Releases: Mirantis/launchpad
Releases · Mirantis/launchpad
1.4.0-rc.1
Changelog
- Add support for Ubuntu 22.04
- Update golang to 1.18
- Update ssh dependencies for rsa-sha2 host keys support
1.4.0-beta.4
Changelog
- Don't restart MCR if daemon.json wasn't changed
1.4.0-beta.3
Changelog
- Add Windows Server 2022 support
1.4.0-beta.1
Changelog
- Merge existing daemon.json instead of overwriting
- Set worker upgrade concurrency via --concurrency
- Add support for Rocky Linux
1.3.3
Changelog
- Fix MCR upgrade on MSR nodes when MSR has not been installed yet
1.3.1
Changelog
- Work around a bug in MKE versions 3.3.8 and above which prevents installation or upgrade from a private repo in an air-gapped environment using
mke.spec.imageRepo
- Fix a nil dereference panic when GitHub version check fails
- Update the MKE version check to respect the
--disable-version-check
flag; previously, this only applied to the launchpad version
1.3.1-beta.1
Changelog
- Work around a bug in MKE versions 3.3.8 and above which prevents installation or upgrade from a private repo in an air-gapped environment using
mke.spec.imageRepo
1.3.0
Changelog
- Configuration APIVersion launchpad.mirantis.com/mke/1.4
- Fix SSH public key authentication when ssh-agent is active
- Allow 1-char usernames in SSH
- Add binaries for Apple M1 and Linux arm64
- Build using Go 1.16
- Get latest available MKE and MSR versions live from docker hub
- Fix MKE bootstrap image name
- SSH keyfile is no longer required when using auth forwarding (
ssh -A user@bastionhost launchpad apply ...
) - SSH bastion host support for both SSH and WinRM targets
- Optional SSH host key checking
- Fix WinRM closed channel panic
- Add MSR certificate configuration fields
- Set MSR
--ucp-ca
when MKE CA configured - Require MKE and MSR versions in configuration
Configuration examples
Hosts with bastion and SSH host key checking:
apiVersion: launchpad.mirantis.com/mke/v1.4
kind: mke
spec:
hosts:
- role: manager
ssh:
address: 10.0.0.2
bastion: *bastion
address: 10.0.0.1
hostKey: ecdsa-sha2-nistp256 AAAABCDEFG12345==
- role: worker
winRM:
address: 10.0.0.3
username: Administrator
bastion:
&bastion
MSR certificate configuration:
spec:
msr:
caCertPath: ./ca.pem
certPath: ./cert.pem
keyPath: ./cert.key
With embedded certificates:
spec:
msr:
caCertData: AABBCC==
certData: AABBCC==
keyData: AABBCC==
1.3.0-beta.3
Changelog
(vs 1.3.0-beta.2
)
- Shell-escape MSR certificates in installer arguments.
1.3.0-beta.2
Changelog
(vs 1.3.0-beta.1
)
- Fix WinRM closed channel panic
- Add MSR certificate configuration fields
- Set MSR
--ucp-ca
when MKE CA configured - Require MKE and MSR versions in configuration
Certificate configuration:
spec:
msr:
caCertPath: ./ca.pem
certPath: ./cert.pem
keyPath: ./cert.key
With embedded certificates:
spec:
msr:
caCertData: AABBCC==
certData: AABBCC==
keyData: AABBCC==