diff --git a/tests/vendir.lock.yml b/tests/vendir.lock.yml index b4a42248b..ce13b80a0 100644 --- a/tests/vendir.lock.yml +++ b/tests/vendir.lock.yml @@ -14,14 +14,14 @@ directories: url: https://api.github.com/repos/kubernetes-sigs/metrics-server/releases/113485257 path: metrics-server-local - githubRelease: - tag: v1.13.1 - url: https://api.github.com/repos/cert-manager/cert-manager/releases/122733017 + tag: v1.13.2 + url: https://api.github.com/repos/cert-manager/cert-manager/releases/127169522 path: cert-manager - git: - commitTitle: Update Contour Docker image to v1.26.1.... - sha: e1e0e05f21aa6d3b5cef80eb47ded15aa7e29452 + commitTitle: Update Contour Docker image to v1.27.0.... + sha: 30f317ea4978ddfcdd3405b40032d74dc43efb02 tags: - - v1.26.1 + - v1.27.0 path: contour path: vendor kind: LockConfig diff --git a/tests/vendor/cert-manager/cert-manager.crds.yaml b/tests/vendor/cert-manager/cert-manager.crds.yaml index d45337eba..14c0726c4 100644 --- a/tests/vendor/cert-manager/cert-manager.crds.yaml +++ b/tests/vendor/cert-manager/cert-manager.crds.yaml @@ -22,7 +22,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -220,7 +220,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -591,7 +591,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: acme.cert-manager.io names: @@ -1669,7 +1669,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: "cert-manager" # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -2989,7 +2989,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: "cert-manager" # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -4309,7 +4309,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: acme.cert-manager.io names: diff --git a/tests/vendor/cert-manager/cert-manager.yaml b/tests/vendor/cert-manager/cert-manager.yaml index 3ebf667b3..15f67a138 100644 --- a/tests/vendor/cert-manager/cert-manager.yaml +++ b/tests/vendor/cert-manager/cert-manager.yaml @@ -27,7 +27,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -225,7 +225,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -596,7 +596,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: acme.cert-manager.io names: @@ -1674,7 +1674,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: "cert-manager" # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -2994,7 +2994,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: "cert-manager" # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: cert-manager.io names: @@ -4314,7 +4314,7 @@ metadata: app.kubernetes.io/name: 'cert-manager' app.kubernetes.io/instance: 'cert-manager' # Generated labels - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: group: acme.cert-manager.io names: @@ -4498,7 +4498,7 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" --- # Source: cert-manager/templates/serviceaccount.yaml apiVersion: v1 @@ -4512,7 +4512,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" --- # Source: cert-manager/templates/webhook-serviceaccount.yaml apiVersion: v1 @@ -4526,7 +4526,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" --- # Source: cert-manager/templates/controller-config.yaml apiVersion: v1 @@ -4539,7 +4539,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" data: --- # Source: cert-manager/templates/webhook-config.yaml @@ -4553,7 +4553,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" data: --- # Source: cert-manager/templates/cainjector-rbac.yaml @@ -4566,7 +4566,7 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates"] @@ -4598,7 +4598,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["cert-manager.io"] resources: ["issuers", "issuers/status"] @@ -4624,7 +4624,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["cert-manager.io"] resources: ["clusterissuers", "clusterissuers/status"] @@ -4650,7 +4650,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"] @@ -4685,7 +4685,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["acme.cert-manager.io"] resources: ["orders", "orders/status"] @@ -4723,7 +4723,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: # Use to update challenge resource status - apiGroups: ["acme.cert-manager.io"] @@ -4783,7 +4783,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests"] @@ -4820,7 +4820,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" rules: - apiGroups: ["cert-manager.io"] @@ -4837,7 +4837,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" @@ -4860,7 +4860,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" rules: @@ -4885,7 +4885,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["cert-manager.io"] resources: ["signers"] @@ -4905,7 +4905,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["certificates.k8s.io"] resources: ["certificatesigningrequests"] @@ -4931,7 +4931,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["authorization.k8s.io"] resources: ["subjectaccessreviews"] @@ -4947,7 +4947,7 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -4967,7 +4967,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -4987,7 +4987,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5007,7 +5007,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5027,7 +5027,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5047,7 +5047,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5067,7 +5067,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5087,7 +5087,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5107,7 +5107,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5127,7 +5127,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -5150,7 +5150,7 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: # Used for leader election by the controller # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller @@ -5176,7 +5176,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] @@ -5197,7 +5197,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" rules: - apiGroups: [""] resources: ["secrets"] @@ -5222,7 +5222,7 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -5245,7 +5245,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -5267,7 +5267,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -5289,7 +5289,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: type: ClusterIP ports: @@ -5313,7 +5313,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: type: ClusterIP ports: @@ -5337,7 +5337,7 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: replicas: 1 selector: @@ -5352,7 +5352,7 @@ spec: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: serviceAccountName: cert-manager-cainjector enableServiceLinks: false @@ -5362,7 +5362,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-cainjector - image: "quay.io/jetstack/cert-manager-cainjector:v1.13.1" + image: "quay.io/jetstack/cert-manager-cainjector:v1.13.2" imagePullPolicy: IfNotPresent args: - --v=2 @@ -5391,7 +5391,7 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: replicas: 1 selector: @@ -5406,7 +5406,7 @@ spec: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" annotations: prometheus.io/path: "/metrics" prometheus.io/scrape: 'true' @@ -5420,13 +5420,13 @@ spec: type: RuntimeDefault containers: - name: cert-manager-controller - image: "quay.io/jetstack/cert-manager-controller:v1.13.1" + image: "quay.io/jetstack/cert-manager-controller:v1.13.2" imagePullPolicy: IfNotPresent args: - --v=2 - --cluster-resource-namespace=$(POD_NAMESPACE) - --leader-election-namespace=kube-system - - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.13.1 + - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.13.2 - --max-concurrent-challenges=60 ports: - containerPort: 9402 @@ -5459,7 +5459,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: replicas: 1 selector: @@ -5474,7 +5474,7 @@ spec: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" spec: serviceAccountName: cert-manager-webhook enableServiceLinks: false @@ -5484,7 +5484,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-webhook - image: "quay.io/jetstack/cert-manager-webhook:v1.13.1" + image: "quay.io/jetstack/cert-manager-webhook:v1.13.2" imagePullPolicy: IfNotPresent args: - --v=2 @@ -5545,7 +5545,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" annotations: cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca" webhooks: @@ -5586,7 +5586,7 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.13.1" + app.kubernetes.io/version: "v1.13.2" annotations: cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca" webhooks: diff --git a/tests/vendor/contour/01-crds.yaml b/tests/vendor/contour/01-crds.yaml index 909909afb..783ff7574 100644 --- a/tests/vendor/contour/01-crds.yaml +++ b/tests/vendor/contour/01-crds.yaml @@ -471,6 +471,14 @@ spec: type: string type: object type: object + featureFlags: + description: 'FeatureFlags defines toggle to enable new contour features. + Available toggles are: useEndpointSlices - configures contour to + fetch endpoint data from k8s endpoint slices. defaults to false + and reading endpoint data from the k8s endpoints.' + items: + type: string + type: array gateway: description: Gateway contains parameters for the gateway-api Gateway that Contour is configured to serve traffic. @@ -3404,6 +3412,15 @@ spec: type: object type: array type: object + overloadMaxHeapSize: + description: 'OverloadMaxHeapSize defines the maximum heap memory + of the envoy controlled by the overload manager. When the value + is greater than 0, the overload manager is enabled, and when + envoy reaches 95% of the maximum heap size, it performs a shrink + heap operation, When it reaches 98% of the maximum heap size, + Envoy Will stop accepting requests. More info: https://projectcontour.io/docs/main/config/overload-manager/' + format: int64 + type: integer podAnnotations: additionalProperties: type: string @@ -3936,6 +3953,14 @@ spec: type: string type: object type: object + featureFlags: + description: 'FeatureFlags defines toggle to enable new contour + features. Available toggles are: useEndpointSlices - configures + contour to fetch endpoint data from k8s endpoint slices. defaults + to false and reading endpoint data from the k8s endpoints.' + items: + type: string + type: array gateway: description: Gateway contains parameters for the gateway-api Gateway that Contour is configured to serve traffic. @@ -5991,8 +6016,15 @@ spec: type: object type: object requestHeadersPolicy: - description: The policy for managing request headers during - proxying. + description: "The policy for managing request headers during + proxying. \n You may dynamically rewrite the Host header to + be forwarded upstream to the content of a request header using + the below format \"%REQ(X-Header-Name)%\". If the value of + the header is empty, it is ignored. \n *NOTE: Pay attention + to the potential security implications of using this option. + Provided header must come from trusted source. \n **NOTE: + The header rewrite is only done while forwarding and has no + bearing on the routing decision." properties: remove: description: Remove specifies a list of HTTP header names diff --git a/tests/vendor/contour/02-job-certgen.yaml b/tests/vendor/contour/02-job-certgen.yaml index 235c51cbd..db53b8aa8 100644 --- a/tests/vendor/contour/02-job-certgen.yaml +++ b/tests/vendor/contour/02-job-certgen.yaml @@ -36,7 +36,7 @@ rules: apiVersion: batch/v1 kind: Job metadata: - name: contour-certgen-v1-26-1 + name: contour-certgen-v1-27-0 namespace: projectcontour spec: template: @@ -46,7 +46,7 @@ spec: spec: containers: - name: contour - image: ghcr.io/projectcontour/contour:v1.26.1 + image: ghcr.io/projectcontour/contour:v1.27.0 imagePullPolicy: IfNotPresent command: - contour diff --git a/tests/vendor/contour/02-role-contour.yaml b/tests/vendor/contour/02-role-contour.yaml index 589f32447..35e9386e7 100644 --- a/tests/vendor/contour/02-role-contour.yaml +++ b/tests/vendor/contour/02-role-contour.yaml @@ -18,6 +18,14 @@ rules: - get - list - watch +- apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - list + - watch - apiGroups: - gateway.networking.k8s.io resources: diff --git a/tests/vendor/contour/03-contour.yaml b/tests/vendor/contour/03-contour.yaml index 0070896e2..f14a99b64 100644 --- a/tests/vendor/contour/03-contour.yaml +++ b/tests/vendor/contour/03-contour.yaml @@ -45,7 +45,7 @@ spec: - --contour-key-file=/certs/tls.key - --config-path=/config/contour.yaml command: ["contour"] - image: ghcr.io/projectcontour/contour:v1.26.1 + image: ghcr.io/projectcontour/contour:v1.27.0 imagePullPolicy: IfNotPresent name: contour ports: diff --git a/tests/vendor/contour/03-envoy.yaml b/tests/vendor/contour/03-envoy.yaml index b39f0308c..c146eb8b6 100644 --- a/tests/vendor/contour/03-envoy.yaml +++ b/tests/vendor/contour/03-envoy.yaml @@ -29,7 +29,7 @@ spec: args: - envoy - shutdown-manager - image: ghcr.io/projectcontour/contour:v1.26.1 + image: ghcr.io/projectcontour/contour:v1.27.0 imagePullPolicy: IfNotPresent lifecycle: preStop: @@ -50,7 +50,7 @@ spec: - --log-level info command: - envoy - image: docker.io/envoyproxy/envoy:v1.27.2 + image: docker.io/envoyproxy/envoy:v1.28.0 imagePullPolicy: IfNotPresent name: envoy env: @@ -107,7 +107,7 @@ spec: - --envoy-key-file=/certs/tls.key command: - contour - image: ghcr.io/projectcontour/contour:v1.26.1 + image: ghcr.io/projectcontour/contour:v1.27.0 imagePullPolicy: IfNotPresent name: envoy-initconfig volumeMounts: