Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KEP-2008: changed to target 1.25 #3264

Merged
merged 1 commit into from
May 31, 2022

Conversation

adrianreber
Copy link
Contributor

@mrunalp @mikebrow @derekwaynecarr PTAL

Let me know if the KEP needs more details about the CRI API changes. Most of the discussion happened so far in the code PR (kubernetes/kubernetes#104907)

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Apr 5, 2022
@k8s-ci-robot
Copy link
Contributor

Hi @adrianreber. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Apr 5, 2022
@k8s-ci-robot k8s-ci-robot added kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/node Categorizes an issue or PR as relevant to SIG Node. labels Apr 5, 2022
Copy link
Member

@ehashman ehashman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/ok-to-test
/lgtm

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Apr 7, 2022
@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 7, 2022
@adrianreber adrianreber force-pushed the 2022-04-05-kep-2008 branch from 5aea967 to c0d84f0 Compare April 8, 2022 07:25
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 8, 2022
@rphillips
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label May 10, 2022
@mrunalp
Copy link
Contributor

mrunalp commented May 10, 2022

/lgtm

@dims
Copy link
Member

dims commented May 15, 2022

/milestone v1.25

@k8s-ci-robot k8s-ci-robot added this to the v1.25 milestone May 15, 2022
Signed-off-by: Adrian Reber <areber@redhat.com>
@adrianreber adrianreber force-pushed the 2022-04-05-kep-2008 branch from f820acc to 645fee8 Compare May 17, 2022 16:14
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label May 17, 2022
@zouyee
Copy link
Member

zouyee commented May 17, 2022

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label May 17, 2022
@adrianreber
Copy link
Contributor Author

@rphillips @mrunalp PTAL. I removed the unused ContainerRestore RPC as it was something many reviewers were uncomfortable with. I am able to restore a container going through Create/Start so that the Restore RPC is not needed anymore.

This update of the PR only removes things which makes the whole KEP and code PR simpler. Please add your /lgtm once more if you still think this is ready.

@mrunalp
Copy link
Contributor

mrunalp commented May 19, 2022

/lgtm

```
with the following parameters:
```
message CheckpointContainerRequest {
Copy link
Member

@mikebrow mikebrow May 24, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

needs a security statement / set of requirements for this service, validating the request and destination are authorized. see https://github.com/kubernetes/enhancements/pull/1990/files#r798031530

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mikebrow Thanks for helping with this KEP. Can you be more specific what you would expect here. Looking at @derekwaynecarr comment on the original KEP it says:

please add detail on checkpoint authorization, we will need to restrict access to the kubelet api resource.

on the container runtime, the actual checkpoint is stored in a location is restricted, but prior to beta, we need clear security practices documented.

Are there already other kubelet API resources which have this kind of authorization? Accessing the kubelet API is not possible without access to the certificates as far as I understand it. Do we need additional authorization? If there is an existing mechanism I am happy to include this. If there is any authorization available on the kubelet API I am not sure I have the necessary understanding of the kubelet to introduce something like that.

@derekwaynecarr
Copy link
Member

/approve
/lgtm

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: adrianreber, derekwaynecarr, rst0git

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 31, 2022
@derekwaynecarr
Copy link
Member

@adrianreber thanks for the work, and look forward to refining the use case.

@k8s-ci-robot k8s-ci-robot merged commit 4f0c45b into kubernetes:master May 31, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. sig/node Categorizes an issue or PR as relevant to SIG Node. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
Development

Successfully merging this pull request may close these issues.

10 participants