Skip to content

chore(deps): update helm release cilium to v1.14.0

Yellowhat requested to merge renovate/cilium-1.x into main

This MR contains the following updates:

Package Update Change
cilium (source) patch v1.14.0-rc.1 -> 1.14.0

Release Notes

cilium/cilium (cilium)

v1.14.0: 1.14.0

Compare Source

Changelog

The Cilium core team are excited to announce the Cilium 1.14 release. 🎉

Warning - IPsec

Do NOT upgrade to this release if you are using IPsec.

Summary of Changes

Major Changes:

  • Add mtls-spiffe as auth mode in the CiliumNetworkPolicy (#​24263, @​meyskens)
  • Add support for Kubernetes v1.27 (#​24837, @​tklauser)
  • Add support for Kubernetes v1.27 (#​25602, @​nathanjsweet)
  • Add support for references to CiliumCIDRGroup inside FromCIDRSet for ingress rules in CNPs (#​24638, @​pippolo84)
  • Add TLSRoute support to GatewayAPI (#​25106, @​meyskens)
  • Add WireGuard host2host and LB encryption (#​19401, @​brb)
  • Added L2 announcement feature (#​25471, @​dylandreimerink)
  • cilium: fib lookup consolidation (#​23884, @​borkmann)
  • cilium: IPv4 BIG TCP support (#​26172, @​borkmann)
  • Implement BPF-based masquerading for IPv6 (#​23165, @​qmonnet)
  • Introduce kvstoremesh, a clustermesh-apiserver companion component allowing to cache remote cluster information in the local kvstore for increased scalability and separation. (#​26083, @​giorio94)
  • Module Health: Add Health Provider/Reporter (#​25662, @​tommyp1ckles)
  • New high-scale ipcache mode to support clustermeshes with millions of pods. (#​25148, @​pchaigno)
  • Support DSR with Geneve dispatch in CNI mode (#​23890, @​ysksuzuki)
  • Support for deploying Cilium L7 Proxy (Envoy) independently as a separate DaemonSet for availability, performance, and security benefits. (#​25081, @​mhofstetter)
  • The Cilium operator now taints nodes where Cilium is scheduled to run but is not running. This prevents pods from being scheduled on nodes without Cilium. The CNI configuration file is no longer removed on agent shutdown. This means that pod deletion will always succeed; previously it would fail if Cilium was down for an upgrade. This should help prevent nodes accidentally entering an unmanageable state. It also means that nodes are not removed from cloud LoadBalancer backends during Cilium upgrades. (#​23486, @​squeed)

Minor Changes:

Bugfixes:

CI Changes:

Misc Changes:

Other Changes:

v1.14.0-snapshot.4: 1.14.0-snapshot.4

Compare Source

Summary of Changes

Major Changes:

Minor Changes:

Bugfixes:

  • bpf: fix error handling for invoke_tailcall_if() (#​26118, @​julianwiedmann)
  • bpf: lxc: fix one missing drop notification in CT lookup tail calls (#​26115, @​julianwiedmann)
  • bpf: nodeport: don't reset aggregate ID when revDNAT is called by bpf_lxc (#​25929, @​julianwiedmann)
  • Envoy resource namespacing (#​26037, @​jrajahalme)
  • Fix a bug that would cause connectivity drops of type XfrmOutPolBlock on upgrade when IPsec is enabled. (#​25735, @​pchaigno)
  • Fix bug with toServices policy where service backend churn left stale CIDR identities (#​25687, @​christarazi)
  • Fix false error log message when IPsec is enabled with IPAM modes ENI or Azure and a remote node is deleted. (#​26093, @​pchaigno)
  • Fix for Identities that can be deleted before CESs are reconciled (#​25001, @​dlapcevic)
  • Fix issue where Cilium ServiceAPI would ignore backend changes to services with backends that were used in several services and updated at least once (#​24474, @​strudelPi)
  • Fix leak of IPsec XFRM FWD policies in IPAM modes cluster-pool, kubernetes, and crd when nodes are deleted. Fix incorrect catch-all default-drop XFRM OUT policy for IPsec IPv6 traffic that could lead to leaking plain-text IPv6 traffic if combined with some other bug. (#​25953, @​pchaigno)
  • Fix missed deletion events when reconnecting to/disconnecting from remote clusters (identities) (#​25677, @​giorio94)
  • Fix missed deletion events when reconnecting to/disconnecting from remote clusters (ipcache entries) (#​25675, @​giorio94)
  • Fix panic due to nil-map assignment in l2announcer (#​26315, @​dylandreimerink)
  • Fix three issues in the bug fix to attach IPsec BPF programs to ENI interfaces: do not fatal if loading unexpectedly fails (which may happen if the device is suddenly deleted), ignore veth device changes in order not to reinitialize when new endpoints appear and wait 1 second for further device state changes between reinitializations. (#​25936, @​joamaki)
  • Fixed Cilium agent crash when policy refers to a non-existing Envoy listener. (#​25969, @​jrajahalme)
  • Fixes an issue where SRv6 encapsulated packets are forwarded to the wrong layer 2 next hop. (#​26136, @​ldelossa)

CI Changes:

Misc Changes:

Docker Manifests

cilium

docker.io/cilium/cilium:v1.14.0-snapshot.4@​sha256:dd75919c7b81d06289ffa1dcc0e238f77294a45c57212a87634f277f28835e7d quay.io/cilium/cilium:v1.14.0-snapshot.4@​sha256:dd75919c7b81d06289ffa1dcc0e238f77294a45c57212a87634f277f28835e7d

clustermesh-apiserver

docker.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.4@​sha256:2b844061901af8bd3da5bb99d893694c915e2ceee05e661131e2d684fb0de68c quay.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.4@​sha256:2b844061901af8bd3da5bb99d893694c915e2ceee05e661131e2d684fb0de68c

docker-plugin

docker.io/cilium/docker-plugin:v1.14.0-snapshot.4@​sha256:0282b913a1fecd2088d64296e492a1a786a3f839551bf00679ae469a4558b620 quay.io/cilium/docker-plugin:v1.14.0-snapshot.4@​sha256:0282b913a1fecd2088d64296e492a1a786a3f839551bf00679ae469a4558b620

hubble-relay

docker.io/cilium/hubble-relay:v1.14.0-snapshot.4@​sha256:5a04cc8b09a00a254466b09f8ff77b9e4e56954aa5ac13f43c8a7c05a5725cd1 quay.io/cilium/hubble-relay:v1.14.0-snapshot.4@​sha256:5a04cc8b09a00a254466b09f8ff77b9e4e56954aa5ac13f43c8a7c05a5725cd1

kvstoremesh

docker.io/cilium/kvstoremesh:v1.14.0-snapshot.4@​sha256:a6c5a3f0f420fde69d4e60fdda82bd78c244fb2c12d09a6041a636840a02cc17 quay.io/cilium/kvstoremesh:v1.14.0-snapshot.4@​sha256:a6c5a3f0f420fde69d4e60fdda82bd78c244fb2c12d09a6041a636840a02cc17

operator-alibabacloud

docker.io/cilium/operator-alibabacloud:v1.14.0-snapshot.4@​sha256:86e40be4fac515ec3aae3f54bad8b7112ed0001a860c86092342dfd49fb5b97f quay.io/cilium/operator-alibabacloud:v1.14.0-snapshot.4@​sha256:86e40be4fac515ec3aae3f54bad8b7112ed0001a860c86092342dfd49fb5b97f

operator-aws

docker.io/cilium/operator-aws:v1.14.0-snapshot.4@​sha256:449e30b7bf5492adfc605c50a1a0f5fc822af20ec6787fa93070a22fd5524731 quay.io/cilium/operator-aws:v1.14.0-snapshot.4@​sha256:449e30b7bf5492adfc605c50a1a0f5fc822af20ec6787fa93070a22fd5524731

operator-azure

docker.io/cilium/operator-azure:v1.14.0-snapshot.4@​sha256:72055583294266a78a2262d17fba2129f568946ba61708ee89e2bf74f7da693b quay.io/cilium/operator-azure:v1.14.0-snapshot.4@​sha256:72055583294266a78a2262d17fba2129f568946ba61708ee89e2bf74f7da693b

