-
Notifications
You must be signed in to change notification settings - Fork 376
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Compatibility with K8s 1.29 #5792
Comments
Regarding the feature gate The conclusion is that the LegacyServiceAccountTokenCleanUp feature gate should have no impact to Antrea even it's enabled by default in v1.29.0. |
Not completely related to this issue, but it may be nice to update our k8s.io Go dependencies to 0.29. I think it's been a while since we bumped them up. |
Sure, it's also a necessary step to access the new ServiceCIDR API and the ipMode field. Added it as one item of the issue. |
Windows conformance test passed on 1.29 cluster. |
Maybe I can take the taske |
hey @luolanzone, @antoninbas can I try to bump dependencies to 0.29, if @hjiajing is occupied |
|
All tasks completed |
Create the issue to track compatibility with impending K8s 1.29.
Changes that may matter now
Kube-controller-manager: The LegacyServiceAccountTokenCleanUp feature gate is now beta and enabled by default. When enabled, legacy auto-generated service account token secrets are auto-labeled with a kubernetes.io/legacy-token-invalid-since label if the credentials have not been used in the time specified by --legacy-service-account-token-clean-up-period (defaulting to one year), and are referenced from the .secrets list of a ServiceAccount object, and are not referenced from pods. This label causes the authentication layer to reject use of the credentials. After being labeled as invalid, if the time specified by --legacy-service-account-token-clean-up-period (defaulting to one year) passes without the credential being used, the secret is automatically deleted. Secrets labeled as invalid which have not been auto-deleted yet can be re-activated by removing the kubernetes.io/legacy-token-invalid-since label. (LegacyServiceAccountTokenCleanUp beta kubernetes/kubernetes#120682)
antctl-service-account-token
andantctl-service-account-token
if they are classified as legacy auto-generated. If that's the case, we should consider stopping create such tokens and update docs.Allow specifying ExternalTrafficPolicy for Services with ExternalIPs. (Allow specifying ExternalTrafficPolicy for Services with ExternalIPs kubernetes/kubernetes#119150)
Changes that may matter in the future
Tests
Items
The text was updated successfully, but these errors were encountered: