Commit Graph

347 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
00ea892a0f
Merge pull request #110564 from j4m3s-s/add-ports-doc-fix
Fix description of Ports in PodSpec
2022-07-08 21:41:46 -07:00
Tim Hockin
c2ee067221 Remove obsolete refs to gate EndpointSliceNodeName 2022-07-07 13:19:59 -07:00
James Landrein
9da646de4e Fix description of Ports in PodSpec 2022-07-07 10:43:25 +02:00
Ricardo Katz
5351f6c90a Generated files for endPort promotion 2022-06-30 00:33:43 +00:00
Patrick Ohly
1aceac797d logs: make LoggingConfiguration an unversioned API
Making the LoggingConfiguration part of the versioned component-base/config API
had the theoretic advantage that components could have offered different
configuration APIs with experimental features limited to alpha versions (for
example, sanitization offered only in a v1alpha1.KubeletConfiguration). Some
components could have decided to only use stable logging options.

In practice, this wasn't done. Furthermore, we don't want different components
to make different choices regarding which logging features they offer to
users. It should always be the same everywhere, for the sake of consistency.

This can be achieved with a saner Go API by dropping the distinction between
internal and external LoggingConfiguration types. Different stability levels of
indidividual fields have to be covered by documentation (done) and potentially
feature gates (not currently done).

Advantages:

- everything related to logging is under component-base/logs;
  previously this was scattered across different packages and
  different files under "logs" (why some code was in logs/config.go
  vs. logs/options.go vs. logs/logs.go always confused me again
  and again when coming back to the code):

  - long-term config and command line API are clearly separated
    into the "api" package underneath that

  - logs/logs.go itself only deals with legacy global flags and
    logging configuration

- removal of separate Go APIs like logs.BindLoggingFlags and
  logs.Options

- LogRegistry becomes an implementation detail, with less code
  and less exported functionality (only registration needs to
  be exported, querying is internal)
2022-06-17 20:22:13 +02:00
Shubham Kuchhal
b1994772ee RBAC: Modify the Description for the apiGroup. 2022-06-14 13:31:09 +05:30
Kubernetes Prow Robot
f80d17ea4e
Merge pull request #109293 from iamNoah1/improve-ingressclassname-api-doc
Ingress API: rework the ingressClassName API documentation
2022-06-09 11:13:41 -07:00
Noah Ispas (iamNoah1)
7d5cedf07a generate ressources after change request 2022-06-09 11:12:30 +02:00
Davanum Srinivas
50bea1dad8
Move from k8s.gcr.io to registry.k8s.io
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
2022-05-31 10:16:53 -04:00
kerthcet
02f0a3ee91 feat: add NodeInclusionPolicy to TopologySpreadConstraint in PodSpec
Signed-off-by: kerthcet <kerthcet@gmail.com>
2022-05-10 12:54:49 +08:00
Kubernetes Prow Robot
7af5a7bfc5
Merge pull request #109602 from lavalamp/remove-clustername
Finish clustername removal
2022-05-07 08:01:16 -07:00
Kubernetes Prow Robot
af4dceeac2
Merge pull request #109308 from danwinship/traffic-policy-docs
Clarify ExternalTrafficPolicy/InternalTrafficPolicy definitions
2022-05-06 17:23:16 -07:00
Daniel Smith
1dabd7be5c generated files 2022-05-05 20:12:51 +00:00
Kubernetes Prow Robot
7adb7c1d06
Merge pull request #109612 from pandaamanda/remove_DeprecatedControllerOptions
refactor: remove deprecated `deleting-pods-qps` `deleting-pods-burst` `register-retry-count`  flags
2022-05-04 02:34:54 -07:00
Kubernetes Prow Robot
6605e526b0
Merge pull request #109421 from vpnachev/fix/typo-in-token-request-doc-string
Fix typo in TokenRequest doc string
2022-05-03 22:43:30 -07:00
Kubernetes Prow Robot
2d4c06bf91
Merge pull request #109259 from roycaihw/tweak-quantity-docs
Tweak quantity docs
2022-05-03 19:30:13 -07:00
Kubernetes Prow Robot
1aec0c81b1
Merge pull request #105963 from zhucan/bugfix-95367
csi: add nodeExpandSecret support for CSI client & add unit test
2022-05-03 17:17:58 -07:00
Noah Ispas (iamNoah1)
a53273129a generate ressources after change request 2022-04-26 13:12:15 +02:00
熊中谅10171568
c4579165f1 refactor: remove deprecated flags
refactor: remove deprecated deleting-pods-qps deleting-pods-burst register-retry-count flags
2022-04-22 20:28:12 +08:00
Dan Winship
e343ea57a6 Clarify ExternalTrafficPolicy/InternalTrafficPolicy definitions 2022-04-21 11:06:43 -04:00
James Laverack
7d57d5c70d Revert "Introduce APIs to support multiple ClusterCIDRs (#108290)"
This reverts commit b9792a9dae.
2022-04-13 13:58:19 +01:00
Vladimir Nachev
9b4927be15
Fix typo in TokenRequest doc string 2022-04-11 23:58:06 +03:00
Noah Ispas (iamNoah1)
6e03bd9fe9 generate ressources after change request 2022-04-09 10:45:01 +02:00
Noah Ispas (iamNoah1)
1b9b68c097 add generated assets 2022-04-05 07:55:14 +00:00
zhucan
1c1faf97ee generated code and doc
Signed-off-by: zhucan <zhucan.k8s@gmail.com>
2022-04-05 11:36:24 +08:00
Qiming Teng
37d5e9292e Generated files 2022-04-02 10:16:51 -07:00
Kubernetes Prow Robot
14cc997d03
Merge pull request #107178 from SataQiu/deprecated-20211222
kube-controller-manager: remove unused option deployment-controller-sync-period for deployment controller
2022-04-01 21:22:10 -07:00
ravisantoshgudimetla
9eb544e78a [sts] Generated: Make available replicas optional 2022-04-01 11:54:02 -04:00
Jordan Liggitt
2b52a1e509 Drop enum tag from certificate request condition 2022-03-31 12:31:47 -04:00
Maciej Wyrzuc
1108bed763 Revert "Field status.hostIPs added for Pod (#101566)"
This reverts commit 61b3c028ba.
2022-03-31 12:39:45 +00:00
Sarvesh Rangnekar
b9792a9dae
Introduce APIs to support multiple ClusterCIDRs (#108290)
* Introduce networking/v1alpha1 api, ClusterCIDRConfig type

Introduce networking/v1alpha1 api group.

Add `ClusterCIDRConfig` type to networking/v1alpha1 api group, this type
will enable the NodeIPAM controller to support multiple ClusterCIDRs.

* Change ClusterCIDRConfig.NodeSelector type in api

* Fix review comments for API

* Update ClusterCIDRConfig API Spec

Introduce PerNodeHostBits field, remove PerNodeMaskSize
2022-03-30 19:39:00 -07:00
SataQiu
9ac1b4b68f remove unused option deployment-controller-sync-period for deployment controller 2022-03-30 20:00:53 +08:00
Kubernetes Prow Robot
9fe98d8bab
Merge pull request #108736 from NetApp/any-volume-data-source-beta
Update AnyVolumeDataSource feature gate to beta
2022-03-29 17:35:25 -07:00
Kubernetes Prow Robot
1cddd38956
Merge pull request #108256 from bertinatto/kubelet-attach-detach
Update EnableControllerAttachDetach documentation
2022-03-29 17:34:49 -07:00
Kubernetes Prow Robot
0f2300575c
Merge pull request #108032 from deejross/kep3140-cronjob-timezone
KEP 3140: TimeZone support for CronJob
2022-03-29 17:34:20 -07:00
Kubernetes Prow Robot
dd1e43332a
Merge pull request #107476 from alculquicondor/job-ready
Graduate JobReadyPods to beta
2022-03-29 16:08:06 -07:00
Fabio Bertinatto
8150cf8d96 Update EnableControllerAttachDetach documentation
The kubelet does not support attach/detach operations on CSI volumes. As
a result, CSI volumes rely on the Attach/Detach controller enabled.
2022-03-29 16:20:06 -03:00
Shiming Zhang
61b3c028ba
Field status.hostIPs added for Pod (#101566)
* Add FeatureGate PodHostIPs

* Add HostIPs field and update PodIPs field

* Types conversion

* Add dropDisabledStatusFields

* Add HostIPs for kubelet

* Add fuzzer for PodStatus

* Add status.hostIPs in ConvertDownwardAPIFieldLabel

* Add status.hostIPs in validEnvDownwardAPIFieldPathExpressions

* Downward API support for status.hostIPs

* Add DownwardAPI validation for status.hostIPs

* Add e2e to check that hostIPs works

* Add e2e to check that Downward API works

* Regenerate
2022-03-29 11:46:07 -07:00
Ben Swartzlander
08948ca779 Update AnyVolumeDataSource feature gate to beta
Default to enabled
Fix validation of null-updates/patches when the "old" PVC was persisted by
an older version. Add upgrade integration tests written by liggitt.
2022-03-29 13:39:48 -04:00
Ross Peoples
d26e6cca72 make update after timeZone support for CronJob 2022-03-29 11:40:46 -05:00
Aldo Culquicondor
8c00f510ef Graduate JobReadyPods to beta
Set podUpdateBatchPeriod to 1s

