You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: site/content/en/news/releases/notes/v1.6.0.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ November 10, 2025
12
12
- When a MirrorPolicy is used, the shadow host suffix is no longer automatically appended to the mirrored cluster name.
13
13
- When running `egctl experimental collect`, SDS (Secret Discovery Service) data is no longer included by default. To include SDS data, enable it by adding the `--sds true` flag.
14
14
- When setting `consecutiveGatewayFailure`, `enforcingConsecutiveGatewayFailure` is automatically set to 100.
15
-
- When the OIDC provider issues a refresh token, Envoy Gateway will now automatically use it to refresh access and ID tokens when they expire. To maintain the previous behavior (not using refresh tokens), set `refreshToken` to false in the OIDC authentication configuration. See https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec for details.
15
+
- When the OIDC provider issues a refresh token, Envoy Gateway will now automatically use it to refresh access and ID tokens when they expire. To maintain the previous behavior (not using refresh tokens), set `refreshToken` to false in the OIDC authentication configuration. See [SecurityPolicy spec](https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec) for details.
-**MirrorPolicy Cluster Naming**: When a `MirrorPolicy` is used, the shadow host suffix is no longer automatically appended to the mirrored cluster name.
30
30
-**egctl collect SDS Data**: When running `egctl experimental collect`, SDS (Secret Discovery Service) data is no longer included by default. To include SDS data, enable it by adding the `--sds true` flag.
31
31
-**Consecutive Gateway Failure**: When setting `consecutiveGatewayFailure`, `enforcingConsecutiveGatewayFailure` is automatically set to 100.
32
-
-**OIDC Refresh Token Behavior**: When the OIDC provider issues a refresh token, Envoy Gateway will now automatically use it to refresh access and ID tokens when they expire. To maintain the previous behavior (not using refresh tokens), set `refreshToken` to false in the OIDC authentication configuration. See https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec for details.
32
+
-**OIDC Refresh Token Behavior**: When the OIDC provider issues a refresh token, Envoy Gateway will now automatically use it to refresh access and ID tokens when they expire. To maintain the previous behavior (not using refresh tokens), set `refreshToken` to false in the OIDC authentication configuration. See [SecurityPolicy spec](https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec) for details.
We encourage all users to upgrade to v1.6.0 to take advantage of the new features, security improvements, and performance gains. For full details, see the [Release Notes][] and updated [Documentation][docs].
115
+
## 📝 Upgrade Notes
116
+
117
+
- We encourage all users to upgrade to v1.6.0 to take advantage of the new features, security improvements, and performance gains. For full details, see the [Release Notes][] and updated [Documentation][docs].
118
+
- It is recommended for users to migrate their resources to use the `v1` Gateway API CRDs soon since `v1alpha3` CRDs are deprecated.
119
+
- See upgrading from previous version via [helm install](../../v1.6/install/install-helm.md#upgrading-from-the-previous-version) or [yaml install](../../v1.6/install/install-yaml.md#upgrading-from-the-previous-version) for more. Note that CRDs should be upgraded first before gateway controller.
0 commit comments