Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
442 changes: 223 additions & 219 deletions static/compatibilities.yaml

Large diffs are not rendered by default.

161 changes: 69 additions & 92 deletions static/compatibilities/cilium.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1082,10 +1082,51 @@ versions:
images: ['quay.io/cilium/cilium:v1.13.2@sha256:85708b11d45647c35b9288e0de0706d24a5ce8a378166cadc700f756cc1a38d6',
'quay.io/cilium/operator-generic:v1.13.2@sha256:a1982c0a22297aaac3563e428c330e17668305a41865a842dec53d241c5490ab']
eolAt: '2024-07-24'
- version: 1.13.0
- version: 1.13.1
kube: ['1.26', '1.25', '1.24']
requirements: []
incompatibilities: []
summary:
helm_changes: "### Helm values / chart changes to account for (1.13.0 \u2192 1.13.1)\n\
- **Use the new Helm chart version** when upgrading to Cilium **v1.13.1** (explicitly\
\ called out in the release notes).\n- **Removed Helm value**: `installIptablesRules`\n\
\ - The agent flag `--install-iptables-rules` is now hidden, and the Helm value\
\ is removed. If your values file sets it, **delete it** or the upgrade will\
\ fail/complain about an unknown value.\n- **New Helm options/features**:\n\
\ - **Pod/container `securityContext` support** added via Helm (you may now\
\ set hardened contexts through values).\n - **ServiceAccount automount configuration**\
\ added (ability to configure `automountServiceAccountToken`).\n - **Hubble\
\ UI Service annotations** supported (can now add annotations to the hubble-ui\
\ Service).\n- **Helm bugfixes** (no action unless you hit these cases):\n \
\ - Fix for `cni.configMap` value regression (if you rely on a custom CNI configmap,\
\ 1.13.1 restores expected behavior).\n - Fix missing `updateStrategy` for\
\ hubble-ui deployment.\n - Fix duplicate `enable-envoy-config` flag generation\
\ when enabling L7LB + Ingress Controller + Gateway API together.\n - Chart\
\ rendering fix: don\u2019t render Role/RoleBinding when agent is disabled."
chart_updates: [Envoy image bumped to **1.23.4** (impacts L7 proxy behavior/perf/compatibility
in edge cases)., Chart now supports configuring **pod/container security contexts**
and **SA token automount** settings., Chart adds support for **annotations
on the Hubble UI Service**., Chart removes the deprecated/now-hidden iptables
install toggle (`installIptablesRules`)., 'Multiple Helm chart rendering/templating
fixes (hubble-ui updateStrategy, duplicate flags, RBAC rendering when agent
disabled).']
features: [New CLI command to dump **cgroups metadata** (useful for debugging
cgroup-related datapath behavior)., 'New Hubble metrics context: **pod-name**
label without namespace (helps metrics cardinality/labeling depending on your
dashboards).', Helm chart now supports configuring **pod/container securityContext**
and **ServiceAccount token automount** settings., Helm chart now supports
**annotations on the Hubble UI Service**.]
breaking_changes: ['Helm chart: **`installIptablesRules` value is removed**; you
must remove it from your Helm values if present. (Agent flag `--install-iptables-rules`
is hidden as well.)']
