traefik/docs/content/migration/v2.md

175 lines
3.5 KiB
Markdown
Raw Normal View History

2019-12-12 16:06:05 +00:00
# Migration: Steps needed between the versions
## v2.0 to v2.1
### Kubernetes CRD
In v2.1, a new Kubernetes CRD called `TraefikService` was added.
While updating an installation to v2.1,
one should apply that CRD, and update the existing `ClusterRole` definition to allow Traefik to use that CRD.
2019-12-12 16:06:05 +00:00
To add that CRD and enhance the permissions, following definitions need to be applied to the cluster.
```yaml tab="TraefikService"
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: traefikservices.traefik.containo.us
spec:
group: traefik.containo.us
version: v1alpha1
names:
kind: TraefikService
plural: traefikservices
singular: traefikservice
scope: Namespaced
```
```yaml tab="ClusterRole"
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: traefik-ingress-controller
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- secrets
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses/status
verbs:
- update
- apiGroups:
- traefik.containo.us
resources:
- middlewares
2020-03-05 10:48:04 +00:00
- ingressroutes
- traefikservices
- ingressroutetcps
- tlsoptions
2019-12-12 16:06:05 +00:00
verbs:
- get
- list
- watch
2020-03-05 10:48:04 +00:00
```
After having both resources applied, Traefik will work properly.
## v2.1 to v2.2
### Headers middleware: accessControlAllowOrigin
`accessControlAllowOrigin` is deprecated.
This field will be removed in future 2.x releases.
Please configure your allowed origins in `accessControlAllowOriginList` instead.
### Kubernetes CRD
In v2.2, new Kubernetes CRDs called `TLSStore` and `IngressRouteUDP` were added.
While updating an installation to v2.2,
one should apply that CRDs, and update the existing `ClusterRole` definition to allow Traefik to use that CRDs.
To add that CRDs and enhance the permissions, following definitions need to be applied to the cluster.
```yaml tab="TLSStore"
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: tlsstores.traefik.containo.us
spec:
group: traefik.containo.us
version: v1alpha1
names:
kind: TLSStore
plural: tlsstores
singular: tlsstore
scope: Namespaced
```
```yaml tab="IngressRouteUDP"
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: ingressrouteudps.traefik.containo.us
spec:
group: traefik.containo.us
version: v1alpha1
names:
kind: IngressRouteUDP
plural: ingressrouteudps
singular: ingressrouteudp
scope: Namespaced
```
```yaml tab="ClusterRole"
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: traefik-ingress-controller
rules:
2019-12-12 16:06:05 +00:00
- apiGroups:
2020-03-05 10:48:04 +00:00
- ""
2019-12-12 16:06:05 +00:00
resources:
2020-03-05 10:48:04 +00:00
- services
- endpoints
- secrets
2019-12-12 16:06:05 +00:00
verbs:
- get
- list
- watch
- apiGroups:
2020-03-05 10:48:04 +00:00
- extensions
2019-12-12 16:06:05 +00:00
resources:
2020-03-05 10:48:04 +00:00
- ingresses
2019-12-12 16:06:05 +00:00
verbs:
- get
- list
- watch
- apiGroups:
2020-03-05 10:48:04 +00:00
- extensions
2019-12-12 16:06:05 +00:00
resources:
2020-03-05 10:48:04 +00:00
- ingresses/status
2019-12-12 16:06:05 +00:00
verbs:
2020-03-05 10:48:04 +00:00
- update
2019-12-12 16:06:05 +00:00
- apiGroups:
- traefik.containo.us
resources:
2020-03-05 10:48:04 +00:00
- middlewares
- ingressroutes
2019-12-12 16:06:05 +00:00
- traefikservices
2020-03-05 10:48:04 +00:00
- ingressroutetcps
- ingressrouteudps
- tlsoptions
- tlsstores
2019-12-12 16:06:05 +00:00
verbs:
- get
- list
- watch
2020-03-05 10:48:04 +00:00
2019-12-12 16:06:05 +00:00
```
After having both resources applied, Traefik will work properly.