-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update status of GMSA KEP to Implementable #710
Conversation
/hold |
/lgtm |
Before moving to implementable, I had these questions:
|
Deep will likely reply to all of these as we already addressed some of them like 2 and 4 out of band (he already updated the comment for 4). |
Rebased PR to resolve conflicts due to changes in the KEP from other branches. |
/lgtm |
open questions:
|
hi @liggitt , i answered the first portion of your sig-windows question to Brian the other day. here's what i had mentioned |
Regarding the question for sig-node:
I found the following comment that I think is relevant in the context of annotations being used in the alpha phase for this feature at https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/apis/cri/runtime/v1alpha2/api.proto#L352 and our plan to eventually convert it into a string field later.
|
Signed-off-by: Deep Debroy <ddebroy@docker.com>
agreed, and if the changes were limited to the runtime impl, I'd have no concerns with this experimentation. since the changes touch kubelet/dockershim, I wanted sig-node to ack the plan. |
I brought up the questions for SIG Node at the SIG Node meeting today [Jan 29th]:
SIG Node clarified that as long as the code is feature gated, there is no major concern. @PatrickLang also pointed out that in dockershim, this is already done today for Hyper-V isolation at:
SIG Node mentioned that there is no effort or initiative underway to look at this reconciliation right now. The main challenge is that on end, pod API is scoped at the pod level while on the other end, OCI is scoped at the container level. Therefore some amount of code is necessary to transform relevant portions of a pod spec to an OCI spec for each container in the pod. Based on the above discussion in SIG node in the Jan 29th meeting, I think at this point, the above two questions for SIG Node are resolved. @liggitt let me know if we missed something. |
To add to that, there are also many different implementations that translates CRI -> OCI to achieve different runtimes. To switch to using OCI, kubelet will have to absorb all the code, defeating the extensibility brought by the interface. There's definitely some middle ground, and plenty more improvements can be made on the APIs. No one is actively looking at this area in sig node AFAIK though. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ddebroy, michmike, yujuhong The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold cancel |
Thanks so much for the detailed review and feedback on the GMSA KEP so far.
Updating status of GMSA KEP to implementable based on having addressed all outstanding feedback so far from latest review in #694. Approvers: @PatrickLang , @yujuhong and @liggitt PTAL so that we can get started on the Alpha implementation of GMSA.
cc @JeremyWx @wk8