diff --git a/docs/releases/1.33-NOTES.md b/docs/releases/1.33-NOTES.md index e6984e9c3d46e..074a1da8bbc00 100644 --- a/docs/releases/1.33-NOTES.md +++ b/docs/releases/1.33-NOTES.md @@ -26,7 +26,7 @@ This is a document to gather the release notes prior to the release. # Other changes of note -* TODO +* Cilium has been upgraded to 1.17 # Breaking changes diff --git a/pkg/apis/kops/validation/validation.go b/pkg/apis/kops/validation/validation.go index 4673b505d21ae..93e7d5bf56d3d 100644 --- a/pkg/apis/kops/validation/validation.go +++ b/pkg/apis/kops/validation/validation.go @@ -1248,8 +1248,8 @@ func validateNetworkingCilium(cluster *kops.Cluster, v *kops.CiliumNetworkingSpe allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Could not parse as semantic version")) } - if version.Minor != 16 { - allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Only version 1.16 is supported")) + if version.Minor != 17 { + allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Only version 1.17 is supported")) } if v.Hubble != nil && fi.ValueOf(v.Hubble.Enabled) { diff --git a/pkg/apis/kops/validation/validation_test.go b/pkg/apis/kops/validation/validation_test.go index 1c6b072f2b0ba..773fce4a74e3d 100644 --- a/pkg/apis/kops/validation/validation_test.go +++ b/pkg/apis/kops/validation/validation_test.go @@ -1204,7 +1204,7 @@ func Test_Validate_Cilium(t *testing.T) { }, { Cilium: kops.CiliumNetworkingSpec{ - Version: "v1.16.0", + Version: "v1.17.0", Ingress: &kops.CiliumIngressSpec{ Enabled: fi.PtrTo(true), DefaultLoadBalancerMode: "bad-value", @@ -1214,7 +1214,7 @@ func Test_Validate_Cilium(t *testing.T) { }, { Cilium: kops.CiliumNetworkingSpec{ - Version: "v1.16.0", + Version: "v1.17.0", Ingress: &kops.CiliumIngressSpec{ Enabled: fi.PtrTo(true), DefaultLoadBalancerMode: "dedicated", @@ -1223,7 +1223,7 @@ func Test_Validate_Cilium(t *testing.T) { }, { Cilium: kops.CiliumNetworkingSpec{ - Version: "v1.16.0", + Version: "v1.17.0", Hubble: &kops.HubbleSpec{ Enabled: fi.PtrTo(true), }, diff --git a/pkg/model/components/cilium.go b/pkg/model/components/cilium.go index 19ddd1c5fd66f..90094c8f577fa 100644 --- a/pkg/model/components/cilium.go +++ b/pkg/model/components/cilium.go @@ -40,7 +40,7 @@ func (b *CiliumOptionsBuilder) BuildOptions(o *kops.Cluster) error { } if c.Version == "" { - c.Version = "v1.16.7" + c.Version = "v1.17.1" } if c.EnableEndpointHealthChecking == nil { diff --git a/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_cluster-completed.spec_content index a3214228d5001..8c21a76997f9a 100644 --- a/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_cluster-completed.spec_content @@ -212,7 +212,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: disabled - version: v1.16.7 + version: v1.17.1 nodeTerminationHandler: cpuRequest: 50m deleteSQSMsgIfNodeNotFound: false diff --git a/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-bootstrap_content b/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-bootstrap_content index 1fd41f6b81124..b1170d5521101 100644 --- a/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-bootstrap_content +++ b/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-bootstrap_content @@ -99,7 +99,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 701616c03e4ad157a9db6cf3caa3a82fc8c200b7d0b838d50668603abe69e43a + manifestHash: 67d42bccab4bb55ae509a3a4138b1f81aada1f04b703b9a013dc3052f67a983c name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content index da0ab25192dc9..f4df972efb1f2 100644 --- a/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/minimal-ipv6-cilium/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content @@ -582,7 +582,7 @@ spec: value: api.internal.minimal-ipv6.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: preStop: @@ -665,6 +665,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/cilium/clustermesh @@ -700,7 +703,7 @@ spec: value: api.internal.minimal-ipv6.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -719,7 +722,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -746,7 +749,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -770,7 +773,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -805,7 +808,7 @@ spec: value: api.internal.minimal-ipv6.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -830,7 +833,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -860,6 +863,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -993,7 +1000,7 @@ spec: value: api.internal.minimal-ipv6.