@@ -33,6 +33,7 @@ session persistence and client certificate verification.
33
33
## What's new
34
34
35
35
### Graduation to Standard
36
+
36
37
This release includes the graduation to Standard of four eagerly awaited features.
37
38
This means they are no longer experimental concepts; inclusion in the Standard
38
39
release channel denotes a high level of confidence in the API surface and
@@ -43,22 +44,21 @@ refinements and improvements to these new features in the future.
43
44
For more information on how all of this works, refer to the
44
45
[ Gateway API Versioning Policy] ( https://gateway-api.sigs.k8s.io/concepts/versioning/ ) .
45
46
46
-
47
47
#### [ Service Mesh Support] ( https://gateway-api.sigs.k8s.io/mesh/ )
48
+
48
49
Service mesh support in Gateway API allows service mesh users to use the same
49
50
API to manage ingress traffic and mesh traffic, reusing the same policy and
50
51
routing interfaces. In Gateway API v1.1, routes (such as HTTPRoute) can now have
51
52
a Service as a ` parentRef ` , to control how traffic to specific services behave.
52
- For more information, read the
53
+ For more information, read the
53
54
[ Gateway API service mesh documentation] ( https://gateway-api.sigs.k8s.io/mesh/ )
54
55
or see the
55
- [ list of Gateway API implementations
56
- ] ( https://gateway-api.sigs.k8s.io/implementations/#service-mesh-implementation-status ) .
56
+ [ list of Gateway API implementations] ( https://gateway-api.sigs.k8s.io/implementations/#service-mesh-implementation-status ) .
57
57
58
58
As an example, one could do a canary deployment of a workload deep in an
59
59
application's call graph with an HTTPRoute as follows:
60
60
61
- ```
61
+ ``` yaml
62
62
apiVersion : gateway.networking.k8s.io/v1
63
63
kind : HTTPRoute
64
64
metadata :
@@ -79,21 +79,21 @@ spec:
79
79
port : 80
80
80
weight : 50
81
81
` ` `
82
-
82
+
83
83
This would split traffic sent to the ` color` Service in the `faces` namespace
84
84
50/50 between the original `color` Service and the `color2` Service, using a
85
85
portable configuration that's easy to move from one mesh to another.
86
86
87
-
88
87
# ### [GRPCRoute](https://gateway-api.sigs.k8s.io/guides/grpc-routing/)
88
+
89
89
If you are already using the experimental version of GRPCRoute, we recommend holding
90
90
off on upgrading to the standard channel version of GRPCRoute until the
91
91
controllers you're using have been updated to support GRPCRoute v1. Until then,
92
92
it is safe to upgrade to the experimental channel version of GRPCRoute in v1.1
93
93
that includes both v1alpha2 and v1 API versions.
94
94
95
-
96
95
# ### [ParentReference Port](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1.ParentReference)
96
+
97
97
The `port` field was added to ParentReference, allowing you to attach resources
98
98
to Gateway Listeners, Services, or other parent resources
99
99
(depending on the implementation). Binding to a port also allows you to attach
@@ -102,9 +102,8 @@ to multiple Listeners at once.
102
102
For example, you can attach an HTTPRoute to one or more specific Listeners of a
103
103
Gateway as specified by the Listener `port`, instead of the Listener `name` field.
104
104
105
- For more information, see [ Attaching to Gateways.
106
- ] ( https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways )
107
-
105
+ For more information, see
106
+ [Attaching to Gateways](https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways).
108
107
109
108
# ### [Conformance Profiles and Reports](https://gateway-api.sigs.k8s.io/concepts/conformance/#conformance-profiles)
110
109
@@ -116,7 +115,6 @@ description of the testing outcome. The Reports have been reorganized in a more
116
115
structured way, and the implementations can now add information on how the tests
117
116
have been run and provide reproduction steps.
118
117
119
-
120
118
# ## New additions to Experimental channel
121
119
122
120
# ### [Gateway Client Certificate Verification](https://gateway-api.sigs.k8s.io/geps/gep-91/)
@@ -130,7 +128,7 @@ The following example shows how the CACertificate stored in
130
128
the `foo-example-com-ca-cert` ConfigMap can be used to validate the certificates
131
129
presented by clients connecting to the `foo-https` Gateway Listener.
132
130
133
- ```
131
+ ` ` ` yaml
134
132
apiVersion: gateway.networking.k8s.io/v1
135
133
kind: Gateway
136
134
metadata:
@@ -156,7 +154,8 @@ spec:
156
154
157
155
# ### [Session Persistence and BackendLBPolicy](https://gateway-api.sigs.k8s.io/geps/gep-1619/)
158
156
159
- [ Session Persistence] ( https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1.SessionPersistence ) is being introduced to Gateway API via a new policy
157
+ [Session Persistence](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1.SessionPersistence)
158
+ is being introduced to Gateway API via a new policy
160
159
([BackendLBPolicy](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1alpha2.BackendLBPolicy))
161
160
for Service-level configuration and as fields within HTTPRoute
162
161
and GRPCRoute for route-level configuration. The BackendLBPolicy and route-level
@@ -168,7 +167,7 @@ session persistence for the `foo` service. It sets the session name to
168
167
` foo-session` , defines absolute and idle timeouts, and configures the cookie to
169
168
be a session cookie :
170
169
171
- ```
170
+ ` ` ` yaml
172
171
apiVersion: gateway.networking.k8s.io/v1alpha2
173
172
kind: BackendLBPolicy
174
173
metadata:
@@ -201,16 +200,15 @@ newer version.
201
200
202
201
Any references to v1alpha2 BackendTLSPolicy fields will need to be updated to
203
202
v1alpha3. Specific changes to fields include :
203
+
204
204
- ` targetRef` becomes `targetRefs` to allow a BackendTLSPolicy to attach to
205
- multiple targets
205
+ multiple targets
206
206
- ` tls` becomes `validation`
207
207
- ` tls.caCertRefs` becomes `validation.caCertificateRefs`
208
208
- ` tls.wellKnownCACerts` becomes `validation.wellKnownCACertificates`
209
209
210
-
211
210
For a full list of the changes included in this release, please refer to the
212
- [ v1.1.0 release notes.
213
- ] ( https://github.com/kubernetes-sigs/gateway-api/releases/tag/v1.1.0 )
211
+ [v1.1.0 release notes](https://github.com/kubernetes-sigs/gateway-api/releases/tag/v1.1.0).
214
212
215
213
# # Gateway API background
216
214
@@ -219,11 +217,9 @@ at the 2019 KubeCon San Diego as the next generation
219
217
of Ingress API. Since then, an incredible community has formed to develop what
220
218
has likely become the
221
219
[most collaborative API in Kubernetes history](https://www.youtube.com/watch?v=V3Vu_FWb4l4).
222
- Over 200 people have contributed to this API so far, and that number continues
223
- to grow.
220
+ Over 200 people have contributed to this API so far, and that number continues to grow.
224
221
225
- The maintainers
226
- would like to thank _ everyone_ who's contributed to Gateway API, whether in the
222
+ The maintainers would like to thank _everyone_ who's contributed to Gateway API, whether in the
227
223
form of commits to the repo, discussion, ideas, or general support. We literally
228
224
couldn't have gotten this far without the support of this dedicated and active
229
225
community.
@@ -242,17 +238,18 @@ To try out the API, follow our [Getting Started Guide](https://gateway-api.sigs.
242
238
There are lots of opportunities to get involved and help define the future of
243
239
Kubernetes routing APIs for both ingress and service mesh.
244
240
245
- * Check out the [ user guides] ( https://gateway-api.sigs.k8s.io/guides ) to see what use-cases can be addressed.
246
- * Try out one of the [ existing Gateway controllers] ( https://gateway-api.sigs.k8s.io/implementations/ )
241
+ * Check out the [user guides](https://gateway-api.sigs.k8s.io/guides) to see what use-cases can be addressed.
242
+ * Try out one of the [existing Gateway controllers](https://gateway-api.sigs.k8s.io/implementations/).
247
243
* Or [join us in the community](https://gateway-api.sigs.k8s.io/contributing/)
248
- and help us build the future of Gateway API together!
244
+ and help us build the future of Gateway API together!
249
245
250
246
# # Related Kubernetes blog articles
247
+
251
248
* [New Experimental Features in Gateway API v1.0](/blog/2023/11/28/gateway-api-ga/)
252
- 11/2023
249
+ 11/2023
253
250
* [Gateway API v1.0: GA Release](/blog/2023/10/31/gateway-api-ga/)
254
- 10/2023
251
+ 10/2023
255
252
* [Introducing ingress2gateway; Simplifying Upgrades to Gateway API](/blog/2023/10/25/introducing-ingress2gateway/)
256
- 10/2023
253
+ 10/2023
257
254
* [Gateway API v0.8.0: Introducing Service Mesh Support](/blog/2023/08/29/gateway-api-v0-8/)
258
- 08/2023
255
+ 08/2023
0 commit comments