Skip to content

Commit 38248db

Browse files
committed
Fix feature state tags
1 parent 3f9b9fd commit 38248db

File tree

1 file changed

+31
-13
lines changed

1 file changed

+31
-13
lines changed

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 31 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,9 @@ NamespaceLifecycle, LimitRanger, ServiceAccount, TaintNodesByCondition, Priority
9999

100100
## What does each admission controller do?
101101

102-
### AlwaysAdmit {#alwaysadmit} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
102+
### AlwaysAdmit {#alwaysadmit}
103+
104+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
103105

104106
This admission controller allows all pods into the cluster. It is deprecated because its behavior is the same as if there were no admission controller at all.
105107

@@ -113,7 +115,9 @@ scheduled onto the right node), without any authorization check against the imag
113115
is enabled, images are always pulled prior to starting containers, which means valid credentials are
114116
required.
115117

116-
### AlwaysDeny {#alwaysdeny} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
118+
### AlwaysDeny {#alwaysdeny}
119+
120+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
117121

118122
Rejects all requests. AlwaysDeny is DEPRECATED as no real meaning.
119123

@@ -164,7 +168,9 @@ if the pods don't already have toleration for taints
164168
`node.kubernetes.io/not-ready:NoExecute` or
165169
`node.alpha.kubernetes.io/unreachable:NoExecute`.
166170

167-
### DenyExecOnPrivileged {#denyexeconprivileged} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
171+
### DenyExecOnPrivileged {#denyexeconprivileged}
172+
173+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
168174

169175
This admission controller will intercept all requests to exec a command in a pod if that pod has a privileged container.
170176

@@ -175,7 +181,9 @@ Use of a policy-based admission plugin (like [PodSecurityPolicy](#podsecuritypol
175181
which can be targeted at specific users or Namespaces and also protects against creation of overly privileged Pods
176182
is recommended instead.
177183

178-
### DenyEscalatingExec {#denyescalatingexec} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
184+
### DenyEscalatingExec {#denyescalatingexec}
185+
186+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
179187

180188
This admission controller will deny exec and attach commands to pods that run with escalated privileges that
181189
allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and
@@ -187,7 +195,9 @@ Use of a policy-based admission plugin (like [PodSecurityPolicy](#podsecuritypol
187195
which can be targeted at specific users or Namespaces and also protects against creation of overly privileged Pods
188196
is recommended instead.
189197

190-
### EventRateLimit {#eventratelimit} {{< feature-state for_k8s_version="v1.13" state="alpha" >}}
198+
### EventRateLimit {#eventratelimit}
199+
200+
{{< feature-state for_k8s_version="v1.13" state="alpha" >}}
191201

192202
This admission controller mitigates the problem where the API server gets flooded by
193203
event requests. The cluster admin can specify event rate limits by:
@@ -446,7 +456,9 @@ applies a 0.1 CPU requirement to all Pods in the `default` namespace.
446456

447457
See the [limitRange design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_limit_range.md) and the [example of Limit Range](/docs/tasks/configure-pod-container/limit-range/) for more details.
448458

449-
### MutatingAdmissionWebhook {#mutatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
459+
### MutatingAdmissionWebhook {#mutatingadmissionwebhook}
460+
461+
{{< feature-state for_k8s_version="v1.13" state="beta" >}}
450462

451463
This admission controller calls any mutating webhooks which match the request. Matching
452464
webhooks are called in serial; each one may modify the object if it desires.
@@ -537,7 +549,9 @@ This admission controller also protects the access to `metadata.ownerReferences[
537549
of an object, so that only users with "update" permission to the `finalizers`
538550
subresource of the referenced *owner* can change it.
539551

540-
### PersistentVolumeLabel {#persistentvolumelabel} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
552+
### PersistentVolumeLabel {#persistentvolumelabel}
553+
554+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
541555

542556
This admission controller automatically attaches region or zone labels to PersistentVolumes
543557
as defined by the cloud provider (for example, GCE or AWS).
@@ -708,7 +722,9 @@ objects in your Kubernetes deployment, you MUST use this admission controller to
708722

709723
See the [resourceQuota design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_resource_quota.md) and the [example of Resource Quota](/docs/concepts/policy/resource-quotas/) for more details.
710724

711-
### RuntimeClass {#runtimeclass} {{< feature-state for_k8s_version="v1.16" state="alpha" >}}
725+
### RuntimeClass {#runtimeclass}
726+
727+
{{< feature-state for_k8s_version="v1.16" state="alpha" >}}
712728

713729
For [RuntimeClass](/docs/concepts/containers/runtime-class/) definitions which describe an overhead associated with running a pod,
714730
this admission controller will set the pod.Spec.Overhead field accordingly.
@@ -729,11 +745,15 @@ We strongly recommend using this admission controller if you intend to make use
729745

730746
The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection` or `kubernetes.io/pv-protection` finalizers to newly created Persistent Volume Claims (PVCs) or Persistent Volumes (PV). In case a user deletes a PVC or PV the PVC or PV is not removed until the finalizer is removed from the PVC or PV by PVC or PV Protection Controller. Refer to the [Storage Object in Use Protection](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection) for more detailed information.
731747

732-
### TaintNodesByCondition {#taintnodesbycondition} {{< feature-state for_k8s_version="v1.12" state="beta" >}}
748+
### TaintNodesByCondition {#taintnodesbycondition}
749+
750+
{{< feature-state for_k8s_version="v1.12" state="beta" >}}
733751

734752
This admission controller {{< glossary_tooltip text="taints" term_id="taint" >}} newly created Nodes as `NotReady` and `NoSchedule`. That tainting avoids a race condition that could cause Pods to be scheduled on new Nodes before their taints were updated to accurately reflect their reported conditions.
735753

736-
### ValidatingAdmissionWebhook {#validatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
754+
### ValidatingAdmissionWebhook {#validatingadmissionwebhook}
755+
756+
{{< feature-state for_k8s_version="v1.13" state="beta" >}}
737757

738758
This admission controller calls any validating webhooks which match the request. Matching
739759
webhooks are called in parallel; if any of them rejects the request, the request
@@ -773,6 +793,4 @@ phase, and therefore is the last admission controller to run.
773793
in the mutating phase.
774794

775795
For earlier versions, there was no concept of validating versus mutating and the
776-
admission controllers ran in the exact order specified.
777-
778-
796+
admission controllers ran in the exact order specified.

0 commit comments

Comments
 (0)