You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 24, 2023. It is now read-only.
*[66](https://github.com/nginxinc/nginx-ingress-operator/pull/66)Fix Service to be an optional field. Add support for updating ExtraLabels.
17
+
*[65](https://github.com/nginxinc/nginx-ingress-operator/pull/65)Fix SCC resource to only affect KIC pods.
18
18
19
19
Documentation
20
20
21
-
* Update IC compatibility in changelog (#54) @pleshakov
21
+
*[54](https://github.com/nginxinc/nginx-ingress-operator/pull/54)Update IC compatibility in changelog.
22
22
23
-
Maintenance
24
-
25
-
* Bump golangci/golangci-lint-action from v2.4.0 to v2.5.1 (#67) @dependabot
26
-
* Add release-drafter (#64) @lucacome
27
-
* Change dependabot interval to weekly (#63) @lucacome
28
-
* Bump actions/cache from v2 to v2.1.4 (#53) @dependabot
29
-
* Bump golangci/golangci-lint-action from v2 to v2.4.0 (#59) @dependabot
30
-
* Bump github.com/google/go-cmp from 0.4.0 to 0.5.4 (#49) @dependabot
31
-
* Add dependabot (#45) @lucacome
32
-
* Update CRDs, CSVs and Makefile (#36) @lucacome
23
+
KNOWN ISSUES:
24
+
* The Operator doesn't automatically remove IngressClasses created by [29](https://github.com/nginxinc/nginx-ingress-operator/pull/29).
1. Remove the existing Policy CRD: `kubectl delete crd policies.k8s.nginx.org`
42
34
**Please note that deletion of the policies.k8s.nginx.org CRD will result in all instances of that CRD being deleted too. Ensure to back up any important Custom Resource instances first!**
4. Update any existing instances of the nginxingresscontrollers.k8s.nginx.org Custom Resource to use a KIC 1.10 image.
35
+
2. Delete the existing SCC: `kubectl delete scc nginx-ingress-scc`
36
+
3. Upgrade the operator to version 0.1.0.
37
+
4. Update any existing instances of the nginxingresscontrollers.k8s.nginx.org Custom Resource to use an NGINX Ingress Controller 1.10.x image.
38
+
39
+
Updating the secrets in KIC:
40
+
Version 1.10.0 of the Ingress Controller added a requirement for secrets to be one of the following types: kubernetes.io/tls for TLS secrets; nginx.org/jwk for JWK secrets; or nginx.org/ca for CA secrets. The Ingress Controller now ignores secrets that are not one of these supported types. Before upgrading, please ensure that the secrets referenced in Ingress, VirtualServer or Policies resources are of a supported type, which is configured via the type field. Please see https://docs.nginx.com/nginx-ingress-controller/releases/#nginx-ingress-controller-1-10-0 for more details.
0 commit comments