Skip to content

Commit

Permalink
Patch relnotes.k8s.io with release v1.16.13
Browse files Browse the repository at this point in the history
  • Loading branch information
saschagrunert committed Jul 17, 2020
1 parent bcf5239 commit baf6dae
Show file tree
Hide file tree
Showing 2 changed files with 109 additions and 0 deletions.
108 changes: 108 additions & 0 deletions src/assets/release-notes-1.16.13.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,108 @@
{
"91948": {
"commit": "302cc2524abd9e17c53b34626c2bfa5eb56f1681",
"text": "fix: use force detach for azure disk",
"markdown": "Fix: use force detach for azure disk ([#91948](https://github.com/kubernetes/kubernetes/pull/91948), [@andyzhangx](https://github.com/andyzhangx)) [SIG Cloud Provider]",
"author": "andyzhangx",
"author_url": "https://github.com/andyzhangx",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/91948",
"pr_number": 91948,
"areas": ["cloudprovider", "provider/azure"],
"kinds": ["bug"],
"sigs": ["cloud-provider"],
"release_version": "1.16.13"
},
"92035": {
"commit": "24212641c73bc02f39f73e6ac09122b28b38b80b",
"text": "Fixes a problem with 63-second or 1-second connection delays with some VXLAN-based\nnetwork plugins which was first widely noticed in 1.16 (though some users saw it\nearlier than that, possibly only with specific network plugins). If you were previously\nusing ethtool to disable checksum offload on your primary network interface, you should\nnow be able to stop doing that.",
"markdown": "Fixes a problem with 63-second or 1-second connection delays with some VXLAN-based\n network plugins which was first widely noticed in 1.16 (though some users saw it\n earlier than that, possibly only with specific network plugins). If you were previously\n using ethtool to disable checksum offload on your primary network interface, you should\n now be able to stop doing that. ([#92035](https://github.com/kubernetes/kubernetes/pull/92035), [@danwinship](https://github.com/danwinship)) [SIG Network and Node]",
"author": "danwinship",
"author_url": "https://github.com/danwinship",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92035",
"pr_number": 92035,
"areas": ["ipvs", "kubelet"],
"kinds": ["bug"],
"sigs": ["network", "node"],
"duplicate": true,
"release_version": "1.16.13"
},
"92166": {
"commit": "bc8908d041e65417863f4dd8a32b0e3d3cc26946",
"text": "fix: GetLabelsForVolume panic issue for azure disk PV",
"markdown": "Fix: GetLabelsForVolume panic issue for azure disk PV ([#92166](https://github.com/kubernetes/kubernetes/pull/92166), [@andyzhangx](https://github.com/andyzhangx)) [SIG Cloud Provider]",
"author": "andyzhangx",
"author_url": "https://github.com/andyzhangx",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92166",
"pr_number": 92166,
"areas": ["cloudprovider", "provider/azure"],
"kinds": ["bug"],
"sigs": ["cloud-provider"],
"release_version": "1.16.13"
},
"92626": {
"commit": "4bcf7fe48ae66f4c393a639f5b3dbdc81611ea70",
"text": "- hyperkube: Use debian-hyperkube-base@v1.1.1 image\n\n Includes iproute2 to fix a regression in hyperkube images\n when using hyperkube as a kubelet",
"markdown": "- hyperkube: Use debian-hyperkube-base@v1.1.1 image\n \n Includes iproute2 to fix a regression in hyperkube images\n when using hyperkube as a kubelet ([#92626](https://github.com/kubernetes/kubernetes/pull/92626), [@justaugustus](https://github.com/justaugustus)) [SIG Cluster Lifecycle, Network and Release]",
"author": "justaugustus",
"author_url": "https://github.com/justaugustus",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92626",
"pr_number": 92626,
"kinds": ["regression"],
"sigs": ["cluster-lifecycle", "network", "release"],
"duplicate": true,
"release_version": "1.16.13"
},
"92644": {
"commit": "0707ac1a824d8f59164e0ecb16ae099dddb42da7",
"text": "Extend kube-apiserver /readyz with new \"informer-sync\" check ensuring that internal informers are synced.",
"markdown": "Extend kube-apiserver /readyz with new \"informer-sync\" check ensuring that internal informers are synced. ([#92644](https://github.com/kubernetes/kubernetes/pull/92644), [@wojtek-t](https://github.com/wojtek-t)) [SIG API Machinery and Testing]",
"author": "wojtek-t",
"author_url": "https://github.com/wojtek-t",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92644",
"pr_number": 92644,
"areas": ["apiserver", "test"],
"kinds": ["bug"],
"sigs": ["api-machinery", "testing"],
"duplicate": true,
"release_version": "1.16.13"
},
"92720": {
"commit": "02213458ff6211b71976324612fa73684269b11c",
"text": "kubeadm: add the deprecated flag --port=0 to kube-controller-manager and kube-scheduler manifests to disable insecure serving. Without this flag the components by default serve (e.g. /metrics) insecurely on the default node interface (controlled by --address). Users that wish to override this behavior and enable insecure serving can pass a custom --port=X via kubeadm's \"extraArgs\" mechanic for these components.",
"markdown": "Kubeadm: add the deprecated flag --port=0 to kube-controller-manager and kube-scheduler manifests to disable insecure serving. Without this flag the components by default serve (e.g. /metrics) insecurely on the default node interface (controlled by --address). Users that wish to override this behavior and enable insecure serving can pass a custom --port=X via kubeadm's \"extraArgs\" mechanic for these components. ([#92720](https://github.com/kubernetes/kubernetes/pull/92720), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]",
"author": "neolit123",
"author_url": "https://github.com/neolit123",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92720",
"pr_number": 92720,
"areas": ["kubeadm", "security"],
"kinds": ["bug"],
"sigs": ["cluster-lifecycle"],
"release_version": "1.16.13"
},
"92916": {
"commit": "14eea29ca483ea044f7ad80dc413b014b7959192",
"text": "CVE-2020-8557 (Medium): Node-local denial of service via container /etc/hosts file. See https://github.com/kubernetes/kubernetes/issues/93032 for more details.",
"markdown": "CVE-2020-8557 (Medium): Node-local denial of service via container /etc/hosts file. See https://github.com/kubernetes/kubernetes/issues/93032 for more details. ([#92916](https://github.com/kubernetes/kubernetes/pull/92916), [@joelsmith](https://github.com/joelsmith)) [SIG Node]",
"author": "joelsmith",
"author_url": "https://github.com/joelsmith",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92916",
"pr_number": 92916,
"areas": ["kubelet"],
"kinds": ["bug"],
"sigs": ["node"],
"release_version": "1.16.13"
},
"92941": {
"commit": "dda9914de448ab767b7c01ebec7f8aaf26da4f4e",
"text": "CVE-2020-8559 (Medium): Privilege escalation from compromised node to cluster. See https://github.com/kubernetes/kubernetes/issues/92914 for more details.\nThe API Server will no longer proxy non-101 responses for upgrade requests. This could break proxied backends (such as an extension API server) that respond to upgrade requests with a non-101 response code.",
"markdown": "CVE-2020-8559 (Medium): Privilege escalation from compromised node to cluster. See https://github.com/kubernetes/kubernetes/issues/92914 for more details.\n The API Server will no longer proxy non-101 responses for upgrade requests. This could break proxied backends (such as an extension API server) that respond to upgrade requests with a non-101 response code. ([#92941](https://github.com/kubernetes/kubernetes/pull/92941), [@tallclair](https://github.com/tallclair)) [SIG API Machinery]",
"author": "tallclair",
"author_url": "https://github.com/tallclair",
"pr_url": "https://github.com/kubernetes/kubernetes/pull/92941",
"pr_number": 92941,
"kinds": ["bug"],
"sigs": ["api-machinery"],
"action_required": true,
"release_version": "1.16.13"
}
}
1 change: 1 addition & 0 deletions src/environments/assets.ts
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
export const assets = [
'assets/release-notes-1.16.13.json',
'assets/release-notes-1.19.0-rc.1.json',
'assets/release-notes-1.19.0-rc.0.json',
'assets/release-notes-1.17.8.json',
Expand Down

0 comments on commit baf6dae

Please sign in to comment.