tomplus/kubernetes_asyncio (kubernetes_asyncio)
### [`v31.1.0`](https://redirect.github.com/tomplus/kubernetes_asyncio/blob/HEAD/CHANGELOG.md#v3110)
[Compare Source](https://redirect.github.com/tomplus/kubernetes_asyncio/compare/30.3.1...31.1.0)
- Added `load_config` function ([#331](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/331), [@james-mchugh](https://redirect.github.com/james-mchugh))
- Watch() retries 410 errors ([#327](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/327), [@tomplus](https://redirect.github.com/tomplus))
- Pod exec enhancements ([#328](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/328), [@olivier-matz-6wind](https://redirect.github.com/olivier-matz-6wind))
- Fix content-type detection for object sending as patch ([#334](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/334), [@tomplus](https://redirect.github.com/tomplus))
- Fix stopping Watch for logs and events with timeout ([#330](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/330), [@tomplus](https://redirect.github.com/tomplus))
##### API Change
- The resource/v1alpha3.ResourceSliceList filed which should have been named "metadata" but was instead named "listMeta" is now properly "metadata". ([kubernetes/kubernetes#126761](https://redirect.github.com/kubernetes/kubernetes/pull/126761), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery]
- 'ACTION REQUIRED: The Dynamic Resource Allocation (DRA) driver's DaemonSet
must be deployed with a service account that enables writing ResourceSlice
and reading ResourceClaim objects.'
([kubernetes/kubernetes#125163](https://redirect.github.com/kubernetes/kubernetes/pull/125163), [@pohly](https://redirect.github.com/pohly)) \[SIG Auth, Node and Testing]
- Add UserNamespaces field to NodeRuntimeHandlerFeatures ([kubernetes/kubernetes#126034](https://redirect.github.com/kubernetes/kubernetes/pull/126034), [@sohankunkerkar](https://redirect.github.com/sohankunkerkar)) \[SIG API Machinery, Apps and Node]
- Added Coordinated Leader Election as Alpha under the `CoordinatedLeaderElection` feature gate. With the feature enabled, the control plane can use LeaseCandidate objects (coordination.k8s.io/v1alpha1 API group) to participate in a leader election and let the kube-apiserver select the best instance according to some strategy. ([kubernetes/kubernetes#124012](https://redirect.github.com/kubernetes/kubernetes/pull/124012), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Release, Scheduling and Testing]
- Added a `.status.features.supplementalGroupsPolicy` field to Nodes. The field is true when the feature is implemented in the CRI implementation (KEP-3619). ([kubernetes/kubernetes#125470](https://redirect.github.com/kubernetes/kubernetes/pull/125470), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps, Node and Testing]
- Added an `allocatedResourcesStatus` to each container status to indicate the health status of devices exposed by the device plugin. ([kubernetes/kubernetes#126243](https://redirect.github.com/kubernetes/kubernetes/pull/126243), [@SergeyKanzhelev](https://redirect.github.com/SergeyKanzhelev)) \[SIG API Machinery, Apps, Node and Testing]
- Added support to the kube-proxy nodePortAddresses / --nodeport-addresses option to
accept the value "primary", meaning to only listen for NodePort connections
on the node's primary IPv4 and/or IPv6 address (according to the Node object).
This is strongly recommended, if you were not previously using
\--nodeport-addresses, to avoid surprising behavior.
(This behavior is enabled by default with the nftables backend; you would
need to explicitly request `--nodeport-addresses 0.0.0.0/0,::/0` there to get
the traditional "listen on all interfaces" behavior.) ([kubernetes/kubernetes#123105](https://redirect.github.com/kubernetes/kubernetes/pull/123105), [@danwinship](https://redirect.github.com/danwinship)) \[SIG API Machinery, Network and Windows]
- Added the feature gates `StrictCostEnforcementForVAP` and `StrictCostEnforcementForWebhooks` to enforce the strict cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. ([kubernetes/kubernetes#124675](https://redirect.github.com/kubernetes/kubernetes/pull/124675), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Auth, Node and Testing]
- Changed how the API server handles updates to `.spec.defaultBackend` of Ingress objects.
Server-side apply now considers `.spec.defaultBackend` to be an atomic struct. This means that any field-owner who sets values in that struct (they are mutually exclusive) owns the whole struct. For almost all users this change has no impact; for controllers that want to change the default backend port from number to name (or vice-versa), this makes it easier. ([kubernetes/kubernetes#126207](https://redirect.github.com/kubernetes/kubernetes/pull/126207), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery]
- Component-base/logs: when compiled with Go >= 1.21, component-base will automatically configure the slog default logger together with initializing klog. ([kubernetes/kubernetes#120696](https://redirect.github.com/kubernetes/kubernetes/pull/120696), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Storage and Testing]
- CustomResourceDefinition objects created with non-empty `caBundle` fields which are invalid or do not contain any certificates will not appear in discovery or serve endpoints until a valid `caBundle` is provided. Updates to CustomResourceDefinition are no longer allowed to transition a valid `caBundle` field to an invalid `caBundle` field, because this breaks serving of the existing CustomResourceDefinition. ([kubernetes/kubernetes#124061](https://redirect.github.com/kubernetes/kubernetes/pull/124061), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery]
- Dynamic Resource Allocation (DRA): Added a feature so the number of ResourceClaim objects can be limited per namespace and by the number of devices requested through a specific class via the v1.ResourceQuota mechanism. ([kubernetes/kubernetes#120611](https://redirect.github.com/kubernetes/kubernetes/pull/120611), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Etcd, Node, Release, Scheduling and Testing]
- Dynamic Resource Allocation (DRA): client-side validation of a ResourceHandle would have accepted a missing DriverName, whereas server-side validation then would have raised an error. ([kubernetes/kubernetes#124075](https://redirect.github.com/kubernetes/kubernetes/pull/124075), [@pohly](https://redirect.github.com/pohly))
- Dynamic Resource Allocation (DRA): in the `pod.spec.recourceClaims` array, the `source` indirection is no longer necessary. Instead of e.g. `source: resourceClaimTemplateName: my-template`, one can write `resourceClaimTemplateName: my-template`. ([kubernetes/kubernetes#125116](https://redirect.github.com/kubernetes/kubernetes/pull/125116), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]
- Enhanced the Dynamic Resource Allocation (DRA) with an updated version of the resource.k8s.io API group. The primary user-facing type remains the ResourceClaim, however significant changes have been made, resulting in the new version, v1alpha3, which is not compatible with the previous version. ([kubernetes/kubernetes#125488](https://redirect.github.com/kubernetes/kubernetes/pull/125488), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Etcd, Node, Release, Scheduling, Storage and Testing]
- Fixed a 1.30.0 regression in OpenAPI descriptions of the `imagePullSecrets` and
`hostAliases` fields to mark the fields used as keys in those lists as either defaulted
or required. ([kubernetes/kubernetes#124553](https://redirect.github.com/kubernetes/kubernetes/pull/124553), [@pmalek](https://redirect.github.com/pmalek))
- Fixed a 1.30.0 regression in openapi descriptions of `PodIP.IP` and `HostIP.IP` fields to mark the fields used as keys in those lists as required. ([kubernetes/kubernetes#126057](https://redirect.github.com/kubernetes/kubernetes/pull/126057), [@thockin](https://redirect.github.com/thockin))
- Fixed a bug in the API server where empty collections of ValidatingAdmissionPolicies did not have an `items` field. ([kubernetes/kubernetes#124568](https://redirect.github.com/kubernetes/kubernetes/pull/124568), [@xyz-li](https://redirect.github.com/xyz-li)) \[SIG API Machinery]
- Fixed a deep copy issue when retrieving the controller reference. ([kubernetes/kubernetes#124116](https://redirect.github.com/kubernetes/kubernetes/pull/124116), [@HiranmoyChowdhury](https://redirect.github.com/HiranmoyChowdhury)) \[SIG API Machinery and Release]
- Fixed code-generator client-gen to work with `api/v1`-like package structure. ([kubernetes/kubernetes#125162](https://redirect.github.com/kubernetes/kubernetes/pull/125162), [@sttts](https://redirect.github.com/sttts)) \[SIG API Machinery and Apps]
- Fixed incorrect "v1 Binding is deprecated in v1.6+" warning in kube-scheduler log. ([kubernetes/kubernetes#125540](https://redirect.github.com/kubernetes/kubernetes/pull/125540), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery]
- Fixed the comment for the Job's managedBy field. ([kubernetes/kubernetes#124793](https://redirect.github.com/kubernetes/kubernetes/pull/124793), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery and Apps]
- Fixed the documentation for the default value of the `procMount` entry in `securityContext` within a Pod.
The documentation was previously using the name of the internal variable `DefaultProcMount`, rather than the actual value, "Default". ([kubernetes/kubernetes#125782](https://redirect.github.com/kubernetes/kubernetes/pull/125782), [@aborrero](https://redirect.github.com/aborrero)) \[SIG Apps and Node]
- Graduate PodDisruptionConditions to GA and lock ([kubernetes/kubernetes#125461](https://redirect.github.com/kubernetes/kubernetes/pull/125461), [@mimowo](https://redirect.github.com/mimowo)) \[SIG Apps, Node, Scheduling and Testing]
- Graduated MatchLabelKeys/MismatchLabelKeys feature in PodAffinity/PodAntiAffinity to Beta. ([kubernetes/kubernetes#123638](https://redirect.github.com/kubernetes/kubernetes/pull/123638), [@sanposhiho](https://redirect.github.com/sanposhiho)) \[SIG API Machinery, Apps, Scheduling and Testing]
- Graduated `JobPodFailurePolicy` to GA and locked it to it's default. ([kubernetes/kubernetes#125442](https://redirect.github.com/kubernetes/kubernetes/pull/125442), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery, Apps, Scheduling and Testing]
- Graduated the Job `successPolicy` field to beta.
