This section is intended to be a guide for API changes that might inspire or require implementation changes.
None of these API changes represent breaking changes.
A new OverlappingTLSConfig
condition has been added to Gateway Listeners to indicate situations where
Connection Coalescing could be problematic. The Gateway specification for handling Hostname and SNI matching for HTTPS
requests has been clarified and now recommends that implementations return 421 HTTP code responses in certain cases.
BackendTLSPolicy
SubjectAltNames
from Core to Extended
SubjectAltNames
field of BackendTLSPolicy
changed from Core to Extended feature. (#3591,@mlavacca)backendRef
filter must send traffic to the correct backends when weighted routing is configured
backendRef
filters don't affect weighted routing. (#3604,@dprotaso)parametersRef
Accepted
condition when parametersRef
is invalid. (#3579,@mlavacca)GatewayClassReasonInvalidParameters
reason description. (#3553,@mlavacca)A new type GatewaySpecAddress
replaces GatewayAddress
. In GatewayAddress
the Value
field was required. InGatewaySpecAddress
the Value
field is optional. When the Value
is unspecified, if an implementation supports that,
it SHOULD automatically assign an address. If an implementation does not support an empty Value
, it MUST set theProgrammed
condition in status to false with a reason of "AddressNotAssigned". The Addresses
field inGateway.Spec
has changed from type []GatewayAddress
to []GatewaySpecAddress
.
The Standard channel is Gateway API's set of maximally-stable install files.
Only features with the best testing and support are added to the standard
channel. This channel should be considered GA or stable, and future changes will
be fully backwards compatible.
This feature enhances the existing request mirroring feature
by allowing users to specify a percentage of requests to be mirrored in both HTTPRoute
and GRPCRoute
objects.
This feature has graduated to Standard and is now considered GA or Stable.
This feature's name for conformance tests (and GatewayClass status reporting) isHTTPRouteRequestPercentageMirror
.
This feature's status is Extended, meaning that it is optional for
implementations to support. If you're using Experimental Channel, you can refer
to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The Experimental Channel is Gateway API's channel for testing out changes and
gaining confidence with them before allowing them to go to Standard.
This channel may include features that are changed or removed later!
New experimental resources now start with "X"This release introduces 2 new experimental resources:
Both of these resources are described in more detail below. As you may notice,
these resource names start with X
and are part of an effort to distinguish
experimental channel resources from standard channel resources.
In addition to the separate names, these resources are also part of thex-k8s.io
API group instead of k8s.io
, as a further effort to signal the
experimental nature of these resources.
In practice this means two things:
For more context on this change, refer to the related discussion.
CORS (Cross Origin Resource Sharing) FilterGEP-1767 describes how to add
configuration of CORS filters on HTTPRoute objects, and in this release, this change
has moved to Experimental.
Please see the GEP reference document or the API reference for the details.
This feature has graduated to Experimental and should now be used for testing
and verification purposes only. Experimental features may be changed or removed
in a future version.
This feature does not currently have a feature name defined.
This feature's status is Extended, meaning that it is optional for
implementations to support.
As there is no feature name or conformance testing available for this feature
yet, please check your implementation's documentation to see if it is supported.
Relevant PRs:
HTTPRoute
(#3637,@robscott)HTTPRouteFilter.CORS.AllowCredentials
to expect a boolean and not a string (#3656,@EyalPazz)HTTPRouteFilterType
(#3668,@EyalPazz)GEP-1713 defines a new mechanism to merge listeners into a single
Gateway, and in this release, this change has moved to Experimental. Following a new naming convention, an
experimental object name is prefaced with an X, thus ListenerSet
has changed to XListenerSet
.
The object group name has changed from gateway.networking.k8s.io
to gateway.networking.x-k8s.io
.
Please see the GEP reference document or the API reference for the details.
This feature has graduated to Experimental and should now be used for testing
and verification purposes only. Experimental features may be changed or removed
in a future version.
This feature does not currently have a feature name defined.
This feature's status is Extended, meaning that it is optional for
implementations to support.
As there is no feature name or conformance testing available for this feature
yet, please check your implementation's documentation to see if it is supported.
Relevant PRs:
ListenerSet
s across namespaces (#3632,@dprotaso)ListenerSet
API & Generate Clients (in the group gateway.networking.k8s-x.io) (#3588,@dprotaso)ListenerSet
has been renamed to XListenerSet
. The Resource BackendTrafficPolicy
has been renamed toXBackendTrafficPolicy
. (#3682,[@mlavacca](https://github.com/...We expect that this release candidate is quite close to the final v1.3.0
release. However, subsequent breaking API changes are still possible.
This release candidate is suitable for implementors, but we do not recommend
shipping products based on a release candidate API due to the possibility of
incompatible changes prior to the final release. The following represents the
changes since v1.3.0-rc.1:
None
has been removed as option for Route Namespaces (was added in rc.1 asWe expect that this release candidate is quite close to the final v1.3.0
release. However, subsequent breaking API changes are still possible.
This release candidate is suitable for implementors, but we do not recommend
shipping products based on a release candidate API due to the possibility of
incompatible changes prior to the final release. The following represents the
changes since v1.2.0:
This section is intended to be a guide for API changes that might inspire or require implementation changes.
None of these API changes represent breaking changes.
A new OverlappingTLSConfig
condition has been added to Gateway Listeners to indicate situations where
Connection Coalescing could be problematic. The Gateway specification for handling Hostname and SNI matching for HTTPS
requests has been clarified and now recommends that implementations return 421 HTTP code responses in certain cases.
BackendTLSPolicy
SubjectAltNames
from Core to Extended
SubjectAltNames
field of BackendTLSPolicy
changed from Core to Extended feature. (#3591,@mlavacca)backendRef
filter must send traffic to the correct backends when weighted routing is configured
backendRef
filters don't affect weighted routing. (#3604,@dprotaso)parametersRef
Accepted
condition when parametersRef
is invalid. (#3579,@mlavacca)GatewayClassReasonInvalidParameters
reason description. (#3553,@mlavacca)A new type GatewaySpecAddress
replaces GatewayAddress
. In GatewayAddress
the Value
field was required. InGatewaySpecAddress
the Value
field is optional. When the Value
is unspecified, if an implementation supports that,
it SHOULD automatically assign an address. If an implementation does not support an empty Value
, it MUST set theProgrammed
condition in status to false with a reason of "AddressNotAssigned". The Addresses
field inGateway.Spec
has changed from type []GatewayAddress
to []GatewaySpecAddress
.
The Standard channel is Gateway API's set of maximally-stable install files.
Only features with the best testing and support are added to the standard
channel. This channel should be considered GA or stable, and future changes will
be fully backwards compatible.
This feature enhances the existing request mirroring feature
by allowing users to specify a percentage of requests to be mirrored in both HTTPRoute
and GRPCRoute
objects.
This feature has graduated to Standard and is now considered GA or Stable.
This feature's name for conformance tests (and GatewayClass status reporting) isHTTPRouteRequestPercentageMirror
.
This feature's status is Extended, meaning that it is optional for
implementations to support. If you're using Experimental Channel, you can refer
to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The Experimental Channel is Gateway API's channel for testing out changes and
gaining confidence with them before allowing them to go to Standard.
This channel may include features that are changed or removed later!
CORS (Cross Origin Resource Sharing) FilterGEP-1767 describes how to add
configuration of CORS filters on HTTPRoute objects, and in this release, this change
has moved to Experimental.
Please see the GEP reference document or the API reference for the details.
This feature has graduated to Experimental and should now be used for testing
and verification purposes only. Experimental features may be changed or removed
in a future version.
This feature does not currently have a feature name defined.
This feature's status is Extended, meaning that it is optional for
implementations to support.
As there is no feature name or conformance testing available for this feature
yet, please check your implementation's documentation to see if it is supported.
Relevant PRs:
HTTPRoute
(#3637,@robscott)HTTPRouteFilter.CORS.AllowCredentials
to expect a boolean and not a string (#3656,@EyalPazz)HTTPRouteFilterType
(#3668,@EyalPazz)GEP-1713 defines a new mechanism to merge listeners into a single
Gateway, and in this release, this change has moved to Experimental. Following a new naming convention, an
experimental object name is prefaced with an X, thus ListenerSet
has changed to XListenerSet
.
The object group name has changed from gateway.networking.k8s.io
to gateway.networking.x-k8s.io
.
Please see the GEP reference document or the API reference for the details.
This feature has graduated to Experimental and should now be used for testing
and verification purposes only. Experimental features may be changed or removed
in a future version.
This feature does not currently have a feature name defined.
This feature's status is Extended, meaning that it is optional for
implementations to support.
As there is no feature name or conformance testing available for this feature
yet, please check your implementation's documentation to see if it is supported.
Relevant PRs:
ListenerSet
s across namespaces (#3632,@dprotaso)ListenerSet
API & Generate Clients (in the group gateway.networking.k8s-x.io) (#3588,@dprotaso)ListenerSet
has been renamed to XListenerSet
. The Resource BackendTrafficPolicy
has been renamed toXBackendTrafficPolicy
. (#3682,@mlavacca)GEP-3388
specifies the configuration of a "retry budget" across all endpoints of a destination service in order to prevent
additional client-side retries after reaching a configured threshold. The budget can be configured using a maximum
percentage of active requests, or an interval during which requests will be considered. In this release, this change has
moved to Experimental. Following a new naming convention, an experimental object name is prefaced with an X, thusBackendTrafficPolicy
has changed to XBackendTrafficPolicy
. The object group name has changed fromgateway.networking.k8s.io
to `gateway.networking.x...
This is a patch release that fixes the backward incompatibility with the SupportedFeatures
feature breaking change introduced in v1.2.0.
v1.2.0
introduced a breaking change in the SupportedFeatures
field of the GatewayClass
API. That broke already existing GatewayClass
es using the previous version of the feature. The fix to introduce backward compatibility is in (#3454, @LiorLieberman).This is a patch release that fixes some issues with GRPCRoute v1alpha2 and session
persistence, and backports some improvements on CI and the conformance suite. Details
follow.
On behalf of Kubernetes SIG Network, we are excited to announce the release of v1.2!
This release includes the graduation of 3 features to the standard channel and the introduction of 4 new features to the experimental channel, along with several improvements in many project areas.
GRPCRoute
and ReferenceGrant
v1alpha2
removal
As per a previous deprecation notice, in this version, both Experimental
and Standard channel CRDs will no longer serve the v1alpha2
versions
of GRPCRoute
and ReferenceGrant
.
Before upgrading to Gateway API v1.2, you'll want to confirm that any
implementations of Gateway API have been upgraded to support the v1
API
version of these resources instead of the v1alpha2
API version. Note that
even if you've been using v1
in your YAML manifests, a controller may still be
using v1alpha2
which would cause it to fail during this upgrade.
Once you've confirmed that the implementations you're relying on have upgraded
to v1, it's time to install the v1.2 CRDs. In most cases, this will work without
any additional effort.
If you ran into issues installing these CRDs, it likely means that you havev1alpha2
in the storedVersions
of one or both of these CRDs. This field is
used to indicate which API versions have ever been used to persist one of these
resources. Unfortunately, this field is not automatically pruned. To check these
values, you can run the following commands:
kubectl get crd grpcroutes.gateway.networking.k8s.io -ojsonpath="{.status.storedVersions}"
kubectl get crd referencegrants.gateway.networking.k8s.io -ojsonpath="{.status.storedVersions}"
If either of these return a list that includes "v1alpha2", it means that we need
to manually remove that version from storedVersions
.
Before doing that, it would be good to ensure that all your ReferenceGrants and
GRPCRoutes have been updated to the latest storage version:
crds=("GRPCRoutes" "ReferenceGrants")
for crd in "${crds[@]}"; do
output=$(kubectl get "${crd}" -A -o json)
echo "$output" | jq -c '.items[]' | while IFS= read -r resource; do
namespace=$(echo "$resource" | jq -r '.metadata.namespace')
name=$(echo "$resource" | jq -r '.metadata.name')
kubectl patch "${crd}" "${name}" -n "${namespace}" --type='json' -p='[{"op": "replace", "path": "/metadata/annotations/migration-time", "value": "'"$(date +%Y-%m-%dT%H:%M:%S)"'" }]'
done
done
Now that all your ReferenceGrant and GRPCRoute resources have been updated to
use the latest storage version, you can patch the ReferenceGrant and GRPCRoute
CRDs:
kubectl patch customresourcedefinitions referencegrants.gateway.networking.k8s.io --subresource='status' --type='merge' -p '{"status":{"storedVersions":["v1beta1"]}}'
kubectl patch customresourcedefinitions grpcroutes.gateway.networking.k8s.io --subresource='status' --type='merge' -p '{"status":{"storedVersions":["v1"]}}'
With these steps complete, upgrading to the latest GRPCRoute and ReferenceGrant
should work well now.
