chore(deps): update dependency kubernetes-asyncio to v28 #623
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==24.2.3
->==28.2.1
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
tomplus/kubernetes_asyncio (kubernetes-asyncio)
v28.2.1
Compare Source
v28.2.0
Compare Source
Kubernetes API Version: v1.28.2
API Change
The incorrect cost was evident when the result of a function was used in subsequent operations. (kubernetes/kubernetes#119807, @jpbetz) [SIG API Machinery, Auth and Cloud Provider]
ContainerAllocateResponse
. This field maps to the CDIDevice field in the CRI protocol. (kubernetes/kubernetes#118254, @elezar) [SIG Node and Testing]When an Indexed Job has a number of completions higher than 10^5 and parallelism higher than 10^4, and a big number of Indexes fail, Kubernetes might not be able to track the termination of the Job. Kubernetes now emits a warning, at Job creation, when the Job manifest exceeds both of these limits. (kubernetes/kubernetes#118420, @alculquicondor) [SIG Apps]
ServedVersions
field toStorageVersion
API. (kubernetes/kubernetes#118386, @Richabanker)IP mode
field to loadbalancer status ingress. (kubernetes/kubernetes#118895, @RyanAoh)podReplacementPolicy
and terminating field to job api. (kubernetes/kubernetes#119301, @kannon92)namespaceParamRef
field toadmissionregistration.k8s.io/v1alpha1.ValidatingAdmissionPolicy
. (kubernetes/kubernetes#119215, @alexzielenski) [SIG API Machinery and Testing]localhostProfile
. (kubernetes/kubernetes#117020, @cji)reason
andfieldPath
into CRD validation rules to allow users to specify reason and field path when validation failed. (kubernetes/kubernetes#118041, @cici37) [SIG API Machinery]namespaceObject
variable with expressions. (kubernetes/kubernetes#118267, @cici37) [SIG API Machinery and Testing]
CRDValidationRatcheting
alpha feature. During a PATCH or UPDATE Validation Ratcheting discards errors thrown by unchanged portions of the resource from most OpenAPI schema validations. (kubernetes/kubernetes#118990, @alexzielenski)batch.kubernetes.io/cronjob-scheduled-timestamp
to Job objects scheduled from CronJobs. (kubernetes/kubernetes#118137, @helayoty)delayCacheUntilActive
toKubeSchedulerConfiguration
that can provide a tradeoff between memory efficiency and scheduling speed when their leadership is updated inkube-scheduler
(kubernetes/kubernetes#115754, @linxiulei) [SIG API Machinery and Scheduling]When you enable the
KMSv2KDF
feature gate (off by default), KMS v2 uses a key derivation function to generate single use data encryption keys from a secret seed combined with some random data. This eliminates the need for a counter based nonce while avoiding nonce collision concerns associated with AES-GCM's 12 byte nonce. (kubernetes/kubernetes#118828, @enj)rest.DefaultServerUrlFor
function. (kubernetes/kubernetes#118055, @timofurrer)BackoffLimitPerIndex
. (kubernetes/kubernetes#119294, @mimowo)AdmissionWebhookMatchCondition
feature to beta. (kubernetes/kubernetes#119380, @a-hilaly)memory.oom.group
. This causes processes within the cgroup to be treated as a unit and killed simultaneously in the event of an OOM kill on any process in the cgroup. (kubernetes/kubernetes#117793, @tzneal) [SIG Apps, Node and Testing]--logging-format
flag to support structured logging. (kubernetes/kubernetes#117800, @cyclinder)PreFilter
extension point for skipping the Filter phase if the Pod doesn't use volumes with limits. (kubernetes/kubernetes#115398, @tangwz) [SIG Scheduling]LastPhaseTransitionTime
field which holds a timestamp of when the volume last transitioned its phase. (kubernetes/kubernetes#116469, @RomanBednar)hostNetwork: true
and declare ports, get thehostPort
field set automatically. Previously this would happen in the PodTemplate of a Deployment, DaemonSet or other workload API. NowhostPort
will only be set when an actual Pod is being created. If this presents a problem, setting the feature gate "DefaultHostNetworkHostPortsInPodTemplates" to true will revert this behavior. Please file a kubernetes bug if you need to do this. (kubernetes/kubernetes#117696, @thockin) [SIG Apps]ValidatingAdmissionPolicy
andValidatingAdmissionPolicyBinding
tov1beta1
. (kubernetes/kubernetes#118644, @alexzielenski) [SIG API Machinery, Apps and Testing]ValidtaingAdmissionPolicy
to beta, and it is turned off by default. (kubernetes/kubernetes#119409, @alexzielenski)BETA
stability. (kubernetes/kubernetes#119264, @logicalhan) [SIG API Machinery, Architecture, Cluster Lifecycle and Instrumentation]resizeStatus
enum frompvc.Status
and replaced withAllocatedResourceStatus
. (kubernetes/kubernetes#116335, @gnufied) [SIG API Machinery, Apps, Auth, Node, Storage and Testing]WindowsHostProcessContainers
feature-gate. (kubernetes/kubernetes#117570, @marosset) [SIG API Machinery, Apps, Auth, Node and Windows]PodFailurePolicy
from alpha to beta. (kubernetes/kubernetes#117802, @kerthcet) [SIG API Machinery and Apps]statefulset.kubernetes.io/pod-index
. (kubernetes/kubernetes#119232, @danielvegamyhre) [SIG Apps]BackoffLimitPerIndex
in Jobs. (kubernetes/kubernetes#118009, @mimowo)IPTablesOwnershipCleanup
feature (KEP-3178) is now GA; kubelet no longercreates the
KUBE-MARK-DROP
chain (which has been unused for several releases)or the
KUBE-MARK-MASQ
chain (which is now only created by kube-proxy). (kubernetes/kubernetes#119374, @danwinship)SelfSubjectReview
API is promoted toauthentication.k8s.io/v1
and thekubectl auth whoami
command is GA. (kubernetes/kubernetes#117713, @nabokihms) [SIG API Machinery, Architecture, Auth, CLI and Testing]<pod>-<claim name>
, but a random suffix will avoid name collisions. (kubernetes/kubernetes#117351, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]PodFailurePolicy
from alpha to beta (kubernetes/kubernetes#118278, @mimowo)client-go
: Improved memory use of reflector caches when watching large numbersof objects which do not change frequently. (kubernetes/kubernetes#113362, @sxllwx)
component-base/logs
is now stricter about not applying configurations multipletimes and will return an error when that is attempted. Can be overridden by binaries
which need to do that. (kubernetes/kubernetes#117108, @pohly)
kube-controller-manager
: TheLegacyServiceAccountTokenCleanUp
feature gateis now available as alpha (off by default). When enabled, the
legacy-service-account-token-cleaner
controller loop removes service account token secrets that have not been used
in the time specified by
--legacy-service-account-token-clean-up-period
(defaultingto one year), and are referenced from the
.secrets
list of a ServiceAccountobject, and are not referenced from pods. (kubernetes/kubernetes#115554, @yt2985)
kube-scheduler
component config (KubeSchedulerConfiguration)kubescheduler.config.k8s.io/v1beta2
is removed in
v1.28
. Migratekube-scheduler
configuration files tokubescheduler.config.k8s.io/v1
. (kubernetes/kubernetes#117649, @SataQiu)responseKind: {}
for resources which are missing group/version/kind information, to ensure compatibility with v0.26.0-v0.26.3 clients. (kubernetes/kubernetes#119835, @liggitt) [SIG API Machinery and Testing]-v
command line flag when combined with--config
. (kubernetes/kubernetes#119867, @pohly) [SIG Network]ValidatingAdmissionPolicy
andValidatingAdmissionPolicyBinding
tov1beta1
. (kubernetes/kubernetes#118644, @alexzielenski) [SIG API Machinery, Apps and Testing]ValidtaingAdmissionPolicy
to beta and it is turned off by default. (kubernetes/kubernetes#119409, @alexzielenski) [SIG API Machinery, Apps, Auth, Instrumentation, Node, Release, Storage and Testing]KMSv2KDF
feature gate (off by default), KMS v2 uses a key derivation function to generate single use data encryption keys from a secret seed combined with some random data. This eliminates the need for a counter based nonce while avoiding nonce collision concerns associated with AES-GCM's 12 byte nonce. (kubernetes/kubernetes#118828, @enj) [SIG API Machinery, Auth and Testing]ContainerAllocateResponse
. This field maps to the CDIDevice field in the CRI protocol. (kubernetes/kubernetes#118254, @elezar) [SIG Node and Testing]batch.kubernetes.io/cronjob-scheduled-timestamp
to Job objects scheduled from CronJobs. (kubernetes/kubernetes#118137, @helayoty) [SIG Apps]reason
andfieldPath
into CRD validation rules to allow users to specify reason and field path when validation failed. (kubernetes/kubernetes#118041, @cici37) [SIG API Machinery]namespaceObject
variable with expressions. (kubernetes/kubernetes#118267, @cici37) [SIG API Machinery and Testing]
AdmissionWebhookMatchCondition
feature to beta (kubernetes/kubernetes#119380, @a-hilaly) [SIG API Machinery]BETA
stability. (kubernetes/kubernetes#119264, @logicalhan) [SIG API Machinery, Architecture, Cluster Lifecycle and Instrumentation]resizeStatus
enum frompvc.Status
and replaced withAllocatedResourceStatus
(kubernetes/kubernetes#116335, @gnufied) [SIG API Machinery, Apps, Auth, Node, Storage and Testing]statefulset.kubernetes.io/pod-index
. (kubernetes/kubernetes#119232, @danielvegamyhre) [SIG Apps]creates the KUBE-MARK-DROP chain (which has been unused for several releases)
or the KUBE-MARK-MASQ chain (which is now only created by kube-proxy). (kubernetes/kubernetes#119374, @danwinship) [SIG API Machinery, Network and Node]
<pod>-<claim name>
, but a random suffix will avoid name collisions. (kubernetes/kubernetes#117351, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]When an Indexed Job has a number of completions higher than 10^5 and parallelism higher than 10^4, and a big number of Indexes fail, Kubernetes might not be able to track the termination of the Job. Kubernetes now emits a warning, at Job creation, when the Job manifest exceeds both of these limits. (kubernetes/kubernetes#118420, @alculquicondor) [SIG Apps]
memory.oom.group
. This causes processes within the cgroup to be treated as a unit and killed simultaneously in the event of an OOM kill on any process in the cgroup. (kubernetes/kubernetes#117793, @tzneal) [SIG Apps, Node and Testing]delayCacheUntilActive
toKubeSchedulerConfiguration
that can provide a tradeoff between memory efficiency and scheduling speed when their leadership is updated inkube-scheduler
(kubernetes/kubernetes#115754, @linxiulei) [SIG API Machinery and Scheduling]LegacyServiceAccountTokenCleanUp
feature gate is now available as alpha (off by default). When enabled, thelegacy-service-account-token-cleaner
controller loop removes service account token secrets that have not been used in the time specified by--legacy-service-account-token-clean-up-period
(defaulting to one year), and are referenced from the.secrets
list of a ServiceAccount object, and are not referenced from pods. (kubernetes/kubernetes#115554, @yt2985) [SIG API Machinery, Apps, Auth, Release and Testing]hostNetwork: true
and declare ports get thehostPort
field set automatically. Previously this would happen in the PodTemplate of a Deployment, DaemonSet or other workload API. NowhostPort
will only be set when an actual Pod is being created. If this presents a problem, setting the feature gate "DefaultHostNetworkHostPortsInPodTemplates" to true will revert this behavior. Please file a kubernetes bug if you need to do this. (kubernetes/kubernetes#117696, @thockin) [SIG Apps]SelfSubjectReview
API is promoted toauthentication.k8s.io/v1
and thekubectl auth whoami
command is GA. (kubernetes/kubernetes#117713, @nabokihms) [SIG API Machinery, Architecture, Auth, CLI and Testing]v27.6.0
Compare Source
Kubernetes API Version: v1.27.6
API Change
Added error handling for seccomp localhost configurations that do not properly set a localhostProfile (kubernetes/kubernetes#117020, @cji) [SIG API Machinery and Node]
Fixed an issue where kubelet does not set case-insensitive headers for http probes. (#117182, @dddddai) (kubernetes/kubernetes#117324, @dddddai) [SIG API Machinery, Apps and Node]
Revised the comment about the feature-gate level for PodFailurePolicy from alpha to beta (kubernetes/kubernetes#117815, @kerthcet) [SIG Apps]
A fix in the
resource.k8s.io/v1alpha1/ResourceClaim
API avoids harmless (?) ".status.reservedFor: element 0: associative list without keys has an element that's a map type" errors in the apiserver. Validation now rejects the incorrect reuse of the same UID in different entries. (kubernetes/kubernetes#115354, @pohly)A terminating pod on a node that is not caused by preemption no longer prevents
kube-scheduler
from preempting pods on that nodePreemptionByKubeScheduler
toPreemptionByScheduler
(kubernetes/kubernetes#114623, @Huang-Wei)API: resource.k8s.io/v1alpha1.PodScheduling was renamed to resource.k8s.io/v1alpha2.PodSchedulingContext. (kubernetes/kubernetes#116556, @pohly) [SIG API Machinery, Apps, Auth, CLI, Node, Scheduling and Testing]
Added CEL runtime cost calculation into ValidatingAdmissionPolicy, matching the evaluation cost
restrictions that already apply to CustomResourceDefinition.
If rule evaluation uses more compute than the limit, the API server aborts the evaluation and the
admission check that was being performed is aborted; the
failurePolicy
for the ValidatingAdmissionPolicydetermines the outcome. (kubernetes/kubernetes#115747, @cici37)
Added
auditAnnotations
toValidatingAdmissionPolicy
, enabling CEL to be used to add audit annotations to request audit events.Added
validationActions
toValidatingAdmissionPolicyBinding
, enabling validation failures to be handled by any combination of the warn, audit and deny enforcement actions. (kubernetes/kubernetes#115973, @jpbetz)Added
messageExpression
field toValidationRule
. (kubernetes/kubernetes#115969, @DangerOnTheRanger)Added
messageExpression
toValidatingAdmissionPolicy
, to set custom failure message via CEL expression. (kubernetes/kubernetes#116397, @jiahuif) [SIG API Machinery]Added a new IPAddress object kind
Added a new alpha API: ClusterTrustBundle (
certificates.k8s.io/v1alpha1
).A ClusterTrustBundle may be used to distribute X.509 trust anchors to workloads within the cluster. (kubernetes/kubernetes#113218, @ahmedtd) [SIG API Machinery, Auth and Testing]
Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a
authorizer
variable with expressions. The new variable provides a builder that allows expressions such
authorizer.group('').resource('pods').check('create').allowed()
. (kubernetes/kubernetes#116054, @jpbetz) [SIG API Machinery and Testing]Added matchConditions field to ValidatingAdmissionPolicy and enabled support for CEL based custom match criteria. (kubernetes/kubernetes#116350, @maxsmythe)
Added new option to the
InterPodAffinity
scheduler plugin to ignore existingpods
preferred inter-pod affinities if the incoming pod has no preferred inter-pod affinities. This option can be used as an optimization for higher scheduling throughput (at the cost of an occasional pod being scheduled non-optimally/violating existing pods preferred inter-pod affinities). To enable this scheduler option, set the
InterPodAffinityscheduler plugin arg
ignorePreferredTermsOfExistingPods: true` (kubernetes/kubernetes#114393, @danielvegamyhre)Added the
MatchConditions
field toValidatingWebhookConfiguration
andMutatingWebhookConfiguration
for the v1beta and v1 apis.The
AdmissionWebhookMatchConditions
featuregate is now in Alpha (kubernetes/kubernetes#116261, @ivelichkovich) [SIG API Machinery and Testing]Added validation to ensure that if
service.kubernetes.io/topology-aware-hints
andservice.kubernetes.io/topology-mode
annotations are both set, they are set to the same value.Also Added deprecation warning ifservice.kubernetes.io/topology-aware-hints
annotation is used. (kubernetes/kubernetes#116612, @robscott)Added warnings about workload resources (Pods, ReplicaSets, Deployments, Jobs, CronJobs, or ReplicationControllers) whose names are not valid DNS labels. (kubernetes/kubernetes#114412, @thockin)
Adds feature gate
NodeLogQuery
which provides cluster administrators with a streaming view of logs using kubectl without them having to implement a client side reader or logging into the node. (kubernetes/kubernetes#96120, @LorbusChris)Api: validation of a
PodSpec
now rejects invalidResourceClaim
andResourceClaimTemplate
names. For a pod, the name generated for theResourceClaim
when using a template also must be valid. (kubernetes/kubernetes#116576, @pohly)Bump default API QPS limits for Kubelet. (kubernetes/kubernetes#116121, @wojtek-t)
Enabled the
StatefulSetStartOrdinal
feature gate in beta (kubernetes/kubernetes#115260, @pwschuurman)Enabled usage of
kube-proxy
,kube-scheduler
andkubelet
HTTP APIs for changing the loggingverbosity at runtime for JSON output. (kubernetes/kubernetes#114609, @pohly)
Encryption of API Server at rest configuration now allows the use of wildcards in the list of resources. For example, . can be used to encrypt all resources, including all current and future custom resources. (kubernetes/kubernetes#115149, @nilekhc)
Extended the kubelet's PodResources API to include resources allocated in
ResourceClaims
viaDynamicResourceAllocation
. Additionally, added a newGet()
method to query a specific pod for its resources. (kubernetes/kubernetes#115847, @moshe010) [SIG Node]Forbid to set matchLabelKeys when labelSelector is not set in topologySpreadConstraints (kubernetes/kubernetes#116535, @denkensk)
GCE does not support LoadBalancer Services with ports with different protocols (TCP and UDP) (kubernetes/kubernetes#115966, @aojea) [SIG Apps and Cloud Provider]
GRPC probes are now a GA feature.
GRPCContainerProbe
feature gate was locked to default value and will be removed in v1.29. If you were setting this feature gate explicitly, please remove it now. (kubernetes/kubernetes#116233, @SergeyKanzhelev)Graduated
Kubelet Topology Manager
to GA. (kubernetes/kubernetes#116093, @swatisehgal)Graduated
KubeletTracing
to beta, which means that the feature gate is now enabled by default. (kubernetes/kubernetes#115750, @saschagrunert)Graduated seccomp profile defaulting to GA.
Set the kubelet
--seccomp-default
flag orseccompDefault
kubelet configuration field totrue
to make pods on that node default to using theRuntimeDefault
seccomp profile.Enabling seccomp for your workload can have a negative performance impact depending on the kernel and container runtime version in use.
Guidance for identifying and mitigating those issues is outlined in the Kubernetes seccomp tutorial. (kubernetes/kubernetes#115719, @saschagrunert) [SIG API Machinery, Node, Storage and Testing]
Graduated the container resource metrics feature on
HPA
to beta. (kubernetes/kubernetes#116046, @sanposhiho)Implemented API streaming for the
watch-cache
When
sendInitialEvents
ListOption
is set together withwatch=true
, it begins the watch stream with synthetic init events followed by a synthetic "Bookmark" after which the server continues streaming events. (kubernetes/kubernetes#110960, @p0lyn0mial)Introduced API for streaming.
Added
SendInitialEvents
field to theListOptions
. When the new option is set together withwatch=true
, it begins the watch stream with synthetic init events followed by a synthetic "Bookmark" after which the server continues streaming events. (kubernetes/kubernetes#115402, @p0lyn0mial)Introduced a breaking change to the
resource.k8s.io
API in itsAllocationResult
struct. This change allows a kubelet plugin for theDynamicResourceAllocation
feature to service allocations from multiple resource driver controllers. (kubernetes/kubernetes#116332, @klueska)Introduces new alpha functionality to the reflector, allowing user to enable API streaming.
To activate this feature, users can set the
ENABLE_CLIENT_GO_WATCH_LIST_ALPHA
environmental variable.It is important to note that the server must support streaming for this feature to function properly.
If streaming is not supported by the server, the reflector will revert to the previous method
of obtaining data through LIST/WATCH semantics. (kubernetes/kubernetes#110772, @p0lyn0mial) [SIG API Machinery]
K8s.io/client-go/tools/record.EventBroadcaster: after Shutdown() is called, the broadcaster now gives up immediately after a failure to write an event to a sink. Previously it tried multiple times for 12 seconds in a goroutine. (kubernetes/kubernetes#115514, @pohly) [SIG API Machinery]
K8s.io/component-base/logs: usage of the pflag values in a normal Go flag set led to panics when printing the help message (kubernetes/kubernetes#114680, @pohly) [SIG Instrumentation]
Kubeadm: explicitly set
priority
for static pods withpriorityClassName: system-node-critical
(kubernetes/kubernetes#114338, @champtar) [SIG Cluster Lifecycle]Kubelet: a "maxParallelImagePulls" field can now be specified in the kubelet configuration file to control how many image pulls the kubelet can perform in parallel. (kubernetes/kubernetes#115220, @ruiwen-zhao) [SIG API Machinery, Node and Scalability]
Kubelet: changed
MemoryThrottlingFactor
default value to0.9
and formulas to calculatememory.high
(kubernetes/kubernetes#115371, @pacoxu)Kubernetes components that perform leader election now only support using
Leases
for this. (kubernetes/kubernetes#114055, @aimuz)Migrated the
DaemonSet
controller (withinkube-controller-manager
) to use contextual logging (kubernetes/kubernetes#113622, @249043822)New
service.kubernetes.io/topology-mode
annotation has been introduced as a replacement for theservice.kubernetes.io/topology-aware-hints
annotation.service.kubernetes.io/topology-aware-hints
annotation has been deprecated.Pods owned by a Job now uses the labels
batch.kubernetes.io/job-name
andbatch.kubernetes.io/controller-uid
.The legacy labels
job-name
andcontroller-uid
are still added for compatibility. (kubernetes/kubernetes#114930, @kannon92)Promoted
CronJobTimeZone
feature to GA (kubernetes/kubernetes#115904, @soltysh)Promoted
SelfSubjectReview
to Beta (kubernetes/kubernetes#116274, @nabokihms) [SIG API Machinery, Auth, CLI and Testing]Relaxed API validation to allow pod node selector to be mutable for gated pods (additions only, no deletions or mutations). (kubernetes/kubernetes#116161, @danielvegamyhre)
Remove
kubernetes.io/grpc
standard appProtocol (kubernetes/kubernetes#116866, @LiorLieberman) [SIG API Machinery and Apps]Remove deprecated
--enable-taint-manager
and--pod-eviction-timeout
CLI (kubernetes/kubernetes#115840, @atosatto)Removed support for the
v1alpha1
kubeletplugin API ofDynamicResourceManagement
. All plugins must be updated tov1alpha2
in order to function properly. (kubernetes/kubernetes#116558, @klueska)The API server now re-uses data encryption keys while the kms v2 plugin key ID is stable. Data encryption keys are still randomly generated on server start but an atomic counter is used to prevent nonce collisions. (kubernetes/kubernetes#116155, @enj)
The PodDisruptionBudget
spec.unhealthyPodEvictionPolicy
field has graduated to beta and is enabled by default. On servers with the feature enabled, this field may be set toAlwaysAllow
to always allow unhealthy pods covered by the PodDisruptionBudget to be evicted. (kubernetes/kubernetes#115363, @ravisantoshgudimetla) [SIG Apps, Auth and Node]The
DownwardAPIHugePages
kubelet feature graduated to stable / GA. (kubernetes/kubernetes#115721, @saschagrunert) [SIG Apps and Node]The following feature gates for volume expansion GA features have now been removed and must no longer be referenced in
--feature-gates
flags:ExpandCSIVolumes
,ExpandInUsePersistentVolumes
,ExpandPersistentVolumes
(kubernetes/kubernetes#113942, @mengjiao-liu)The list-type of the alpha
resourceClaims
field introduced toPods
in1.26.0
was modified fromset
tomap
, resolving an incompatibility with use of this schema inCustomResourceDefinitions
and with server-side apply. (kubernetes/kubernetes#114585, @JoelSpeed)Updated API reference for Requests, specifying they must not exceed limits (kubernetes/kubernetes#115434, @ehashman)
Updated
KMSv2
to beta (kubernetes/kubernetes#115123, @aramase)Updated: Redefine AppProtocol field description and add new standard values (kubernetes/kubernetes#115433, @LiorLieberman) [SIG API Machinery, Apps and Network]
/metrics/slis
is now available for control plane components allowing you to scrape health check metrics. (kubernetes/kubernetes#114997, @Richabanker)APIServerTracing
feature gate is now enabled by default. Tracing in the APIServer is still disabled by default, and requires a config file to enable. (kubernetes/kubernetes#116144, @dashpole)
NodeResourceFit
andNodeResourcesBalancedAllocation
implement thePreScore
extension point for a more performant calculation. (kubernetes/kubernetes#115655, @tangwz)
PodSchedulingReadiness
is graduated to beta. (kubernetes/kubernetes#115815, @Huang-Wei)PodSpec.Container.Resources
became mutable for CPU and memory resource types.PodSpec.Container.ResizePolicy
(new object) gives users control over how their containers are resized.PodStatus.Resize
status describes the state of a requested Pod resize.PodStatus.ResourcesAllocated
describes node resources allocated to Pod.PodStatus.Resources
describes node resources applied to running containers by CRI.UpdateContainerResources
CRI API now supports both Linux and Windows. (kubernetes/kubernetes#102884, @vinaykul)SELinuxMountReadWriteOncePod
graduated to Beta. (kubernetes/kubernetes#116425, @jsafrane)StatefulSetAutoDeletePVC
feature gate promoted to beta. (kubernetes/kubernetes#116501, @mattcary)StatefulSet
names must be DNS labels, rather than subdomains. AnyStatefulSet
which took advantage of subdomain validation (by having dots in the name) can't
possibly have worked, because we eventually set
pod.spec.hostname
from theStatefulSetName
,and that is validated as a DNS label. (kubernetes/kubernetes#114172, @thockin)
ValidatingAdmissionPolicy
now provides a status field that contains results of type checking the validation expression.The type checking is fully informational, and the behavior of the policy is unchanged. (kubernetes/kubernetes#115668, @jiahuif)
cacheSize
field inEncryptionConfiguration
is not supported for KMSv2 provider (kubernetes/kubernetes#113121, @aramase)k8s.io/component-base/logs
now also supports adding command line flags to aflag.FlagSet
. (kubernetes/kubernetes#114731, @pohly)kubelet
: migrated--container-runtime-endpoint
and--image-service-endpoint
to kubelet config (kubernetes/kubernetes#112136, @pacoxu)
resource.k8s.io/v1alpha1
was replaced withresource.k8s.io/v1alpha2
. Beforeupgrading a cluster, all objects in resource.k8s.io/v1alpha1 (ResourceClaim, ResourceClaimTemplate,
ResourceClass, PodScheduling) must be deleted. The changes are internal, so
YAML files which create pods and resource claims don't need changes except for
the newer
apiVersion
. (kubernetes/kubernetes#116299, @pohly)volumes
:resource.claims
is now cleared for PVC specs during create or update of a pod spec with inline PVC template or of a PVC because it has no effect. (kubernetes/kubernetes#115928, @pohly)Added a new alpha API: ClusterTrustBundle (
certificates.k8s.io/v1alpha1
).A ClusterTrustBundle may be used to distribute X.509 trust anchors to workloads within the cluster. (kubernetes/kubernetes#113218, @ahmedtd) [SIG API Machinery, Auth and Testing]
Remove
kubernetes.io/grpc
standard appProtocol (kubernetes/kubernetes#116866, @LiorLieberman) [SIG API Machinery and Apps]API: resource.k8s.io/v1alpha1.PodScheduling was renamed to resource.k8s.io/v1alpha2.PodSchedulingContext. (kubernetes/kubernetes#116556, @pohly) [SIG API Machinery, Apps, Auth, CLI, Node, Scheduling and Testing]
APIServerTracing feature gate is now enabled by default. Tracing in the API Server is still disabled by default, and requires a config file to enable. (kubernetes/kubernetes#116144, @dashpole) [SIG API Machinery and Testing]
Added CEL runtime cost calculation into ValidatingAdmissionPolicy, matching the evaluation cost
restrictions that already apply to CustomResourceDefinition.
If rule evaluation uses more compute than the limit, the API server aborts the evaluation and the
admission check that was being performed is aborted; the
failurePolicy
for the ValidatingAdmissionPolicydetermines the outcome. (kubernetes/kubernetes#115747, @cici37) [SIG API Machinery]
Added
messageExpression
toValidatingAdmissionPolicy
, to set custom failure message via CEL expression. (kubernetes/kubernetes#116397, @jiahuif) [SIG API Machinery]Added a new IPAddress object kind
Added a new alpha API: ClusterTrustBundle (
certificates.k8s.io/v1alpha1
).A ClusterTrustBundle may be used to distribute X.509 trust anchors to workloads within the cluster. (kubernetes/kubernetes#113218, @ahmedtd) [SIG API Machinery, Auth and Testing]
Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a
authorizer
variable with expressions. The new variable provides a builder that allows expressions such
authorizer.group('').resource('pods').check('create').allowed()
. (kubernetes/kubernetes#116054, @jpbetz) [SIG API Machinery and Testing]Added matchConditions field to ValidatingAdmissionPolicy, enabled support for CEL based custom match criteria. (kubernetes/kubernetes#116350, @maxsmythe) [SIG API Machinery and Testing]
Added messageExpression field to ValidationRule. (#115969, @DangerOnTheRanger) ([Add messageExpression field for CRD validation kubernetes/kubernetes#115969](https://togithub.com/kubernetes/kube
Configuration
📅 Schedule: Branch creation - "before 4am on Monday" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.