The new reason label, "SuccessPolicy" and "CompletionsReached" are added to the "jobs_finished_total" metric.
Additionally, if you enable the `JobSuccessPolicy` feature gate, the Job gets "CompletionsReached" reason for the "SuccessCriteriaMet" and "Complete" condition type
when the number of succeeded Job Pods (`.status.succeeded`) reached the desired completions (`.spec.completions`). ([kubernetes/kubernetes#126067](https://redirect.github.com/kubernetes/kubernetes/pull/126067), [@tenzen-y](https://redirect.github.com/tenzen-y)) \[SIG API Machinery, Apps and Testing]
- Graduated the `DisableNodeKubeProxyVersion` feature gate to beta. By default, the kubelet no longer attempts to set the `.status.kubeProxyVersion` field for its associated Node. ([kubernetes/kubernetes#123845](https://redirect.github.com/kubernetes/kubernetes/pull/123845), [@HirazawaUi](https://redirect.github.com/HirazawaUi)) \[SIG API Machinery, Cloud Provider, Network, Node and Testing]
- Improved scheduling performance when many nodes, and prefilter returned 1-2 nodes (e.g. daemonset)
For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status. ([kubernetes/kubernetes#125197](https://redirect.github.com/kubernetes/kubernetes/pull/125197), [@gabesaba](https://redirect.github.com/gabesaba))
- Introduced a new boolean kubelet flag `--fail-cgroupv1`. ([kubernetes/kubernetes#126031](https://redirect.github.com/kubernetes/kubernetes/pull/126031), [@harche](https://redirect.github.com/harche)) \[SIG API Machinery and Node]
- K8s.io/apimachinery/pkg/util/runtime: Added support for new calls to handle panics and errors in the context where they occur. `PanicHandlers` and `ErrorHandlers` now must accept a context parameter for that. Log output is structured instead of unstructured. ([kubernetes/kubernetes#121970](https://redirect.github.com/kubernetes/kubernetes/pull/121970), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery and Instrumentation]
- KEP-1880: Users of the new feature to add multiple service CIDR will use by default a dual-write strategy on the new ClusterIP allocators to avoid the problem of possible duplicate IPs allocated to Services when running skewed kube-apiservers using different allocators. They can opt-out of this behavior by enabled the feature gate DisableAllocatorDualWrite. ([kubernetes/kubernetes#122047](https://redirect.github.com/kubernetes/kubernetes/pull/122047), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, Instrumentation and Testing]
- Kube-apiserver: Added Alpha features to allow API server authz to check the context of requests:
- The `AuthorizeWithSelectors` feature gate enables including field and label selector information from requests in webhook authorization calls.
- The `AuthorizeNodeWithSelectors` feature gate changes node authorizer behavior to limit requests from node API clients, so that each Node can only get / list / watch its own Node API object, and can also only get / list / watch Pod API objects bound to that node. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or obtain broader read access independent of the node authorizer. ([kubernetes/kubernetes#125571](https://redirect.github.com/kubernetes/kubernetes/pull/125571), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery, Auth, Node, Scheduling and Testing]
- Kube-apiserver: ControllerRevision objects are now verified to contain valid JSON data in the `data` field. ([kubernetes/kubernetes#125549](https://redirect.github.com/kubernetes/kubernetes/pull/125549), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery and Apps]
- Kube-apiserver: the `--encryption-provider-config` file is now loaded with strict deserialization, which fails if the config file contains duplicate or unknown fields. This protects against accidentally running with config files that are malformed, mis-indented, or have typos in field names, and getting unexpected behavior. When `--encryption-provider-config-automatic-reload` is used, new encryption config files that contain typos after the kube-apiserver is running are treated as invalid and the last valid config is used. ([kubernetes/kubernetes#124912](https://redirect.github.com/kubernetes/kubernetes/pull/124912), [@enj](https://redirect.github.com/enj)) \[SIG API Machinery and Auth]
- Kube-controller-manager: the `horizontal-pod-autoscaler-upscale-delay` and `horizontal-pod-autoscaler-downscale-delay` flags have been removed (deprecated and non-functional since v1.12). ([kubernetes/kubernetes#124948](https://redirect.github.com/kubernetes/kubernetes/pull/124948), [@SataQiu](https://redirect.github.com/SataQiu)) \[SIG API Machinery, Apps and Autoscaling]
- Made kube-proxy Windows service control manager integration (`--windows-service`) configurable in v1alpha1 component configuration via `windowsRunAsService` field. ([kubernetes/kubernetes#126072](https://redirect.github.com/kubernetes/kubernetes/pull/126072), [@aroradaman](https://redirect.github.com/aroradaman)) \[SIG Network and Scalability]
- PersistentVolumeLastPhaseTransitionTime feature is stable and enabled by default. ([kubernetes/kubernetes#124969](https://redirect.github.com/kubernetes/kubernetes/pull/124969), [@RomanBednar](https://redirect.github.com/RomanBednar)) \[SIG API Machinery, Apps, Storage and Testing]
- Promoted `LocalStorageCapacityIsolation` to beta; the behaviour is enabled by default. Within the kubelet, storage capacity isolation is active if the feature gate is enabled and the specific Pod is using a user namespace. ([kubernetes/kubernetes#126014](https://redirect.github.com/kubernetes/kubernetes/pull/126014), [@PannagaRao](https://redirect.github.com/PannagaRao)) \[SIG Apps, Autoscaling, Node, Storage and Testing]
- Promoted `StatefulSetStartOrdinal` to stable. This means `--feature-gates=StatefulSetStartOrdinal=true` are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation. ([kubernetes/kubernetes#125374](https://redirect.github.com/kubernetes/kubernetes/pull/125374), [@pwschuurman](https://redirect.github.com/pwschuurman)) \[SIG API Machinery, Apps and Testing]
- Promoted feature-gate `VolumeAttributesClass` to beta (disabled by default). Users need to enable the feature gate and the `storage.k8s.io/v1beta1` API group to use this feature.
Promoted the VolumeAttributesClass API to beta. ([kubernetes/kubernetes#126145](https://redirect.github.com/kubernetes/kubernetes/pull/126145), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, CLI, Etcd, Storage and Testing]
- Removed deprecated command flags --volume-host-cidr-denylist
and --volume-host-allow-local-loopback from kube-controller-manager.
([kubernetes/kubernetes#124017](https://redirect.github.com/kubernetes/kubernetes/pull/124017), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, Cloud Provider and Storage]
- Removed feature gate `CustomResourceValidationExpressions`. ([kubernetes/kubernetes#126136](https://redirect.github.com/kubernetes/kubernetes/pull/126136), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Cloud Provider and Testing]
- Reverted a [change](https://redirect.github.com/kubernetes/kubernetes/pull/123513) where `ConsistentListFromCache` was moved to beta and enabled by default. ([kubernetes/kubernetes#126139](https://redirect.github.com/kubernetes/kubernetes/pull/126139), [@enj](https://redirect.github.com/enj))
- Revised the Pod API with Alpha support for volumes derived from OCI artifacts. This feature is behind the `ImageVolume` feature gate. ([kubernetes/kubernetes#125660](https://redirect.github.com/kubernetes/kubernetes/pull/125660), [@saschagrunert](https://redirect.github.com/saschagrunert)) \[SIG API Machinery, Apps and Node]
- Supported fine-grained supplemental groups policy (KEP-3619), which enabled
fine-grained control for supplementary groups in the first container processes.
