Skip to content

Releases: traefik/traefik-helm-chart

v28.1.0-beta.2

02 May 10:03
7048216
Compare
Choose a tag to compare
v28.1.0-beta.2 Pre-release
Pre-release

28.1.0-beta.2 (2024-05-02)

Features

  • 🚀 add initial support for traefik-hub api gateway (dc5c68d)

Bug Fixes

  • 🐛 refine Traefik Hub support (60d210d)

Documentation

  • example: Update Digital Ocean PROXY Protocol (9850319)

v28.1.0-beta.1

30 Apr 08:11
1f4f52d
Compare
Choose a tag to compare
v28.1.0-beta.1 Pre-release
Pre-release

28.1.0-beta.1 (2024-04-30)

Features

  • 🚀 add initial support for traefik-hub api gateway (dc5c68d)

v28.0.0

30 Apr 07:48
b593e14
Compare
Choose a tag to compare

28.0.0 (2024-04-30)

⚠ BREAKING CHANGES

Features

  • podtemplate: set GOMEMLIMIT, GOMAXPROCS when limits are defined (e4f2aa8)
  • 💥 initial support of Traefik Proxy v3 (536059d)
  • ✨ add support of experimental-v3.0 unstable version (579984c)
  • ✨ fail gracefully when required port number is not set (f8be5e1)
  • ports: add transport options (47e0f28)
  • ability to override liveness and readiness probe paths (ea95df0)

Bug Fixes

  • 🐛 logs filters on status codes (c204014)
  • 🐛 only expose http3 port on service when TCP variant is exposed (2d6243d)

Styles

  • 🎨 consistent capitalization on --entryPoints CLI flag (b1f6f96)

Documentation

  • 📚️ improve EXAMPLES on acme resolver (2252aba)

New Contributors

v28.0.0-rc.1

18 Apr 10:02
af6b2c8
Compare
Choose a tag to compare
v28.0.0-rc.1 Pre-release
Pre-release

28.0.0-rc.1 (2024-04-18)

Upgrade Notes

This is a major breaking upgrade. Migration guide have been applied on the chart.

It needs a Kubernetes v1.22 or higher.
All CRDs using API Group traefik.containo.us are not supported anymore in Traefik Proxy v3

CRDs needs to be upgraded: kubectl apply --server-side --force-conflicts -k https://github.com/traefik/traefik-helm-chart/traefik/crds/

After upgrade, CRDs with API Group traefik.containo.us can be removed:

kubectl delete crds \
  ingressroutes.traefik.containo.us \
  ingressroutetcps.traefik.containo.us \
  ingressrouteudps.traefik.containo.us \
  middlewares.traefik.containo.us \
  middlewaretcps.traefik.containo.us \
  serverstransports.traefik.containo.us \
  tlsoptions.traefik.containo.us \
  tlsstores.traefik.containo.us \
  traefikservices.traefik.containo.us

⚠ BREAKING CHANGES

  • 💥 initial support of Traefik Proxy v3

Features

  • podtemplate: set GOMEMLIMIT, GOMAXPROCS when limits are defined (e4f2aa8)
  • 💥 initial support of Traefik Proxy v3 (536059d)
  • ✨ fail gracefully when required port number is not set (f8be5e1)

Documentation

  • 📚️ improve EXAMPLES on acme resolver (2252aba)

v27.0.2

12 Apr 07:35
e14904d
Compare
Choose a tag to compare

27.0.2 (2024-04-12)

Upgrade Notes

This release comes with an important fix for traefik/traefik#10598 introduced in v2.11.1, see upstream release notes.

Features

  • feat: ✨ update Traefik Proxy to v2.11.2 (#1034)

v27.0.1

11 Apr 10:36
4dadd66
Compare
Choose a tag to compare

27.0.1 (2024-04-11)

Upgrade notes

🚨 Traefik Proxy v2.11.1 introduces lingeringTimeout, see traefik/traefik#10569, that can be breaking for server-first protocols. This new setting can be set with additionalArguments.

