Skip to content

Commit 5eb6798

Browse files
authored
chore: upgrade APISIX to 3.6.0 (#633)
1 parent be31a91 commit 5eb6798

6 files changed

Lines changed: 5 additions & 150 deletions

File tree

charts/apisix/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,12 @@ type: application
3131
# This is the chart version. This version number should be incremented each time you make changes
3232
# to the chart and its templates, including the app version.
3333
# Versions are expected to follow Semantic Versioning (https://semver.org/)
34-
version: 1.6.2
34+
version: 1.7.0
3535

3636
# This is the version number of the application being deployed. This version number should be
3737
# incremented each time you make changes to the application. Versions are not expected to
3838
# follow Semantic Versioning. They should reflect the version the application is using.
39-
appVersion: 3.5.0
39+
appVersion: 3.6.0
4040
sources:
4141
- https://github.com/apache/apisix-helm-chart
4242

charts/apisix/README.md

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The command removes all the Kubernetes components associated with the chart and
7070
| apisix.httpRouter | string | `"radixtree_host_uri"` | Defines how apisix handles routing: - radixtree_uri: match route by uri(base on radixtree) - radixtree_host_uri: match route by host + uri(base on radixtree) - radixtree_uri_with_parameter: match route by uri with parameters |
7171
| apisix.image.pullPolicy | string | `"IfNotPresent"` | Apache APISIX image pull policy |
7272
| apisix.image.repository | string | `"apache/apisix"` | Apache APISIX image repository |
73-
| apisix.image.tag | string | `"3.5.0-debian"` | Apache APISIX image tag Overrides the image tag whose default is the chart appVersion. |
73+
| apisix.image.tag | string | `"3.6.0-debian"` | Apache APISIX image tag Overrides the image tag whose default is the chart appVersion. |
7474
| apisix.kind | string | `"Deployment"` | Use a `DaemonSet` or `Deployment` |
7575
| apisix.luaModuleHook | object | `{"configMapRef":{"mounts":[{"key":"","path":""}],"name":""},"enabled":false,"hookPoint":"","luaPath":""}` | Whether to add a custom lua module |
7676
| apisix.luaModuleHook.configMapRef | object | `{"mounts":[{"key":"","path":""}],"name":""}` | configmap that stores the codes |
@@ -120,21 +120,6 @@ The command removes all the Kubernetes components associated with the chart and
120120
| dashboard.config.conf.etcd.prefix | string | `"/apisix"` | apisix configurations prefix |
121121
| dashboard.config.conf.etcd.username | string | `nil` | Specifies etcd basic auth username if enable etcd auth |
122122
| dashboard.enabled | bool | `false` | |
123-
| deployment.certs | object | `{"cert":"","cert_key":"","certsSecret":"","mTLSCACert":"","mTLSCACertSecret":""}` | certs used for certificates in decoupled mode |
124-
| deployment.certs.cert | string | `""` | cert name in certsSecret |
125-
| deployment.certs.cert_key | string | `""` | cert key in certsSecret |
126-
| deployment.certs.certsSecret | string | `""` | secret name used for decoupled mode |
127-
| deployment.certs.mTLSCACert | string | `""` | mTLS CA cert filename in mTLSCACertSecret |
128-
| deployment.certs.mTLSCACertSecret | string | `""` | trusted_ca_cert name in certsSecret |
129-
| deployment.controlPlane | object | `{"cert":"","certKey":"","certsSecret":"","confServerPort":"9280"}` | used for control_plane deployment mode |
130-
| deployment.controlPlane.cert | string | `""` | conf Server CA cert name in certsSecret |
131-
| deployment.controlPlane.certKey | string | `""` | conf Server cert key name in certsSecret |
132-
| deployment.controlPlane.certsSecret | string | `""` | secret name used by conf Server |
133-
| deployment.controlPlane.confServerPort | string | `"9280"` | conf Server address |
134-
| deployment.dataPlane | object | `{"controlPlane":{"host":[],"prefix":"/apisix","timeout":30}}` | used for data_plane deployment mode |
135-
| deployment.dataPlane.controlPlane.host | list | `[]` | The hosts of the control_plane used by the data_plane |
136-
| deployment.dataPlane.controlPlane.prefix | string | `"/apisix"` | The prefix of the control_plane used by the data_plane |
137-
| deployment.dataPlane.controlPlane.timeout | int | `30` | Timeout when the data plane connects to the control plane |
138123
| deployment.mode | string | `"traditional"` | Apache APISIX deployment mode Optional: traditional, decoupled ref: https://apisix.apache.org/docs/apisix/deployment-modes/ |
139124
| deployment.role | string | `"traditional"` | Deployment role Optional: traditional, data_plane, control_plane ref: https://apisix.apache.org/docs/apisix/deployment-modes/ |
140125
| discovery.enabled | bool | `false` | Enable or disable Apache APISIX integration service discovery |

charts/apisix/templates/_pod.tpl

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -147,21 +147,6 @@ spec:
147147
subPath: {{ .Values.gateway.tls.certCAFilename }}
148148
{{- end }}
149149

150-
{{- if and (eq .Values.deployment.role "control_plane") .Values.deployment.controlPlane.certsSecret }}
151-
- mountPath: /conf-server-ssl
152-
name: conf-server-ssl
153-
{{- end }}
154-
155-
{{- if and (eq .Values.deployment.mode "decoupled") .Values.deployment.certs.mTLSCACertSecret }}
156-
- mountPath: /conf-ca-ssl
157-
name: conf-ca-ssl
158-
{{- end }}
159-
160-
{{- if and (eq .Values.deployment.mode "decoupled") .Values.deployment.certs.certsSecret }}
161-
- mountPath: /conf-client-ssl
162-
name: conf-client-ssl
163-
{{- end }}
164-
165150
{{- if .Values.etcd.auth.tls.enabled }}
166151
- mountPath: /etcd-ssl
167152
name: etcd-ssl
@@ -226,23 +211,6 @@ spec:
226211
secretName: {{ .Values.etcd.auth.tls.existingSecret | quote }}
227212
name: etcd-ssl
228213
{{- end }}
229-
{{- if and (eq .Values.deployment.role "control_plane") .Values.deployment.controlPlane.certsSecret }}
230-
- secret:
231-
secretName: {{ .Values.deployment.controlPlane.certsSecret | quote }}
232-
name: conf-server-ssl
233-
{{- end }}
234-
235-
{{- if and (eq .Values.deployment.mode "decoupled") .Values.deployment.certs.mTLSCACertSecret }}
236-
- secret:
237-
secretName: {{ .Values.deployment.certs.mTLSCACertSecret | quote }}
238-
name: conf-ca-ssl
239-
{{- end }}
240-
241-
{{- if and (eq .Values.deployment.mode "decoupled") .Values.deployment.certs.certsSecret }}
242-
- secret:
243-
secretName: {{ .Values.deployment.certs.certsSecret | quote }}
244-
name: conf-client-ssl
245-
{{- end }}
246214
{{- if .Values.apisix.setIDFromPodUID }}
247215
- downwardAPI:
248216
items:

charts/apisix/templates/configmap.yaml

Lines changed: 1 addition & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -306,13 +306,6 @@ data:
306306
{{- if eq .Values.deployment.role "control_plane" }}
307307
role_control_plane:
308308
config_provider: etcd
309-
conf_server:
310-
listen: 0.0.0.0:{{ .Values.deployment.controlPlane.confServerPort }}
311-
cert: "/conf-server-ssl/{{ .Values.deployment.controlPlane.cert }}"
312-
cert_key: "/conf-server-ssl/{{ .Values.deployment.controlPlane.certKey }}"
313-
{{- if .Values.deployment.certs.mTLSCACertSecret }}
314-
client_ca_cert: "/conf-ca-ssl/{{ .Values.deployment.certs.mTLSCACert }}"
315-
{{- end }}
316309
{{- end }}
317310
318311
admin:
@@ -386,25 +379,7 @@ data:
386379
387380
{{- if eq .Values.deployment.role "data_plane" }}
388381
role_data_plane:
389-
config_provider: control_plane
390-
control_plane:
391-
host:
392-
{{- range $.Values.deployment.dataPlane.controlPlane.host }}
393-
- {{ . | quote }}
394-
{{- end }}
395-
prefix: {{ .Values.deployment.dataPlane.controlPlane.prefix }}
396-
timeout: {{ .Values.deployment.dataPlane.controlPlane.timeout }}
397-
{{- end }}
398-
399-
{{- if eq .Values.deployment.mode "decoupled"}}
400-
{{- if .Values.deployment.certs.certsSecret }}
401-
certs:
402-
cert: "/conf-client-ssl/{{ .Values.deployment.certs.cert }}"
403-
cert_key: "/conf-client-ssl/{{ .Values.deployment.certs.cert_key }}"
404-
{{- if .Values.deployment.certs.mTLSCACertSecret }}
405-
trusted_ca_cert: "/conf-ca-ssl/{{ .Values.deployment.certs.mTLSCACert }}"
406-
{{- end }}
407-
{{- end }}
382+
config_provider: etcd
408383
{{- end }}
409384
410385
{{- end }}

charts/apisix/templates/service-control-plane.yaml

Lines changed: 0 additions & 38 deletions
This file was deleted.

charts/apisix/values.yaml

Lines changed: 1 addition & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ apisix:
105105
pullPolicy: IfNotPresent
106106
# -- Apache APISIX image tag
107107
# Overrides the image tag whose default is the chart appVersion.
108-
tag: 3.5.0-debian
108+
tag: 3.6.0-debian
109109

110110
# -- Use a `DaemonSet` or `Deployment`
111111
kind: Deployment
@@ -218,41 +218,6 @@ deployment:
218218
# ref: https://apisix.apache.org/docs/apisix/deployment-modes/
219219
role: "traditional"
220220

221-
# -- used for control_plane deployment mode
222-
controlPlane:
223-
# -- conf Server address
224-
confServerPort: "9280"
225-
# -- secret name used by conf Server
226-
certsSecret: ""
227-
# -- conf Server CA cert name in certsSecret
228-
cert: ""
229-
# -- conf Server cert key name in certsSecret
230-
certKey: ""
231-
232-
# -- used for data_plane deployment mode
233-
dataPlane:
234-
controlPlane:
235-
# -- The hosts of the control_plane used by the data_plane
236-
host: []
237-
# -- The prefix of the control_plane used by the data_plane
238-
prefix: "/apisix"
239-
# -- Timeout when the data plane connects to the control plane
240-
timeout: 30
241-
242-
# -- certs used for certificates in decoupled mode
243-
certs:
244-
# -- secret name used for decoupled mode
245-
certsSecret: ""
246-
# -- cert name in certsSecret
247-
cert: ""
248-
# -- cert key in certsSecret
249-
cert_key: ""
250-
251-
# -- trusted_ca_cert name in certsSecret
252-
mTLSCACertSecret: ""
253-
# -- mTLS CA cert filename in mTLSCACertSecret
254-
mTLSCACert: ""
255-
256221
gateway:
257222
# -- Apache APISIX service type for user access itself
258223
type: NodePort

0 commit comments

Comments
 (0)