This allows you to choose whether to include groups defined in the container image (/etc/groups)
for the container's primary UID or not. ([kubernetes/kubernetes#117842](https://redirect.github.com/kubernetes/kubernetes/pull/117842), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps and Node]
- The (alpha) nftables mode of kube-proxy now requires version 1.0.1 or later
of the nft command-line, and kernel 5.13 or later. (For testing/development
purposes, you can use older kernels, as far back as 5.4, if you set the
`nftables.skipKernelVersionCheck` option in the kube-proxy config, but this is not
recommended in production since it may cause problems with other nftables
users on the system.) ([kubernetes/kubernetes#124152](https://redirect.github.com/kubernetes/kubernetes/pull/124152), [@danwinship](https://redirect.github.com/danwinship)) \[SIG Network]
- To enhance usability and developer experience, CRD validation rules now support direct use of (CEL) reserved keywords as field names in object validation expressions for existing expressions in storage, will fully support runtime in next release for compatibility concern. ([kubernetes/kubernetes#126188](https://redirect.github.com/kubernetes/kubernetes/pull/126188), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery and Testing]
- Updated the feature MultiCIDRServiceAllocator to beta (disabled by default). Users need to enable the feature gate and the networking v1beta1 group to be able to use this new feature, that allows to dynamically reconfigure Service CIDR ranges. ([kubernetes/kubernetes#125021](https://redirect.github.com/kubernetes/kubernetes/pull/125021), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, CLI, Etcd, Instrumentation, Network and Testing]
- Use omitempty for optional Job Pod Failure Policy fields. ([kubernetes/kubernetes#126046](https://redirect.github.com/kubernetes/kubernetes/pull/126046), [@mimowo](https://redirect.github.com/mimowo))
- User can choose a different static policy option `SpreadPhysicalCPUsPreferredOption` to spread cpus across physical cpus for some specific applications ([kubernetes/kubernetes#123733](https://redirect.github.com/kubernetes/kubernetes/pull/123733), [@Jeffwan](https://redirect.github.com/Jeffwan)) \[SIG Node]
- When the featuregate AnonymousAuthConfigurableEndpoints is enabled users can update the AuthenticationConfig file with endpoints for with anonymous requests are alllowed. ([kubernetes/kubernetes#124917](https://redirect.github.com/kubernetes/kubernetes/pull/124917), [@vinayakankugoyal](https://redirect.github.com/vinayakankugoyal)) \[SIG API Machinery, Auth, Cloud Provider, Node and Testing]
- Move ConsistentListFromCache feature flag to Beta and enable it by default ([kubernetes/kubernetes#126469](https://redirect.github.com/kubernetes/kubernetes/pull/126469), [@serathius](https://redirect.github.com/serathius)) \[SIG API Machinery]
- Add Coordinated Leader Election as alpha under the CoordinatedLeaderElection feature gate. With the feature enabled, the control plane can use LeaseCandidate objects (coordination.k8s.io/v1alpha1 API group) to participate in a leader election and let the kube-apiserver select the best instance according to some strategy. ([kubernetes/kubernetes#124012](https://redirect.github.com/kubernetes/kubernetes/pull/124012), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Release, Scheduling and Testing]
- Add an AllocatedResourcesStatus to each container status to indicate the health status of devices exposed by the device plugin. ([kubernetes/kubernetes#126243](https://redirect.github.com/kubernetes/kubernetes/pull/126243), [@SergeyKanzhelev](https://redirect.github.com/SergeyKanzhelev)) \[SIG API Machinery, Apps, Node and Testing]
- Added Node.Status.Features.SupplementalGroupsPolicy field which is set to true when the feature is implemented in the CRI implementation (KEP-3619) ([kubernetes/kubernetes#125470](https://redirect.github.com/kubernetes/kubernetes/pull/125470), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps, Node and Testing]
- CustomResourceDefinition objects created with non-empty `caBundle` fields which are invalid or do not contain any certificates will not appear in discovery or serve endpoints until a valid `caBundle` is provided. Updates to CustomResourceDefinition are no longer allowed to transition a valid `caBundle` field to an invalid `caBundle` field. ([kubernetes/kubernetes#124061](https://redirect.github.com/kubernetes/kubernetes/pull/124061), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery]
- DRA: The DRA driver's daemonset must be deployed with a service account that enables writing ResourceSlice and reading ResourceClaim objects. ([kubernetes/kubernetes#125163](https://redirect.github.com/kubernetes/kubernetes/pull/125163), [@pohly](https://redirect.github.com/pohly)) \[SIG Auth, Node and Testing]
- DRA: new API and several new features ([kubernetes/kubernetes#125488](https://redirect.github.com/kubernetes/kubernetes/pull/125488), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Etcd, Node, Release, Scheduling, Storage and Testing]
- DRA: the number of ResourceClaim objects can be limited per namespace and by the number of devices requested through a specific class via the v1.ResourceQuota mechanism. ([kubernetes/kubernetes#120611](https://redirect.github.com/kubernetes/kubernetes/pull/120611), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Etcd, Node, Release, Scheduling and Testing]
- Fix the documentation for the default value of the procMount entry in the pod securityContext.
The documentation was previously using the name of the internal variable 'DefaultProcMount' rather than the actual value 'Default'. ([kubernetes/kubernetes#125782](https://redirect.github.com/kubernetes/kubernetes/pull/125782), [@aborrero](https://redirect.github.com/aborrero)) \[SIG Apps and Node]
- Fixed a bug in the API server where empty collections of ValidatingAdmissionPolicies did not have an `items` field. ([kubernetes/kubernetes#124568](https://redirect.github.com/kubernetes/kubernetes/pull/124568), [@xyz-li](https://redirect.github.com/xyz-li)) \[SIG API Machinery]
- Graduate the Job SuccessPolicy to Beta.
The new reason label, "SuccessPolicy" and "CompletionsReached" are added to the "jobs_finished_total" metric.
Additionally, If we enable the "JobSuccessPolicy" feature gate, the Job gets "CompletionsReached" reason for the "SuccessCriteriaMet" and "Complete" condition type
when the number of succeeded Job Pods (".status.succeeded") reached the desired completions (".spec.completions"). ([kubernetes/kubernetes#126067](https://redirect.github.com/kubernetes/kubernetes/pull/126067), [@tenzen-y](https://redirect.github.com/tenzen-y)) \[SIG API Machinery, Apps and Testing]
- Introduce a new boolean kubelet flag --fail-cgroupv1 ([kubernetes/kubernetes#126031](https://redirect.github.com/kubernetes/kubernetes/pull/126031), [@harche](https://redirect.github.com/harche)) \[SIG API Machinery and Node]
- Kube-apiserver: adds an alpha AuthorizeWithSelectors feature that includes field and label selector information from requests in webhook authorization calls; adds an alpha AuthorizeNodeWithSelectors feature that makes the node authorizer limit requests from node API clients to get / list / watch its own Node API object, and to get / list / watch its own Pod API objects. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or grant broader read access independent of the node authorizer. ([kubernetes/kubernetes#125571](https://redirect.github.com/kubernetes/kubernetes/pull/125571), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery, Auth, Node, Scheduling and Testing]
- Kube-proxy Windows service control manager integration(--windows-service) is now configurable in v1alpha1 component configuration via `WindowsRunAsService` field ([kubernetes/kubernetes#126072](https://redirect.github.com/kubernetes/kubernetes/pull/126072), [@aroradaman](https://redirect.github.com/aroradaman)) \[SIG Network and Scalability]
- Promote LocalStorageCapacityIsolation to beta and enable if user namespace is enabled for the pod ([kubernetes/kubernetes#126014](https://redirect.github.com/kubernetes/kubernetes/pull/126014), [@PannagaRao](https://redirect.github.com/PannagaRao)) \[SIG Apps, Autoscaling, Node, Storage and Testing]
- Promote StatefulSetStartOrdinal to stable. This means `--feature-gates=StatefulSetStartOrdinal=true` are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation ([kubernetes/kubernetes#125374](https://redirect.github.com/kubernetes/kubernetes/pull/125374), [@pwschuurman](https://redirect.github.com/pwschuurman)) \[SIG API Machinery, Apps and Testing]
- Promoted feature-gate `VolumeAttributesClass` to beta (disabled by default). Users need to enable the feature gate and the storage v1beta1 group to use this new feature.
- Promoted API `VolumeAttributesClass` and `VolumeAttributesClassList` to `storage.k8s.io/v1beta1`. ([kubernetes/kubernetes#126145](https://redirect.github.com/kubernetes/kubernetes/pull/126145), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, CLI, Etcd, Storage and Testing]
- Removed feature gate `CustomResourceValidationExpressions`. ([kubernetes/kubernetes#126136](https://redirect.github.com/kubernetes/kubernetes/pull/126136), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Cloud Provider and Testing]
- Revert "Move ConsistentListFromCache feature flag to Beta and enable it by default" ([kubernetes/kubernetes#126139](https://redirect.github.com/kubernetes/kubernetes/pull/126139), [@enj](https://redirect.github.com/enj)) \[SIG API Machinery]
- Revised the Pod API with alpha support for volumes derived from OCI artefacts.
This feature is behind the `ImageVolume` feature gate. ([kubernetes/kubernetes#125660](https://redirect.github.com/kubernetes/kubernetes/pull/125660), [@saschagrunert](https://redirect.github.com/saschagrunert)) \[SIG API Machinery, Apps and Node]
- The Ingress.spec.defaultBackend is now considered an atomic struct for the purposes of server-side-apply. This means that any field-owner who sets values in that struct (they are mutually exclusive) owns the whole struct. For almost all users this change has no impact. For controllers which want to change port from number to name (or vice-versa), this makes it easier. ([kubernetes/kubernetes#126207](https://redirect.github.com/kubernetes/kubernetes/pull/126207), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery]
- To enhance usability and developer experience, CRD validation rules now support direct use of (CEL) reserved keywords as field names in object validation expressions for existing expressions in storage, will fully support runtime in next release for compatibility concern. ([kubernetes/kubernetes#126188](https://redirect.github.com/kubernetes/kubernetes/pull/126188), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery and Testing]
- Add UserNamespaces field to NodeRuntimeHandlerFeatures ([kubernetes/kubernetes#126034](https://redirect.github.com/kubernetes/kubernetes/pull/126034), [@sohankunkerkar](https://redirect.github.com/sohankunkerkar)) \[SIG API Machinery, Apps and Node]
- Fixes a 1.30.0 regression in openapi descriptions of PodIP.IP and HostIP.IP fields to mark the fields used as keys in those lists as required. ([kubernetes/kubernetes#126057](https://redirect.github.com/kubernetes/kubernetes/pull/126057), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery]
- Graduate JobPodFailurePolicy to GA and lock ([kubernetes/kubernetes#125442](https://redirect.github.com/kubernetes/kubernetes/pull/125442), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery, Apps, Scheduling and Testing]
- Graduate PodDisruptionConditions to GA and lock ([kubernetes/kubernetes#125461](https://redirect.github.com/kubernetes/kubernetes/pull/125461), [@mimowo](https://redirect.github.com/mimowo)) \[SIG Apps, Node, Scheduling and Testing]
- PersistentVolumeLastPhaseTransitionTime feature is stable and enabled by default. ([kubernetes/kubernetes#124969](https://redirect.github.com/kubernetes/kubernetes/pull/124969), [@RomanBednar](https://redirect.github.com/RomanBednar)) \[SIG API Machinery, Apps, Storage and Testing]
- The (alpha) nftables mode of kube-proxy now requires version 1.0.1 or later
of the nft command-line, and kernel 5.13 or later. (For testing/development
purposes, you can use older kernels, as far back as 5.4, if you set the
`nftables.skipKernelVersionCheck` option in the kube-proxy config, but this is not
recommended in production since it may cause problems with other nftables
users on the system.) ([kubernetes/kubernetes#124152](https://redirect.github.com/kubernetes/kubernetes/pull/124152), [@danwinship](https://redirect.github.com/danwinship)) \[SIG Network]
- Use omitempty for optional Job Pod Failure Policy fields ([kubernetes/kubernetes#126046](https://redirect.github.com/kubernetes/kubernetes/pull/126046), [@mimowo](https://redirect.github.com/mimowo)) \[SIG Apps]
- User can choose a different static policy option `SpreadPhysicalCPUsPreferredOption` to spread cpus across physical cpus for some specific applications ([kubernetes/kubernetes#123733](https://redirect.github.com/kubernetes/kubernetes/pull/123733), [@Jeffwan](https://redirect.github.com/Jeffwan)) \[SIG Node]
- DRA: in the `pod.spec.recourceClaims` array, the `source` indirection is no longer necessary. Instead of e.g. `source: resourceClaimTemplateName: my-template`, one can write `resourceClaimTemplateName: my-template`. ([kubernetes/kubernetes#125116](https://redirect.github.com/kubernetes/kubernetes/pull/125116), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]
- Fix code-generator client-gen to work with `api/v1`-like package structure. ([kubernetes/kubernetes#125162](https://redirect.github.com/kubernetes/kubernetes/pull/125162), [@sttts](https://redirect.github.com/sttts)) \[SIG API Machinery and Apps]
- KEP-1880: Users of the new feature to add multiple service CIDR will use by default a dual-write strategy on the new ClusterIP allocators to avoid the problem of possible duplicate IPs allocated to Services when running skewed kube-apiservers using different allocators. They can opt-out of this behavior by enabled the feature gate DisableAllocatorDualWrite ([kubernetes/kubernetes#122047](https://redirect.github.com/kubernetes/kubernetes/pull/122047), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, Instrumentation and Testing]
- Kube-apiserver: ControllerRevision objects are now verified to contain valid JSON data in the `data` field. ([kubernetes/kubernetes#125549](https://redirect.github.com/kubernetes/kubernetes/pull/125549), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery and Apps]
- Update the feature MultiCIDRServiceAllocator to beta (disabled by default). Users need to enable the feature gate and the networking v1beta1 group to be able to use this new feature, that allows to dynamically reconfigure Service CIDR ranges. ([kubernetes/kubernetes#125021](https://redirect.github.com/kubernetes/kubernetes/pull/125021), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, CLI, Etcd, Instrumentation, Network and Testing]
- When the featuregate AnonymousAuthConfigurableEndpoints is enabled users can update the AuthenticationConfig file with endpoints for with anonymous requests are alllowed. ([kubernetes/kubernetes#124917](https://redirect.github.com/kubernetes/kubernetes/pull/124917), [@vinayakankugoyal](https://redirect.github.com/vinayakankugoyal)) \[SIG API Machinery, Auth, Cloud Provider, Node and Testing]
- Fixed incorrect "v1 Binding is deprecated in v1.6+" warning in kube-scheduler log. ([kubernetes/kubernetes#125540](https://redirect.github.com/kubernetes/kubernetes/pull/125540), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery]
- Added the feature gates `StrictCostEnforcementForVAP` and `StrictCostEnforcementForWebhooks` to enforce the strct cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. ([kubernetes/kubernetes#124675](https://redirect.github.com/kubernetes/kubernetes/pull/124675), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Auth, Node and Testing]
- Component-base/logs: when compiled with Go >= 1.21, component-base will automatically configure the slog default logger together with initializing klog. ([kubernetes/kubernetes#120696](https://redirect.github.com/kubernetes/kubernetes/pull/120696), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Storage and Testing]
- DRA: client-side validation of a ResourceHandle would have accepted a missing DriverName, whereas server-side validation then would have raised an error. ([kubernetes/kubernetes#124075](https://redirect.github.com/kubernetes/kubernetes/pull/124075), [@pohly](https://redirect.github.com/pohly)) \[SIG Apps]
- Fix Deep Copy issue in getting controller reference ([kubernetes/kubernetes#124116](https://redirect.github.com/kubernetes/kubernetes/pull/124116), [@HiranmoyChowdhury](https://redirect.github.com/HiranmoyChowdhury)) \[SIG API Machinery and Release]
- Fix the comment for the Job's managedBy field ([kubernetes/kubernetes#124793](https://redirect.github.com/kubernetes/kubernetes/pull/124793), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery and Apps]
- Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. ([kubernetes/kubernetes#124553](https://redirect.github.com/kubernetes/kubernetes/pull/124553), [@pmalek](https://redirect.github.com/pmalek)) \[SIG API Machinery]
- Graduate MatchLabelKeys/MismatchLabelKeys feature in PodAffinity/PodAntiAffinity to Beta ([kubernetes/kubernetes#123638](https://redirect.github.com/kubernetes/kubernetes/pull/123638), [@sanposhiho](https://redirect.github.com/sanposhiho)) \[SIG API Machinery, Apps, Scheduling and Testing]
- Graduated the `DisableNodeKubeProxyVersion` feature gate to beta. By default, the kubelet no longer attempts to set the `.status.kubeProxyVersion` field for its associated Node. ([kubernetes/kubernetes#123845](https://redirect.github.com/kubernetes/kubernetes/pull/123845), [@HirazawaUi](https://redirect.github.com/HirazawaUi)) \[SIG API Machinery, Cloud Provider, Network, Node and Testing]
- Improved scheduling performance when many nodes, and prefilter returns 1-2 nodes (e.g. daemonset)
For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status ([kubernetes/kubernetes#125197](https://redirect.github.com/kubernetes/kubernetes/pull/125197), [@gabesaba](https://redirect.github.com/gabesaba)) \[SIG Scheduling]
- K8s.io/apimachinery/pkg/util/runtime: new calls support handling panics and errors in the context where they occur. `PanicHandlers` and `ErrorHandlers` now must accept a context parameter for that. Log output is structured instead of unstructured. ([kubernetes/kubernetes#121970](https://redirect.github.com/kubernetes/kubernetes/pull/121970), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery and Instrumentation]
- Kube-apiserver: the `--encryption-provider-config` file is now loaded with strict deserialization, which fails if the config file contains duplicate or unknown fields. This protects against accidentally running with config files that are malformed, mis-indented, or have typos in field names, and getting unexpected behavior. When `--encryption-provider-config-automatic-reload` is used, new encryption config files that contain typos after the kube-apiserver is running are treated as invalid and the last valid config is used. ([kubernetes/kubernetes#124912](https://redirect.github.com/kubernetes/kubernetes/pull/124912), [@enj](https://redirect.github.com/enj)) \[SIG API Machinery and Auth]
- Kube-controller-manager removes deprecated command flags: --volume-host-cidr-denylist and --volume-host-allow-local-loopback ([kubernetes/kubernetes#124017](https://redirect.github.com/kubernetes/kubernetes/pull/124017), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, Cloud Provider and Storage]
- Kube-controller-manager: the `horizontal-pod-autoscaler-upscale-delay` and `horizontal-pod-autoscaler-downscale-delay` flags have been removed (deprecated and non-functional since v1.12) ([kubernetes/kubernetes#124948](https://redirect.github.com/kubernetes/kubernetes/pull/124948), [@SataQiu](https://redirect.github.com/SataQiu)) \[SIG API Machinery, Apps and Autoscaling]
- Support fine-grained supplemental groups policy (KEP-3619), which enables fine-grained control for supplementary groups in the first container processes. You can choose whether to include groups defined in the container image(/etc/groups) for the container's primary uid or not. ([kubernetes/kubernetes#117842](https://redirect.github.com/kubernetes/kubernetes/pull/117842), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps and Node]
- The kube-proxy nodeportAddresses / --nodeport-addresses option now
accepts the value "primary", meaning to only listen for NodePort connections
on the node's primary IPv4 and/or IPv6 address (according to the Node object).
This is strongly recommended, if you were not previously using
\--nodeport-addresses, to avoid surprising behavior.