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: diff --git a/tests/integration/update_cluster/minimal-warmpool/data/aws_launch_template_nodes.minimal-warmpool.example.com_user_data b/tests/integration/update_cluster/minimal-warmpool/data/aws_launch_template_nodes.minimal-warmpool.example.com_user_data index 980be6f62c996..20e526824f0ba 100644 --- a/tests/integration/update_cluster/minimal-warmpool/data/aws_launch_template_nodes.minimal-warmpool.example.com_user_data +++ b/tests/integration/update_cluster/minimal-warmpool/data/aws_launch_template_nodes.minimal-warmpool.example.com_user_data @@ -153,7 +153,7 @@ ConfigServer: - https://kops-controller.internal.minimal-warmpool.example.com:3988/ InstanceGroupName: nodes InstanceGroupRole: Node -NodeupConfigHash: 5uju3TyrpJia7EVXjpE80ZhpgiJ8lkHOSz6oHXR8ekE= +NodeupConfigHash: OlbIZ+owUMoXRoRKpoP1iIbn6nG2V2M+fqkmvQnyNzs= __EOF_KUBE_ENV diff --git a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_cluster-completed.spec_content index 9405ef644ddd4..7d1f40939a611 100644 --- a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_cluster-completed.spec_content @@ -204,7 +204,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: vxlan - version: v1.16.7 + version: v1.17.1 nodeTerminationHandler: cpuRequest: 50m deleteSQSMsgIfNodeNotFound: false diff --git a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-bootstrap_content b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-bootstrap_content index c966b6af99e6a..b713b132a1e2f 100644 --- a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-bootstrap_content +++ b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-bootstrap_content @@ -99,7 +99,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 1d069b812e49ee373c8c35c4a7c653e7c7690c8292f34025abd2c33db0064277 + manifestHash: 77954aa17548c1404ee5ff147cd441f3ef0be5ad736123784dde238ace7b3f36 name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content index 0098cfb71e3e8..f1832a5c39c40 100644 --- a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content @@ -583,7 +583,7 @@ spec: value: api.internal.minimal-warmpool.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: preStop: @@ -666,6 +666,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/cilium/clustermesh @@ -701,7 +704,7 @@ spec: value: api.internal.minimal-warmpool.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -720,7 +723,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -747,7 +750,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -771,7 +774,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -806,7 +809,7 @@ spec: value: api.internal.minimal-warmpool.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -831,7 +834,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -861,6 +864,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -994,7 +1001,7 @@ spec: value: api.internal.minimal-warmpool.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: diff --git a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_nodeupconfig-nodes_content b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_nodeupconfig-nodes_content index b840eef8c8fa7..d6c7ff58f192d 100644 --- a/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_nodeupconfig-nodes_content +++ b/tests/integration/update_cluster/minimal-warmpool/data/aws_s3_object_nodeupconfig-nodes_content @@ -61,7 +61,7 @@ containerdConfig: usesLegacyGossip: false usesNoneDNS: false warmPoolImages: -- quay.io/cilium/cilium:v1.16.7 -- quay.io/cilium/operator:v1.16.7 +- quay.io/cilium/cilium:v1.17.1 +- quay.io/cilium/operator:v1.17.1 - registry.k8s.io/kube-proxy:v1.32.0 - registry.k8s.io/provider-aws/cloud-controller-manager:v1.31.0 diff --git a/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_cluster-completed.spec_content index 5b78d6c3907d3..c48529cd371a4 100644 --- a/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_cluster-completed.spec_content @@ -200,7 +200,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: vxlan - version: v1.16.7 + version: v1.17.1 nonMasqueradeCIDR: 100.64.0.0/10 podCIDR: 100.96.0.0/11 secretStore: memfs://tests/scw-minimal.k8s.local/secrets diff --git a/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-bootstrap_content b/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-bootstrap_content index 37dc354f77d84..b8dc7b185f02c 100644 --- a/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-bootstrap_content +++ b/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-bootstrap_content @@ -55,7 +55,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: cceac64c304516725d40231c9b73cff5e8299856760fb6cea3222f1c21d080f7 + manifestHash: 304e50b6609a42e86ccc4985b37b035bd5a363b6c84023700f258b9f5f3caad8 