change process GVK for TLSRoute/BackendTLSPolicy#7523
change process GVK for TLSRoute/BackendTLSPolicy#7523zirain wants to merge 8 commits intoenvoyproxy:mainfrom
Conversation
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #7523 +/- ##
==========================================
- Coverage 72.82% 72.77% -0.06%
==========================================
Files 235 235
Lines 35176 35185 +9
==========================================
- Hits 25618 25605 -13
- Misses 7744 7762 +18
- Partials 1814 1818 +4 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
3ec1a42 to
6ef897d
Compare
2dceab3 to
05f0125
Compare
|
Thanks @zirain for fixing this. Could this happen again next time when we upgrade Gateway API? Is there anything that we can do to prevent it in the future-and upgrade test? |
05f0125 to
134bde6
Compare
we should be careful with the verions that EG supported. |
134bde6 to
853ad46
Compare
Signed-off-by: zirain <zirain2009@gmail.com>
853ad46 to
2e8fe19
Compare
|
we didn't need this ATM. |
5ee1652 to
5c112bc
Compare
|
so this issue is because the user didnt update CRDs ? and this section is missing ? and should we enforce that v1.6 CRDs be applied before v1.7 upgrade ? |
The reason is that the user didn't update CRDs - BackendTLSPolicy in the cluster is
I think it’s reasonable for EG to stay compatible with the previous Gateway API version to ensure a smooth upgrade, but we don’t necessarily need to keep compatibility with versions before that. We can make this explicit in the compatibility matrix and upgrade sections in the docs. |
|
Could this be added in to 1.6.x soon? Currently we are unable to upgrade from 1.5.x to 1.6.x because we use |
|
Hi @lboynton will upgrading CRD first solve your case? For the v1.3.0 experimental to v1.4.1 standard channel upgrade path, I don't think this PR will help, as it will only watch the old v1alpha3. If we want EG to work with v1.4.1 standard channel, this PR shouldn't be merged. |
|
OK sorry, I don't think this is needed (at least for my case). I misunderstood the problem, it was actually a fix in envoy gateway v1.5.x I needed to make that version compatible with GW API CRDs v1.4.x before completing the upgrade to envoy gateway v1.6.x. See my comment on #7709. |
|
Discussed in today’s community meeting: the decision is to continue watching the v1 version of BackendTLSPolicy, so Envoy Gateway v1.6 can work with the Gateway API v1.4.1 standard channel. For users upgrading from v1.5.x to v1.6.x, the recommended upgrade order is: We should also add e2e tests for rollback scenarios—for example, verifying that EG v1.5.x works correctly with Gateway API v1.4.1. |
fixes: #7522
related to: #7090
For TLSRoute, use v1alpha2.
For BackendTLSPolicy, use v1alpha3.
The goal is make
EG v1.6+work withGateway API v1.3this's important during the upgrade.Fixes: #7709