Change-Id: I8a10fd8f8559adad9df179b664b8c82851607855
2022-03-29 10:07:41 -04:00
Kubernetes Prow Robot
1ea07d482a
Merge pull request #108126 from sanposhiho/doc/generatedname
fix the doc about generateName conflict
2022-03-29 02:58:47 -07:00
Ricardo Katz
42a1201082
Implementation on Network Policy Status (#107963)
* Implement status subresource in NetworkPolicy

* add NetworkPolicyStatus generated files

* Fix comments in netpol status review
2022-03-29 01:52:48 -07:00
Kubernetes Prow Robot
f85ff4b574
Merge pull request #82162 from krmayankk/maxun
API: maxUnavailable for StatefulSet
2022-03-28 17:57:10 -07:00
Kubernetes Prow Robot
0bbb617412
Merge pull request #93438 from tallclair/audit-ips
Document the sources for the sourceIPs audit log field
2022-03-28 15:23:41 -07:00
Kubernetes Prow Robot
6c1b7d9543
Merge pull request #108713 from jiahuif-forks/feature/openapi/intstr-any-of
use oneOf for IntOrString and Quantity in OpenAPI v3
2022-03-28 13:01:21 -07:00
Kubernetes Prow Robot
3a3c9bc5c0
Merge pull request #108282 from sftim/20220222_reword_types_container_runtime_neutral
Update types to be neutral about container runtime
2022-03-28 13:01:08 -07:00
Mayank Kumar
357203d992 API: maxUnavailable for StatefulSet 2022-03-28 11:01:05 -07:00
Tim Bannister
de55f39f65
Update generated docs 2022-03-28 17:41:29 +01:00
Jiahui Feng
a442293a3c generated: make update 2022-03-28 09:19:45 -07:00
Surya Seetharaman
7d480d8ac8 Enable local traffic detection using the interface options
This commit adds the framework for the new local detection
modes BridgeInterface and InterfaceNamePrefix to work.

Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
2022-03-25 20:06:12 +01:00
Kubernetes Prow Robot
68cf2a60c6
Merge pull request #108847 from adisky/update-credential-api
Move kubelet credential provider feature flag to beta and update the api's
2022-03-24 20:05:53 -07:00
Aditi Sharma
ed16ef2206 Move feature flag credential provider to beta
Signed-off-by: Aditi Sharma <adi.sky17@gmail.com>
2022-03-24 22:43:38 +05:30
Kubernetes Prow Robot
96aa41513e
Merge pull request #107859 from ravisantoshgudimetla/promote-PodOS-beta
Promote PodOS field to beta
2022-03-24 00:14:41 -07:00
Kubernetes Prow Robot
bb67b5e9e8
Merge pull request #108717 from lavalamp/remove-clustername
Remove ClusterName
2022-03-23 22:31:33 -07:00
Kubernetes Prow Robot
8168c68bb6
Merge pull request #108522 from SergeyKanzhelev/grpcToBeta
promote grpcProbes to beta
2022-03-23 22:31:05 -07:00
Kubernetes Prow Robot
f97825e1ce
Merge pull request #107395 from alculquicondor/indexed-job
Graduate IndexedJob to stable
2022-03-23 17:44:41 -07:00
Kubernetes Prow Robot
3a2509b60e
Merge pull request #108841 from tengqm/fix-kubeletcfg-docstring
Fix doc strings for kubelet config APIs
2022-03-23 13:22:27 -07:00
Daniel Smith
fad4ba2a34 generated files 2022-03-23 17:59:55 +00:00
Kubernetes Prow Robot
24a71990e0
Merge pull request #108445 from pohly/storage-capacity-ga
storage capacity GA
2022-03-23 08:06:21 -07:00
Kensei Nakada
0865b9eca3 fix the doc about generateName conflict 2022-03-23 01:08:37 +00:00
Kubernetes Prow Robot
0053a0e0fd
Merge pull request #108782 from cfryanr/expirationseconds_conformance
Promote CertificateSigningRequest's Spec.ExpirationSeconds field to GA
2022-03-21 20:19:55 -07:00
Qiming Teng
629b7aef51 Update generated file(s) 2022-03-21 22:12:35 +08:00
Ryan Richard
e29ac0f8be Promote CertificateSigningRequest's Spec.ExpirationSeconds field to GA
Remove the comment "As of v1.22, this field is beta and is controlled
via the CSRDuration feature gate" from the expirationSeconds field's
godoc.

Mark the "CSRDuration" feature gate as GA in 1.24, lock its value to
"true", and remove the various logic which handled when the gate was
"false".

Update conformance test to check that the CertificateSigningRequest's
Spec.ExpirationSeconds field is stored, but do not check if the field
is honored since this functionality is optional.
2022-03-18 14:41:43 -07:00
Kubernetes Prow Robot
b9817c801b
Merge pull request #108616 from margocrawf/delete-execcredential-v1alpha1
Remove v1alpha1 of the execcredential
2022-03-18 13:57:56 -07:00
Margo Crawford
38cbe6d7fe Generated code for deleting exec credential v1alpha1 api
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-18 10:16:58 -07:00
Kubernetes Prow Robot
a504daa048
Merge pull request #108441 from pacoxu/pod-overload-ga
mark PodOverhead to GA in v1.24; remove in v1.26
2022-03-17 06:33:22 -07:00
Kubernetes Prow Robot
41b29e6542
Merge pull request #99287 from anfernee/clientip
Add HNS Load Balancer Healthchecks for ExternalTrafficPolicy: Local
2022-03-16 22:57:18 -07:00
Paco Xu
acd696266e mark PodOverhead to GA in v1.24; remove in v1.26 2022-03-17 09:30:14 +08:00
Jefftree
8a1d5947ad googleapis/gnostic -> google/gnostic 2022-03-15 20:44:03 -07:00
Jiahui Feng
c9dd7bdc9d generated: make update 2022-03-15 12:07:21 -07:00
Aldo Culquicondor
2c5d0a273c Graduate IndexedJob to stable
- Lock feature gate to true and schedule for deletion in 1.26
- Remove checks on feature gate
- Graduate E2E test to Conformance

Change-Id: I6814819d318edaed5c86dae4055f4b050a4d39fd
2022-03-15 13:41:06 -04:00
Sergey Kanzhelev
792a37e2f1 promote grpcProbes to beta 2022-03-14 22:49:38 +00:00
Patrick Ohly
b1aefb9b90 storage capacity: generated files 2022-03-14 20:05:45 +01:00
Yongkun Gui
78a507b256 Fix health check from Google's Load Balancer
This change adds 2 options for windows:
--forward-healthcheck-vip: If true forward service VIP for health check
port
--root-hnsendpoint-name: The name of the hns endpoint name for root
namespace attached to l2bridge, default is cbr0

When --forward-healthcheck-vip is set as true and winkernel is used,
kube-proxy will add an hns load balancer to forward health check request
that was sent to lb_vip:healthcheck_port to the node_ip:healthcheck_port.
Without this forwarding, the health check from google load balancer will
fail, and it will stop forwarding traffic to the windows node.

This change fixes the following 2 cases for service:
- `externalTrafficPolicy: Cluster` (default option): healthcheck_port is
10256 for all services. Without this fix, all traffic won't be directly
forwarded to windows node. It will always go through a linux node and
get forwarded to windows from there.
- `externalTrafficPolicy: Local`: different healthcheck_port for each
service that is configured as local. Without this fix, this feature
won't work on windows node at all. This feature preserves client ip
that tries to connect to their application running in windows pod.

Change-Id: If4513e72900101ef70d86b91155e56a1f8c79719
2022-03-11 22:34:59 -08:00
Tim Allclair
a67b32ce9c generated files 2022-03-10 17:08:49 -08:00
sanposhiho
3b13e9445a Add MinDomains API to TopologySpreadConstraints field 2022-03-09 20:57:12 +09:00
carlory
fcc282f9f2 remove audit.k8s.io/v1[alpha|beta]1 versions 2022-03-08 14:37:26 +08:00
ravisantoshgudimetla
8a8cd18b4f Generated: PodOS field to beta 2022-03-02 14:49:47 -05:00
Tim Hockin
f9e19fc83e Add the last zz_generated.openapi.go file
We had 4 of 5 checked in.
2022-02-28 10:17:54 -08:00
Joe Finney
48fc03b8f2 Remove zz_generated.openapi.go. 2017-04-25 17:41:33 -07:00
Kubernetes Submit Queue
ca8f1bcf3d Merge pull request #44519 from thockin/remove-deprecated-public-ips
Automatic merge from submit-queue