operator-generic

docker.io/cilium/operator-generic:v1.14.0-snapshot.4@​sha256:1bfe879fff900180000265743afde223c809e3189c8dd704b1c10fb0ccedba6f quay.io/cilium/operator-generic:v1.14.0-snapshot.4@​sha256:1bfe879fff900180000265743afde223c809e3189c8dd704b1c10fb0ccedba6f

operator

docker.io/cilium/operator:v1.14.0-snapshot.4@​sha256:2d47129ebb7bfca3b65e628c0eaaf02d1708ae4aedd29d70ea0f9dc282a7ebda quay.io/cilium/operator:v1.14.0-snapshot.4@​sha256:2d47129ebb7bfca3b65e628c0eaaf02d1708ae4aedd29d70ea0f9dc282a7ebda

v1.14.0-snapshot.3: 1.14.0-snapshot.3

Compare Source

Summary of Changes

Major Changes:

  • Add TLSRoute support to GatewayAPI (#​25106, @​meyskens)
  • New high-scale ipcache mode to support clustermeshes with millions of pods. (#​25148, @​pchaigno)
  • Support for deploying Cilium L7 Proxy (Envoy) independently as a separate DaemonSet for availability, performance, and security benefits. (#​25081, @​mhofstetter)

Minor Changes:

Bugfixes:

  • Add drop notifications for various error paths in the datapath. (#​25183, @​julianwiedmann)
  • Added validation to ensure that enabling Ingress or Gateway API support while l7proxy is disabled will fail, as this is an incompatible configuration. (#​25215, @​youngnick)
  • Avoid dropping short packets (that don't have their L3 header in linear data) in the to-netdev and from-host paths. (#​25159, @​julianwiedmann)
  • bpf,datapath: read jiffies from /proc/schedstat (#​25795, @​ti-mo)
  • bpf/nat: fix current behavior that is silently ignoring errors in a revSNAT context (#​19753, @​sahid)
  • bpf: lb: deal with stale rev_nat_index after svc lookup in fallback path (#​24757, @​julianwiedmann)
  • Compare annotations before discarding CiliumNode updates. (#​25465, @​LynneD)
  • datapath: Fix double SNAT (#​25189, @​brb)
  • DNS proxy now always updates the proxy policy to avoid intermittent policy drops. (#​25147, @​jrajahalme)
  • Fix a bug due to which we would leak Linux XFRM policies, potentially leading to increased CPU consumption, when IPsec is enabled with Azure or ENI IPAM. (#​25784, @​pchaigno)
  • Fix a bug that would cause connectivity drops of type XfrmInNoStates on upgrade when IPsec is enabled with ENI or Azure IPAM mode. (#​25724, @​pchaigno)
  • Fix a possible deadlock when using WireGuard transparent encryption. (#​25419, @​bimmlerd)
  • Fix a regression in which link-local addresses were not treated with the "host" identity in some circumstances. (#​25298, @​asauber)
  • Fix broken IPv6 access to native node devices due to wrong source IPv6 of NA response. (#​25329, @​jschwinger233)
  • Fix bug affecting EKS installations with IPsec encryption enabled, where Cilium wouldn't attach its IPsec BPF program to new ENI interfaces, resulting in connectivity loss between pods on remote nodes. (#​25744, @​joamaki)
  • Fix data race affecting the preferred mark in backends, e.g. backends selected by service with affinity set to local. In very rare cases a backend might be missing its preferred status and a non-local backend might be selected. (#​25087, @​joamaki)
  • Fix incorrect hubble flow data when HTTP requests contain an x-forwarded-for header by adding an explicit use_remote_address: true config to Envoy HTTP configuration to always use the actual remote address of the incoming connection rather than the value of x-forwarded-for header, which may originate from an untrusted source. This change has no effect on Cilium policy enforcement where the source security identity is always resolved before HTTP headers are parsed. Previous Cilium behavior of not adding x-forwarded-for headers is retained via an explicit skip_xff_append: true config setting, except for Cilium Ingress where the source IP address is now appended to x-forwarded-for header. (#​25674, @​jrajahalme)
  • Fix missed deletion events when reconnecting to/disconnecting from remote clusters (nodes and services) (#​25499, @​giorio94)
  • Fix missing drop notifications on conntrack lookup failures when IPv4 and IPv6 are both enabled or socket-level load balancing is disabled. (#​25426, @​bleggett)
  • Fix operator shutdown hanging when kvstore is enabled (#​24979, @​giorio94)
  • Fix path asymmetry when using pod-to-pod encryption with IPsec and tunnel mode. (#​25440, @​pchaigno)
  • Fix permission issue when copying cni plugins onto host path (#​24891, @​JohnJAS)
  • Fix RevSNAT for ICMPv6 packets. (#​25306, @​julianwiedmann)
  • Fix spurious errors containing "Failed to map node IP address to allocated ID". (#​25222, @​bimmlerd)
  • Fix syncing of relevant node annotations into CiliumNode (#​25307, @​meyskens)
  • Fixes issue in BGP reconciler when multiple pod cidr withdrawals are done. (#​25320, @​harsimran-pabla)
  • gateway-api: Race condition between routes and Gateway (#​25573, @​sayboras)
  • gateway-api: Skip reconciliation for non-matching controller routes (#​25549, @​sayboras)
  • helm: Correct typo in Ingress validation (#​25570, @​sayboras)
  • Reject incorrect configuration enable-host-legacy-routing=false kube-proxy-replacement=partial. (#​25803, @​pchaigno)
  • Track reply packets in long-living egress gateway connections and SNATed host-local connections. (#​25112, @​gentoo-root)

CI Changes:

Misc Changes:

Docker Manifests

cilium

docker.io/cilium/cilium:v1.14.0-snapshot.3@​sha256:f0fd212111143ec56fa0a51a6140be96dca40ab8e207dc52aa88d44d395abf81 quay.io/cilium/cilium:v1.14.0-snapshot.3@​sha256:f0fd212111143ec56fa0a51a6140be96dca40ab8e207dc52aa88d44d395abf81

clustermesh-apiserver

docker.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.3@​sha256:8bcfae32ece9db19d72de00f34f9b59fa2ebe00b33c4f8ed504a1994921d23cf quay.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.3@​sha256:8bcfae32ece9db19d72de00f34f9b59fa2ebe00b33c4f8ed504a1994921d23cf

docker-plugin

docker.io/cilium/docker-plugin:v1.14.0-snapshot.3@​sha256:db65fe9a63d8cf2ee2ee54da277d2174762f08e4efcf7c6806863dc9c02f74e3 quay.io/cilium/docker-plugin:v1.14.0-snapshot.3@​sha256:db65fe9a63d8cf2ee2ee54da277d2174762f08e4efcf7c6806863dc9c02f74e3

hubble-relay

docker.io/cilium/hubble-relay:v1.14.0-snapshot.3@​sha256:27e6b77b5cea7826a8fb5fbf720663123cee58f951d1bc41e8cf51eb1684c2ac quay.io/cilium/hubble-relay:v1.14.0-snapshot.3@​sha256:27e6b77b5cea7826a8fb5fbf720663123cee58f951d1bc41e8cf51eb1684c2ac

operator-alibabacloud

docker.io/cilium/operator-alibabacloud:v1.14.0-snapshot.3@​sha256:e8ff4b580de9672f2e17e4f305283300af3f493e41e8d39026067c797caf6cde quay.io/cilium/operator-alibabacloud:v1.14.0-snapshot.3@​sha256:e8ff4b580de9672f2e17e4f305283300af3f493e41e8d39026067c797caf6cde

operator-aws

docker.io/cilium/operator-aws:v1.14.0-snapshot.3@​sha256:281292efcd7a80dfc63269f6301f20e877ad9821befb6f0970fed3c3f4cf344e quay.io/cilium/operator-aws:v1.14.0-snapshot.3@​sha256:281292efcd7a80dfc63269f6301f20e877ad9821befb6f0970fed3c3f4cf344e

operator-azure

docker.io/cilium/operator-azure:v1.14.0-snapshot.3@​sha256:b44660fcbe7f593986466011ea083e0a7c1efd1690df68e302aca86d7d18c02d quay.io/cilium/operator-azure:v1.14.0-snapshot.3@​sha256:b44660fcbe7f593986466011ea083e0a7c1efd1690df68e302aca86d7d18c02d

