Skip to content

Upgrade to v1.5 of Gateway API#4613

Merged
k8s-ci-robot merged 3 commits intokubernetes-sigs:mainfrom
zac-nixon:main
Mar 4, 2026
Merged

Upgrade to v1.5 of Gateway API#4613
k8s-ci-robot merged 3 commits intokubernetes-sigs:mainfrom
zac-nixon:main

Conversation

@zac-nixon
Copy link
Copy Markdown
Collaborator

Description

Upgrade to use v1.5 of Gateway API. Main change is that TLSRoute moves alpha2 to v1. Need to work through the guidance for customers still, as the current Gateway CRDs remove TLSRoute entirely from alpha2 (effectively breaking users)

Also, threw in a small refactor to support listenersets (next pr, it will be ~largeish)

Checklist

  • Added tests that cover your change (if possible)
  • Added/modified documentation as required (such as the README.md, or the docs directory)
  • Manually tested
  • Made sure the title of the PR is a good description that can go into the release notes

BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯

  • Backfilled missing tests for code in same general area 🎉
  • Refactored something and made the world a better place 🌟

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. labels Mar 4, 2026
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: zac-nixon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 4, 2026
There a few backwards incompatible release.

- Going from a version less than v1.5
- v1.5 brings TLSRoute out of alpha and into the v1 API version. Once this happens, old versions of the controller will not work with TLSRoutes.
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

v1.5 brings TLSRoute out of alpha and into the v1 API version. Once this happens, old versions of the controller will not work with TLSRoutes.

Is the statement true? The older version of the controller will not work with v1 TLSRoutes, but they'll still work with v1alpha2 TLSRoutes , right ?. We would better say users must ensure their TLSRoute match the API version their controller expects.

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unfortunately the statement is true. The Gateway API community decide to set storage = false, serve = false for TLSRoutes on alpha2, meaning that the API won't return them. I am thinking for our v3.2.0 release, we will update the CRDs to set storage = true, to allow seamless transition for users.

@shuqz
Copy link
Copy Markdown
Collaborator

shuqz commented Mar 4, 2026

outside scope of this PR, if we are updating gateway api version, we need to run conformance test again

@shuqz
Copy link
Copy Markdown
Collaborator

shuqz commented Mar 4, 2026

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 4, 2026
@k8s-ci-robot k8s-ci-robot merged commit 3596116 into kubernetes-sigs:main Mar 4, 2026
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants