-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identify Windows pods at API admission level authoritatively #2802
Comments
/sig windows |
/milestone v1.23 |
Hi @ravisantoshgudimetla! 1.23 Enhancements team here. Just checking in as we approach enhancements freeze on Thursday 09/09. Here's where this enhancement currently stands:
Starting with 1.23, we have implented a soft freeze on production readiness reviews beginning on Thursday 09/02. If your enhancement needs a PRR, please make sure to try and complete it by that date! Thanks! |
Hi @ravisantoshgudimetla! 1.23 Enhancements shadow here👋🏽 Just following up as we are approaching the enhancements freeze on Thursday 09/09. Here's where this enhancement currently stands:
Looks like this issue is all set for the Enhancement Freeze 🎉 Thank you! |
Hi @ravisantoshgudimetla 👋 1.23 Docs shadow here. This enhancement is marked as 'Needs Docs' for the 1.23 release. Please follow the steps detailed in the documentation to open a PR against the dev-1.23 branch in the k/website repo. This PR can be just a placeholder at this time and must be created before Thu November 18, 11:59 PM PDT. Also, if needed take a look at Documenting for a release to familiarize yourself with the docs requirement for the release. Thanks! |
Do we have a list of recognised operating system names / intend to have a list like that? If so, we should aim to document what that list of names consists of. These might be borrowed from elsewhere; that's OK, and we can document where to look. |
Linking some implementation PRs |
Hi @ravisantoshgudimetla! 1.23 Enhancements shadow here👋🏽 I see that the two PRs are merged. Are there any open PRs that need to be linked to this issue? |
@supriya-premkumar - All the needed PRs merged. Will open a docs PR shortly |
👋 Hello @ravisantoshgudimetla, 1.25 Enhancements team here. Just checking in as we approach enhancements freeze on 18:00 PST on Thursday June 16, 2022. Here's where this enhancement currently stands:
Looks like for this one, we need to merge #3303 which includes everything to meet all requirements for enhancements freeze. For note, the status of this enhancement is marked as |
Hi @rhockenbury KEP has updated test plan - Can you take a look. I can ask folks from prod readiness to review it then. |
@ravisantoshgudimetla Yes, it looks like all requirements for enhancement freeze will be met once #3303 is merged. |
With #3303 merged, I have this marked as |
Checking in once more as we approach 1.25 code freeze at 01:00 UTC on Wednesday, 3rd August 2022. Please ensure the following items are completed:
Please verify, if there are any additional k/k PRs besides the ones listed above. |
We should document (Windows is one supported When we add that documentation, consider updating the release note for kubernetes/kubernetes#111229 |
1.25 Release Docs Shadow here. Does this enhancement work planned for 1.25 require any new docs or modification to existing docs? |
Hello @ravisantoshgudimetla 👋 With the k/k code PRs, now merged, the enhancement is ready for the 1.25 code freeze The status of this enhancement is currently marked as Thank you. |
I recommend mentioning kubernetes/website#35985 in the KEP issue description. |
done! |
This is merged. |
/close Thanks @ravisantoshgudimetla for all of your contributions here! |
@marosset: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Enhancement Description
Identifying Windows pods at the API admission level authoritatively is crucial to apply appropriate security constraints to the pod. We rely on kubelet to strip certain security constraints when the pod lands on the node. While this is workable solution identifying all the valid scenarios during kubelet admission time is hard and not scalable. Having the identification done during the API admission would also help the other admission controllers like PodSecurityAdmission to authoritatively apply security constraints.
k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update PR(s): [docs][windows]: Pod OS field update website#30436k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update(s):k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update(s):Please keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
The text was updated successfully, but these errors were encountered: