Skip to content

Commit 30442f8

Browse files
authored
Merge pull request #48590 from sftim/20241029_feature_gate_changes
Update feature gate information for v1.31
2 parents 2a234b2 + ae54fc2 commit 30442f8

14 files changed

+179
-15
lines changed
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: AllowDNSOnlyNodeCSR
3+
content_type: feature_gate
4+
_build:
5+
list: never
6+
render: false
7+
8+
stages:
9+
- stage: deprecated
10+
defaultValue: false
11+
fromVersion: "1.31"
12+
---
13+
Allow kubelet to request a certificate without any Node IP available, only with DNS names.
14+
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: AllowInsecureKubeletCertificateSigningRequests
3+
content_type: feature_gate
4+
5+
_build:
6+
list: never
7+
render: false
8+
9+
stages:
10+
- stage: deprecated
11+
defaultValue: false
12+
fromVersion: "1.31"
13+
---
14+
Disable node admission validation of
15+
[CertificateSigningRequests](/docs/reference/access-authn-authz/certificate-signing-requests/#certificate-signing-requests)
16+
for kubelet signers. Unless you disable this feature gate, Kubernetes enforces that new
17+
kubelet certificates have a `commonName` matching `system:node:$nodeName`.
18+

content/en/docs/reference/command-line-tools-reference/feature-gates/anonymous-auth-configurable-endpoints.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ _build:
66
render: false
77

88
stages:
9-
- stage: alpha
9+
- stage: alpha
1010
defaultValue: false
1111
fromVersion: "1.31"
12+
1213
---
13-
Enable [configurable endpoints for anonymous auth](/docs/reference/access-authn-authz/authentication/#anonymous-authenticator-configuration)
14-
for the API server.
14+
Enable configuring anonymous authentication / authorization for only certain API server endpoints.
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: AppArmorFields
3+
content_type: feature_gate
4+
_build:
5+
list: never
6+
render: false
7+
8+
stages:
9+
- stage: beta
10+
defaultValue: true
11+
fromVersion: "1.30"
12+
toVersion: "1.30"
13+
- stage: stable
14+
defaultValue: true
15+
fromVersion: "1.31"
16+
---
17+
Enable AppArmor related security context settings.
18+
19+
For more information about AppArmor and Kubernetes, read the
20+
[AppArmor](/docs/concepts/security/linux-kernel-security-constraints/#apparmor) section
21+
within
22+
[security features in the Linux kernel](/docs/concepts/security/linux-kernel-security-constraints/#linux-security-features).
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: ConcurrentWatchObjectDecode
3+
content_type: feature_gate
4+
5+
_build:
6+
list: never
7+
render: false
8+
9+
stages:
10+
- stage: beta
11+
defaultValue: false
12+
fromVersion: "1.31"
13+
14+
---
15+
Enable concurrent watch object decoding. This is to avoid starving the API server's
16+
watch cache when a conversion webhook is installed.

content/en/docs/reference/command-line-tools-reference/feature-gates/csi-migration-portworx.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,10 @@ stages:
1313
- stage: beta
1414
defaultValue: false
1515
fromVersion: "1.25"
16+
toVersion: "1.30"
17+
- stage: beta
18+
defaultValue: true
19+
fromVersion: "1.31"
1620
---
1721
Enables shims and translation logic to route volume operations
1822
from the Portworx in-tree plugin to Portworx CSI plugin.
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: DisableAllocatorDualWrite
3+
content_type: feature_gate
4+
_build:
5+
list: never
6+
render: false
7+
8+
stages:
9+
- stage: alpha
10+
defaultValue: false
11+
fromVersion: "1.31"
12+
---
13+
You can enable the `MultiCIDRServiceAllocator` feature gate. The API server supports migration
14+
from the old bitmap ClusterIP allocators to the new IPAddress allocators.
15+
16+
The API server performs a dual-write on both allocators. This feature gate disables the dual write
17+
on the new Cluster IP allocators; you can enable this feature gate if you have completed the
18+
relevant stage of the migration.

content/en/docs/reference/command-line-tools-reference/feature-gates/disable-cloud-providers.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,19 @@ stages:
1010
defaultValue: false
1111
fromVersion: "1.22"
1212
toVersion: "1.28"
13-
- stage: beta
13+
- stage: beta
1414
defaultValue: true
15-
fromVersion: "1.29"
15+
fromVersion: "1.29"
16+
toVersion": "1.30"
17+
- stage: stable
18+
defaultValue: true
19+
fromVersion: "1.31"
20+
1621
---
17-
Disables any functionality in `kube-apiserver`,
18-
`kube-controller-manager` and `kubelet` related to the `--cloud-provider`
19-
component flag.
22+
Enabling this feature gate deactivated functionality in `kube-apiserver`,
23+
`kube-controller-manager` and `kubelet` that related to the `--cloud-provider`
24+
command line argument.
25+
26+
In Kubernetes v1.31 and later, the only valid values for `--cloud-provider`
27+
are the empty string (no cloud provider integration), or "external"
28+
(integration via a separate cloud-controller-manager).

content/en/docs/reference/command-line-tools-reference/feature-gates/disable-kubelet-cloud-credential-providers.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,16 @@ stages:
99
- stage: alpha
1010
defaultValue: false
1111
fromVersion: "1.23"
12-
toVersion: "1.28"
13-
- stage: beta
12+
toVersion: "1.28"
13+
- stage: beta
1414
defaultValue: true
15-
fromVersion: "1.29"
15+
fromVersion: "1.29"
16+
toVersion: "1.30"
17+
- stage: stable
18+
defaultValue: true
19+
fromVersion: "1.31"
20+
1621
---
17-
Disable the in-tree functionality in kubelet
18-
to authenticate to a cloud provider container registry for image pull credentials.
22+
Enabling the feature gate deactivated the legacy in-tree functionality within the
23+
kubelet, that allowed the kubelet to to authenticate to a cloud provider container registry
24+
for container image pulls.

content/en/docs/reference/command-line-tools-reference/feature-gates/proc-mount-type.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,13 @@ _build:
66
render: false
77

88
stages:
9-
- stage: alpha
9+
- stage: alpha
1010
defaultValue: false
1111
fromVersion: "1.12"
12+
toVersion: "1.30"
13+
- stage: beta
14+
defaultValue: false
15+
fromVersion: "1.31"
1216
---
1317
Enables control over the type proc mounts for containers
14-
by setting the `procMount` field of a SecurityContext.
18+
by setting the `procMount` field of a Pod's `securityContext`.

0 commit comments

Comments
 (0)