chore(deps): update dependency kubernetes-asyncio to v31 - autoclosed #64
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==28.2.1
->==31.1.1
Release Notes
tomplus/kubernetes_asyncio (kubernetes-asyncio)
v31.1.1
Compare Source
Changes:
v31.1.0
Compare Source
Breaking changes:
Websocket connect method returns an asynchronous context manager instead of a websocket (#328, @olivier-matz-6wind)
Example:
v30.3.1
Compare Source
v30.3.0
Compare Source
API Change
StrictCostEnforcementForVAP
andStrictCostEnforcementForWebhooks
to enforce the strct cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. (#124676, @cici37) [SIG API Machinery, Auth, Node and Testing]For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status (#125306, @gabesaba) [SIG Scheduling]
v30.1.1
Compare Source
v30.1.0
Compare Source
API Change
Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. (kubernetes/kubernetes#124553, @pmalek) [SIG API Machinery]
Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. (kubernetes/kubernetes#124694, @pmalek) [SIG API Machinery]
Added (alpha) support for the
managedBy
field on Jobs. Jobs with a custom value of this field - any value other thankubernetes.io/job-controller
- were skipped by the job controller, and their reconciliation was delegated to an external controller, indicated by the value of the field. Jobs that didn't have this field at all, or where the field value was the reserved stringkubernetes.io/job-controller
, were reconciled by the built-in job controller.(kubernetes/kubernetes#123273, @mimowo)
Added alpha-level support for the SuccessPolicy in Jobs.
(kubernetes/kubernetes#123412, @tenzen-y)
Added the
CEL
library for IP Addresses and CIDRs. This was made available for use starting from version1.31
.(kubernetes/kubernetes#121912, @JoelSpeed)
Allowed container runtimes to fix an image garbage collection bug by adding an
image_id
field to the CRI Container message.(kubernetes/kubernetes#123508, @saschagrunert)
Dynamic Resource Allocation: DRA drivers can now use "structured parameters" to let the scheduler handle claim allocation.
(kubernetes/kubernetes#123516, @pohly)
Fixed accidental enablement of the new alpha
optionalOldSelf
API field inCustomResourceDefinition
validation rules, which should only have been allowed to be set when theCRDValidationRatcheting
feature gate is enabled.(kubernetes/kubernetes#122329, @jpbetz)
Implemented the
prescore
extension point for thevolumeBinding
plugin. It now returns skip if it doesn't do anything in Score.(kubernetes/kubernetes#115768, @AxeZhan)
Kubelet would fail if NodeSwap was used with LimitedSwap and cgroupv1 node.
(kubernetes/kubernetes#123738, @kannon92)
Promoted
AdmissionWebhookMatchConditions
to GA. The feature is now stable, and the feature gate is now locked to default.(kubernetes/kubernetes#123560, @ivelichkovich)
Structured Authentication Configuration now supports
DiscoveryURL
. If specified,discoveryURL
overrides the URL used to fetch discovery information. This is for scenarios where the well-known and jwks endpoints are hosted at a different location than the issuer (such as locally in the cluster).(kubernetes/kubernetes#123527, @aramase)
The
StorageVersionMigration
API, previously available as a Custom Resource Definition (CRD), is now a built-in API in Kubernetes.(kubernetes/kubernetes#123344, @nilekhc)
When configuring a JWT authenticator:
If
username.expression
used 'claims.email', then 'claims.email_verified' must have been used inusername.expression
orextra[*].valueExpression
orclaimValidationRules[*].expression
. An example claim validation rule expression that matches the validation automatically applied whenusername.claim
is set to 'email' is 'claims.?email_verified.orValue(true)'.(kubernetes/kubernetes#123737, @enj)
readOnly
volumes now support recursive read-only mounts for kernel versions >= 5.12."(kubernetes/kubernetes#123180, @AkihiroSuda)
cri-api: Implemented KEP-3857: Recursive Read-only (RRO) mounts.