operator-generic

docker.io/cilium/operator-generic:v1.14.0-snapshot.3@​sha256:c714d7d535afbcb70d930b07127f74401e0bf1a444981c4b50f6b268b7e12d73 quay.io/cilium/operator-generic:v1.14.0-snapshot.3@​sha256:c714d7d535afbcb70d930b07127f74401e0bf1a444981c4b50f6b268b7e12d73

operator

docker.io/cilium/operator:v1.14.0-snapshot.3@​sha256:62217676c80688e60d43b59d32830f1389f9433df8971e665b8576899a4f4043 quay.io/cilium/operator:v1.14.0-snapshot.3@​sha256:62217676c80688e60d43b59d32830f1389f9433df8971e665b8576899a4f4043

v1.14.0-snapshot.2

Compare Source

We are pleased to release Cilium v1.14.0-snapshot.2.

Summary of Changes

Major Changes:

Minor Changes:

Bugfixes:

  • Address cilium-agent startup performance regression. (#​25007, @​bimmlerd)
  • bpf: dsr: fix parsing of IPv6 AUTH extension header (#​24792, @​julianwiedmann)
  • bpf: nodeport: fix up trace point in to-overlay NAT paths (#​24886, @​julianwiedmann)
  • bpf: policy: fix handling of ICMPv6 packet with extension headers (#​24797, @​julianwiedmann)
  • Bugfix: Invert --hubble-monitor-events logic to be an allowlist (#​25167, @​epk)
  • cmd/cleanup: Fix cleanup of generic XDP programs (#​25117, @​pchaigno)
  • Filter ipv6 advertisements when using metallb as BGP speaker. (#​25043, @​harsimran-pabla)
  • Fix broken IPv4 connectivity from outside to NodePort service when using L7 ingress policy, by removing MROXY_RT route table. (#​24807, @​jschwinger233)
  • Fix bug that causes enforcement of host policies on reply IPv6 pod traffic. (#​25024, @​pchaigno)
  • Fix bug where Cilium configurations running with tunneling disabled, BPF-masq disabled, but with masquerading enabled, do not clean up ipset configuration when a node IP changes. This can lead to a lack of masquerading on those node IPs. (#​24825, @​christarazi)
  • Fix connectivity issue if nodes share the same name across the clustermesh and wireguard is enabled (#​24785, @​giorio94)
  • Fix incorrect network policy ebpf setup that may lead to incorrect packets denies when CEP is present in multiple CES (#​24838, @​alan-kut)
  • Fix issues that caused SPIRE not to install properly (#​25160, @​meyskens)
  • Fix operator startup delay caused by leader election lease not being released correctly (#​24978, @​giorio94)
  • Fix panic due to assignment to nil BGP service announcements map. (#​24985, @​harsimran-pabla)
  • Fix security-group-tags not working in ENI (#​24951, @​aanm)
  • Fix the bug when long-living connections using egress gateway may be reset. (#​24905, @​gentoo-root)
  • Fixed bug where L7 rules would be incorrectly merged between rules for the same (remote) endpoint. This bug could have caused L7 rules to be bypassed via a wildcard header rule being improperly appended to the set of HTTP rules when both a policy with HTTP header rules applying to multiple endpoints and an allow-all rule for only one of those endpoints are specified. (#​24788, @​jrajahalme)
  • gateway-api: Re-queue gateway for namespace change (#​24624, @​sayboras)
  • Handle leaked service backends that may lead to filling up of lb4_backends map and thereby connectivity issues. (#​24681, @​aditighag)
  • helm: mandate issuer configuration when using cert-manager to generate certificates (#​24666, @​giorio94)
  • ipcache don't short-circuit InjectLabels if source differs (#​24875, @​squeed)
  • ipsec: Clean up stale XFRM policies and states (#​24773, @​pchaigno)
  • pkg/kvstore: Fix for deadlock in etcd status checker (#​24786, @​hemanthmalla)
  • Prevent egress gateway from adding and then immediately removing BPF policy entries for policies that don't match any gateway node (#​24646, @​MrFreezeex)
  • Solve control-plane deadlock issues leading to outages. A typical log line indicative of this issue is probe=l7-proxy msg="No response from probe within 15 seconds" (#​24672, @​bimmlerd)
  • The operator now reconciles duplicate entries in a CiliumEndpointSlice on startup. (#​24596, @​alan-kut)

CI Changes:

Misc Changes:

Docker Manifests

cilium

docker.io/cilium/cilium:v1.14.0-snapshot.2@​sha256:fb92067c1c5c031ae6a6581ef46c35304acb316850d718470fef58c5571f150b quay.io/cilium/cilium:v1.14.0-snapshot.2@​sha256:fb92067c1c5c031ae6a6581ef46c35304acb316850d718470fef58c5571f150b

clustermesh-apiserver

docker.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.2@​sha256:9e06603b72be5eff51930af3cbdd945d0b69f514531ba1569bb4a4b26fad2521 quay.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.2@​sha256:9e06603b72be5eff51930af3cbdd945d0b69f514531ba1569bb4a4b26fad2521

docker-plugin

docker.io/cilium/docker-plugin:v1.14.0-snapshot.2@​sha256:d99c9216137b52bb40fcfd56ca422702235d61b7375175f3f404169826f79061 quay.io/cilium/docker-plugin:v1.14.0-snapshot.2@​sha256:d99c9216137b52bb40fcfd56ca422702235d61b7375175f3f404169826f79061

hubble-relay

docker.io/cilium/hubble-relay:v1.14.0-snapshot.2@​sha256:d7bca0ec8e6b0597b11d8ddca4e889fdab0057a0e7dcf4ea8e1faae69c20d5de quay.io/cilium/hubble-relay:v1.14.0-snapshot.2@​sha256:d7bca0ec8e6b0597b11d8ddca4e889fdab0057a0e7dcf4ea8e1faae69c20d5de

operator-alibabacloud

docker.io/cilium/operator-alibabacloud:v1.14.0-snapshot.2@​sha256:1c896f17772ea7b37aca9aaab128e63e6598fdb607e54329525705e3f241b1a7 quay.io/cilium/operator-alibabacloud:v1.14.0-snapshot.2@​sha256:1c896f17772ea7b37aca9aaab128e63e6598fdb607e54329525705e3f241b1a7

operator-aws

docker.io/cilium/operator-aws:v1.14.0-snapshot.2@​sha256:5b07ff515077169459d41f527a5f45327e1a6f2ba41d0a41559ea416a880036e quay.io/cilium/operator-aws:v1.14.0-snapshot.2@​sha256:5b07ff515077169459d41f527a5f45327e1a6f2ba41d0a41559ea416a880036e

operator-azure

docker.io/cilium/operator-azure:v1.14.0-snapshot.2@​sha256:8db15e6810d6fc3e1ac54dc4d29caf8c8566ec0c160695312b2540111438e278 quay.io/cilium/operator-azure:v1.14.0-snapshot.2@​sha256:8db15e6810d6fc3e1ac54dc4d29caf8c8566ec0c160695312b2540111438e278

operator-generic

docker.io/cilium/operator-generic:v1.14.0-snapshot.2@​sha256:ac6e3f6058c2692decba6d8b84f8b505b5b677ead8efc78c1ca234873fb92b63 quay.io/cilium/operator-generic:v1.14.0-snapshot.2@​sha256:ac6e3f6058c2692decba6d8b84f8b505b5b677ead8efc78c1ca234873fb92b63

operator

docker.io/cilium/operator:v1.14.0-snapshot.2@​sha256:16acb7bb9145dd998a046f3c46fc6ccd3585ae8de2a21f814a1e69bf8bf82874 quay.io/cilium/operator:v1.14.0-snapshot.2@​sha256:16acb7bb9145dd998a046f3c46fc6ccd3585ae8de2a21f814a1e69bf8bf82874

v1.14.0-snapshot.1: 1.14.0-snapshot.1

Compare Source

We are pleased to release Cilium v1.14.0-snapshot.1.

Summary of Changes

Major Changes:

  • Add mtls-spiffe as auth mode in the CiliumNetworkPolicy (#​24263, @​meyskens)
  • cilium: fib lookup consolidation (#​23884, @​borkmann)
  • The Cilium operator now taints nodes where Cilium is scheduled to run but is not running. This prevents pods from being scheduled on nodes without Cilium. The CNI configuration file is no longer removed on agent shutdown. This means that pod deletion will always succeed; previously it would fail if Cilium was down for an upgrade. This should help prevent nodes accidentally entering an unmanageable state. It also means that nodes are not removed from cloud LoadBalancer backends during Cilium upgrades. (#​23486, @​squeed)

Minor Changes:

Bugfixes:

  • Add missing xfrm-no-track rules for IPv6 IPSec. This fixes a connectivity issue for IPv6 IPSec with externalTrafficPolicy=local. (#​24557, @​jschwinger233)
  • Add support for builtin kernel modules (#​23953, @​TheAifam5)
  • Add the option to preserve CNI configuration file on agent shutdown. This can help prevent issues where pods can no longer be deleted. This may cause some transient error messages to be displayed if a pod is scheduled while Cilium is being upgraded. (#​24009, @​squeed)
  • agent: rework clustermesh config watcher for increased robustness (#​24163, @​giorio94)
  • Avoid k8s CiliumNode initialization problems when Cilium connects to the KVStore (#​24156, @​aanm)
  • bpf: fix ipv6 extension header parsing error (#​24309, @​chenyuezhou)
  • bpf: nodeport: fix handling of stale CT entry with CT_REPLY (#​23894, @​julianwiedmann)
  • Correctly configure extra SANs for the clustermesh API server certificate when generated through certgen (#​24339, @​giorio94)
  • daemon: fix panic when running with etcd with endpoint crd disabled (#​24085, @​tommyp1ckles)
  • daemon: initialize datapath before compiling sockops programs (#​24140, @​jibi)
  • endpoint: fix k8sNamespace log field when ep gets deleted (#​24575, @​mhofstetter)
  • Fix a bug where users are unable to change a wrong remote etcd configuration (#​24046, @​oblazek)
  • Fix a memory leak in the service cache, and possible missed service updates on scale to zero events in rare circumstances (#​24619, @​giorio94)
  • Fix bug in BGP CP where changing the route-id of an existing router would cause announcements to disappear (#​24304, @​dylandreimerink)
  • Fix bug that would prevent IPsec from working with GENEVE encapsulation. (#​24116, @​borkmann)
  • Fix bug where ingress policies for remote-note identities are not applied correctly new nodes join the cluster, specifically when the nodes joining the cluster had IP addresses specified in CIDR policies (#​23764, @​christarazi)
  • Fix Cilium crash during network policy computation (#​24322, @​joestringer)
  • Fix Cilium Operator from crashing when encountering empty node pools on Azure (#​24189, @​forgems)
  • Fix deadlock in cilium-operator when using CiliumEndpointSlices (#​24343, @​alan-kut)
  • Fix enable-stale-cilium-endpoint-cleanup flag not actually disabling the cleanup init set when set to false. This provides a workaround for an existing panic that can occur when running using etcd kvstore. (#​23874, @​sjdot)
  • Fix failure to load the datapath for new pods on latest kernel when (almost) all datapath features are enabled. (#​24405, @​borkmann)
  • Fix FIB lookup for traffic to a L7 service backend, when BPF host-routing is enabled and multiple external devices are configured. (#​24182, @​julianwiedmann)
  • Fix for disabled cloud provider rate limiting (#​24413, @​hemanthmalla)
  • Fix incorrectly dropping in-cluster traffic for L7 ingress resources (#​23984, @​sayboras)
  • Fix IPv6 policy enforcement for SNATed traffic from the Host (#​24132, @​ysksuzuki)
  • Fix panic in hubble http v2 metrics (#​24350, @​chancez)
  • Fix Pod connectivity interruption during agent restart (#​24336, @​ti-mo)
  • Fix some test failures for bpf_nat_test.c (#​24534, @​YutaroHayakawa)
  • init.sh: fix cgroup program detachment and detach multiple progs with retry (#​24118, @​ti-mo)
  • install: don't render role / rolebinding when agent disabled (#​23877, @​squeed)
  • Services backends with publishNotReadyAddresses are able to receive traffic independently if they are Terminating, since is the user intent to make them reachable despite its state. (#​24174, @​aojea)
  • Set user-agent for k8s client with Cilium's version (#​24275, @​aanm)
  • Solved an issue failing to forward traffic to Services if the Endpoint Slices had the same Address on different Slices (#​24202, @​aojea)
  • When using KMR Nodeport with DSR, support backends in hostNetwork or with L7 policies. (#​22978, @​julianwiedmann)

