yaml b/manifests/alp/istio-inject-configmap-1.1.15.yaml index cafd313b29a..1128c88b9b5 100644 --- a/manifests/alp/istio-inject-configmap-1.1.15.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.15.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.16.yaml b/manifests/alp/istio-inject-configmap-1.1.16.yaml index 4d5d2d46932..d5e22dd2491 100644 --- a/manifests/alp/istio-inject-configmap-1.1.16.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.16.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.17.yaml b/manifests/alp/istio-inject-configmap-1.1.17.yaml index 16399bcfa53..4094862b9a7 100644 --- a/manifests/alp/istio-inject-configmap-1.1.17.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.17.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.2.yaml b/manifests/alp/istio-inject-configmap-1.1.2.yaml index ed41a4732fb..785212143c1 100644 --- a/manifests/alp/istio-inject-configmap-1.1.2.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.2.yaml @@ -178,7 +178,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.3.yaml b/manifests/alp/istio-inject-configmap-1.1.3.yaml index c4a66b03604..3b3f9f94427 100644 --- a/manifests/alp/istio-inject-configmap-1.1.3.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.3.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.4.yaml b/manifests/alp/istio-inject-configmap-1.1.4.yaml index 777b24de4f6..2fdcd5384fe 100644 --- a/manifests/alp/istio-inject-configmap-1.1.4.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.4.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.5.yaml b/manifests/alp/istio-inject-configmap-1.1.5.yaml index 6c1e42d9f29..b7554486be4 100644 --- a/manifests/alp/istio-inject-configmap-1.1.5.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.5.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.6.yaml b/manifests/alp/istio-inject-configmap-1.1.6.yaml index 61bdfecb54a..e7ae768261d 100644 --- a/manifests/alp/istio-inject-configmap-1.1.6.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.6.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.7.yaml b/manifests/alp/istio-inject-configmap-1.1.7.yaml index d71dff8b562..fbf0a532815 100644 --- a/manifests/alp/istio-inject-configmap-1.1.7.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.7.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.8.yaml b/manifests/alp/istio-inject-configmap-1.1.8.yaml index 7321c78f013..7c1b2686f82 100644 --- a/manifests/alp/istio-inject-configmap-1.1.8.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.8.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.1.9.yaml b/manifests/alp/istio-inject-configmap-1.1.9.yaml index ac7dbfb7eef..9470041134e 100644 --- a/manifests/alp/istio-inject-configmap-1.1.9.yaml +++ b/manifests/alp/istio-inject-configmap-1.1.9.yaml @@ -180,7 +180,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.10.yaml b/manifests/alp/istio-inject-configmap-1.10.yaml index 4f0382cf24d..27b2184b5c5 100644 --- a/manifests/alp/istio-inject-configmap-1.10.yaml +++ b/manifests/alp/istio-inject-configmap-1.10.yaml @@ -433,7 +433,7 @@ data: name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false @@ -720,7 +720,7 @@ data: name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.15.yaml b/manifests/alp/istio-inject-configmap-1.15.yaml index 389535de8fd..28c37931102 100644 --- a/manifests/alp/istio-inject-configmap-1.15.yaml +++ b/manifests/alp/istio-inject-configmap-1.15.yaml @@ -434,7 +434,7 @@ data: name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false @@ -719,7 +719,7 @@ data: name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.0.yaml b/manifests/alp/istio-inject-configmap-1.2.0.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.0.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.0.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.1.yaml b/manifests/alp/istio-inject-configmap-1.2.1.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.1.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.1.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.2.yaml b/manifests/alp/istio-inject-configmap-1.2.2.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.2.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.2.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.3.yaml b/manifests/alp/istio-inject-configmap-1.2.3.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.3.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.3.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.4.yaml b/manifests/alp/istio-inject-configmap-1.2.4.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.4.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.4.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.5.yaml b/manifests/alp/istio-inject-configmap-1.2.5.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.5.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.5.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.6.yaml b/manifests/alp/istio-inject-configmap-1.2.6.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.6.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.6.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.7.yaml b/manifests/alp/istio-inject-configmap-1.2.7.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.7.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.7.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.8.yaml b/manifests/alp/istio-inject-configmap-1.2.8.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.8.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.8.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.2.9.yaml b/manifests/alp/istio-inject-configmap-1.2.9.yaml index 5c29503701c..27bb00289ba 100644 --- a/manifests/alp/istio-inject-configmap-1.2.9.yaml +++ b/manifests/alp/istio-inject-configmap-1.2.9.yaml @@ -301,7 +301,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.3.0.yaml b/manifests/alp/istio-inject-configmap-1.3.0.yaml index 6f246da202b..ea9f6d25ea2 100644 --- a/manifests/alp/istio-inject-configmap-1.3.0.yaml +++ b/manifests/alp/istio-inject-configmap-1.3.0.yaml @@ -327,7 +327,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.3.1.yaml b/manifests/alp/istio-inject-configmap-1.3.1.yaml index f78729a8e48..cd1154340d0 100644 --- a/manifests/alp/istio-inject-configmap-1.3.1.yaml +++ b/manifests/alp/istio-inject-configmap-1.3.1.yaml @@ -333,7 +333,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.3.2.yaml b/manifests/alp/istio-inject-configmap-1.3.2.yaml index f78729a8e48..cd1154340d0 100644 --- a/manifests/alp/istio-inject-configmap-1.3.2.yaml +++ b/manifests/alp/istio-inject-configmap-1.3.2.yaml @@ -333,7 +333,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.3.3.yaml b/manifests/alp/istio-inject-configmap-1.3.3.yaml index f78729a8e48..cd1154340d0 100644 --- a/manifests/alp/istio-inject-configmap-1.3.3.yaml +++ b/manifests/alp/istio-inject-configmap-1.3.3.yaml @@ -333,7 +333,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.3.4.yaml b/manifests/alp/istio-inject-configmap-1.3.4.yaml index f78729a8e48..cd1154340d0 100644 --- a/manifests/alp/istio-inject-configmap-1.3.4.yaml +++ b/manifests/alp/istio-inject-configmap-1.3.4.yaml @@ -333,7 +333,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.3.5.yaml b/manifests/alp/istio-inject-configmap-1.3.5.yaml index f78729a8e48..cd1154340d0 100644 --- a/manifests/alp/istio-inject-configmap-1.3.5.yaml +++ b/manifests/alp/istio-inject-configmap-1.3.5.yaml @@ -333,7 +333,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.4.0.yaml b/manifests/alp/istio-inject-configmap-1.4.0.yaml index fe411e9a037..0f693cd4441 100644 --- a/manifests/alp/istio-inject-configmap-1.4.0.yaml +++ b/manifests/alp/istio-inject-configmap-1.4.0.yaml @@ -351,7 +351,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.4.1.yaml b/manifests/alp/istio-inject-configmap-1.4.1.yaml index fe411e9a037..0f693cd4441 100644 --- a/manifests/alp/istio-inject-configmap-1.4.1.yaml +++ b/manifests/alp/istio-inject-configmap-1.4.1.yaml @@ -351,7 +351,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.4.2.yaml b/manifests/alp/istio-inject-configmap-1.4.2.yaml index fe411e9a037..0f693cd4441 100644 --- a/manifests/alp/istio-inject-configmap-1.4.2.yaml +++ b/manifests/alp/istio-inject-configmap-1.4.2.yaml @@ -351,7 +351,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.6.yaml b/manifests/alp/istio-inject-configmap-1.6.yaml index acd9b262bdd..1175bef5cb7 100644 --- a/manifests/alp/istio-inject-configmap-1.6.yaml +++ b/manifests/alp/istio-inject-configmap-1.6.yaml @@ -363,7 +363,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.7.yaml b/manifests/alp/istio-inject-configmap-1.7.yaml index f9a11228be7..a0535856035 100644 --- a/manifests/alp/istio-inject-configmap-1.7.yaml +++ b/manifests/alp/istio-inject-configmap-1.7.yaml @@ -369,7 +369,7 @@ data: - mountPath: /var/run/dikastes name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/alp/istio-inject-configmap-1.9.yaml b/manifests/alp/istio-inject-configmap-1.9.yaml index 94b71a75c1c..416357737e7 100644 --- a/manifests/alp/istio-inject-configmap-1.9.yaml +++ b/manifests/alp/istio-inject-configmap-1.9.yaml @@ -428,7 +428,7 @@ data: name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false @@ -714,7 +714,7 @@ data: name: dikastes-sock - name: dikastes - image: calico/dikastes:v3.29.0 + image: calico/dikastes:v3.29.1 args: ["server", "-l", "/var/run/dikastes/dikastes.sock", "-d", "/var/run/felix/nodeagent/socket"] securityContext: allowPrivilegeEscalation: false diff --git a/manifests/apiserver.yaml b/manifests/apiserver.yaml index 5bfb57d5019..a4a1f0d19c5 100644 --- a/manifests/apiserver.yaml +++ b/manifests/apiserver.yaml @@ -77,7 +77,7 @@ spec: env: - name: DATASTORE_TYPE value: kubernetes - image: calico/apiserver:v3.29.0 + image: calico/apiserver:v3.29.1 name: calico-apiserver readinessProbe: httpGet: diff --git a/manifests/calico-bpf.yaml b/manifests/calico-bpf.yaml index c6c88011063..5919b0f1087 100644 --- a/manifests/calico-bpf.yaml +++ b/manifests/calico-bpf.yaml @@ -6122,7 +6122,7 @@ spec: # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: @@ -6161,7 +6161,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6215,7 +6215,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6241,7 +6241,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6478,7 +6478,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. diff --git a/manifests/calico-etcd.yaml b/manifests/calico-etcd.yaml index 33de1918e88..a46042a8194 100644 --- a/manifests/calico-etcd.yaml +++ b/manifests/calico-etcd.yaml @@ -305,7 +305,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -351,7 +351,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -377,7 +377,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -623,7 +623,7 @@ spec: hostNetwork: true containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # The location of the etcd cluster. diff --git a/manifests/calico-policy-only.yaml b/manifests/calico-policy-only.yaml index a4a3cb06762..60750c8133d 100644 --- a/manifests/calico-policy-only.yaml +++ b/manifests/calico-policy-only.yaml @@ -6103,7 +6103,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6140,7 +6140,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6166,7 +6166,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6360,7 +6360,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. @@ -6453,7 +6453,7 @@ spec: seccompProfile: type: RuntimeDefault containers: - - image: docker.io/calico/typha:v3.29.0 + - image: docker.io/calico/typha:v3.29.1 imagePullPolicy: IfNotPresent name: calico-typha ports: diff --git a/manifests/calico-typha.yaml b/manifests/calico-typha.yaml index f6fa4d2ec3a..b0dcf73f16e 100644 --- a/manifests/calico-typha.yaml +++ b/manifests/calico-typha.yaml @@ -6153,7 +6153,7 @@ spec: # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: @@ -6181,7 +6181,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6224,7 +6224,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6250,7 +6250,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6479,7 +6479,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. @@ -6572,7 +6572,7 @@ spec: seccompProfile: type: RuntimeDefault containers: - - image: docker.io/calico/typha:v3.29.0 + - image: docker.io/calico/typha:v3.29.1 imagePullPolicy: IfNotPresent name: calico-typha ports: diff --git a/manifests/calico-vxlan.yaml b/manifests/calico-vxlan.yaml index 07482367cc3..0881c23b9a6 100644 --- a/manifests/calico-vxlan.yaml +++ b/manifests/calico-vxlan.yaml @@ -6117,7 +6117,7 @@ spec: # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: @@ -6145,7 +6145,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6188,7 +6188,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6214,7 +6214,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6435,7 +6435,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. diff --git a/manifests/calico.yaml b/manifests/calico.yaml index 35e1782fb9e..a17ebe2dbeb 100644 --- a/manifests/calico.yaml +++ b/manifests/calico.yaml @@ -6117,7 +6117,7 @@ spec: # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: @@ -6145,7 +6145,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6188,7 +6188,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6214,7 +6214,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6437,7 +6437,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. diff --git a/manifests/calicoctl-etcd.yaml b/manifests/calicoctl-etcd.yaml index 02865f018a5..7f7c45afc2c 100644 --- a/manifests/calicoctl-etcd.yaml +++ b/manifests/calicoctl-etcd.yaml @@ -1,7 +1,7 @@ # Calico Version master # https://projectcalico.docs.tigera.io/releases#master # This manifest includes the following component versions: -# calico/ctl:v3.29.0 +# calico/ctl:v3.29.1 apiVersion: v1 kind: Pod @@ -14,7 +14,7 @@ spec: hostNetwork: true containers: - name: calicoctl - image: calico/ctl:v3.29.0 + image: calico/ctl:v3.29.1 command: - calicoctl args: diff --git a/manifests/calicoctl.yaml b/manifests/calicoctl.yaml index 9782725b51b..781109d9ea9 100644 --- a/manifests/calicoctl.yaml +++ b/manifests/calicoctl.yaml @@ -1,7 +1,7 @@ # Calico Version master # https://projectcalico.docs.tigera.io/releases#master # This manifest includes the following component versions: -# calico/ctl:v3.29.0 +# calico/ctl:v3.29.1 apiVersion: v1 kind: ServiceAccount @@ -23,7 +23,7 @@ spec: serviceAccountName: calicoctl containers: - name: calicoctl - image: calico/ctl:v3.29.0 + image: calico/ctl:v3.29.1 command: - calicoctl args: diff --git a/manifests/canal-etcd.yaml b/manifests/canal-etcd.yaml index 44d1cb5afbb..8142d74b28e 100644 --- a/manifests/canal-etcd.yaml +++ b/manifests/canal-etcd.yaml @@ -385,7 +385,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -455,7 +455,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -481,7 +481,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -783,7 +783,7 @@ spec: hostNetwork: true containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # The location of the etcd cluster. diff --git a/manifests/canal.yaml b/manifests/canal.yaml index b44aa078747..b9bdaeec9de 100644 --- a/manifests/canal.yaml +++ b/manifests/canal.yaml @@ -6126,7 +6126,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6175,7 +6175,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6201,7 +6201,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6435,7 +6435,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. diff --git a/manifests/csi-driver.yaml b/manifests/csi-driver.yaml index 1a3b275abc9..bc488e6f1a3 100644 --- a/manifests/csi-driver.yaml +++ b/manifests/csi-driver.yaml @@ -50,7 +50,7 @@ spec: effect: NoSchedule containers: - name: calico-csi - image: calico/csi:v3.29.0 + image: calico/csi:v3.29.1 imagePullPolicy: IfNotPresent args: - --nodeid=$(KUBE_NODE_NAME) @@ -75,7 +75,7 @@ spec: mountPath: /var/lib/kubelet/ mountPropagation: "Bidirectional" - name: csi-node-driver-registrar - image: calico/node-driver-registrar:v3.29.0 + image: calico/node-driver-registrar:v3.29.1 imagePullPolicy: IfNotPresent args: - --v=5 diff --git a/manifests/flannel-migration/calico.yaml b/manifests/flannel-migration/calico.yaml index 81a02747467..ab64e881ed9 100644 --- a/manifests/flannel-migration/calico.yaml +++ b/manifests/flannel-migration/calico.yaml @@ -6119,7 +6119,7 @@ spec: # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: @@ -6147,7 +6147,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.29.0 + image: docker.io/calico/cni:v3.29.1 imagePullPolicy: IfNotPresent command: ["/opt/cni/bin/install"] envFrom: @@ -6190,7 +6190,7 @@ spec: # i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed # in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode. - name: "mount-bpffs" - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent command: ["calico-node", "-init", "-best-effort"] volumeMounts: @@ -6216,7 +6216,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.29.0 + image: docker.io/calico/node:v3.29.1 imagePullPolicy: IfNotPresent envFrom: - configMapRef: @@ -6437,7 +6437,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.29.0 + image: docker.io/calico/kube-controllers:v3.29.1 imagePullPolicy: IfNotPresent env: # Choose which controllers to run. diff --git a/manifests/flannel-migration/migration-job.yaml b/manifests/flannel-migration/migration-job.yaml index 9ad230cae4b..cd06607918e 100644 --- a/manifests/flannel-migration/migration-job.yaml +++ b/manifests/flannel-migration/migration-job.yaml @@ -150,7 +150,7 @@ spec: restartPolicy: OnFailure containers: - name: flannel-migration-controller - image: calico/flannel-migration-controller:v3.29.0 + image: calico/flannel-migration-controller:v3.29.1 env: # Choose which controllers to run. - name: ENABLED_CONTROLLERS diff --git a/manifests/ocp/02-tigera-operator.yaml b/manifests/ocp/02-tigera-operator.yaml index a55481934b3..397293b7522 100644 --- a/manifests/ocp/02-tigera-operator.yaml +++ b/manifests/ocp/02-tigera-operator.yaml @@ -32,7 +32,7 @@ spec: dnsPolicy: ClusterFirstWithHostNet containers: - name: tigera-operator - image: quay.io/tigera/operator:v1.36.0 + image: quay.io/tigera/operator:v1.36.2 imagePullPolicy: IfNotPresent command: - operator @@ -50,7 +50,7 @@ spec: - name: OPERATOR_NAME value: "tigera-operator" - name: TIGERA_OPERATOR_INIT_IMAGE_VERSION - value: v1.36.0 + value: v1.36.2 envFrom: - configMapRef: name: kubernetes-services-endpoint @@ -69,7 +69,7 @@ spec: name: install-resources-script initContainers: - name: create-initial-resources - image: docker.io/calico/ctl:v3.29.0 + image: docker.io/calico/ctl:v3.29.1 env: - name: DATASTORE_TYPE value: kubernetes diff --git a/manifests/tigera-operator.yaml b/manifests/tigera-operator.yaml index 3df7b29a1a0..abb1d848db9 100644 --- a/manifests/tigera-operator.yaml +++ b/manifests/tigera-operator.yaml @@ -22583,7 +22583,7 @@ spec: dnsPolicy: ClusterFirstWithHostNet containers: - name: tigera-operator - image: quay.io/tigera/operator:v1.36.0 + image: quay.io/tigera/operator:v1.36.2 imagePullPolicy: IfNotPresent command: - operator @@ -22601,7 +22601,7 @@ spec: - name: OPERATOR_NAME value: "tigera-operator" - name: TIGERA_OPERATOR_INIT_IMAGE_VERSION - value: v1.36.0 + value: v1.36.2 envFrom: - configMapRef: name: kubernetes-services-endpoint diff --git a/release-notes/v3.29.1-release-notes.md b/release-notes/v3.29.1-release-notes.md new file mode 100644 index 00000000000..c868a4990c4 --- /dev/null +++ b/release-notes/v3.29.1-release-notes.md @@ -0,0 +1,15 @@ +20 Nov 2024 + +#### Bug fixes + +- Fix that the new tiers resource was omitted from etcd->Kubernetes migration. [calico 9494](https://github.com/projectcalico/calico/pull/9494) (@fasaxc) +- Fix a panic in Felix when accessing a nil address in flushing host addresses, i.e. flushHostIPUpdates function. [calico 9488](https://github.com/projectcalico/calico/pull/9488) (@mazdakn) +- Add permission to Calico API server to create tier resources. [calico 9484](https://github.com/projectcalico/calico/pull/9484) (@mazdakn) +- Do not fail data store initialisation when unauthorised error happen while creating default and adminnetworkpolicy tiers. Those tiers eventually get created by another component. [calico 9454](https://github.com/projectcalico/calico/pull/9454) (@mazdakn) +- Helm: Fix that uninstall Job had duplicate k8s-app labels [calico 9439](https://github.com/projectcalico/calico/pull/9439) (@caseydavenport) +- Fix missing routes when vxlan mode is cross-subnet and the environment is purely V6 (no V4 host addresses) [calico 9430](https://github.com/projectcalico/calico/pull/9430) (@tomastigera) + +#### Other changes + +- ebpf: real IPs in bpf debug output with co-re enabled kernels [calico 9465](https://github.com/projectcalico/calico/pull/9465) (@tomastigera) +- Add setting to enable wireguard NAPI threading [calico 9414](https://github.com/projectcalico/calico/pull/9414) (@jrcichra)