name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content index b5574a5eaadfd..e1b819ece4cfc 100644 --- a/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/minimal_scaleway/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content @@ -583,7 +583,7 @@ spec: value: api.internal.scw-minimal.k8s.local - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: preStop: @@ -666,6 +666,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/cilium/clustermesh @@ -701,7 +704,7 @@ spec: value: api.internal.scw-minimal.k8s.local - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -720,7 +723,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -747,7 +750,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -771,7 +774,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -806,7 +809,7 @@ spec: value: api.internal.scw-minimal.k8s.local - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -831,7 +834,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -861,6 +864,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -994,7 +1001,7 @@ spec: value: api.internal.scw-minimal.k8s.local - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: diff --git a/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_cluster-completed.spec_content index a862c1e06f0c6..a467482694d95 100644 --- a/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_cluster-completed.spec_content @@ -206,7 +206,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: disabled - version: v1.16.7 + version: v1.17.1 nodeTerminationHandler: cpuRequest: 50m deleteSQSMsgIfNodeNotFound: false diff --git a/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content b/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content index 487cb46723d87..e7a5b3a6411de 100644 --- a/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content +++ b/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content @@ -99,7 +99,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 210aad01f06c3cc7f91e69931cd81881496c91740622f8a2f1867e1df64e7410 + manifestHash: 775ba81407bedc987267b5f6bb5f06896ea7930ddc14b198a0a93f0103a49d7b name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content index 96820a8a0c039..9dff668f25adb 100644 --- a/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/privatecilium-eni/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content @@ -585,7 +585,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: postStart: @@ -693,6 +693,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/cilium/clustermesh @@ -728,7 +731,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -747,7 +750,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -774,7 +777,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -798,7 +801,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -833,7 +836,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -858,7 +861,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -888,6 +891,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -1021,7 +1028,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: diff --git a/tests/integration/update_cluster/privatecilium/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/privatecilium/data/aws_s3_object_cluster-completed.spec_content index 14de0aba86154..7abe711b455c6 100644 --- a/tests/integration/update_cluster/privatecilium/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/privatecilium/data/aws_s3_object_cluster-completed.spec_content @@ -214,7 +214,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: vxlan - version: v1.16.7 + version: v1.17.1 nodeTerminationHandler: cpuRequest: 50m deleteSQSMsgIfNodeNotFound: false diff --git a/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content b/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content index 05d4a466e6a12..2fef2c08ca37c 100644 --- a/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content +++ b/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content @@ -99,7 +99,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: d7856bfc2bc1190c333411aa196efab57fd217253de2cd00ba6e9e58318f8894 + manifestHash: 90d81b1b4ed13b1e6a4d89536ef139bd7e2c747745f94e5fafbce3f6cbea13c3 name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content index 844b56875398d..13002de9bee09 100644 --- a/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/privatecilium/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content @@ -586,7 +586,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: preStop: @@ -669,6 +669,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/cilium/clustermesh @@ -704,7 +707,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -723,7 +726,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -750,7 +753,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -774,7 +777,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -809,7 +812,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -834,7 +837,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -864,6 +867,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -1001,7 +1008,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: diff --git a/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_cluster-completed.spec_content index 0cf762192b763..c1f2dbe84b1da 100644 --- a/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_cluster-completed.spec_content @@ -226,7 +226,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: vxlan - version: v1.16.7 + version: v1.17.1 nodeTerminationHandler: cpuRequest: 50m deleteSQSMsgIfNodeNotFound: false diff --git a/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content b/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content index 6112dd9636e6a..a4a038900dc7d 100644 --- a/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content +++ b/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-bootstrap_content @@ -155,7 +155,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 79db9d85ae81dccb36c7ea45d54ce5a11b8c554fc583976c8edbe2c76ef0b45e + manifestHash: bfa9c02e66a45761cb95b007a58b5baef3f6bf569cb9cdd9933981f07aeae536 name: networking.cilium.io needsPKI: true needsRollingUpdate: all diff --git a/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content index 0bd280010e242..2e1e2053cee08 100644 --- a/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/privatecilium2/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content @@ -837,7 +837,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: preStop: @@ -928,6 +928,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/cilium/clustermesh @@ -966,7 +969,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -985,7 +988,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -1012,7 +1015,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -1036,7 +1039,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -1071,7 +1074,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -1096,7 +1099,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -1126,6 +1129,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -1273,7 +1280,7 @@ spec: value: api.internal.privatecilium.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: @@ -1377,7 +1384,7 @@ spec: - serve command: - hubble-relay - image: quay.io/cilium/hubble-relay:v1.16.7 + image: quay.io/cilium/hubble-relay:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 12 diff --git a/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_cluster-completed.spec_content b/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_cluster-completed.spec_content index 19f0bbe089f38..686c6b886b699 100644 --- a/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_cluster-completed.spec_content +++ b/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_cluster-completed.spec_content @@ -218,7 +218,7 @@ spec: sidecarIstioProxyImage: cilium/istio_proxy toFqdnsDnsRejectResponseCode: refused tunnel: disabled - version: v1.16.7 + version: v1.17.1 nodeTerminationHandler: cpuRequest: 50m deleteSQSMsgIfNodeNotFound: false diff --git a/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-bootstrap_content b/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-bootstrap_content index bca4939876a67..158e49b274c71 100644 --- a/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-bootstrap_content +++ b/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-bootstrap_content @@ -99,7 +99,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 4156a83ceda6287eaa790ad43d7f0acf1dc7d0a12afd30078ad9841e93d6e53c + manifestHash: bac074ce5d8d0e2d50c1183922fc1e87bf631d326f61117944016a7c11c92419 name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content b/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content index baf4077664e5f..0332bbb28e09e 100644 --- a/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content +++ b/tests/integration/update_cluster/privateciliumadvanced/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content @@ -595,7 +595,7 @@ spec: value: api.internal.privateciliumadvanced.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent lifecycle: postStart: @@ -703,6 +703,9 @@ spec: name: cilium-cgroup - mountPath: /var/run/cilium name: cilium-run + - mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer + name: cilium-netns - mountPath: /host/etc/cni/net.d name: etc-cni-netd - mountPath: /var/lib/etcd-config @@ -744,7 +747,7 @@ spec: value: api.internal.privateciliumadvanced.