The Experimental supportedFeatures
field in GatewayClass status
has changed
from being a list of strings to being a list of objects/structs with a name
field.
This is to allow adding in extra information to each entry at a later date.
Relevant PRs:
There was one small change since RC2 - the Gateway Infrastructure conformance
test has been marked as provisional as we're not sure that the same-namespace
requirement imposed by this test is necessary. #3373
This was our first release using a new release
cycle that is
meant to make Gateway API releases more frequent and predictable.
There are now four phases:
For all the detail about this, please see the Release Cycle
docs.
Relevant PRs:
Standard Channel Additions and ChangesThe Standard channel is Gateway API's set of maximally-stable install files.
Only features with the best testing and support are added to the standard
channel. This channel should be considered GA or stable, and future changes will
be fully backwards compatible.
GEP-1867 added aninfrastructure
stanza to Gateway objects that is intended to carry
infrastructure configuration specific to that Gateway object.
GEP-1762 adds a section forlabels
and annotations
to this stanza that specifies labels and annotations
to be annotated to all resources created to fulfill that Gateway request.
This feature can be used to affect the labels and annotations created on
LoadBalancer Services by in-cluster implementations to fulfill the Gateway
contract or by Cloud Load Balancing resources created by Cloud Providers.
This feature has graduated to Standard and is now considered GA or Stable.
This feature's name for conformance tests and GatewayClass status reporting isGatewayInfrastructurePropagation
.
This feature's status is Extended, meaning that it is optional for
implementations to support. If you're using Experimental Channel, you can refer
to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The HTTPRoute Timeouts
field on Route Rules has graduated to Standard and is
now considered GA or Stable.
This field allows you to configure overall Request Timeouts as well as Backend
Request Timeouts. For more information, refer to GEP
1742.
The relevant feature names this for conformance tests and GatewayClass status
reporting are:
HTTPRouteRequestTimeout
for httproute.spec.rules[].timeouts.request
HTTPRouteBackendTimeout
for httproute.spec.rules[].timeouts.backendRequest
This feature's status is Extended, meaning that it is optional for
implementations to support. If you're using Experimental Channel, you can refer
to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The previous coordinated work across both Gateway API and upstream Kubernetes
which defined 3 new values for the AppProtocol field on Service Ports has
graduated to Standard and is now considered GA or Stable.
The values are:
kubernetes.io/h2c
- HTTP/2 over cleartext as described inkubernetes.io/ws
- WebSocket over cleartext as described inkubernetes.io/wss
- WebSocket over TLS as described inThese can now be used with Gateway API to describe the protocol to use for
connections to Kubernetes Services. For more information, refer to GEP
1911.
The relevant feature names this for conformance tests and GatewayClass status
reporting are:
HTTPRouteBackendProtocolH2C
for H2C support, whenservice.spec.ports[].appProtocol
is kubernetes.io/h2c
.HTTPRouteBackendProtocolWebSocket
for Websocket support, whenservice.spec.ports[].appProtocol
is kubernetes.io/ws
orkubernetes.io/wss
.This feature's status is Extended, meaning that it is optional for
implementations to support. If you're using Experimental Channel, you can refer
to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
This release candidate should be the same as the final v1.2.0 release.
This release candidate is suitable for implementors, but we do not recommend
shipping products based on a release candidate API due to the possibility of
incompatible changes prior to the final release. The following represents the
changes since v1.2.0-rc1:
GRPCRoute
and ReferenceGrant
v1alpha2
removal
As per a previous deprecation notice, in this version, both Experimental
and Standard channel YAMLs will no longer serve the v1alpha2
versions
of GRPCRoute
and ReferenceGrant
.
For the final release, we will provide pre-upgrade migration instructions
to cover folks who have been using the v1alpha2
versions of these objects.
We expect that this release candidate is quite close to the final v1.2.0 release. However, subsequent breaking API changes are still possible.
This release candidate is suitable for implementors, but we do not recommend shipping products based on a release candidate API due to the possibility of incompatible changes prior to the final release. The following represents the changes since v1.1.0:
Release Cycle changesThis was our first release using a new release cycle that is meant to make Gateway API releases more frequent and predictable.