Remove deprecatedPublicIPs field
2017-04-17 12:11:00 -07:00
Tim Hockin
9153bfa911 Remove deprecatedPublicIPs field 2017-04-15 13:16:05 -07:00
Chao Xu
d4850b6c2b move pkg/api/v1/helpers.go to subpackage 2017-04-14 14:25:11 -07:00
Maciej Szulik
fda5010948 Generated changes for docs in batch types.go 2017-04-13 14:15:19 +02:00
Kubernetes Submit Queue
868eb745ab Merge pull request #42663 from soltysh/37166_followup
Automatic merge from submit-queue

Add default information to CronJobSpec

This is requested followup to https://github.com/kubernetes/kubernetes/pull/41890

@smarterclayton @janetkuo ptal
2017-04-13 03:23:26 -07:00
Dan Winship
11471e965d Regenerate files 2017-04-10 09:00:48 -04:00
Maciej Szulik
6e9658ab55 Generated changes for defaults updates 2017-04-10 14:02:11 +02:00
Kubernetes Submit Queue
357af07718 Merge pull request #44197 from Random-Liu/dockershim-only-mode
Automatic merge from submit-queue

Add dockershim only mode

This PR added a `experimental-dockershim` hidden flag in kubelet to run dockershim only.

We introduce this flag mainly for cri validation test. In the future we should compile dockershim into another binary.

@yujuhong @feiskyer @xlgao-zju 
/cc @kubernetes/sig-node-pr-reviews
2017-04-09 19:27:51 -07:00
Kubernetes Submit Queue
6e3bd081d5 Merge pull request #43892 from bsalamat/sched_conf1
Automatic merge from submit-queue

Scheduler can recieve its policy configuration from a ConfigMap

**What this PR does / why we need it**: This PR adds the ability to scheduler to receive its policy configuration from a ConfigMap. Before this, scheduler could receive its policy config only from a file. The logic to watch the ConfigMap object will be added in a subsequent PR.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #

**Special notes for your reviewer**:

**Release note**:

```Add the ability to the default scheduler to receive its policy configuration from a ConfigMap object.
```
2017-04-08 23:19:43 -07:00
Kubernetes Submit Queue
d043e20feb Merge pull request #44121 from mbohlool/patch
Automatic merge from submit-queue (batch tested with PRs 43777, 44121)

Add patchMergeKey and patchStrategy  support to OpenAPI

Support generating Open API extensions for strategic merge patch tags in go struct tags
Support `patchStrategy` and `patchMergeKey`.
Also support checking if the Open API extension and struct tags match.

```release-note
Support generating Open API extensions for strategic merge patch tags in go struct tags
```

cc: @pwittrock @ymqytw 

(Description mostly copied from #43833)
2017-04-07 20:01:10 -07:00
Bobby Salamat
7edc2498ea Generated files 2017-04-07 17:06:23 -07:00
Bobby Salamat
d1bc320b44 Scheduler can recieve its policy configuration from a ConfigMap 2017-04-07 17:03:12 -07:00
Random-Liu
327fc270d7 Add dockershim only mode 2017-04-07 16:43:57 -07:00
ymqytw
5f60dcd90b autogen 2017-04-07 15:44:33 -07:00
Kubernetes Submit Queue
98a4c6ba7f Merge pull request #43396 from rootfs/iscsi-chap
Automatic merge from submit-queue (batch tested with PRs 44119, 42538, 43802, 42336, 43396)

iSCSI CHAP support

**What this PR does / why we need it**:
To support CHAP authentication in a multi-tenant setup
**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #

**Special notes for your reviewer**:

**Release note**:

```release-note
Support iSCSI CHAP authentication
```
2017-04-07 14:09:42 -07:00
Haoran Wang
251abaa72f generated 2017-04-05 22:40:51 +08:00
Huamin Chen
777eb32e91 generated files
Signed-off-by: Huamin Chen <hchen@redhat.com>
2017-04-05 12:46:42 +00:00
Huamin Chen
4b7e084a8e add iSCSI CHAP API
Signed-off-by: Huamin Chen <hchen@redhat.com>
2017-04-05 12:43:48 +00:00
Chris Hupman
dc4b8e3496 Fixed inaccurate comments for Secret and ConfigMap
Fixes #42203

ran documentation update scripts in hack folder

Signed-off-by: Chris Hupman <chupman@us.ibm.com>
2017-04-04 19:42:08 +00:00