-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[question] --enable_alpha_plugins #2721
Comments
previously asked: #1609 |
also relevant: #1504 |
Trying to add some commentary to this query... I am getting some internal pushback as I advocate for the use of Kustomize in production, specifically when used in combination with plugins requiring the I could reference @monopole in #1504 Should I expect to see continued support for 3rd party plugins from Kustomize, understanding the responsibility for reviewing and trusting said 3rd party plugins? |
Searched for Forgive me if you dislike being @-ed. I was hoping that as the maintainers/main contributors of the most popular (by stars) kustomize plugins you might have some input here. |
Another interesting data point... 82 markdown documents with references to |
I wouldn't call my plugin popular, but as a user i'd love to see this supported in stable (and possibly in kubectl with apply-k) |
my conclusion was: so my vote is, remove the flag, let them fly. You can't accidentally run a random plugin, they have to be in a well defined location that is not likely to be on unix path. |
Agree with @donbowman plugins allow the last-mile flexibility that is very useful for helping simplifying user/company-specific workflows. Go plugins are finicky but do the job. I think there is work to be done to unify the functionality and interface between the Go and Exec plugins. For example, one issue I've made is around the inconsistency and lack of support for behavior annotations for Go plugin. I can't claim security expertise, but because the plugin has to be installed to a specific path it definitely reduces the possibility of pure accidental execution of third party plugins. I also love the idea of code and security reviewed "kustomize certified/approved" plugins. Another point of reference is Google's kpt functions offer very similar functionality to Kustomzie plugins. Overall, I'm in favor of promoting it. |
Thank you all for the additional conversation and insights. For what it's worth I would be happy with/fully understand the need for a flag that makes clear some risk. It's the It implies that the feature could radically change or be suddenly removed. |
Has there been any update on this? Would be great if the flag was just |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle stale |
I strongly agree about the importance of plugins and would like to promote them, but some issues will need to be resolved as part of that. I have written up a KEP with a plan: kubernetes/enhancements#2954. If you are interested in this topic, I would love to get your feedback--please comment on that PR rather than here and follow the KEP issue going forward. Here is the full series of KEPs we are working on to making Kustomize plugins better:
|
@KnVerey forgive the "at" --- is it safe to assess that the above listed enhancements stalled out? -- do you have any insight into the likelihood of "graduating" plugins out of alpha? |
Is there a roadmap/plan to promote plugin support from alpha to beta -or- supported?
The text was updated successfully, but these errors were encountered: