Update calico to version 3.26.0
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
9014aa38d3
commit
d13e3b73a5
13 changed files with 213 additions and 12 deletions
|
|
@ -1,6 +1,8 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
BASEURL=https://docs.projectcalico.org/manifests
|
CALICO_VERSION="3.26.0"
|
||||||
|
#BASEURL=https://docs.projectcalico.org/manifests
|
||||||
#BASEURL=https://docs.projectcalico.org/archive/v3.18/manifests
|
#BASEURL=https://docs.projectcalico.org/archive/v3.18/manifests
|
||||||
|
BASEURL="https://raw.githubusercontent.com/projectcalico/calico/v${CALICO_VERSION}/manifests"
|
||||||
curl "${BASEURL}"/calico.yaml -O
|
curl "${BASEURL}"/calico.yaml -O
|
||||||
kubernetes-split-yaml calico.yaml > generated.log
|
kubernetes-split-yaml calico.yaml > generated.log
|
||||||
mv generated/*.yaml templates/
|
mv generated/*.yaml templates/
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,123 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: (devel)
|
||||||
|
creationTimestamp: null
|
||||||
|
name: bgpfilters.crd.projectcalico.org
|
||||||
|
spec:
|
||||||
|
group: crd.projectcalico.org
|
||||||
|
names:
|
||||||
|
kind: BGPFilter
|
||||||
|
listKind: BGPFilterList
|
||||||
|
plural: bgpfilters
|
||||||
|
singular: bgpfilter
|
||||||
|
scope: Cluster
|
||||||
|
versions:
|
||||||
|
- name: v1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: BGPFilterSpec contains the IPv4 and IPv6 filter rules of
|
||||||
|
the BGP Filter.
|
||||||
|
properties:
|
||||||
|
exportV4:
|
||||||
|
description: The ordered set of IPv4 BGPFilter rules acting on exporting
|
||||||
|
routes to a peer.
|
||||||
|
items:
|
||||||
|
description: BGPFilterRuleV4 defines a BGP filter rule consisting
|
||||||
|
a single IPv4 CIDR block and a filter action for this CIDR.
|
||||||
|
properties:
|
||||||
|
action:
|
||||||
|
type: string
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
matchOperator:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- action
|
||||||
|
- cidr
|
||||||
|
- matchOperator
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
exportV6:
|
||||||
|
description: The ordered set of IPv6 BGPFilter rules acting on exporting
|
||||||
|
routes to a peer.
|
||||||
|
items:
|
||||||
|
description: BGPFilterRuleV6 defines a BGP filter rule consisting
|
||||||
|
a single IPv6 CIDR block and a filter action for this CIDR.
|
||||||
|
properties:
|
||||||
|
action:
|
||||||
|
type: string
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
matchOperator:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- action
|
||||||
|
- cidr
|
||||||
|
- matchOperator
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
importV4:
|
||||||
|
description: The ordered set of IPv4 BGPFilter rules acting on importing
|
||||||
|
routes from a peer.
|
||||||
|
items:
|
||||||
|
description: BGPFilterRuleV4 defines a BGP filter rule consisting
|
||||||
|
a single IPv4 CIDR block and a filter action for this CIDR.
|
||||||
|
properties:
|
||||||
|
action:
|
||||||
|
type: string
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
matchOperator:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- action
|
||||||
|
- cidr
|
||||||
|
- matchOperator
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
importV6:
|
||||||
|
description: The ordered set of IPv6 BGPFilter rules acting on importing
|
||||||
|
routes from a peer.
|
||||||
|
items:
|
||||||
|
description: BGPFilterRuleV6 defines a BGP filter rule consisting
|
||||||
|
a single IPv6 CIDR block and a filter action for this CIDR.
|
||||||
|
properties:
|
||||||
|
action:
|
||||||
|
type: string
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
matchOperator:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- action
|
||||||
|
- cidr
|
||||||
|
- matchOperator
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
||||||
|
|
@ -36,6 +36,11 @@ spec:
|
||||||
description: The AS Number of the peer.
|
description: The AS Number of the peer.
|
||||||
format: int32
|
format: int32
|
||||||
type: integer
|
type: integer
|
||||||
|
filters:
|
||||||
|
description: The ordered set of BGPFilters applied on this BGP peer.
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
keepOriginalNextHop:
|
keepOriginalNextHop:
|
||||||
description: Option to keep the original nexthop field when routes
|
description: Option to keep the original nexthop field when routes
|
||||||
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
||||||
|
|
|
||||||
34
templates/calico-cni-plugin-ClusterRole.yaml
Normal file
34
templates/calico-cni-plugin-ClusterRole.yaml
Normal file
|
|
@ -0,0 +1,34 @@
|
||||||
|
# Source: calico/templates/calico-node-rbac.yaml
|
||||||
|
# CNI cluster role
|
||||||
|
kind: ClusterRole
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
metadata:
|
||||||
|
name: calico-cni-plugin
|
||||||
|
rules:
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources:
|
||||||
|
- pods
|
||||||
|
- nodes
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources:
|
||||||
|
- pods/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
|
- apiGroups: ["crd.projectcalico.org"]
|
||||||
|
resources:
|
||||||
|
- blockaffinities
|
||||||
|
- ipamblocks
|
||||||
|
- ipamhandles
|
||||||
|
- clusterinformations
|
||||||
|
- ippools
|
||||||
|
- ipreservations
|
||||||
|
- ipamconfigs
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
13
templates/calico-cni-plugin-ClusterRoleBinding.yaml
Normal file
13
templates/calico-cni-plugin-ClusterRoleBinding.yaml
Normal file
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Source: calico/templates/calico-node-rbac.yaml
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: calico-cni-plugin
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: calico-cni-plugin
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: calico-cni-plugin
|
||||||
|
namespace: kube-system
|
||||||
6
templates/calico-cni-plugin-ServiceAccount.yaml
Normal file
6
templates/calico-cni-plugin-ServiceAccount.yaml
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
# Source: calico/templates/calico-node.yaml
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
name: calico-cni-plugin
|
||||||
|
namespace: kube-system
|
||||||
|
|
@ -36,7 +36,7 @@ spec:
|
||||||
priorityClassName: system-cluster-critical
|
priorityClassName: system-cluster-critical
|
||||||
containers:
|
containers:
|
||||||
- name: calico-kube-controllers
|
- name: calico-kube-controllers
|
||||||
image: docker.io/calico/kube-controllers:v3.25.0
|
image: docker.io/calico/kube-controllers:v3.26.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
env:
|
env:
|
||||||
# Choose which controllers to run.
|
# Choose which controllers to run.
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- serviceaccounts/token
|
- serviceaccounts/token
|
||||||
resourceNames:
|
resourceNames:
|
||||||
- calico-node
|
- calico-cni-plugin
|
||||||
verbs:
|
verbs:
|
||||||
- create
|
- create
|
||||||
# The CNI plugin needs to get pods, nodes, and namespaces.
|
# The CNI plugin needs to get pods, nodes, and namespaces.
|
||||||
|
|
@ -82,6 +82,7 @@ rules:
|
||||||
- globalfelixconfigs
|
- globalfelixconfigs
|
||||||
- felixconfigurations
|
- felixconfigurations
|
||||||
- bgppeers
|
- bgppeers
|
||||||
|
- bgpfilters
|
||||||
- globalbgpconfigs
|
- globalbgpconfigs
|
||||||
- bgpconfigurations
|
- bgpconfigurations
|
||||||
- ippools
|
- ippools
|
||||||
|
|
|
||||||
|
|
@ -44,7 +44,7 @@ spec:
|
||||||
# It can be deleted if this is a fresh installation, or if you have already
|
# It can be deleted if this is a fresh installation, or if you have already
|
||||||
# upgraded to use calico-ipam.
|
# upgraded to use calico-ipam.
|
||||||
- name: upgrade-ipam
|
- name: upgrade-ipam
|
||||||
image: docker.io/calico/cni:v3.25.0
|
image: docker.io/calico/cni:v3.26.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
||||||
envFrom:
|
envFrom:
|
||||||
|
|
@ -72,7 +72,7 @@ spec:
|
||||||
# This container installs the CNI binaries
|
# This container installs the CNI binaries
|
||||||
# and CNI network config file on each node.
|
# and CNI network config file on each node.
|
||||||
- name: install-cni
|
- name: install-cni
|
||||||
image: docker.io/calico/cni:v3.25.0
|
image: docker.io/calico/cni:v3.26.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
command: ["/opt/cni/bin/install"]
|
command: ["/opt/cni/bin/install"]
|
||||||
envFrom:
|
envFrom:
|
||||||
|
|
@ -115,7 +115,7 @@ spec:
|
||||||
# i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed
|
# i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed
|
||||||
# in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode.
|
# in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode.
|
||||||
- name: "mount-bpffs"
|
- name: "mount-bpffs"
|
||||||
image: docker.io/calico/node:v3.25.0
|
image: docker.io/calico/node:v3.26.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
command: ["calico-node", "-init", "-best-effort"]
|
command: ["calico-node", "-init", "-best-effort"]
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
|
|
@ -141,7 +141,7 @@ spec:
|
||||||
# container programs network policy and routes on each
|
# container programs network policy and routes on each
|
||||||
# host.
|
# host.
|
||||||
- name: calico-node
|
- name: calico-node
|
||||||
image: docker.io/calico/node:v3.25.0
|
image: docker.io/calico/node:v3.26.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ spec:
|
||||||
serviceAccountName: calicoctl
|
serviceAccountName: calicoctl
|
||||||
containers:
|
containers:
|
||||||
- name: calicoctl
|
- name: calicoctl
|
||||||
image: calico/ctl:v3.25.0
|
image: calico/ctl:v3.26.0
|
||||||
command:
|
command:
|
||||||
- /calicoctl
|
- /calicoctl
|
||||||
args:
|
args:
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
# Calico Version master
|
# Calico Version master
|
||||||
# https://projectcalico.docs.tigera.io/releases#master
|
# https://projectcalico.docs.tigera.io/releases#master
|
||||||
# This manifest includes the following component versions:
|
# This manifest includes the following component versions:
|
||||||
# calico/ctl:v3.25.0
|
# calico/ctl:v3.26.0
|
||||||
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
|
|
|
||||||
|
|
@ -60,6 +60,13 @@ spec:
|
||||||
connections. The only reason to disable it is for debugging purposes. [Default:
|
connections. The only reason to disable it is for debugging purposes. [Default:
|
||||||
true]'
|
true]'
|
||||||
type: boolean
|
type: boolean
|
||||||
|
bpfDSROptoutCIDRs:
|
||||||
|
description: BPFDSROptoutCIDRs is a list of CIDRs which are excluded
|
||||||
|
from DSR. That is, clients in those CIDRs will accesses nodeports
|
||||||
|
as if BPFExternalServiceMode was set to Tunnel.