CI Changes:

Misc Changes:

v1.14.0-snapshot.0: 1.14.0-snapshot.0

Compare Source

Summary of Changes

Major Changes:

Minor Changes:

Bugfixes:

CI Changes:

Misc Changes:

Docker Manifests

cilium

docker.io/cilium/cilium:v1.14.0-snapshot.0@​sha256:e3026b6482f4dff7fbcc8b06e37b712728a31ad4c294581ddf5475dbcf3b7a80 quay.io/cilium/cilium:v1.14.0-snapshot.0@​sha256:e3026b6482f4dff7fbcc8b06e37b712728a31ad4c294581ddf5475dbcf3b7a80

clustermesh-apiserver

docker.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.0@​sha256:f8f319ff0b43023f863702c8be8eb2305d52a4a0a60ced347622069bc13fb651 quay.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.0@​sha256:f8f319ff0b43023f863702c8be8eb2305d52a4a0a60ced347622069bc13fb651

docker-plugin

docker.io/cilium/docker-plugin:v1.14.0-snapshot.0@​sha256:5667cdc4205b5efc5970d7a3bae0870b53d5a82df5d8df987c1c2f9edb7313b4 quay.io/cilium/docker-plugin:v1.14.0-snapshot.0@​sha256:5667cdc4205b5efc5970d7a3bae0870b53d5a82df5d8df987c1c2f9edb7313b4

hubble-relay

docker.io/cilium/hubble-relay:v1.14.0-snapshot.0@​sha256:dbd1e4361c272c8b45f48ae3bed54966e9e3601bf43f59ffa3b1066520cc1bd5 quay.io/cilium/hubble-relay:v1.14.0-snapshot.0@​sha256:dbd1e4361c272c8b45f48ae3bed54966e9e3601bf43f59ffa3b1066520cc1bd5

operator-alibabacloud

docker.io/cilium/operator-alibabacloud:v1.14.0-snapshot.0@​sha256:fd0ef1f31cb9d99dff87ac55910ec0d45caf1ee482fa8e01878b33f1487fafd0 quay.io/cilium/operator-alibabacloud:v1.14.0-snapshot.0@​sha256:fd0ef1f31cb9d99dff87ac55910ec0d45caf1ee482fa8e01878b33f1487fafd0

operator-aws

docker.io/cilium/operator-aws:v1.14.0-snapshot.0@​sha256:b570d54162121f0e7c9518376d69d24d59d565bd636ef9708110611473ff491e quay.io/cilium/operator-aws:v1.14.0-snapshot.0@​sha256:b570d54162121f0e7c9518376d69d24d59d565bd636ef9708110611473ff491e

operator-azure

docker.io/cilium/operator-azure:v1.14.0-snapshot.0@​sha256:3e83b89b7ac8c675f2e0de8f6e8120b254bdb5b9066033c110c0cbcab5bb23b8 quay.io/cilium/operator-azure:v1.14.0-snapshot.0@​sha256:3e83b89b7ac8c675f2e0de8f6e8120b254bdb5b9066033c110c0cbcab5bb23b8

operator-generic

docker.io/cilium/operator-generic:v1.14.0-snapshot.0@​sha256:78af387bac5aaa603f88f69ce773b325cd359f8ecd9b540962d86a55be1824bf quay.io/cilium/operator-generic:v1.14.0-snapshot.0@​sha256:78af387bac5aaa603f88f69ce773b325cd359f8ecd9b540962d86a55be1824bf

operator

docker.io/cilium/operator:v1.14.0-snapshot.0@​sha256:6574cf455cb09f8fd19f4cd08e1995afddcaf36c03727b07c1c0562a2f1e9381 quay.io/cilium/operator:v1.14.0-snapshot.0@​sha256:6574cf455cb09f8fd19f4cd08e1995afddcaf36c03727b07c1c0562a2f1e9381


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this MR and you won't be reminded about this update again.


  • If you want to rebase/retry this MR, check this box

This MR has been generated by Renovate Bot.

Edited by Yellowhat

Merge request reports