Features

  • release v27.0.1 with Traefik Proxy to v2.11.1 (4dadd66)

v27.0.0

04 Apr 09:00
d57d4a9
Compare
Choose a tag to compare

27.0.0 (2024-04-04)

⚠ BREAKING CHANGES

  • 💥 refactor custom services and port exposure (7e349d4)

Upgrade notes

Custom services and port exposure have been redesigned, requiring the following changes:

  • if you were overriding port exposure behavior using the expose or exposeInternal flags, you should replace them with a service name to boolean mapping, i.e. replace this:
ports:
   web:
      port: 80
      expose: false
      exposeInternal: true

with this:

ports:
   web:
      port: 80
      expose:
         default: false
         internal: true
  • if you were previously using the service.internal value, you should migrate the values to the service.additionalServices.internal value instead; this should yield the same results, but make sure to carefully check for any changes!

Features

  • restrict access to secrets (8fbae97)

Bug Fixes

  • rbac: do not create clusterrole for namespace deployment on Traefik v3 (d0f3442)
  • remove null annotations on dashboard IngressRoute (606ab52)
  • use hostIP also on entrypoint and healthChecks when set (82a3cab)

New Contributors

Full Changelog: v26.1.0...v27.0.0

v26.1.0

19 Feb 07:48
63c0891
Compare
Choose a tag to compare

26.1.0 (2024-02-19)

Important notice

ℹ️ CRDs has been updated in this release. On Traefik v2, there is no new or removed field, just description format update by upstream library.

⚠️ This Chart does not support Traefik v3 beta and rc versions.

Features

  • update traefik docker tag to v2.11.0 (843d1d7)
  • allow exposure of ports on internal service only (d9f4731)
  • create v1 Gateway and GatewayClass Version for Traefik v3 (85697f0)
  • set runtimeClassName on pod spec (c07d55c)

Bug Fixes

  • 🐛 missing quote on experimental plugin args (e7ce1b4)
  • 🐛 set runtimeClassName at pod level (3d76d3e)
  • update traefik v3 serverstransporttcps CRD (e404db9)

v26.0.0

05 Dec 07:33
ed7e8bb
Compare
Choose a tag to compare

26.0.0 (2023-12-05)

Breaking Changes

This release can be breaking for:

  • Plugin user, see PR #961
  • PodAnnotation user, see PR #972

Features

  • 💥 unify plugin import between traefik and this chart (cbddacb)
  • 💥 deployment.podannotations support interpolation with tpl (d31b991)
  • add file provider (ddd6cee)
  • allow defining startupProbe (f061628)
  • allow update of namespace policy for websecure listener (2045843)

Bug Fixes

  • 🐛 declare http3 udp port, with or without hostport (76dcb02)
  • 🐛 improve confusing suggested value on openTelemetry.grpc (6a6efc1)

New Contributors

Full Changelog: v25.0.0...v26.0.0

v25.0.0

23 Oct 08:17
e03b128
Compare
Choose a tag to compare

25.0.0 (2023-10-23)

The two breaking changes are:

  1. On redirectTo, ports.web.redirectTo=websecure => ports.web.redirectTo.port=websecure.
    • More details in PR #934
  2. On gateway, all values are now flattened to experimental.kubernetesGateway.
    • More details in PR #927

Features

  • 💥 rework and allow update of namespace policy for Gateway (b04d479)
  • 💥 support http redirections and http challenges with cert-manager (8cf14c8)
  • ✨ add healthcheck ingressRoute (0725e48)
  • Update traefik docker tag to v2.10.5 by @renovate in #930

Bug Fixes

  • 🐛 remove old CRDs using traefik.containo.us (6484a40)
  • add missing separator in crds (ba67d9b)
  • add Prometheus scraping annotations only if serviceMonitor not created (6b2268f)
  • allow updateStrategy.rollingUpdate.maxUnavailable to be passed in as an int or string (0dcc834)
  • detect correctly v3 version when using sha in image.tag (1f043da)
  • disable ClusterRole and ClusterRoleBinding when not needed (14d4895)

Reverts

  • "fix: 🐛 remove old CRDs using traefik.containo.us" (bf75a5d)

Documentation

  • 📚️ how to use this chart as a dependency (18c9d45)
  • fix typo in README (d1a2770)
  • Fix typo in the default values file (607b808)
  • remove email from apiToken in CloudFlare example (9b9f306)

New Contributors

Full Changelog: v24.0.0...v25.0.0