(kubernetes/kubernetes#123272, @AkihiroSuda)
kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-config
files has been promoted toapiserver.config.k8s.io/v1beta1
.(kubernetes/kubernetes#123696, @aramase)
kubelet allowed specifying a custom root directory for pod logs (instead of the default /var/log/pods) using the
podLogsDir
key in kubelet configuration.(kubernetes/kubernetes#112957, @mxpv)
resource.k8s.io/ResourceClaim (alpha API): The strategic merge patch strategy for the
status.reservedFor
array was changed so that a strategic-merge-patch can now add individual entries. This change may break clients using strategic merge patch to update status, which rely on the previous behavior (replacing the entire array).(kubernetes/kubernetes#122276, @pohly)
Added a CBOR implementation of
runtime.Serializer
. Until CBOR graduates to Alpha, API servers will refuse to start if configured with CBOR support. (kubernetes/kubernetes#122881, @benluddy)Added a alpha feature, behind the
RelaxedEnvironmentVariableValidation
feature gate.When that gate is enabled, Kubernetes allows almost all printable ASCII characters to be used in the names
of environment variables for containers in Pods. (kubernetes/kubernetes#123385, @HirazawaUi)
Added a new (alpha) field,
trafficDistribution
, to the Servicespec
to express preferences for traffic distribution to endpoints. Enabled through theServiceTrafficDistribution
feature gate. (kubernetes/kubernetes#123487, @gauravkghildiyal)Added audienceMatchPolicy field to AuthenticationConfiguration and support for configuring multiple audiences.
The "audienceMatchPolicy" can be empty (or unset) when a single audience is specified in the "audiences" field.
The "audienceMatchPolicy" must be set to "MatchAny" when multiple audiences are specified in the "audiences" field. (kubernetes/kubernetes#123165, @aramase)
Added consistent vanity import to files and provided tooling for verifying and updating them. (kubernetes/kubernetes#120642, @jcchavezs)
Added the
disable-force-detach
CLI option forkube-controller-manager
. By default, it's set tofalse
. When enabled, it prevents force detaching volumes based on maximum unmount time and node status. If activated, the non-graceful node shutdown feature must be used to recover from node failure. Additionally, if a pod needs to be forcibly terminated at the risk of corruption, the appropriate VolumeAttachment object must be deleted. (kubernetes/kubernetes#120344, @rohitssingh)Added to
MutableFeatureGate
the ability to override the default setting of feature gates, to allow default-enabling a feature on a component-by-component basis instead of for all affected components simultaneously. (kubernetes/kubernetes#122647, @benluddy)Aggregated discovery supports both
v2beta1
and v2 types and feature is promoted to GA. (kubernetes/kubernetes#122882, @Jefftree)Alpha support for field selectors on custom resources has been added. With the
CustomResourceFieldSelectors
feature gate enabled, the CustomResourceDefinition API now allows specifyingselectableFields
. Listing a field there enables filtering custom resources for that CustomResourceDefinition in list or watch requests. (kubernetes/kubernetes#122717, @jpbetz)AppArmor profiles can now be configured through fields on the
PodSecurityContext
and containerSecurityContext
. The beta AppArmor annotations are deprecated, and AppArmor status is no longer included in the node ready condition. (kubernetes/kubernetes#123435, @tallclair)Contextual logging is now in beta and enabled by default. Check out the KEP and official documentation for more details. (kubernetes/kubernetes#122589, @pohly)
Enabled concurrent log rotation in kubelet. You can now configure the maximum number of concurrent rotations with the
containerLogMaxWorkers
setting, and adjust the monitoring interval withcontainerLogMonitorInterval
. (kubernetes/kubernetes#114301, @harshanarayana)Graduated pod scheduling gates to general availability.
The
PodSchedulingReadiness
feature gate no longer has any effect, and the.spec.schedulingGates
field is always available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123575, @Huang-Wei)Graduated support for
minDomains
in pod topology spread constraints, to general availability.The
MinDomainsInPodTopologySpread
feature gate no longer has any effect, and the field isalways available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123481, @sanposhiho)
In kubelet configuration, the
.memorySwap.swapBehavior
field now accepts a new valueNoSwap
, which becomes the default if unspecified. The previously acceptedUnlimitedSwap
value has been dropped.(kubernetes/kubernetes#122745, @kannon92)
Kube-apiserver: the AuthorizationConfiguration type accepted in
--authorization-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123640, @liggitt)OIDC authentication will now fail if the username asserted based on a CEL expression config is the empty string. Previously the request would be authenticated with the username set to the empty string. (kubernetes/kubernetes#123568, @enj)
Removed note that
hostAliases
are not supported on hostNetwork Pods from the PodSpec API. The feature has been supported since v1.8. (kubernetes/kubernetes#122422, @neolit123)Structured Authentication Configuration now supports configuring multiple JWT authenticators. The maximum allowed JWT authenticators in the authentication configuration is 64. (kubernetes/kubernetes#123431, @aramase)
Text logging in Kubernetes components now uses textlogger. The same split streams of info and error log entries with buffering of info entries is now also supported for text output (off by default, alpha feature). Previously, this was only supported for JSON. Performance is better also without split streams. (kubernetes/kubernetes#114672, @pohly)
The API server now detects and fails on startup if there are conflicting issuers between JWT authenticators and service account configurations. Previously, such configurations would run but could be inconsistently effective depending on the credential. (kubernetes/kubernetes#123561, @enj)
The JWT authenticator configuration set via the
--authentication-config
flag is now dynamically reloaded as the file changes on disk. (kubernetes/kubernetes#123525, @enj)The
StructuredAuthenticationConfiguration
feature is now beta and enabled. (kubernetes/kubernetes#123719, @enj)The
kube_codegen
tool now ignores the vendor folder during code generation.(kubernetes/kubernetes#122729, @jparrill)
The kubernetes repo now uses Go workspaces. This should not impact end users at all, but does have impact for developers of downstream projects. Switching to workspaces caused some breaking changes in the flags to the various k8s.io/code-generator tools. Downstream consumers should look at staging/src/k8s.io/code-generator/kube_codegen.sh to see the changes. (kubernetes/kubernetes#123529, @thockin)
Updated an audit annotation key used by the
…/serviceaccounts/<name>/token
resource handler.The annotation used to persist the issued credential identifier is now
authentication.kubernetes.io/issued-credential-id
. (kubernetes/kubernetes#123098, @munnerz) [SIG Auth]Users are now allowed to mutate
FSGroupPolicy
andPodInfoOnMount
inCSIDriver.Spec
. (kubernetes/kubernetes#116209, @haoruan)ValidatingAdmissionPolicy was promoted to GA and will be
enabled
by default. (kubernetes/kubernetes#123405, @cici37)When scheduling a mix of pods using
ResourceClaims
and others that don't, scheduling a pod withResourceClaims
has a lower impact on scheduling latency. (kubernetes/kubernetes#121876, @pohly)When working with client-go events, it's now recommended to use
NewEventBroadcasterAdapterWithContext
instead ofNewEventBroadcasterAdapter
if contextual logging support is needed. (kubernetes/kubernetes#122142, @pohly)A new (alpha) field,
trafficDistribution
, has been added to the Servicespec
.This field provides a way to express preferences for how traffic is distributed to the endpoints for a Service.
It can be enabled through the
ServiceTrafficDistribution
feature gate. (kubernetes/kubernetes#123487, @gauravkghildiyal) [SIG API Machinery, Apps and Network]Add alpha-level support for the SuccessPolicy in Jobs (kubernetes/kubernetes#123412, @tenzen-y) [SIG API Machinery, Apps and Testing]
Added (alpha) support for the managedBy field on Jobs. Jobs with a custom value of this field - any
value other than
kubernetes.io/job-controller
- are skipped by the job controller, and theirreconciliation is delegated to an external controller, indicated by the value of the field. Jobs that
don't have this field at all, or where the field value is the reserved string
kubernetes.io/job-controller
,are reconciled by the built-in job controller. (kubernetes/kubernetes#123273, @mimowo) [SIG API Machinery, Apps and Testing]
Added a alpha feature, behind the
RelaxedEnvironmentVariableValidation
feature gate.When that gate is enabled, Kubernetes allows almost all printable ASCII characters to be used in the names
of environment variables for containers in Pods. (kubernetes/kubernetes#123385, @HirazawaUi) [SIG Apps, Node and Testing]
Added alpha support for field selectors on custom resources.
Provided that the
CustomResourceFieldSelectors
feature gate is enabled, the CustomResourceDefinitionAPI now lets you specify
selectableFields
. Listing a field there allows filtering custom resources for thatCustomResourceDefinition in list or watch requests. (kubernetes/kubernetes#122717, @jpbetz) [SIG API Machinery]
Added support for configuring multiple JWT authenticators in Structured Authentication Configuration. The maximum allowed JWT authenticators in the authentication configuration is 64. (kubernetes/kubernetes#123431, @aramase) [SIG Auth and Testing]
Aggregated discovery supports both v2beta1 and v2 types and feature is promoted to GA (kubernetes/kubernetes#122882, @Jefftree) [SIG API Machinery and Testing]
Allowing container runtimes to fix an image garbage collection bug by adding an
image_id
field to the CRI Container message. (kubernetes/kubernetes#123508, @saschagrunert) [SIG Node]AppArmor profiles can now be configured through fields on the PodSecurityContext and container SecurityContext.
Conflicting issuers between JWT authenticators and service account config are now detected and fail on API server startup. Previously such a config would run but would be inconsistently effective depending on the credential. (kubernetes/kubernetes#123561, @enj) [SIG API Machinery and Auth]
Dynamic Resource Allocation: DRA drivers may now use "structured parameters" to let the scheduler handle claim allocation. (kubernetes/kubernetes#123516, @pohly) [SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Instrumentation, Node, Release, Scheduling, Storage and Testing]
Graduated pod scheduling gates to general availability.
The
PodSchedulingReadiness
feature gate no longer has any effect, and the.spec.schedulingGates
field is always available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123575, @Huang-Wei) [SIG API Machinery, Apps, Node, Scheduling and Testing]Graduated support for
minDomains
in pod topology spread constraints, to general availability.The
MinDomainsInPodTopologySpread
feature gate no longer has any effect, and the field isalways available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123481, @sanposhiho) [SIG API Machinery, Apps, Scheduling and Testing]
JWT authenticator config set via the --authentication-config flag is now dynamically reloaded as the file changes on disk. (kubernetes/kubernetes#123525, @enj) [SIG API Machinery, Auth and Testing]
Kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123696, @aramase) [SIG API Machinery, Auth and Testing]Kube-apiserver: the AuthorizationConfiguration type accepted in
--authorization-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123640, @liggitt) [SIG Auth and Testing]Kubelet should fail if NodeSwap is used with LimitedSwap and cgroupv1 node. (kubernetes/kubernetes#123738, @kannon92) [SIG API Machinery, Node and Testing]
Kubelet: a custom root directory for pod logs (instead of default /var/log/pods) can be specified using the
podLogsDir
key in kubelet configuration. (kubernetes/kubernetes#112957, @mxpv) [SIG API Machinery, Node, Scalability and Testing]
Kubelet: the
.memorySwap.swapBehavior
field in kubelet configuration accepts a new valueNoSwap
and makes this the default if unspecified; the previously acceptedUnlimitedSwap
value has been dropped. (kubernetes/kubernetes#122745, @kannon92) [SIG API Machinery, Node and Testing]OIDC authentication will now fail if the username asserted based on a CEL expression config is the empty string. Previously the request would be authenticated with the username set to the empty string. (kubernetes/kubernetes#123568, @enj) [SIG API Machinery, Auth and Testing]
PodSpec API: remove note that hostAliases are not supported on hostNetwork Pods. The feature has been supported since v1.8. (kubernetes/kubernetes#122422, @neolit123) [SIG API Machinery and Apps]
Promote AdmissionWebhookMatchConditions to GA. The feature is now stable and the feature gate is now locked to default. (kubernetes/kubernetes#123560, @ivelichkovich) [SIG API Machinery and Testing]
Structured Authentication Configuration now supports
DiscoveryURL
.discoveryURL if specified, overrides the URL used to fetch discovery information.
This is for scenarios where the well-known and jwks endpoints are hosted at a different
location than the issuer (such as locally in the cluster). (kubernetes/kubernetes#123527, @aramase) [SIG API Machinery, Auth and Testing]
Support Recursive Read-only (RRO) mounts (KEP-3857) (kubernetes/kubernetes#123180, @AkihiroSuda) [SIG API Machinery, Apps, Node and Testing]
The StructuredAuthenticationConfiguration feature is now beta and enabled by default. (kubernetes/kubernetes#123719, @enj) [SIG API Machinery and Auth]
The
StorageVersionMigration
API, which was previously available as a Custom Resource Definition (CRD), is now a built-in API in Kubernetes. (kubernetes/kubernetes#123344, @nilekhc) [SIG API Machinery, Apps, Auth, CLI and Testing]The kubernetes repo now uses Go workspaces. This should not impact end users at all, but does have impact for developers of downstream projects. Switching to workspaces caused some breaking changes in the flags to the various k8s.io/code-generator tools. Downstream consumers should look at staging/src/k8s.io/code-generator/kube_codegen.sh to see the changes. (kubernetes/kubernetes#123529, @thockin) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Storage and Testing]
ValidatingAdmissionPolicy is promoted to GA and will be enabled by default. (kubernetes/kubernetes#123405, @cici37) [SIG API Machinery, Apps, Auth and Testing]
When configuring a JWT authenticator:
If username.expression uses 'claims.email', then 'claims.email_verified' must be used in
username.expression or extra[].valueExpression or claimValidationRules[].expression.
An example claim validation rule expression that matches the validation automatically
applied when username.claim is set to 'email' is 'claims.?email_verified.orValue(true)'. (kubernetes/kubernetes#123737, @enj) [SIG API Machinery and Auth]
Added a CBOR implementation of
runtime.Serializer
. Until CBOR graduates to Alpha, API servers will refuse to start if configured with CBOR support. (kubernetes/kubernetes#122881, @benluddy) [SIG API Machinery]Added audienceMatchPolicy field to AuthenticationConfiguration and support for configuring multiple audiences.
Contextual logging is now beta and enabled by default. (kubernetes/kubernetes#122589, @pohly) [SIG Instrumentation]
Cri-api: KEP-3857: Recursive Read-only (RRO) mounts (kubernetes/kubernetes#123272, @AkihiroSuda) [SIG Node]
Enabled a mechanism for concurrent log rotatation via
kubelet
using a configuration entity ofcontainerLogMaxWorkers
which controls the maximum number of concurrent rotation that can be performed and an interval configuration ofcontainerLogMonitorInterval
that can aid is configuring the monitoring duration to best suite your cluster's log generation standards. (kubernetes/kubernetes#114301, @harshanarayana) [SIG API Machinery, Node and Testing]Text logging in Kubernetes components now uses textlogger. The same split streams of info and error log entries with buffering of info entries is now also supported for text output (off by default, alpha feature). Previously, this was only supported for JSON. Performance is better also without split streams. (kubernetes/kubernetes#114672, @pohly) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Storage and Testing]
This change adds the following CLI option for
kube-controller-manager
:disable-force-detach
(defaults tofalse
): Prevent force detaching volumes based on maximum unmount time and node status. If enabled, the non-graceful node shutdown feature must be used to recover from node failure (see https://kubernetes.io/blog/2023/08/16/kubernetes-1-28-non-graceful-node-shutdown-ga/). If enabled and a pod must be forcibly terminated at the risk of corruption, then the appropriate VolumeAttachment object (see here: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/volume-attachment-v1/) must be deleted. (kubernetes/kubernetes#120344, @rohitssingh) [SIG API Machinery, Apps, Storage and Testing]Updated an audit annotation key used by the
…/serviceaccounts/<name>/token
resource handler.The annotation used to persist the issued credential identifier is now
authentication.kubernetes.io/issued-credential-id
. (kubernetes/kubernetes#123098, @munnerz) [SIG Auth]Add CEL library for IP Addresses and CIDRs. This will not be available for use until 1.31. (kubernetes/kubernetes#121912, @JoelSpeed) [SIG API Machinery]
Added to MutableFeatureGate the ability to override the default setting of feature gates, to allow default-enabling a feature on a component-by-component basis instead of for all affected components simultaneously. (kubernetes/kubernetes#122647, @benluddy) [SIG API Machinery and Cluster Lifecycle]
Adds a rule on the kube_codegen tool to ignore vendor folder during the code generation. (kubernetes/kubernetes#122729, @jparrill) [SIG API Machinery and Cluster Lifecycle]
Allow users to mutate FSGroupPolicy and PodInfoOnMount in CSIDriver.Spec (kubernetes/kubernetes#116209, @haoruan) [SIG API Machinery, Storage and Testing]
Client-go events:
NewEventBroadcasterAdapterWithContext
should be used instead ofNewEventBroadcasterAdapter
if the goal is to support contextual logging. (kubernetes/kubernetes#122142, @pohly) [SIG API Machinery, Instrumentation and Scheduling]Fixes accidental enablement of the new alpha
optionalOldSelf
API field in CustomResourceDefinition validation rules, which should only be allowed to be set when the CRDValidationRatcheting feature gate is enabled. (kubernetes/kubernetes#122329, @jpbetz) [SIG API Machinery]Implement
prescore
extension point forvolumeBinding
plugin. Return skip if it doesn't do anything in Score. (kubernetes/kubernetes#115768, @AxeZhan) [SIG Scheduling, Storage and Testing]Resource.k8s.io/ResourceClaim (alpha API): the strategic merge patch strategy for the
status.reservedFor
array was changed such that a strategic-merge-patch can add individual entries. This breaks clients using strategic merge patch to update status which rely on the previous behavior (replacing the entire array). (kubernetes/kubernetes#122276, @pohly) [SIG API Machinery]When scheduling a mixture of pods using ResourceClaims and others which don't, scheduling a pod with ResourceClaims impacts scheduling latency less. (kubernetes/kubernetes#121876, @pohly) [SIG API Machinery, Node, Scheduling and Testing]
v29.0.1
Compare Source
v29.0.0
Compare Source
API Change
'
kube-apiserver
: adds--authentication-config
flag for readingAuthenticationConfiguration
files.