(This behavior is enabled by default with the nftables backend; you would
need to explicitly request `--nodeport-addresses 0.0.0.0/0,::/0` there to get
the traditional "listen on all interfaces" behavior.) ([kubernetes/kubernetes#123105](https://redirect.github.com/kubernetes/kubernetes/pull/123105), [@danwinship](https://redirect.github.com/danwinship)) \[SIG API Machinery, Network and Windows]
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
[ ] If you want to rebase/retry this PR, check this box
This PR contains the following updates:
30.3.1
->31.1.0
Release Notes
tomplus/kubernetes_asyncio (kubernetes_asyncio)
### [`v31.1.0`](https://redirect.github.com/tomplus/kubernetes_asyncio/blob/HEAD/CHANGELOG.md#v3110) [Compare Source](https://redirect.github.com/tomplus/kubernetes_asyncio/compare/30.3.1...31.1.0) - Added `load_config` function ([#331](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/331), [@james-mchugh](https://redirect.github.com/james-mchugh)) - Watch() retries 410 errors ([#327](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/327), [@tomplus](https://redirect.github.com/tomplus)) - Pod exec enhancements ([#328](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/328), [@olivier-matz-6wind](https://redirect.github.com/olivier-matz-6wind)) - Fix content-type detection for object sending as patch ([#334](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/334), [@tomplus](https://redirect.github.com/tomplus)) - Fix stopping Watch for logs and events with timeout ([#330](https://redirect.github.com/tomplus/kubernetes_asyncio/pull/330), [@tomplus](https://redirect.github.com/tomplus)) ##### API Change - The resource/v1alpha3.ResourceSliceList filed which should have been named "metadata" but was instead named "listMeta" is now properly "metadata". ([kubernetes/kubernetes#126761](https://redirect.github.com/kubernetes/kubernetes/pull/126761), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery] - 'ACTION REQUIRED: The Dynamic Resource Allocation (DRA) driver's DaemonSet must be deployed with a service account that enables writing ResourceSlice and reading ResourceClaim objects.' ([kubernetes/kubernetes#125163](https://redirect.github.com/kubernetes/kubernetes/pull/125163), [@pohly](https://redirect.github.com/pohly)) \[SIG Auth, Node and Testing] - Add UserNamespaces field to NodeRuntimeHandlerFeatures ([kubernetes/kubernetes#126034](https://redirect.github.com/kubernetes/kubernetes/pull/126034), [@sohankunkerkar](https://redirect.github.com/sohankunkerkar)) \[SIG API Machinery, Apps and Node] - Added Coordinated Leader Election as Alpha under the `CoordinatedLeaderElection` feature gate. With the feature enabled, the control plane can use LeaseCandidate objects (coordination.k8s.io/v1alpha1 API group) to participate in a leader election and let the kube-apiserver select the best instance according to some strategy. ([kubernetes/kubernetes#124012](https://redirect.github.com/kubernetes/kubernetes/pull/124012), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Release, Scheduling and Testing] - Added a `.status.features.supplementalGroupsPolicy` field to Nodes. The field is true when the feature is implemented in the CRI implementation (KEP-3619). ([kubernetes/kubernetes#125470](https://redirect.github.com/kubernetes/kubernetes/pull/125470), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps, Node and Testing] - Added an `allocatedResourcesStatus` to each container status to indicate the health status of devices exposed by the device plugin. ([kubernetes/kubernetes#126243](https://redirect.github.com/kubernetes/kubernetes/pull/126243), [@SergeyKanzhelev](https://redirect.github.com/SergeyKanzhelev)) \[SIG API Machinery, Apps, Node and Testing] - Added support to the kube-proxy nodePortAddresses / --nodeport-addresses option to accept the value "primary", meaning to only listen for NodePort connections on the node's primary IPv4 and/or IPv6 address (according to the Node object). This is strongly recommended, if you were not previously using \--nodeport-addresses, to avoid surprising behavior. (This behavior is enabled by default with the nftables backend; you would need to explicitly request `--nodeport-addresses 0.0.0.0/0,::/0` there to get the traditional "listen on all interfaces" behavior.) ([kubernetes/kubernetes#123105](https://redirect.github.com/kubernetes/kubernetes/pull/123105), [@danwinship](https://redirect.github.com/danwinship)) \[SIG API Machinery, Network and Windows] - Added the feature gates `StrictCostEnforcementForVAP` and `StrictCostEnforcementForWebhooks` to enforce the strict cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. ([kubernetes/kubernetes#124675](https://redirect.github.com/kubernetes/kubernetes/pull/124675), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Auth, Node and Testing] - Changed how the API server handles updates to `.spec.defaultBackend` of Ingress objects. Server-side apply now considers `.spec.defaultBackend` to be an atomic struct. This means that any field-owner who sets values in that struct (they are mutually exclusive) owns the whole struct. For almost all users this change has no impact; for controllers that want to change the default backend port from number to name (or vice-versa), this makes it easier. ([kubernetes/kubernetes#126207](https://redirect.github.com/kubernetes/kubernetes/pull/126207), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery] - Component-base/logs: when compiled with Go >= 1.21, component-base will automatically configure the slog default logger together with initializing klog. ([kubernetes/kubernetes#120696](https://redirect.github.com/kubernetes/kubernetes/pull/120696), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Storage and Testing] - CustomResourceDefinition objects created with non-empty `caBundle` fields which are invalid or do not contain any certificates will not appear in discovery or serve endpoints until a valid `caBundle` is provided. Updates to CustomResourceDefinition are no longer allowed to transition a valid `caBundle` field to an invalid `caBundle` field, because this breaks serving of the existing CustomResourceDefinition. ([kubernetes/kubernetes#124061](https://redirect.github.com/kubernetes/kubernetes/pull/124061), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery] - Dynamic Resource Allocation (DRA): Added a feature so the number of ResourceClaim objects can be limited per namespace and by the number of devices requested through a specific class via the v1.ResourceQuota mechanism. ([kubernetes/kubernetes#120611](https://redirect.github.com/kubernetes/kubernetes/pull/120611), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Etcd, Node, Release, Scheduling and Testing] - Dynamic Resource Allocation (DRA): client-side validation of a ResourceHandle would have accepted a missing DriverName, whereas server-side validation then would have raised an error. ([kubernetes/kubernetes#124075](https://redirect.github.com/kubernetes/kubernetes/pull/124075), [@pohly](https://redirect.github.com/pohly)) - Dynamic Resource Allocation (DRA): in the `pod.spec.recourceClaims` array, the `source` indirection is no longer necessary. Instead of e.g. `source: resourceClaimTemplateName: my-template`, one can write `resourceClaimTemplateName: my-template`. ([kubernetes/kubernetes#125116](https://redirect.github.com/kubernetes/kubernetes/pull/125116), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] - Enhanced the Dynamic Resource Allocation (DRA) with an updated version of the resource.k8s.io API group. The primary user-facing type remains the ResourceClaim, however significant changes have been made, resulting in the new version, v1alpha3, which is not compatible with the previous version. ([kubernetes/kubernetes#125488](https://redirect.github.com/kubernetes/kubernetes/pull/125488), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Etcd, Node, Release, Scheduling, Storage and Testing] - Fixed a 1.30.0 regression in OpenAPI descriptions of the `imagePullSecrets` and `hostAliases` fields to mark the fields used as keys in those lists as either defaulted or required. ([kubernetes/kubernetes#124553](https://redirect.github.com/kubernetes/kubernetes/pull/124553), [@pmalek](https://redirect.github.com/pmalek)) - Fixed a 1.30.0 regression in openapi descriptions of `PodIP.IP` and `HostIP.IP` fields to mark the fields used as keys in those lists as required. ([kubernetes/kubernetes#126057](https://redirect.github.com/kubernetes/kubernetes/pull/126057), [@thockin](https://redirect.github.com/thockin)) - Fixed a bug in the API server where empty collections of ValidatingAdmissionPolicies did not have an `items` field. ([kubernetes/kubernetes#124568](https://redirect.github.com/kubernetes/kubernetes/pull/124568), [@xyz-li](https://redirect.github.com/xyz-li)) \[SIG API Machinery] - Fixed a deep copy issue when retrieving the controller reference. ([kubernetes/kubernetes#124116](https://redirect.github.com/kubernetes/kubernetes/pull/124116), [@HiranmoyChowdhury](https://redirect.github.com/HiranmoyChowdhury)) \[SIG API Machinery and Release] - Fixed code-generator client-gen to work with `api/v1`-like package structure. ([kubernetes/kubernetes#125162](https://redirect.github.com/kubernetes/kubernetes/pull/125162), [@sttts](https://redirect.github.com/sttts)) \[SIG API Machinery and Apps] - Fixed incorrect "v1 Binding is deprecated in v1.6+" warning in kube-scheduler log. ([kubernetes/kubernetes#125540](https://redirect.github.com/kubernetes/kubernetes/pull/125540), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery] - Fixed the comment for the Job's managedBy field. ([kubernetes/kubernetes#124793](https://redirect.github.com/kubernetes/kubernetes/pull/124793), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery and Apps] - Fixed the documentation for the default value of the `procMount` entry in `securityContext` within a Pod. The documentation was previously using the name of the internal variable `DefaultProcMount`, rather than the actual value, "Default". ([kubernetes/kubernetes#125782](https://redirect.github.com/kubernetes/kubernetes/pull/125782), [@aborrero](https://redirect.github.com/aborrero)) \[SIG Apps and Node] - Graduate PodDisruptionConditions to GA and lock ([kubernetes/kubernetes#125461](https://redirect.github.com/kubernetes/kubernetes/pull/125461), [@mimowo](https://redirect.github.com/mimowo)) \[SIG Apps, Node, Scheduling and Testing] - Graduated MatchLabelKeys/MismatchLabelKeys feature in PodAffinity/PodAntiAffinity to Beta. ([kubernetes/kubernetes#123638](https://redirect.github.com/kubernetes/kubernetes/pull/123638), [@sanposhiho](https://redirect.github.com/sanposhiho)) \[SIG API Machinery, Apps, Scheduling and Testing] - Graduated `JobPodFailurePolicy` to GA and locked it to it's default. ([kubernetes/kubernetes#125442](https://redirect.github.com/kubernetes/kubernetes/pull/125442), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery, Apps, Scheduling and Testing] - Graduated the Job `successPolicy` field to beta. The new reason label, "SuccessPolicy" and "CompletionsReached" are added to the "jobs_finished_total" metric. Additionally, if you enable the `JobSuccessPolicy` feature gate, the Job gets "CompletionsReached" reason for the "SuccessCriteriaMet" and "Complete" condition type when the number of succeeded Job Pods (`.status.succeeded`) reached the desired completions (`.spec.completions`). ([kubernetes/kubernetes#126067](https://redirect.github.com/kubernetes/kubernetes/pull/126067), [@tenzen-y](https://redirect.github.com/tenzen-y)) \[SIG API Machinery, Apps and Testing] - Graduated the `DisableNodeKubeProxyVersion` feature gate to beta. By default, the kubelet no longer attempts to set the `.status.kubeProxyVersion` field for its associated Node. ([kubernetes/kubernetes#123845](https://redirect.github.com/kubernetes/kubernetes/pull/123845), [@HirazawaUi](https://redirect.github.com/HirazawaUi)) \[SIG API Machinery, Cloud Provider, Network, Node and Testing] - Improved scheduling performance when many nodes, and prefilter returned 1-2 nodes (e.g. daemonset) For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status. ([kubernetes/kubernetes#125197](https://redirect.github.com/kubernetes/kubernetes/pull/125197), [@gabesaba](https://redirect.github.com/gabesaba)) - Introduced a new boolean kubelet flag `--fail-cgroupv1`. ([kubernetes/kubernetes#126031](https://redirect.github.com/kubernetes/kubernetes/pull/126031), [@harche](https://redirect.github.com/harche)) \[SIG API Machinery and Node] - K8s.io/apimachinery/pkg/util/runtime: Added support for new calls to handle panics and errors in the context where they occur. `PanicHandlers` and `ErrorHandlers` now must accept a context parameter for that. Log output is structured instead of unstructured. ([kubernetes/kubernetes#121970](https://redirect.github.com/kubernetes/kubernetes/pull/121970), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery and Instrumentation] - KEP-1880: Users of the new feature to add multiple service CIDR will use by default a dual-write strategy on the new ClusterIP allocators to avoid the problem of possible duplicate IPs allocated to Services when running skewed kube-apiservers using different allocators. They can opt-out of this behavior by enabled the feature gate DisableAllocatorDualWrite. ([kubernetes/kubernetes#122047](https://redirect.github.com/kubernetes/kubernetes/pull/122047), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, Instrumentation and Testing] - Kube-apiserver: Added Alpha features to allow API server authz to check the context of requests: - The `AuthorizeWithSelectors` feature gate enables including field and label selector information from requests in webhook authorization calls. - The `AuthorizeNodeWithSelectors` feature gate changes node authorizer behavior to limit requests from node API clients, so that each Node can only get / list / watch its own Node API object, and can also only get / list / watch Pod API objects bound to that node. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or obtain broader read access independent of the node authorizer. ([kubernetes/kubernetes#125571](https://redirect.github.com/kubernetes/kubernetes/pull/125571), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery, Auth, Node, Scheduling and Testing] - Kube-apiserver: ControllerRevision objects are now verified to contain valid JSON data in the `data` field. ([kubernetes/kubernetes#125549](https://redirect.github.com/kubernetes/kubernetes/pull/125549), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery and Apps] - Kube-apiserver: the `--encryption-provider-config` file is now loaded with strict deserialization, which fails if the config file contains duplicate or unknown fields. This protects against accidentally running with config files that are malformed, mis-indented, or have typos in field names, and getting unexpected behavior. When `--encryption-provider-config-automatic-reload` is used, new encryption config files that contain typos after the kube-apiserver is running are treated as invalid and the last valid config is used. ([kubernetes/kubernetes#124912](https://redirect.github.com/kubernetes/kubernetes/pull/124912), [@enj](https://redirect.github.com/enj)) \[SIG API Machinery and Auth] - Kube-controller-manager: the `horizontal-pod-autoscaler-upscale-delay` and `horizontal-pod-autoscaler-downscale-delay` flags have been removed (deprecated and non-functional since v1.12). ([kubernetes/kubernetes#124948](https://redirect.github.com/kubernetes/kubernetes/pull/124948), [@SataQiu](https://redirect.github.com/SataQiu)) \[SIG API Machinery, Apps and Autoscaling] - Made kube-proxy Windows service control manager integration (`--windows-service`) configurable in v1alpha1 component configuration via `windowsRunAsService` field. ([kubernetes/kubernetes#126072](https://redirect.github.com/kubernetes/kubernetes/pull/126072), [@aroradaman](https://redirect.github.com/aroradaman)) \[SIG Network and Scalability] - PersistentVolumeLastPhaseTransitionTime feature is stable and enabled by default. ([kubernetes/kubernetes#124969](https://redirect.github.com/kubernetes/kubernetes/pull/124969), [@RomanBednar](https://redirect.github.com/RomanBednar)) \[SIG API Machinery, Apps, Storage and Testing] - Promoted `LocalStorageCapacityIsolation` to beta; the behaviour is enabled by default. Within the kubelet, storage capacity isolation is active if the feature gate is enabled and the specific Pod is using a user namespace. ([kubernetes/kubernetes#126014](https://redirect.github.com/kubernetes/kubernetes/pull/126014), [@PannagaRao](https://redirect.github.com/PannagaRao)) \[SIG Apps, Autoscaling, Node, Storage and Testing] - Promoted `StatefulSetStartOrdinal` to stable. This means `--feature-gates=StatefulSetStartOrdinal=true` are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation. ([kubernetes/kubernetes#125374](https://redirect.github.com/kubernetes/kubernetes/pull/125374), [@pwschuurman](https://redirect.github.com/pwschuurman)) \[SIG API Machinery, Apps and Testing] - Promoted feature-gate `VolumeAttributesClass` to beta (disabled by default). Users need to enable the feature gate and the `storage.k8s.io/v1beta1` API group to use this feature. Promoted the VolumeAttributesClass API to beta. ([kubernetes/kubernetes#126145](https://redirect.github.com/kubernetes/kubernetes/pull/126145), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, CLI, Etcd, Storage and Testing] - Removed deprecated command flags --volume-host-cidr-denylist and --volume-host-allow-local-loopback from kube-controller-manager. ([kubernetes/kubernetes#124017](https://redirect.github.com/kubernetes/kubernetes/pull/124017), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, Cloud Provider and Storage] - Removed feature gate `CustomResourceValidationExpressions`. ([kubernetes/kubernetes#126136](https://redirect.github.com/kubernetes/kubernetes/pull/126136), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Cloud Provider and Testing] - Reverted a [change](https://redirect.github.com/kubernetes/kubernetes/pull/123513) where `ConsistentListFromCache` was moved to beta and enabled by default. ([kubernetes/kubernetes#126139](https://redirect.github.com/kubernetes/kubernetes/pull/126139), [@enj](https://redirect.github.com/enj)) - Revised the Pod API with Alpha support for volumes derived from OCI artifacts. This feature is behind the `ImageVolume` feature gate. ([kubernetes/kubernetes#125660](https://redirect.github.com/kubernetes/kubernetes/pull/125660), [@saschagrunert](https://redirect.github.com/saschagrunert)) \[SIG API Machinery, Apps and Node] - Supported fine-grained supplemental groups policy (KEP-3619), which enabled fine-grained control for supplementary groups in the first container processes. This allows you to choose whether to include groups defined in the container image (/etc/groups) for the container's primary UID or not. ([kubernetes/kubernetes#117842](https://redirect.github.com/kubernetes/kubernetes/pull/117842), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps and Node] - The (alpha) nftables mode of kube-proxy now requires version 1.0.1 or later of the nft command-line, and kernel 5.13 or later. (For testing/development purposes, you can use older kernels, as far back as 5.4, if you set the `nftables.skipKernelVersionCheck` option in the kube-proxy config, but this is not recommended in production since it may cause problems with other nftables users on the system.) ([kubernetes/kubernetes#124152](https://redirect.github.com/kubernetes/kubernetes/pull/124152), [@danwinship](https://redirect.github.com/danwinship)) \[SIG Network] - To enhance usability and developer experience, CRD validation rules now support direct use of (CEL) reserved keywords as field names in object validation expressions for existing expressions in storage, will fully support runtime in next release for compatibility concern. ([kubernetes/kubernetes#126188](https://redirect.github.com/kubernetes/kubernetes/pull/126188), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery and Testing] - Updated the feature MultiCIDRServiceAllocator to beta (disabled by default). Users need to enable the feature gate and the networking v1beta1 group to be able to use this new feature, that allows to dynamically reconfigure Service CIDR ranges. ([kubernetes/kubernetes#125021](https://redirect.github.com/kubernetes/kubernetes/pull/125021), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, CLI, Etcd, Instrumentation, Network and Testing] - Use omitempty for optional Job Pod Failure Policy fields. ([kubernetes/kubernetes#126046](https://redirect.github.com/kubernetes/kubernetes/pull/126046), [@mimowo](https://redirect.github.com/mimowo)) - User can choose a different static policy option `SpreadPhysicalCPUsPreferredOption` to spread cpus across physical cpus for some specific applications ([kubernetes/kubernetes#123733](https://redirect.github.com/kubernetes/kubernetes/pull/123733), [@Jeffwan](https://redirect.github.com/Jeffwan)) \[SIG Node] - When the featuregate AnonymousAuthConfigurableEndpoints is enabled users can update the AuthenticationConfig file with endpoints for with anonymous requests are alllowed. ([kubernetes/kubernetes#124917](https://redirect.github.com/kubernetes/kubernetes/pull/124917), [@vinayakankugoyal](https://redirect.github.com/vinayakankugoyal)) \[SIG API Machinery, Auth, Cloud Provider, Node and Testing] - Move ConsistentListFromCache feature flag to Beta and enable it by default ([kubernetes/kubernetes#126469](https://redirect.github.com/kubernetes/kubernetes/pull/126469), [@serathius](https://redirect.github.com/serathius)) \[SIG API Machinery] - Add Coordinated Leader Election as alpha under the CoordinatedLeaderElection feature gate. With the feature enabled, the control plane can use LeaseCandidate objects (coordination.k8s.io/v1alpha1 API group) to participate in a leader election and let the kube-apiserver select the best instance according to some strategy. ([kubernetes/kubernetes#124012](https://redirect.github.com/kubernetes/kubernetes/pull/124012), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Release, Scheduling and Testing] - Add an AllocatedResourcesStatus to each container status to indicate the health status of devices exposed by the device plugin. ([kubernetes/kubernetes#126243](https://redirect.github.com/kubernetes/kubernetes/pull/126243), [@SergeyKanzhelev](https://redirect.github.com/SergeyKanzhelev)) \[SIG API Machinery, Apps, Node and Testing] - Added Node.Status.Features.SupplementalGroupsPolicy field which is set to true when the feature is implemented in the CRI implementation (KEP-3619) ([kubernetes/kubernetes#125470](https://redirect.github.com/kubernetes/kubernetes/pull/125470), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps, Node and Testing] - CustomResourceDefinition objects created with non-empty `caBundle` fields which are invalid or do not contain any certificates will not appear in discovery or serve endpoints until a valid `caBundle` is provided. Updates to CustomResourceDefinition are no longer allowed to transition a valid `caBundle` field to an invalid `caBundle` field. ([kubernetes/kubernetes#124061](https://redirect.github.com/kubernetes/kubernetes/pull/124061), [@Jefftree](https://redirect.github.com/Jefftree)) \[SIG API Machinery] - DRA: The DRA driver's daemonset must be deployed with a service account that enables writing ResourceSlice and reading ResourceClaim objects. ([kubernetes/kubernetes#125163](https://redirect.github.com/kubernetes/kubernetes/pull/125163), [@pohly](https://redirect.github.com/pohly)) \[SIG Auth, Node and Testing] - DRA: new API and several new features ([kubernetes/kubernetes#125488](https://redirect.github.com/kubernetes/kubernetes/pull/125488), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Etcd, Node, Release, Scheduling, Storage and Testing] - DRA: the number of ResourceClaim objects can be limited per namespace and by the number of devices requested through a specific class via the v1.ResourceQuota mechanism. ([kubernetes/kubernetes#120611](https://redirect.github.com/kubernetes/kubernetes/pull/120611), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, CLI, Etcd, Node, Release, Scheduling and Testing] - Fix the documentation for the default value of the procMount entry in the pod securityContext. The documentation was previously using the name of the internal variable 'DefaultProcMount' rather than the actual value 'Default'. ([kubernetes/kubernetes#125782](https://redirect.github.com/kubernetes/kubernetes/pull/125782), [@aborrero](https://redirect.github.com/aborrero)) \[SIG Apps and Node] - Fixed a bug in the API server where empty collections of ValidatingAdmissionPolicies did not have an `items` field. ([kubernetes/kubernetes#124568](https://redirect.github.com/kubernetes/kubernetes/pull/124568), [@xyz-li](https://redirect.github.com/xyz-li)) \[SIG API Machinery] - Graduate the Job SuccessPolicy to Beta. The new reason label, "SuccessPolicy" and "CompletionsReached" are added to the "jobs_finished_total" metric. Additionally, If we enable the "JobSuccessPolicy" feature gate, the Job gets "CompletionsReached" reason for the "SuccessCriteriaMet" and "Complete" condition type when the number of succeeded Job Pods (".status.succeeded") reached the desired completions (".spec.completions"). ([kubernetes/kubernetes#126067](https://redirect.github.com/kubernetes/kubernetes/pull/126067), [@tenzen-y](https://redirect.github.com/tenzen-y)) \[SIG API Machinery, Apps and Testing] - Introduce a new boolean kubelet flag --fail-cgroupv1 ([kubernetes/kubernetes#126031](https://redirect.github.com/kubernetes/kubernetes/pull/126031), [@harche](https://redirect.github.com/harche)) \[SIG API Machinery and Node] - Kube-apiserver: adds an alpha AuthorizeWithSelectors feature that includes field and label selector information from requests in webhook authorization calls; adds an alpha AuthorizeNodeWithSelectors feature that makes the node authorizer limit requests from node API clients to get / list / watch its own Node API object, and to get / list / watch its own Pod API objects. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or grant broader read access independent of the node authorizer. ([kubernetes/kubernetes#125571](https://redirect.github.com/kubernetes/kubernetes/pull/125571), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery, Auth, Node, Scheduling and Testing] - Kube-proxy Windows service control manager integration(--windows-service) is now configurable in v1alpha1 component configuration via `WindowsRunAsService` field ([kubernetes/kubernetes#126072](https://redirect.github.com/kubernetes/kubernetes/pull/126072), [@aroradaman](https://redirect.github.com/aroradaman)) \[SIG Network and Scalability] - Promote LocalStorageCapacityIsolation to beta and enable if user namespace is enabled for the pod ([kubernetes/kubernetes#126014](https://redirect.github.com/kubernetes/kubernetes/pull/126014), [@PannagaRao](https://redirect.github.com/PannagaRao)) \[SIG Apps, Autoscaling, Node, Storage and Testing] - Promote StatefulSetStartOrdinal to stable. This means `--feature-gates=StatefulSetStartOrdinal=true` are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation ([kubernetes/kubernetes#125374](https://redirect.github.com/kubernetes/kubernetes/pull/125374), [@pwschuurman](https://redirect.github.com/pwschuurman)) \[SIG API Machinery, Apps and Testing] - Promoted feature-gate `VolumeAttributesClass` to beta (disabled by default). Users need to enable the feature gate and the storage v1beta1 group to use this new feature. - Promoted API `VolumeAttributesClass` and `VolumeAttributesClassList` to `storage.k8s.io/v1beta1`. ([kubernetes/kubernetes#126145](https://redirect.github.com/kubernetes/kubernetes/pull/126145), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, CLI, Etcd, Storage and Testing] - Removed feature gate `CustomResourceValidationExpressions`. ([kubernetes/kubernetes#126136](https://redirect.github.com/kubernetes/kubernetes/pull/126136), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Cloud Provider and Testing] - Revert "Move ConsistentListFromCache feature flag to Beta and enable it by default" ([kubernetes/kubernetes#126139](https://redirect.github.com/kubernetes/kubernetes/pull/126139), [@enj](https://redirect.github.com/enj)) \[SIG API Machinery] - Revised the Pod API with alpha support for volumes derived from OCI artefacts. This feature is behind the `ImageVolume` feature gate. ([kubernetes/kubernetes#125660](https://redirect.github.com/kubernetes/kubernetes/pull/125660), [@saschagrunert](https://redirect.github.com/saschagrunert)) \[SIG API Machinery, Apps and Node] - The Ingress.spec.defaultBackend is now considered an atomic struct for the purposes of server-side-apply. This means that any field-owner who sets values in that struct (they are mutually exclusive) owns the whole struct. For almost all users this change has no impact. For controllers which want to change port from number to name (or vice-versa), this makes it easier. ([kubernetes/kubernetes#126207](https://redirect.github.com/kubernetes/kubernetes/pull/126207), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery] - To enhance usability and developer experience, CRD validation rules now support direct use of (CEL) reserved keywords as field names in object validation expressions for existing expressions in storage, will fully support runtime in next release for compatibility concern. ([kubernetes/kubernetes#126188](https://redirect.github.com/kubernetes/kubernetes/pull/126188), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery and Testing] - Add UserNamespaces field to NodeRuntimeHandlerFeatures ([kubernetes/kubernetes#126034](https://redirect.github.com/kubernetes/kubernetes/pull/126034), [@sohankunkerkar](https://redirect.github.com/sohankunkerkar)) \[SIG API Machinery, Apps and Node] - Fixes a 1.30.0 regression in openapi descriptions of PodIP.IP and HostIP.IP fields to mark the fields used as keys in those lists as required. ([kubernetes/kubernetes#126057](https://redirect.github.com/kubernetes/kubernetes/pull/126057), [@thockin](https://redirect.github.com/thockin)) \[SIG API Machinery] - Graduate JobPodFailurePolicy to GA and lock ([kubernetes/kubernetes#125442](https://redirect.github.com/kubernetes/kubernetes/pull/125442), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery, Apps, Scheduling and Testing] - Graduate PodDisruptionConditions to GA and lock ([kubernetes/kubernetes#125461](https://redirect.github.com/kubernetes/kubernetes/pull/125461), [@mimowo](https://redirect.github.com/mimowo)) \[SIG Apps, Node, Scheduling and Testing] - PersistentVolumeLastPhaseTransitionTime feature is stable and enabled by default. ([kubernetes/kubernetes#124969](https://redirect.github.com/kubernetes/kubernetes/pull/124969), [@RomanBednar](https://redirect.github.com/RomanBednar)) \[SIG API Machinery, Apps, Storage and Testing] - The (alpha) nftables mode of kube-proxy now requires version 1.0.1 or later of the nft command-line, and kernel 5.13 or later. (For testing/development purposes, you can use older kernels, as far back as 5.4, if you set the `nftables.skipKernelVersionCheck` option in the kube-proxy config, but this is not recommended in production since it may cause problems with other nftables users on the system.) ([kubernetes/kubernetes#124152](https://redirect.github.com/kubernetes/kubernetes/pull/124152), [@danwinship](https://redirect.github.com/danwinship)) \[SIG Network] - Use omitempty for optional Job Pod Failure Policy fields ([kubernetes/kubernetes#126046](https://redirect.github.com/kubernetes/kubernetes/pull/126046), [@mimowo](https://redirect.github.com/mimowo)) \[SIG Apps] - User can choose a different static policy option `SpreadPhysicalCPUsPreferredOption` to spread cpus across physical cpus for some specific applications ([kubernetes/kubernetes#123733](https://redirect.github.com/kubernetes/kubernetes/pull/123733), [@Jeffwan](https://redirect.github.com/Jeffwan)) \[SIG Node] - DRA: in the `pod.spec.recourceClaims` array, the `source` indirection is no longer necessary. Instead of e.g. `source: resourceClaimTemplateName: my-template`, one can write `resourceClaimTemplateName: my-template`. ([kubernetes/kubernetes#125116](https://redirect.github.com/kubernetes/kubernetes/pull/125116), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] - Fix code-generator client-gen to work with `api/v1`-like package structure. ([kubernetes/kubernetes#125162](https://redirect.github.com/kubernetes/kubernetes/pull/125162), [@sttts](https://redirect.github.com/sttts)) \[SIG API Machinery and Apps] - KEP-1880: Users of the new feature to add multiple service CIDR will use by default a dual-write strategy on the new ClusterIP allocators to avoid the problem of possible duplicate IPs allocated to Services when running skewed kube-apiservers using different allocators. They can opt-out of this behavior by enabled the feature gate DisableAllocatorDualWrite ([kubernetes/kubernetes#122047](https://redirect.github.com/kubernetes/kubernetes/pull/122047), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, Instrumentation and Testing] - Kube-apiserver: ControllerRevision objects are now verified to contain valid JSON data in the `data` field. ([kubernetes/kubernetes#125549](https://redirect.github.com/kubernetes/kubernetes/pull/125549), [@liggitt](https://redirect.github.com/liggitt)) \[SIG API Machinery and Apps] - Update the feature MultiCIDRServiceAllocator to beta (disabled by default). Users need to enable the feature gate and the networking v1beta1 group to be able to use this new feature, that allows to dynamically reconfigure Service CIDR ranges. ([kubernetes/kubernetes#125021](https://redirect.github.com/kubernetes/kubernetes/pull/125021), [@aojea](https://redirect.github.com/aojea)) \[SIG API Machinery, Apps, CLI, Etcd, Instrumentation, Network and Testing] - When the featuregate AnonymousAuthConfigurableEndpoints is enabled users can update the AuthenticationConfig file with endpoints for with anonymous requests are alllowed. ([kubernetes/kubernetes#124917](https://redirect.github.com/kubernetes/kubernetes/pull/124917), [@vinayakankugoyal](https://redirect.github.com/vinayakankugoyal)) \[SIG API Machinery, Auth, Cloud Provider, Node and Testing] - Fixed incorrect "v1 Binding is deprecated in v1.6+" warning in kube-scheduler log. ([kubernetes/kubernetes#125540](https://redirect.github.com/kubernetes/kubernetes/pull/125540), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery] - Added the feature gates `StrictCostEnforcementForVAP` and `StrictCostEnforcementForWebhooks` to enforce the strct cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. ([kubernetes/kubernetes#124675](https://redirect.github.com/kubernetes/kubernetes/pull/124675), [@cici37](https://redirect.github.com/cici37)) \[SIG API Machinery, Auth, Node and Testing] - Component-base/logs: when compiled with Go >= 1.21, component-base will automatically configure the slog default logger together with initializing klog. ([kubernetes/kubernetes#120696](https://redirect.github.com/kubernetes/kubernetes/pull/120696), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Storage and Testing] - DRA: client-side validation of a ResourceHandle would have accepted a missing DriverName, whereas server-side validation then would have raised an error. ([kubernetes/kubernetes#124075](https://redirect.github.com/kubernetes/kubernetes/pull/124075), [@pohly](https://redirect.github.com/pohly)) \[SIG Apps] - Fix Deep Copy issue in getting controller reference ([kubernetes/kubernetes#124116](https://redirect.github.com/kubernetes/kubernetes/pull/124116), [@HiranmoyChowdhury](https://redirect.github.com/HiranmoyChowdhury)) \[SIG API Machinery and Release] - Fix the comment for the Job's managedBy field ([kubernetes/kubernetes#124793](https://redirect.github.com/kubernetes/kubernetes/pull/124793), [@mimowo](https://redirect.github.com/mimowo)) \[SIG API Machinery and Apps] - Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. ([kubernetes/kubernetes#124553](https://redirect.github.com/kubernetes/kubernetes/pull/124553), [@pmalek](https://redirect.github.com/pmalek)) \[SIG API Machinery] - Graduate MatchLabelKeys/MismatchLabelKeys feature in PodAffinity/PodAntiAffinity to Beta ([kubernetes/kubernetes#123638](https://redirect.github.com/kubernetes/kubernetes/pull/123638), [@sanposhiho](https://redirect.github.com/sanposhiho)) \[SIG API Machinery, Apps, Scheduling and Testing] - Graduated the `DisableNodeKubeProxyVersion` feature gate to beta. By default, the kubelet no longer attempts to set the `.status.kubeProxyVersion` field for its associated Node. ([kubernetes/kubernetes#123845](https://redirect.github.com/kubernetes/kubernetes/pull/123845), [@HirazawaUi](https://redirect.github.com/HirazawaUi)) \[SIG API Machinery, Cloud Provider, Network, Node and Testing] - Improved scheduling performance when many nodes, and prefilter returns 1-2 nodes (e.g. daemonset) For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status ([kubernetes/kubernetes#125197](https://redirect.github.com/kubernetes/kubernetes/pull/125197), [@gabesaba](https://redirect.github.com/gabesaba)) \[SIG Scheduling] - K8s.io/apimachinery/pkg/util/runtime: new calls support handling panics and errors in the context where they occur. `PanicHandlers` and `ErrorHandlers` now must accept a context parameter for that. Log output is structured instead of unstructured. ([kubernetes/kubernetes#121970](https://redirect.github.com/kubernetes/kubernetes/pull/121970), [@pohly](https://redirect.github.com/pohly)) \[SIG API Machinery and Instrumentation] - Kube-apiserver: the `--encryption-provider-config` file is now loaded with strict deserialization, which fails if the config file contains duplicate or unknown fields. This protects against accidentally running with config files that are malformed, mis-indented, or have typos in field names, and getting unexpected behavior. When `--encryption-provider-config-automatic-reload` is used, new encryption config files that contain typos after the kube-apiserver is running are treated as invalid and the last valid config is used. ([kubernetes/kubernetes#124912](https://redirect.github.com/kubernetes/kubernetes/pull/124912), [@enj](https://redirect.github.com/enj)) \[SIG API Machinery and Auth] - Kube-controller-manager removes deprecated command flags: --volume-host-cidr-denylist and --volume-host-allow-local-loopback ([kubernetes/kubernetes#124017](https://redirect.github.com/kubernetes/kubernetes/pull/124017), [@carlory](https://redirect.github.com/carlory)) \[SIG API Machinery, Apps, Cloud Provider and Storage] - Kube-controller-manager: the `horizontal-pod-autoscaler-upscale-delay` and `horizontal-pod-autoscaler-downscale-delay` flags have been removed (deprecated and non-functional since v1.12) ([kubernetes/kubernetes#124948](https://redirect.github.com/kubernetes/kubernetes/pull/124948), [@SataQiu](https://redirect.github.com/SataQiu)) \[SIG API Machinery, Apps and Autoscaling] - Support fine-grained supplemental groups policy (KEP-3619), which enables fine-grained control for supplementary groups in the first container processes. You can choose whether to include groups defined in the container image(/etc/groups) for the container's primary uid or not. ([kubernetes/kubernetes#117842](https://redirect.github.com/kubernetes/kubernetes/pull/117842), [@everpeace](https://redirect.github.com/everpeace)) \[SIG API Machinery, Apps and Node] - The kube-proxy nodeportAddresses / --nodeport-addresses option now accepts the value "primary", meaning to only listen for NodePort connections on the node's primary IPv4 and/or IPv6 address (according to the Node object). This is strongly recommended, if you were not previously using \--nodeport-addresses, to avoid surprising behavior. (This behavior is enabled by default with the nftables backend; you would need to explicitly request `--nodeport-addresses 0.0.0.0/0,::/0` there to get the traditional "listen on all interfaces" behavior.) ([kubernetes/kubernetes#123105](https://redirect.github.com/kubernetes/kubernetes/pull/123105), [@danwinship](https://redirect.github.com/danwinship)) \[SIG API Machinery, Network and Windows]Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.