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: config terminationMessagePolicy: FallbackToLogsOnError @@ -763,7 +766,7 @@ spec: value: /run/cilium/cgroupv2 - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-cgroup securityContext: @@ -790,7 +793,7 @@ spec: env: - name: BIN_PATH value: /opt/cni/bin - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: apply-sysctl-overwrites securityContext: @@ -814,7 +817,7 @@ spec: - /bin/bash - -c - -- - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: mount-bpf-fs securityContext: @@ -849,7 +852,7 @@ spec: value: api.internal.privateciliumadvanced.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: clean-cilium-state securityContext: @@ -874,7 +877,7 @@ spec: name: cilium-run - command: - /install-plugin.sh - image: quay.io/cilium/cilium:v1.16.7 + image: quay.io/cilium/cilium:v1.17.1 imagePullPolicy: IfNotPresent name: install-cni-binaries resources: @@ -904,6 +907,10 @@ spec: path: /var/run/cilium type: DirectoryOrCreate name: cilium-run + - hostPath: + path: /var/run/netns + type: DirectoryOrCreate + name: cilium-netns - hostPath: path: /sys/fs/bpf type: DirectoryOrCreate @@ -1048,7 +1055,7 @@ spec: value: api.internal.privateciliumadvanced.example.com - name: KUBERNETES_SERVICE_PORT value: "443" - image: quay.io/cilium/operator:v1.16.7 + image: quay.io/cilium/operator:v1.17.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: diff --git a/upup/models/cloudup/resources/addons/networking.cilium.io/k8s-1.16-v1.15.yaml.template b/upup/models/cloudup/resources/addons/networking.cilium.io/k8s-1.16-v1.15.yaml.template index cc8dfac6d5a50..1ce94b43bb852 100644 --- a/upup/models/cloudup/resources/addons/networking.cilium.io/k8s-1.16-v1.15.yaml.template +++ b/upup/models/cloudup/resources/addons/networking.cilium.io/k8s-1.16-v1.15.yaml.template @@ -1182,6 +1182,9 @@ spec: mountPath: /run/cilium/cgroupv2 - name: cilium-run mountPath: /var/run/cilium + - name: cilium-netns + mountPath: /var/run/cilium/netns + mountPropagation: HostToContainer - name: etc-cni-netd mountPath: /host/etc/cni/net.d {{ if .EtcdManaged }} @@ -1439,6 +1442,11 @@ spec: hostPath: path: /var/run/cilium type: DirectoryOrCreate + # To exec into pod network namespaces + - name: cilium-netns + hostPath: + path: /var/run/netns + type: DirectoryOrCreate # To keep state between restarts / upgrades for bpf maps - name: bpf-maps hostPath: diff --git a/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/cilium/manifest.yaml b/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/cilium/manifest.yaml index a3c584e488b65..2f8a5a61435f7 100644 --- a/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/cilium/manifest.yaml +++ b/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/cilium/manifest.yaml @@ -99,7 +99,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 4a07a56473cdad035456abc6f2dd3515f3437ef4492f8d6f0e397f7951b2f9ad + manifestHash: 4351a8686b74f502424d24edaebcadcc4742d02219e5e66e33017a25d87bb00f name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/insecure-1.19/manifest.yaml b/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/insecure-1.19/manifest.yaml index 0c51821831965..15dc6fc7b4981 100644 --- a/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/insecure-1.19/manifest.yaml +++ b/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/insecure-1.19/manifest.yaml @@ -106,7 +106,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 4a07a56473cdad035456abc6f2dd3515f3437ef4492f8d6f0e397f7951b2f9ad + manifestHash: 4351a8686b74f502424d24edaebcadcc4742d02219e5e66e33017a25d87bb00f name: networking.cilium.io needsRollingUpdate: all selector: diff --git a/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/secure-1.19/manifest.yaml b/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/secure-1.19/manifest.yaml index 2aef52067feac..81332d737091c 100644 --- a/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/secure-1.19/manifest.yaml +++ b/upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/metrics-server/secure-1.19/manifest.yaml @@ -163,7 +163,7 @@ spec: version: 9.99.0 - id: k8s-1.16 manifest: networking.cilium.io/k8s-1.16-v1.15.yaml - manifestHash: 4a07a56473cdad035456abc6f2dd3515f3437ef4492f8d6f0e397f7951b2f9ad + manifestHash: 4351a8686b74f502424d24edaebcadcc4742d02219e5e66e33017a25d87bb00f name: networking.cilium.io needsRollingUpdate: all selector: