Skip to content

Commit 0be56c6

Browse files
authored
Merge pull request #2765 from sreeram-venkitesh/release-notes-draft-v1.33.0-rc.1
Release Notes draft for k/k v1.33.0-rc.1
2 parents e0e0853 + edd0bcf commit 0be56c6

File tree

158 files changed

+2295
-231
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

158 files changed

+2295
-231
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
pr: 122550
2+
releasenote:
3+
text: |-
4+
When the `StrictIPCIDRValidation` feature gate is enabled, Kubernetes will be
5+
slightly stricter about what values will be accepted as IP addresses and network
6+
address ranges ("CIDR blocks").
7+
8+
In particular, octets within IPv4 addresses are not allowed to have any leading
9+
`0`s, and IPv4-mapped IPv6 values (e.g. `::ffff:192.168.0.1`) are forbidden.
10+
These sorts of values can potentially cause security problems when different
11+
components interpret the same string as referring to different IP addresses
12+
(as in CVE-2021-29923).
13+
14+
This tightening applies only to fields in build-in API kinds, and not to
15+
custom resource kinds, values in Kubernetes configuration files, or
16+
command-line arguments.
17+
18+
(When the feature gate is disabled, creating an object with such an invalid
19+
IP or CIDR value will result in a warning from the API server about the fact
20+
that it will be rejected in the future).
21+
pr_body: ""
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 122646
2+
releasenote:
3+
text: 'kube-apiserver: shortening the grace period during a pod deletion no longer
4+
moves the `metadata.deletionTimestamp` into the past.'
5+
pr_body: ""
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
pr: 124360
2+
releasenote:
3+
text: "It introduces a new scope name `VolumeAttributesClass`. \n\nIt matches all
4+
PVC objects that have the volume attributes class mentioned. \n\nIf you want to
5+
limit the count of PVCs that have a specific volume attributes class. In that
6+
case, you can create a quota object with the scope name `VolumeAttributesClass`
7+
and a `matchExpressions` that match the volume attributes class."
8+
pr_body: ""
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 127053
2+
releasenote:
3+
text: Respect the incoming trace context for authenticated requests to the kube-apiserver
4+
for APIServer tracing.
5+
pr_body: ""
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
pr: 127092
2+
releasenote:
3+
text: Automatically copy `topology.k8s.io/zone`, `topology.k8s.io/region` and `kubernetes.io/hostname`
4+
labels from Node objects to Pods when they are scheduled to a node (via the `pods/binding`
5+
endpoint) to allow applications that need to be explicitly aware of their assigned
6+
node topology to access this information via the downward API, rather than requiring
7+
permission to `get node` objects (exposing the entire API surface of the Node
8+
object to otherwise unprivileged workloads).
9+
pr_body: ""
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
pr: 127577
2+
releasenote:
3+
text: "`mergeDefaultEvictionSettings` indicates that defaults for the evictionHard,
4+
evictionSoft, evictionSoftGracePeriod, and evictionMinimumReclaim fields should
5+
be merged into values specified for those fields in this configuration. Signals
6+
specified in this configuration take precedence. Signals not specified in this
7+
configuration inherit their defaults."
8+
pr_body: ""
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
pr: 127696
2+
releasenote:
3+
text: Implemented a warning message to inform users about the debug container's capabilities
4+
granted by debugging profile may not work as expected if a non-root user is specified
5+
in target Pod's `.Spec.SecurityContext.RunAsUser` field.
6+
pr_body: ""
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
pr: 128152
2+
releasenote:
3+
text: |-
4+
New configuration is introduced to the kubelet that allows it to track container images and the list of authentication information that lead to their successful pulls . This data is persisted across reboots of the host and restarts of the kubelet.
5+
6+
The kubelet ensures any image requiring credential verification is always pulled if authentication information from an image pull is not yet present, thus enforcing authentication / re-authentication. This means an image pull might be attempted even in cases where a pod requests the `IfNotPresent` image pull policy, and might lead to the pod not starting if its pull policy is `Never` and is unable to present authentication information that lead to a previous successful pull of the image it is requesting.
7+
pr_body: ""
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
pr: 128184
2+
releasenote:
3+
text: The `StorageCapacityScoring` feature gate was added to score nodes by available
4+
storage capacity. It's in alpha and disabled by default. The `VolumeCapacityPriority`
5+
alpha feature was replaced with this, and the default behavior was changed. The
6+
`VolumeCapacityPriority` preferred a node with the least allocatable, but the
7+
`StorageCapacityScoring` preferred a node with the maximum allocatable. See [KEP-4049](https://github.com/kubernetes/enhancements/blob/master/keps/sig-storage/4049-storage-capacity-scoring-of-nodes-for-dynamic-provisioning/README.md)
8+
for details.
9+
pr_body: ""
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
pr: 128372
2+
releasenote:
3+
text: Expanded the on-disk kubelet credential provider configuration to allow an
4+
optional `tokenAttribute` field to be configured. When it is set, the Kubelet
5+
will provision a token with the given audience bound to the current pod and its
6+
service account. This KSA token along with required annotations on the KSA defined
7+
in configuration will be sent to the credential provider plugin via its standard
8+
input (along with the image information that is already sent today). The KSA annotations
9+
to be sent are configurable in the kubelet credential provider configuration.
10+
pr_body: ""

0 commit comments

Comments
 (0)