--authentication-config
flag is mutually exclusive with the existing--oidc-*
flags.' (kubernetes/kubernetes#119142, @aramase)
'
kube-scheduler
component config (KubeSchedulerConfiguration
)kubescheduler.config.k8s.io/v1beta3
is removed in
v1.29
. Migratedkube-scheduler
configuration files tokubescheduler.config.k8s.io/v1
.' (kubernetes/kubernetes#119994, @SataQiu)A new sleep action for the
PreStop
lifecycle hook was added, allowing containers to pause for a specified duration before termination. (kubernetes/kubernetes#119026, @AxeZhan)Added CEL expressions to
v1alpha1 AuthenticationConfiguration
. (kubernetes/kubernetes#121078, @aramase)Added Windows support for InPlace Pod Vertical Scaling feature. (kubernetes/kubernetes#112599, @fabi200123) [SIG Autoscaling, Node, Scalability, Scheduling and Windows]
Added
ImageMaximumGCAge
field to Kubelet configuration, which allows a user to set the maximum age an image is unused before it's garbage collected. (kubernetes/kubernetes#121275, @haircommander)Added
UserNamespacesPodSecurityStandards
feature gate to enable user namespace support for Pod Security Standards.Enabling this feature will modify all Pod Security Standard rules to allow setting:
spec[.*].securityContext.[runAsNonRoot,runAsUser]
.This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled.
The feature gate will not graduate or be enabled by default in future Kubernetes releases. (kubernetes/kubernetes#118760, @saschagrunert) [SIG API Machinery, Auth, Node and Release]
Added
optionalOldSelf
tox-kubernetes-validations
to support ratcheting CRD schema constraints. (kubernetes/kubernetes#121034, @alexzielenski)Added a new
ServiceCIDR
type that allows to dynamically configure the cluster range used to allocateService ClusterIPs
addresses. (kubernetes/kubernetes#116516, @aojea)Added a new
ipMode
field to the.status
of Services wheretype
is set toLoadBalancer
.The new field is behind the
LoadBalancerIPMode
feature gate. (kubernetes/kubernetes#119937, @RyanAoh) [SIG API Machinery, Apps, Cloud Provider, Network and Testing]Added options for configuring
nf_conntrack_udp_timeout
, andnf_conntrack_udp_timeout_stream
variables of netfilter conntrack subsystem. (kubernetes/kubernetes#120808, @aroradaman)Added support for CEL expressions to
v1alpha1 AuthorizationConfiguration
webhookmatchConditions
. (kubernetes/kubernetes#121223, @ritazh)Added support for projecting
certificates.k8s.io/v1alpha1
ClusterTrustBundle objects into pods. (kubernetes/kubernetes#113374, @ahmedtd)Added the
DisableNodeKubeProxyVersion
feature gate. IfDisableNodeKubeProxyVersion
is enabled, thekubeProxyVersion
field is not set. (kubernetes/kubernetes#120954, @HirazawaUi)Fixed a bug where CEL expressions in CRD validation rules would incorrectly compute a high estimated cost for functions that return strings, lists or maps.
