Hi, while I can understand you are pivoting business model and deprecating the Kong OSS & free versions, it seems you released a version of KIC breaking all the clusters running Kong v3.9.
However, from the PR in question (#7853), you knew this would happen (cf. https://github.com/Kong/kubernetes-ingress-controller/blob/247aeb9006abd52f92ae6d7ee306842bae098a54/internal/dataplane/testdata/golden/ingress-v1-rule-with-tls-and-consumer-ee/note.txt).
You still proceeded without any care for anyone working in the field, and released your backwards-incompatible version as a patch that would auto-update with the default tag in the Helm chart being 3.4.
This kind of predatory behavior is one you should be ashamed of.
For anyone stumbling into this issue, the fix is to lock the KIC to the 3.4.11 tag, maybe even with the hash to prevent any further breakage from upstream.
Further remediation will be to completely switch away from this software altogether.
Hi, while I can understand you are pivoting business model and deprecating the Kong OSS & free versions, it seems you released a version of KIC breaking all the clusters running Kong v3.9.
However, from the PR in question (#7853), you knew this would happen (cf. https://github.com/Kong/kubernetes-ingress-controller/blob/247aeb9006abd52f92ae6d7ee306842bae098a54/internal/dataplane/testdata/golden/ingress-v1-rule-with-tls-and-consumer-ee/note.txt).
You still proceeded without any care for anyone working in the field, and released your backwards-incompatible version as a patch that would auto-update with the default tag in the Helm chart being
3.4.This kind of predatory behavior is one you should be ashamed of.
For anyone stumbling into this issue, the fix is to lock the KIC to the
3.4.11tag, maybe even with the hash to prevent any further breakage from upstream.Further remediation will be to completely switch away from this software altogether.