Merge pull request #48499 from zhangxiaoyu-zidif/fix-format-changelog-v.1.7.0-alpha.4

Automatic merge from submit-queue

fix style of yaml and text

**What this PR does / why we need it**:
The original format is very odd. So I try to fix it.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #

**Special notes for your reviewer**:

**Release note**:

```release-note
NONE
```
This commit is contained in:
Kubernetes Submit Queue 2017-07-05 13:28:21 -07:00 committed by GitHub
commit 3f0141edd5

View File

@ -2074,37 +2074,41 @@ filename | sha256 hash
* Support updating storageclasses in etcd to storage.k8s.io/v1. You must do this prior to upgrading to 1.8. ([#46116](https://github.com/kubernetes/kubernetes/pull/46116), [@ncdc](https://github.com/ncdc))
* The namespace API object no longer supports the deletecollection operation. ([#46407](https://github.com/kubernetes/kubernetes/pull/46407), [@liggitt](https://github.com/liggitt))
* NetworkPolicy has been moved from `extensions/v1beta1` to the new ([#39164](https://github.com/kubernetes/kubernetes/pull/39164), [@danwinship](https://github.com/danwinship))
* `networking.k8s.io/v1` API group. The structure remains unchanged from
* the beta1 API.
* The `net.beta.kubernetes.io/network-policy` annotation on Namespaces
* to opt in to isolation has been removed. Instead, isolation is now
* determined at a per-pod level, with pods being isolated if there is
* any NetworkPolicy whose spec.podSelector targets them. Pods that are
* targeted by NetworkPolicies accept traffic that is accepted by any of
* the NetworkPolicies (and nothing else), and pods that are not targeted
* by any NetworkPolicy accept all traffic by default.
* Action Required:
* When upgrading to Kubernetes 1.7 (and a network plugin that supports
* the new NetworkPolicy v1 semantics), to ensure full behavioral
* compatibility with v1beta1:
* 1. In Namespaces that previously had the "DefaultDeny" annotation,
* you can create equivalent v1 semantics by creating a
* NetworkPolicy that matches all pods but does not allow any
* traffic:
* kind: NetworkPolicy
* apiVersion: networking.k8s.io/v1
* metadata:
* name: default-deny
* spec:
* podSelector:
* This will ensure that pods that aren't matched by any other
* NetworkPolicy will continue to be fully-isolated, as they were
* before.
* 2. In Namespaces that previously did not have the "DefaultDeny"
* annotation, you should delete any existing NetworkPolicy
* objects. These would have had no effect before, but with v1
* semantics they might cause some traffic to be blocked that you
* didn't intend to be blocked.
`networking.k8s.io/v1` API group. The structure remains unchanged from
the beta1 API.
The `net.beta.kubernetes.io/network-policy` annotation on Namespaces
to opt in to isolation has been removed. Instead, isolation is now
determined at a per-pod level, with pods being isolated if there is
any NetworkPolicy whose spec.podSelector targets them. Pods that are
targeted by NetworkPolicies accept traffic that is accepted by any of
the NetworkPolicies (and nothing else), and pods that are not targeted
by any NetworkPolicy accept all traffic by default.
Action Required:
When upgrading to Kubernetes 1.7 (and a network plugin that supports
the new NetworkPolicy v1 semantics), to ensure full behavioral
compatibility with v1beta1:
1. In Namespaces that previously had the "DefaultDeny" annotation,
you can create equivalent v1 semantics by creating a
NetworkPolicy that matches all pods but does not allow any
traffic:
```yaml
kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: default-deny
spec:
podSelector:
```
This will ensure that pods that aren't matched by any other
NetworkPolicy will continue to be fully-isolated, as they were
before.
2. In Namespaces that previously did not have the "DefaultDeny"
annotation, you should delete any existing NetworkPolicy
objects. These would have had no effect before, but with v1
semantics they might cause some traffic to be blocked that you
didn't intend to be blocked.
### Other notable changes
@ -2567,37 +2571,41 @@ filename | sha256 hash
* Support updating storageclasses in etcd to storage.k8s.io/v1. You must do this prior to upgrading to 1.8. ([#46116](https://github.com/kubernetes/kubernetes/pull/46116), [@ncdc](https://github.com/ncdc))
* The namespace API object no longer supports the deletecollection operation. ([#46407](https://github.com/kubernetes/kubernetes/pull/46407), [@liggitt](https://github.com/liggitt))
* NetworkPolicy has been moved from `extensions/v1beta1` to the new ([#39164](https://github.com/kubernetes/kubernetes/pull/39164), [@danwinship](https://github.com/danwinship))
* `networking.k8s.io/v1` API group. The structure remains unchanged from
* the beta1 API.
* The `net.beta.kubernetes.io/network-policy` annotation on Namespaces
* to opt in to isolation has been removed. Instead, isolation is now
* determined at a per-pod level, with pods being isolated if there is
* any NetworkPolicy whose spec.podSelector targets them. Pods that are
* targeted by NetworkPolicies accept traffic that is accepted by any of
* the NetworkPolicies (and nothing else), and pods that are not targeted
* by any NetworkPolicy accept all traffic by default.
* Action Required:
* When upgrading to Kubernetes 1.7 (and a network plugin that supports
* the new NetworkPolicy v1 semantics), to ensure full behavioral
* compatibility with v1beta1:
* 1. In Namespaces that previously had the "DefaultDeny" annotation,
* you can create equivalent v1 semantics by creating a
* NetworkPolicy that matches all pods but does not allow any
* traffic:
* kind: NetworkPolicy
* apiVersion: networking.k8s.io/v1
* metadata:
* name: default-deny
* spec:
* podSelector:
* This will ensure that pods that aren't matched by any other
* NetworkPolicy will continue to be fully-isolated, as they were
* before.
* 2. In Namespaces that previously did not have the "DefaultDeny"
* annotation, you should delete any existing NetworkPolicy
* objects. These would have had no effect before, but with v1
* semantics they might cause some traffic to be blocked that you
* didn't intend to be blocked.
`networking.k8s.io/v1` API group. The structure remains unchanged from
the beta1 API.
The `net.beta.kubernetes.io/network-policy` annotation on Namespaces
to opt in to isolation has been removed. Instead, isolation is now
determined at a per-pod level, with pods being isolated if there is
any NetworkPolicy whose spec.podSelector targets them. Pods that are
targeted by NetworkPolicies accept traffic that is accepted by any of
the NetworkPolicies (and nothing else), and pods that are not targeted
by any NetworkPolicy accept all traffic by default.
Action Required:
When upgrading to Kubernetes 1.7 (and a network plugin that supports
the new NetworkPolicy v1 semantics), to ensure full behavioral
compatibility with v1beta1:
1. In Namespaces that previously had the "DefaultDeny" annotation,
you can create equivalent v1 semantics by creating a
NetworkPolicy that matches all pods but does not allow any
traffic:
```yaml
kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: default-deny
spec:
podSelector:
```
This will ensure that pods that aren't matched by any other
NetworkPolicy will continue to be fully-isolated, as they were
before.
2. In Namespaces that previously did not have the "DefaultDeny"
annotation, you should delete any existing NetworkPolicy
objects. These would have had no effect before, but with v1
semantics they might cause some traffic to be blocked that you
didn't intend to be blocked.
### Other notable changes