The incorrect cost was evident when the result of a function was used in subsequent operations. (kubernetes/kubernetes#119800, @jpbetz) [SIG API Machinery, Auth and Cloud Provider]
Fixed the API comments for the Job
Ready
field in status. (kubernetes/kubernetes#121765, @mimowo)Fixed the API comments for the
FailIndex
Job pod failure policy action. (kubernetes/kubernetes#121764, @mimowo)Go API: the
ResourceRequirements
struct was replaced withVolumeResourceRequirements
for use with volumes. (kubernetes/kubernetes#118653, @pohly)Graduated
Job BackoffLimitPerIndex
feature tobeta
. (kubernetes/kubernetes#121356, @mimowo)Marked the
onPodConditions
field as optional inJob
's pod failure policy. (kubernetes/kubernetes#120204, @mimowo)Promoted
PodReadyToStartContainers
condition tobeta
. (kubernetes/kubernetes#119659, @kannon92)The
flowcontrol.apiserver.k8s.io/v1beta3
FlowSchema
andPriorityLevelConfiguration
APIs has been promoted toflowcontrol.apiserver.k8s.io/v1
, with the following changes:PriorityLevelConfiguration
: the.spec.limited.nominalConcurrencyShares
field defaults to30
only if the field is omitted (v1beta3 also defaulted an explicit0
value to30
). Specifying an explicit0
value is not allowed in thev1
version in v1.29 to ensure compatibility withv1.28
API servers. Inv1.30
, explicit0
values will be allowed in this field in thev1
API.The
flowcontrol.apiserver.k8s.io/v1beta3
APIs are deprecated and will no longer be served in v1.32. All existing objects are available via thev1
APIs. Transition clients and manifests to use thev1
APIs before upgrading tov1.32
. (kubernetes/kubernetes#121089, @tkashem)The
kube-proxy
command-line documentation was updated to clarify that--bind-address
does not actually have anything to do with binding to anaddress, and you probably don't actually want to be using it. (kubernetes/kubernetes#120274, @danwinship)
The
kube-scheduler
selectorSpread
plugin has been removed, please use thepodTopologySpread
plugin instead. (kubernetes/kubernetes#117720, @kerthcet)The
matchLabelKeys/mismatchLabelKeys
feature is introduced to the hard/softPodAffinity/PodAntiAffinity
. (kubernetes/kubernetes#116065, @sanposhiho)When updating a CRD, per-expression cost limit check are now skipped for
x-kubernetes-validations
rules of versions that are not mutated. (kubernetes/kubernetes#121460, @jiahuif)CSINodeExpandSecret
feature has been promoted toGA
in this release and is enabledby default. The CSI drivers can make use of the
secretRef
values passed inNodeExpansion
request optionally sent by the CSI Client from this release onwards. (kubernetes/kubernetes#121303, @humblec)
NodeStageVolume
calls will now be retried if the CSI node driver is not running. (kubernetes/kubernetes#120330, @rohitssingh)PersistentVolumeLastPhaseTransitionTime
is now beta and enabled by default. (kubernetes/kubernetes#120627, @RomanBednar)ValidatingAdmissionPolicy
type checking now supports CRDs and API extensions types. (kubernetes/kubernetes#119109, @jiahuif)kube-apiserver
: added--authorization-config
flag for reading a configuration file containing anapiserver.config.k8s.io/v1alpha1 AuthorizationConfiguration
object. The--authorization-config
flag is mutually exclusive with--authorization-modes
and--authorization-webhook-*
flags. Thealpha
StructuredAuthorizationConfiguration
feature flag must be enabled for--authorization-config
to be specified. (kubernetes/kubernetes#120154, @palnabarun)kube-proxy
now has a new nftables-based mode, available by runningThis is currently an alpha-level feature and while it probably will not
eat your data, it may nibble at it a bit. (It passes e2e testing but has
not yet seen real-world use.)
At this point it should be functionally mostly identical to the iptables
mode, except that it does not (and will not) support Service NodePorts on
127.0.0.1. (Also note that there are currently no command-line arguments
for the nftables-specific config; you will need to use a config file if
you want to set the equivalent of any of the
--iptables-xxx
options.)As this code is still very new, it has not been heavily optimized yet;
while it is expected to eventually have better performance than the
iptables backend, very little performance testing has been done so far. (kubernetes/kubernetes#121046, @danwinship)
kube-proxy
: Added an option/flag for configuring thenf_conntrack_tcp_be_liberal
sysctl (in the kernel's netfilter conntrack subsystem). When enabled,kube-proxy
will not install theDROP
rule for invalid conntrack states, which currently breaks users of asymmetric routing. (kubernetes/kubernetes#120354, @aroradaman)Added support for projecting certificates.k8s.io/v1alpha1 ClusterTrustBundle objects into pods. (kubernetes/kubernetes#113374, @ahmedtd) [SIG API Machinery, Apps, Auth, Node, Storage and Testing]
Adds
optionalOldSelf
tox-kubernetes-validations
to support ratcheting CRD schema constraints (kubernetes/kubernetes#121034, @alexzielenski) [SIG API Machinery]Fix API comment for the Job Ready field in status (kubernetes/kubernetes#121765, @mimowo) [SIG API Machinery and Apps]
Fix API comments for the FailIndex Job pod failure policy action. (kubernetes/kubernetes#121764, @mimowo) [SIG API Machinery and Apps]
A new sleep action for the PreStop lifecycle hook is added, allowing containers to pause for a specified duration before termination. (kubernetes/kubernetes#119026, @AxeZhan) [SIG API Machinery, Apps, Node and Testing]
Add ImageMaximumGCAge field to Kubelet configuration, which allows a user to set the maximum age an image is unused before it's garbage collected. (kubernetes/kubernetes#121275, @haircommander) [SIG API Machinery and Node]
Add a new ServiceCIDR type that allows to dynamically configure the cluster range used to allocate Service ClusterIPs addresses (kubernetes/kubernetes#116516, @aojea) [SIG API Machinery, Apps, Auth, CLI, Network and Testing]
Add the DisableNodeKubeProxyVersion feature gate. If DisableNodeKubeProxyVersion is enabled, the kubeProxyVersion field is not set. (kubernetes/kubernetes#120954, @HirazawaUi) [SIG API Machinery, Apps and Node]
Added Windows support for InPlace Pod Vertical Scaling feature. (kubernetes/kubernetes#112599, @fabi200123) [SIG Autoscaling, Node, Scalability, Scheduling and Windows]
Added
UserNamespacesPodSecurityStandards
feature gate to enable user namespace support for Pod Security Standards.Enabling this feature will modify all Pod Security Standard rules to allow setting:
spec[.*].securityContext.[runAsNonRoot,runAsUser]
.This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled.
The feature gate will not graduate or be enabled by default in future Kubernetes releases. (kubernetes/kubernetes#118760, @saschagrunert) [SIG API Machinery, Auth, Node and Release]
Added options for configuring nf_conntrack_udp_timeout, and nf_conntrack_udp_timeout_stream variables of netfilter conntrack subsystem. (kubernetes/kubernetes#120808, @aroradaman) [SIG API Machinery and Network]
Adds CEL expressions to v1alpha1 AuthenticationConfiguration. (kubernetes/kubernetes#121078, @aramase) [SIG API Machinery, Auth and Testing]
Adds support for CEL expressions to v1alpha1 AuthorizationConfiguration webhook matchConditions. (kubernetes/kubernetes#121223, @ritazh) [SIG API Machinery and Auth]
CSINodeExpandSecret feature has been promoted to GA in this release and enabled by default. The CSI drivers can make use of the
secretRef
values passed in NodeExpansion request optionally sent by the CSI Client from this release onwards. (kubernetes/kubernetes#121303, @humblec) [SIG API Machinery, Apps and Storage]Graduate Job BackoffLimitPerIndex feature to Beta (kubernetes/kubernetes#121356, @mimowo) [SIG Apps]
Kube-apiserver: adds --authorization-config flag for reading a configuration file containing an apiserver.config.k8s.io/v1alpha1 AuthorizationConfiguration object. --authorization-config flag is mutually exclusive with --authorization-modes and --authorization-webhook-* flags. The alpha StructuredAuthorizationConfiguration feature flag must be enabled for --authorization-config to be specified. (kubernetes/kubernetes#120154, @palnabarun) [SIG API Machinery, Auth and Testing]
Kube-proxy now has a new nftables-based mo
Configuration
📅 Schedule: Branch creation - "after 10pm,before 5am" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.