chart_version: 1.13.1
images: ['quay.io/cilium/cilium:v1.13.1@sha256:428a09552707cc90228b7ff48c6e7a33dc0a97fe1dd93311ca672834be25beda',
'quay.io/cilium/operator-generic:v1.13.1@sha256:f47ba86042e11b11b1a1e3c8c34768a171c6d8316a3856253f4ad4a92615d555']
eolAt: '2024-07-24'
- version: 1.13.0
kube: ['1.25', '1.24', '1.23']
requirements: []
incompatibilities: []
summary:
helm_changes: "### Helm values / chart behavior to review\n- **New:** `ipMasqAgent.nonMasqueradeCIDRs`\
\ (1.13) \u2014 lets you configure additional CIDRs that should not be masqueraded\
Expand Down Expand Up @@ -1203,58 +1244,14 @@ versions:
chart_version: 1.12.9
images: ['quay.io/cilium/cilium:v1.12.9@sha256:677e7a906506b8a13fecb6f0f783ed647b36036786c8c640ff98e25ec2f2ab1f',
'quay.io/cilium/operator-generic:v1.12.9@sha256:cc8d7b222f63812c691a685b32fedab8a805d243da720653cdc2ff0c4a562673']
- version: 1.12.6
- version: 1.12.8
kube: ['1.26', '1.25', '1.24']
requirements: []
incompatibilities: []
summary:
helm_changes: "### Helm chart / values changes to watch (1.12.0 \u2192 1.12.6)\n\
\nFrom the notes you provided, the only explicit Helm-related change called\
\ out in **v1.12.6** is:\n\n- **Removed Helm validation for `certManagerIssuerRef`**\
\ (`helm: Delete validations for certManagerIssuerRef`).\n - Practical impact:\
\ installs/upgrades that previously failed due to chart-side validation may\
\ now proceed. No action required unless you relied on the validation as a guardrail.\n\
\nFrom **v1.12.0** (initial 1.12 series) you should ensure your values align\
\ with renamed/new options that appear in the release notes:\n\n- **Config rename:**\
\ `bpf.hostRouting` \u2192 `bpf.hostLegacyRouting` (ConfigMap option). If you\
\ set the old key, move to the new one.\n- **Prometheus ports default changed**\
\ to new reserved Cilium ports. If you scrape by port number or have NetworkPolicies/firewalls,\
\ verify and update.\n- **Ingress controller support** added (including Helm\
\ support to create a `cilium` `IngressClass`). Only relevant if you enable\
\ Cilium Ingress.\n- **Egress Gateway CRD change:** new `CiliumEgressGatewayPolicy`\
\ introduced; `CiliumEgressNATPolicy` deprecated. If you use egress gateway,\
\ plan CRD/policy migration.\n- **DaemonSet privileged mode removed** in 1.12.0;\
\ ensure your cluster/runtime doesn\u2019t depend on privileged security context\
\ for Cilium.\n\nIf you have your current Helm values file, do a `helm diff\
\ upgrade` and specifically search for the items above.\n"
chart_updates: [v1.12.6 contains a Helm chart tweak to remove validations for
`certManagerIssuerRef` (less strict chart-side validation during install/upgrade).,
No other chart-template structural changes were explicitly listed in the snippets
you provided for v1.12.6; most changes in 1.12.6 are runtime/agent fixes.,
'The 1.12.0 notes mention multiple Helm chart enhancements (IngressClass creation,
more exposed values, certgen update, service type/nodePort options for Hubble
Relay/UI) which may be present throughout the 1.12.x chart series depending
on your starting chart version.']
features: ['v1.12.0 introduces the integrated Cilium Ingress Controller, enabling
Kubernetes Ingress to be served by Cilium/Envoy.', v1.12.0 adds major Service
Mesh capabilities (sidecar and sidecar-free options) and support for `CiliumEnvoyConfig`
CRDs., v1.12.0 promotes Egress Gateway to stable and introduces new capabilities
like NAT46/64 for Services and service backend quarantine/maintenance states.,
'v1.12.6 adds a bugtool flag to exclude endpoint objects, improving supportability
when collecting diagnostics.', 'v1.12.6 includes a CES queue delay metric
fix and other observability-related improvements (e.g., preventing a crash
when the tracker is nil).']
breaking_changes: ['Egress Gateway policy CRD changed in 1.12.0: `CiliumEgressGatewayPolicy`
is introduced and the previous `CiliumEgressNATPolicy` is deprecated; clusters
using the old CRD should plan migration and confirm CRDs are installed/updated
before applying new policies.', 'Config option rename in 1.12.0: `bpf.hostRouting`
was renamed to `bpf.hostLegacyRouting`; using the old key may result in the
setting being ignored depending on your config management.', 'Default Prometheus
ports changed in 1.12.0; monitoring configs, NetworkPolicies, and firewalls
that assume the old ports may break scraping until updated.']
chart_version: 1.12.6
images: ['quay.io/cilium/cilium:v1.12.6@sha256:454134506b0448c756398d3e8df68d474acde2a622ab58d0c7e8b272b5867d0d',
'quay.io/cilium/operator-generic:v1.12.6@sha256:eec4430d222cb2967d42d3b404d2606e66468de47ae85e0a3ca3f58f00a5e017']
summary: null
chart_version: 1.12.8
images: ['quay.io/cilium/cilium:v1.12.8@sha256:b6c3c48b380334b8f08dba6e0c28d906c0d722b8c2beb0d506b3cea27f66f78d',
'quay.io/cilium/operator-generic:v1.12.8@sha256:7431f0c2001fb875b1a8901e103825394c38cd6c63a1435a3273ed20ae0e7578']
- version: 1.12.0
kube: ['1.25', '1.24', '1.23']
requirements: []
Expand Down Expand Up @@ -1339,25 +1336,32 @@ versions:
chart_version: 1.11.16
images: ['quay.io/cilium/cilium:v1.11.16@sha256:d2f2632c997a027ee4e540432edb4d8594e78e33315427e7ec3c06b473ec1e4e',
'quay.io/cilium/operator-generic:v1.11.16@sha256:ea3fbe5ab65efc41228d716a64804b6fca9e2299835c3d39ae1cb248c1594c55']
- version: 1.11.13
- version: 1.11.15
kube: ['1.26', '1.25', '1.24']
requirements: []
incompatibilities: []
summary:
helm_changes: ''
chart_updates: []
features: ['1.11.13 adds a bugtool flag to exclude endpoint objects from the collected
bundle, which can reduce output size and avoid sharing endpoint details when
needed.', '1.11.13 improves operational robustness via an agent init check
that cleans up unmanaged/stale CiliumEndpoint objects on restart, helping
avoid endpoint drift and related issues.']
breaking_changes: ['If you are still using the legacy taint `node.cilium.io/agent-not-ready=true:NoSchedule`
(noted as important in v1.11.2 release notes), update to `node.cilium.io/agent-not-ready=true:NoExecute`
to ensure correct scheduling/eviction behavior on affected environments such
as GKE; this can change how pods are handled while the agent is not ready.']
chart_version: 1.11.13
images: ['quay.io/cilium/cilium:v1.11.13@sha256:cc5212dd709d1fadf19ffeae602d2af54d03634791f0f1a7e3bab0bd263918a1',
'quay.io/cilium/operator-generic:v1.11.13@sha256:a34fc3d5007201bdfe7fc3a469351dc6b9f190720ea54622f94cdfb0b28c6726']
helm_changes: "- **Use the newer Helm chart version when upgrading to v1.11.15.**\
\ The release notes explicitly call this out.\n- **New Helm chart knobs/behavior:**\n\
\ - Adds **Pod and container `securityContext`** support in the chart. If you\
\ previously set security context via custom patches, re-check rendered manifests\
\ and move settings into values where appropriate.\n - Adds **ServiceAccount\
\ automount configuration** (ability to control `automountServiceAccountToken`).\
\ If your cluster enforces restricted PSA/OPA policies, you may need to explicitly\
\ set this for Cilium components.\n"
chart_updates: [Helm chart updated to support pod/container `securityContext`
fields., Helm chart updated to support ServiceAccount token automount configuration.,
Helm chart improvements mentioned; ensure chart version matches the app version
for this upgrade.]
features: [Helm chart gains first-class configuration for pod/container security
contexts (useful for Pod Security Standards / restricted clusters)., Helm
chart can now configure ServiceAccount token automount behavior for Cilium
pods., Envoy sidecar/proxy dependency updated to 1.23.4 (includes various
fixes and CVE coverage depending on upstream).]
breaking_changes: []
chart_version: 1.11.15
images: ['quay.io/cilium/cilium:v1.11.15@sha256:434ea1ff40b8db76c2be6cabfa1bbd2b887eaabe42e757651ea14757468e3bf4',
'quay.io/cilium/operator-generic:v1.11.15@sha256:1feed1b895b39c7bdcbfe6232536e26edba9beb41c160c66d539de4358275a2e']
- version: 1.11.2
kube: ['1.25', '1.24', '1.23']
requirements: []
Expand Down Expand Up @@ -1495,33 +1499,6 @@ versions:
chart_version: 1.11.0
images: ['quay.io/cilium/cilium:v1.11.0@sha256:ea677508010800214b0b5497055f38ed3bff57963fa2399bcb1c69cf9476453a',
'quay.io/cilium/operator-generic:v1.11.0@sha256:b522279577d0d5f1ad7cadaacb7321d1b172d8ae8c8bc816e503c897b420cfe3']
- version: 1.10.19
kube: ['1.26', '1.25', '1.24']
requirements: []
incompatibilities: []
summary:
helm_changes: "- **New Helm values (1.10.8):** `serviceMonitor.annotations` /\
\ custom ServiceMonitor annotations were added so you can attach extra labels/annotations\
\ to the Prometheus ServiceMonitor (useful for Prometheus Operator discovery/tenancy).\n\
\ - Action: if you previously patched the ServiceMonitor post-install, you\
\ can now move that into values.yaml.\n\n- **Hubble Relay deployment manifest\
\ fix (1.10.19):** The chart/manifests were adjusted to set the correct `terminationMessagePolicy`\
\ for the Hubble Relay Deployment.\n - Action: no value changes expected, but\
\ after upgrade verify the rendered Deployment spec matches your policy/standards\
\ if you enforce them via admission policies.\n"
chart_updates: [Host proxy (Envoy) version was updated in the 1.10.8 release line
(Envoy 1.21.1) to address multiple CVEs; expect new images/digests for cilium
components., Hubble Relay Deployment spec was fixed in 1.10.19 (termination
message policy)., CNI plugins were updated to v1.2.0 by 1.10.19; this changes
the bundled CNI binary version shipped with the images.]
features: ['Prometheus metrics: xfrm (IPsec/XFRM) statistics are now exposed,
improving observability for encrypted traffic paths.', 'Helm chart now supports
adding custom annotations to the ServiceMonitor directly via values, reducing
the need for post-render patches.']
breaking_changes: []
chart_version: 1.10.19
images: ['quay.io/cilium/cilium:v1.10.19@sha256:63c76e5c2317b22f9e11c5d30f1b799cd19eb88649c03941f66dbd9b8f487f15',
'quay.io/cilium/operator-generic:v1.10.19@sha256:d09f5ca4738bb9190c977f4ffed77e2aec2eae50db2a75368cbcc3f8f7ab6708']
- version: 1.10.8
kube: ['1.25', '1.24', '1.23']
requirements: []
Expand Down
49 changes: 46 additions & 3 deletions static/compatibilities/external-secrets.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,17 @@ versions:
kube: ['1.34']
requirements: []
incompatibilities: []
summary: null
summary:
helm_changes: ''
chart_updates: [Helm chart bumped from 1.1.0 (noted in app v1.1.1 release notes)
to 1.2.0 (noted in app v1.2.1 release notes).]
features: ['Infisical provider: added caBundle and caProvider support for custom/cluster
CA handling.', 'Doppler provider: added configurable retry settings.', 'BeyondTrust
provider: enabled pushing secrets to BeyondTrust.', 'Password generator: can
generate and expose multiple passwords.', 'Oracle provider: implemented SecretExists
check/behavior.', 'Helm chart: added dynamic labelSelector when topologySpreadConstraints
labelSelector is not defined.']
breaking_changes: []
chart_version: 1.2.1
images: ['ghcr.io/external-secrets/external-secrets:v1.2.1']
- version: 1.1.1
Expand Down Expand Up @@ -84,7 +94,27 @@ versions:
kube: ['1.34']
requirements: []
incompatibilities: []
summary: null
summary:
helm_changes: ''
chart_updates: [Helm chart release/update is included for v0.20.4 (from v0.20.3)
but v1.0.0 notes provided do not include specific chart value/key changes
beyond one default normalization and internal chart cleanups mentioned in
PR titles., 'Chart-related changes called out: removed unused values from
the chart (in v0.20.4) and normalized the default certificate duration value
(in v1.0.0).']
features: [Dynamic target implementation for ExternalSecret sources (new dynamic
target behavior/implementation)., 'esoctl: new bootstrap generator commands
to help generate bootstrap manifests/config for generators.', 'Generators:
added a hex generator.', 'AWS Secrets Manager: ability to define a resource
policy via metadata.', E2E managed tests were re-implemented (improves test
coverage/reliability rather than user-facing runtime behavior).]
breaking_changes: ['Possible Helm values impact: chart removed unused values (if
you set any of those keys, Helm will now ignore/possibly error depending on
tooling) and the default certificate duration value was normalized (could
change effective cert validity if you relied on the previous implicit default).',
'Go module separation/internal build changes (generally not runtime-breaking
for users, but could affect downstream builds/forks or custom images if you
vendor/import ESO modules).']
chart_version: 1.0.0
images: ['oci.external-secrets.io/external-secrets/external-secrets:v1.0.0']
- version: 0.20.4
Expand Down Expand Up @@ -311,7 +341,20 @@ versions:
'1.20', '1.19']
requirements: []
incompatibilities: []
summary: null
summary:
helm_changes: ''
chart_updates: []
features: ['New provider integrations: Infisical, Device42, and Bitwarden Secret
Manager.', 'GCP PushSecret: support specifying a location/region for pushed
secrets.', 'AWS SSM Parameter Store: support setting parameter Type, and reduce
API calls (fetch once).', 'ClusterSecretStore: namespaceConditions now support
glob patterns for namespace matching.', 'PushSecret: add logic to skip unmanaged
stores; support pushing whole Kubernetes Secrets to Google Cloud Secret Manager
and Azure Key Vault.', 'Kubernetes provider: add AuthRef support for improved
auth configuration.', 'Logging: add log.level and log.encoding options across
components.', 'cert-controller performance/scaling: allow restricting CRDs/webhooks
in informer cache; enable partial cache when installCRDs=true.']
breaking_changes: []
chart_version: 0.9.20
images: ['ghcr.io/external-secrets/external-secrets:v0.9.20']
- version: 0.8.7
Expand Down
2 changes: 1 addition & 1 deletion static/compatibilities/gpu-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ versions:
images: ['k8s.gcr.io/nfd/node-feature-discovery:v0.10.1', 'nvcr.io/nvidia/gpu-operator:v22.9.2']
incompatibilities: []
- version: 22.9.1
kube: ['1.26', '1.25', '1.24']
kube: ['1.25', '1.24', '1.23']
requirements: []
chart_version: 22.9.1
images: ['k8s.gcr.io/nfd/node-feature-discovery:v0.10.1', 'nvcr.io/nvidia/gpu-operator:v22.9.1']
Expand Down
1 change: 1 addition & 0 deletions static/compatibilities/keda.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ versions:
incompatibilities: []
summary: null
chart_version: 2.17.0
eolAt: '2026-02-02'
- version: 2.16.0
kube: ['1.31', '1.30', '1.29']
requirements: []
Expand Down
16 changes: 4 additions & 12 deletions static/compatibilities/kube-prometheus-stack.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,22 +5,14 @@ readme_url: https://raw.githubusercontent.com/prometheus-community/helm-charts/m
helm_repository_url: https://prometheus-community.github.io/helm-charts
chart_changelog_url: https://raw.githubusercontent.com/prometheus-community/helm-charts/refs/heads/main/charts/kube-prometheus-stack/UPGRADE.md
versions:
- version: 81.5.2
- version: 81.6.1
kube: ['1.35', '1.34', '1.33', '1.32', '1.31', '1.30', '1.29', '1.28', '1.27', '1.26',
'1.25']
requirements: []
incompatibilities: []
summary:
helm_changes: ''
chart_updates: [Allows Prometheus ingress to reach the alertmanager reloader metrics
port (chart-level ingress behavior change)., 81.5.0 included non-major dependency
updates for kube-prometheus-stack chart dependencies.]
features: ['Prometheus ingress can now be configured/allowed to access the Alertmanager
reloader metrics port, improving scrape/visibility of that component when
using ingress.']
breaking_changes: []
chart_version: 81.5.2
images: ['docker.io/bats/bats:1.13.0', 'docker.io/grafana/grafana:12.3.2', 'ghcr.io/jkroepke/kube-webhook-certgen:1.7.4',
summary: null
chart_version: 81.6.1
images: ['docker.io/bats/bats:1.13.0', 'docker.io/grafana/grafana:12.3.2', 'ghcr.io/jkroepke/kube-webhook-certgen:1.7.6',
'quay.io/kiwigrid/k8s-sidecar:2.5.0', 'quay.io/prometheus-operator/prometheus-operator:v0.88.1',
'quay.io/prometheus/alertmanager:v0.31.0', 'quay.io/prometheus/node-exporter:v1.10.2',
'quay.io/prometheus/prometheus:v3.9.1', 'registry.k8s.io/kube-state-metrics/kube-state-metrics:v2.18.0']
Expand Down
Loading