There are now four phases:
For all the detail about this, please see the Release Cycle docs.
Relevant PRs:
Standard Channel Additions and ChangesThe Standard channel is Gateway API's set of maximally-stable install files. Only features with the best testing and support are added to the standard channel. This channel should be considered GA or stable, and future changes will be fully backwards compatible.
Infrastructure Labels and Annotations ๐GEP-1867 added an infrastructure
stanza to Gateway objects that is intended to carry infrastructure configuration specific to that Gateway object.
GEP-1762 adds a section for labels
and annotations
to this stanza that specifies labels and annotations to be annotated to all resources created to fulfill that Gateway request.
This feature can be used to affect the labels and annotations created on LoadBalancer Services by in-cluster implementations to fulfill the Gateway contract or by Cloud Load Balancing resources created by Cloud Providers.
This feature has graduated to Standard and is now considered GA or Stable.
This feature's name for conformance tests and GatewayClass status reporting is GatewayInfrastructurePropagation
.
This feature's status is Extended, meaning that it is optional for implementations to support. If you're using Experimental Channel, you can refer to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The HTTPRoute Timeouts
field on Route Rules has graduated to Standard and is now considered GA or Stable.
This field allows you to configure overall Request Timeouts as well as Backend Request Timeouts. For more information, refer to GEP 1742.
The relevant feature names this for conformance tests and GatewayClass status reporting are:
HTTPRouteRequestTimeout
for httproute.spec.rules[].timeouts.request
HTTPRouteBackendTimeout
for httproute.spec.rules[].timeouts.backendRequest
This feature's status is Extended, meaning that it is optional for implementations to support. If you're using Experimental Channel, you can refer to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The previous coordinated work across both Gateway API and upstream Kubernetes which defined 3 new values for the AppProtocol field on Service Ports has graduated to Standard and is now considered GA or Stable.
The values are:
kubernetes.io/h2c
- HTTP/2 over cleartext as described in RFC7540kubernetes.io/ws
- WebSocket over cleartext as described in RFC6445kubernetes.io/wss
- WebSocket over TLS as described in RFC6455These can now be used with Gateway API to describe the protocol to use for connections to Kubernetes Services. For more information, refer to GEP 1911.
The relevant feature names this for conformance tests and GatewayClass status reporting are:
HTTPRouteBackendProtocolH2C
for H2C support, when service.spec.ports[].appProtocol
is kubernetes.io/h2c
.HTTPRouteBackendProtocolWebSocket
for Websocket support, when service.spec.ports[].appProtocol
is kubernetes.io/ws
orkubernetes.io/wss
.This feature's status is Extended, meaning that it is optional for implementations to support. If you're using Experimental Channel, you can refer to the supportedFeatures
field in the status
of any GatewayClass.
Relevant PRs:
The Experimental Channel is Gateway API's channel for testing out changes and gaining confidence with them before allowing them to go to Standard.
This channel may include features that are changed or removed later!
BREAKING CHANGEThe Experimental supportedFeatures
field in GatewayClass status
has changed from being a list of strings to being a list of objects/structs with a name
field.
This is to allow addding in extra information to each entry at a later date.
Relevant PRs:
GEP-1731 described how to add configuration of retries on HTTPRoute objects, and in this release, this change has moved to Experimental.
Please see the GEP reference document or the API reference for the details.
This feature has graduated to Experimental amd should now be used for testing and verification purposes only. Experimental features may be changed or removed in a future version.
This feature does not currently have a feature name defined.
This feature's status is Extended, meaning that it is optional for implementations to support.
As there is no feature name or conformance tests available for this feature as yet, please see your implementation's documentation to see if it is supported.
Relevant PRs:
retry
stanza within HTTPRouteRule to configure retrying unsuccessful requests to backends before sending a response to a client by @mikemorris in #3199The existing Request Mirroring feature has been enhanced by allowing users to specify a percentage of requests they'd like mirrored. These changes are described in GEP-3171.
Please see the GEP reference document or the API reference for the details.
This feature has graduated to Experimental amd should now be used for testing and verification purposes only. Experimental features may be changed or removed in a future version.
This feature does not currently have a feature name defined.
This feature's status is Extended, meaning that it is optional f...
Read more v1.1.0 v1.1.0On behalf of Kubernetes SIG Network, we are pleased to announce the v1.1 release!
This release includes the graduation of several features to GA, including both
GRPCRoute and Service Mesh. We are also introducing several new experimental
features, including Session Persistence and Gateway Client Cert Verification.
The following represents the changes since v1.0.0:
Standard Channel GRPCRoute has Graduated to GA ๐GRPCRoute has graduated to GA (v1) and is now part of the Standard Channel. If
you are already using the experimental version GRPCRoute, we recommend holding
off on upgrading to the standard channel version of GRPCRoute until the
controllers you're using have been updated to support GRPCRoute v1. Until then,
it is safe to upgrade to the experimental channel version of GRPCRoute in v1.1
that includes both v1alpha2 and v1 API versions.
Leading Contributor: @gnossen
Service Mesh Support has Graduated to GA ๐The standard for using Gateway API for Mesh has formally graduated to GA (v1)
and is now part of the Standard Channel.
Service mesh support in Gateway API allows service mesh users to use the same
API to manage ingress traffic and mesh traffic, reusing the same policy and
routing interfaces. In Gateway API v1.1, routes (such as HTTPRoute) can now have
a Service
as a parentRef
, to control how traffic to specific services
behave. For more information, read the service
mesh documentation or see the list of
implementations.
Leading Contributors: @howardjohn, @keithmattix, @kflynn, @mikemorris
Conformance Profiles and ReportsThe Conformance Reports API and the corresponding test suite have been graduated
to GA. The Conformance report API has been expanded with the mode
field
(intended to specify the working mode of the implementation), and thegatewayAPIChannel
(standard or experimental). The gatewayAPIVersion
andgatewayAPIChannel
are now filled in automatically by the suite machinery,
along with a brief description of the testing outcome. The Reports have been
reorganized in a more structured way, and the implementations can now add
information on how the tests have been run and provide reproduction steps.
Leading Contributors: @mlavacca, @shaneutt
ParentRef Port field Graduated to GAThe port
field in ParentRefs has graduated to GA (v1) and is now part of the
Standard Channel. You can use the port
field to attach resources to Gateways,
Services, or other parent resources. For example, you can attach an HTTPRoute to
one or more specific Listeners of a Gateway based on the Listener port
,
instead of name
field.
Leading Contributor: @frankbu
Experimental Channel Session Persistence + BackendLBPolicySession Persistence is being introduced to Gateway API via a new policy
(BackendLBPolicy) for Service-level configuration and as fields within HTTPRoute
and GRPCRoute for Route-level configuration. The BackendLBPolicy and Route-level
APIs provide the same session persistence configuration, including session
timeouts, session name, session type, and cookie lifetime type.
Leading Contributors: @gcs278, @ginayeh
Gateway Client Cert VerificationGateways can now configure client cert verification for each Gateway Listener by
introducing a new field frontendValidation
field within tls
. This field
supports configuring a list of CA Certificates that can be used as a trust
anchor to validate the certificates presented by the client.
Leading Contributors: @arkodg
BackendTLSPolicyAs part of a broader goal of making our TLS terminology more consistent
throughout the API, we've introduced some breaking changes to BackendTLSPolicy.
This has resulted in a new API version (v1alpha3) and will require any existing
users of this policy to uninstall the v1alpha2 version before installing this
newer version.
Any references to v1alpha2 BackendTLSPolicy fields will need to be updated.
Specific changes include:
targetRef
field is now a targetRefs
list and these references nonamespace
field.tls
field has been renamed to validation
caCertRefs
field has been renamed to caCertificateRefs
wellKnownCACerts
field has been renamed to wellKnownCACertificates
Leading Contributors: @candita
Gateway ParamsGateways now feature a new field that allows references to
implementation-specific parameters, similar to GatewayClass.
Leading Contributors: @howardjohn
Everything Else gwctlget
command to support gateways, gatewayclasses, andget
command now provides more detailed information for httproutes,describe
command now supports descriptions of policycrds and namespaces.-l
get
and describe
commands. (#2892, #2915, #2934,Mesh-GRPC
profile has beenWe expect that this release candidate is quite close to the final v1.1.0
release. However, subsequent breaking API changes are still possible.
This release candidate is suitable for implementors, but we do not recommend
shipping products based on a release candidate API due to the possibility of
incompatible changes prior to the final release. The following represents the
changes since v1.1.0-rc1:
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4