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
bpfDataIfacePattern:
|
bpfDataIfacePattern:
|
||||||
description: BPFDataIfacePattern is a regular expression that controls
|
description: BPFDataIfacePattern is a regular expression that controls
|
||||||
which interfaces Felix should attach BPF programs to in order to
|
which interfaces Felix should attach BPF programs to in order to
|
||||||
|
|
@ -83,7 +90,7 @@ spec:
|
||||||
description: 'BPFEnforceRPF enforce strict RPF on all host interfaces
|
description: 'BPFEnforceRPF enforce strict RPF on all host interfaces
|
||||||
with BPF programs regardless of what is the per-interfaces or global
|
with BPF programs regardless of what is the per-interfaces or global
|
||||||
setting. Possible values are Disabled, Strict or Loose. [Default:
|
setting. Possible values are Disabled, Strict or Loose. [Default:
|
||||||
Strict]'
|
Loose]'
|
||||||
type: string
|
type: string
|
||||||
bpfExtToServiceConnmark:
|
bpfExtToServiceConnmark:
|
||||||
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
|
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
|
||||||
|
|
@ -348,7 +355,7 @@ spec:
|
||||||
type: integer
|
type: integer
|
||||||
healthTimeoutOverrides:
|
healthTimeoutOverrides:
|
||||||
description: HealthTimeoutOverrides allows the internal watchdog timeouts
|
description: HealthTimeoutOverrides allows the internal watchdog timeouts
|
||||||
of individual subcomponents to be overriden. This is useful for
|
of individual subcomponents to be overridden. This is useful for
|
||||||
working around "false positive" liveness timeouts that can occur
|
working around "false positive" liveness timeouts that can occur
|
||||||
in particularly stressful workloads or if CPU is constrained. For
|
in particularly stressful workloads or if CPU is constrained. For
|
||||||
a list of active subcomponents, see Felix's logs.
|
a list of active subcomponents, see Felix's logs.
|
||||||
|
|
@ -408,6 +415,12 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
iptablesFilterAllowAction:
|
iptablesFilterAllowAction:
|
||||||
type: string
|
type: string
|
||||||
|
iptablesFilterDenyAction:
|
||||||
|
description: IptablesFilterDenyAction controls what happens to traffic
|
||||||
|
that is denied by network policy. By default Calico blocks traffic
|
||||||
|
with an iptables "DROP" action. If you want to use "REJECT" action
|
||||||
|
instead you can configure it in here.
|
||||||
|
type: string
|
||||||
iptablesLockFilePath:
|
iptablesLockFilePath:
|
||||||
description: 'IptablesLockFilePath is the location of the iptables
|
description: 'IptablesLockFilePath is the location of the iptables
|
||||||
lock file. You may need to change this if the lock file is not in
|
lock file. You may need to change this if the lock file is not in
|
||||||
|
|
|
||||||
|
|
@ -3,8 +3,10 @@ calico_files:
|
||||||
- "calico-kube-controllers-PodDisruptionBudget.yaml"
|
- "calico-kube-controllers-PodDisruptionBudget.yaml"
|
||||||
- "calico-kube-controllers-ServiceAccount.yaml"
|
- "calico-kube-controllers-ServiceAccount.yaml"
|
||||||
- "calico-node-ServiceAccount.yaml"
|
- "calico-node-ServiceAccount.yaml"
|
||||||
|
- "calico-cni-plugin-ServiceAccount.yaml"
|
||||||
- "calico-config-ConfigMap.yaml"
|
- "calico-config-ConfigMap.yaml"
|
||||||
- "bgpconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "bgpconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
|
- "bgpfilters.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "blockaffinities.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "blockaffinities.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
|
|
@ -23,8 +25,10 @@ calico_files:
|
||||||
- "networksets.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "networksets.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "calico-kube-controllers-ClusterRole.yaml"
|
- "calico-kube-controllers-ClusterRole.yaml"
|
||||||
- "calico-node-ClusterRole.yaml"
|
- "calico-node-ClusterRole.yaml"
|
||||||
|
- "calico-cni-plugin-ClusterRole.yaml"
|
||||||
- "calico-kube-controllers-ClusterRoleBinding.yaml"
|
- "calico-kube-controllers-ClusterRoleBinding.yaml"
|
||||||
- "calico-node-ClusterRoleBinding.yaml"
|
- "calico-node-ClusterRoleBinding.yaml"
|
||||||
|
- "calico-cni-plugin-ClusterRoleBinding.yaml"
|
||||||
- "calico-node-DaemonSet.yaml"
|
- "calico-node-DaemonSet.yaml"
|
||||||
- "calico-kube-controllers-Deployment.yaml"
|
- "calico-kube-controllers-Deployment.yaml"
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue