Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions modules/nw-ingress-gateway-api-implementation.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -18,3 +18,13 @@ Any CRDs created within an {product-title} {product-version} cluster are compati
If you are updating your cluster from a previous {product-title} version that contains Gateway API CRDs change those resources so that they exactly match the version supported by {product-title}. Otherwise, you cannot update your cluster because those CRDs were not managed by {product-title}, and could contain functionality that is unsupported by Red{nbsp}Hat.
====

[id="gateway-api-x-k8s-io-crds_{context}"]
== Gateway API CRDs in the x-k8s.io API group

In previous versions of {product-title}, deploying Gateway API CRDs that belong to the `x-k8s.io` group, such as `gateway.networking.x-k8s.io`, was blocked. Starting in {product-title} 4.22, this restriction is removed, and you can deploy Gateway API CRDs that belong to the `x-k8s.io` group.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

one question/suggestion: we allow deploying this group, but it doesn't mean we will reconcile it. Is there a good way of saying "these APIs will still be ignored by our Gateway API implementation and can be used by 3rd party implementations" ?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@rikatz I'll look and see!


[NOTE]
====
Experimental Gateway API CRDs in the `gateway.networking.k8s.io` group remain restricted. Only `x-k8s.io` group resources are unblocked.
====

9 changes: 7 additions & 2 deletions modules/nw-ingress-gateway-api-manage-succession.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,12 @@
[id="nw-ingress-gateway-api-manage-succession_{context}"]
= Preparing for Gateway API management succession by the Ingress Operator

Starting in {product-title} 4.19, the Ingress Operator manages the lifecycle of any Gateway API custom resource definitions (CRDs). This means that you will be denied access to creating, updating, and deleting any CRDs within the API groups that are grouped under Gateway API.
Starting in {product-title} 4.19, the Ingress Operator manages the lifecycle of any Gateway API custom resource definitions (CRDs). This means that you will be denied access to creating, updating, and deleting any CRDs within the `gateway.networking.k8s.io` API group.

[NOTE]
====
Starting in {product-title} 4.22, CRDs that belong to the `x-k8s.io` group, such as `gateway.networking.x-k8s.io`, are no longer restricted. You can deploy Gateway API CRDs in the `x-k8s.io` group without interference from the Ingress Operator. Experimental CRDs in the `gateway.networking.k8s.io` group remain restricted.
====

Updating from a version before 4.19 of {product-title} where this management was not present requires you to replace or remove any Gateway API CRDs that already exist in the cluster so that they conform to the specific {product-title} specification required by the Ingress Operator. {product-title} version 4.19 requires Gateway API Standard version 1.2.1 CRDs.

Expand All @@ -31,7 +36,7 @@ Backup and restore can fail or result in data loss for any CRD fields that were
+
[source,terminal]
----
$ oc get crd | grep -F -e gateway.networking.k8s.io -e gateway.networking.x-k8s.io
$ oc get crd | grep -F gateway.networking.k8s.io
----
+
.Example output
Expand Down
18 changes: 18 additions & 0 deletions modules/rn-ocp-release-notes-notable-changes.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
:_mod-docs-content-type: REFERENCE
[id="rn-ocp-release-notes-notable-changes_{context}"]
= Notable technical changes
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🤖 [error] AsciiDocDITA.ShortDescription: Assign [role="_abstract"] to a paragraph to use it as in DITA.


This section includes several technical changes for {product-title} {product-version}.

////
Instructions: Add entries in the following format:

Item description::
+
Detailed information.
////

Gateway API `x-k8s.io` group CRDs are no longer restricted::
+
In previous versions of {product-title}, deploying Gateway API custom resource definitions (CRDs) that belong to the `x-k8s.io` group was blocked. Starting in {product-title} {product-version}, this restriction is removed, and you can deploy Gateway API CRDs that belong to the `x-k8s.io` group, such as `gateway.networking.x-k8s.io`. Experimental CRDs in the `gateway.networking.k8s.io` group remain restricted. For more information, see xref:../networking/ingress_load_balancing/configuring_ingress_cluster_traffic/ingress-gateway-api.adoc#nw-ingress-gateway-api-implementation_ingress-gateway-api[Gateway API implementation for {product-title}].
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🤖 [error] OpenShiftAsciiDoc.NoXrefInModules: Do not include xrefs in modules, only assemblies (exception: release notes modules).