-
Notifications
You must be signed in to change notification settings - Fork 701
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
REQUEST: Create new repository for kube-network-policies #4856
Comments
/cc @danwinship @thockin |
/cc @ameukam |
Should bikeshed the name a bit; we don't really use "netpol" as an abbreviation anywhere other than Should it have "reference" or "userspace" or something in the name to better distinguish it from other things? |
+1 FWIW. we could just use an acronym for the name ? nprc (Network Policy Reference Controller) ? |
yes please, I prefer something more sounding 👍 praesidium |
/hold vote with the icons above |
If this is purely a "reference implementation" then it should have a boring, obvious name. If we intend for it to actually be/become a viable option for use in production clusters, then it could have a more "exciting" name (though it doesn't need to, eg, "kube-proxy"). But that also implies more of a commitment from SIG Network and maybe this needs to be discussed somewhere? FTR I was objecting to "kube-netpol" solely on the grounds that we don't normally use "netpol" as an abbreviation for "NetworkPolicy". |
I'd like to make this a kube-proxy like but for network policies, not a project in its own, having adoption on users should not be a goal of the project ... having something that helps us to get CI signal and validate APIs is a goal
|
/retitle REQUEST: Create new repository for kube-network-policies (fix typo) |
/hold cancel |
cc @kubernetes/owners 🙏🏾 |
/unassign @mrbobbytables I think he is out until next week, maybe someone else from @kubernetes/owners can take it? |
/assign I'll go ahead with creating the new repo @aojea @danwinship, the requested new repo will be part of which subproject of sig-network? network-policy? |
New repo: https://github.com/kubernetes-sigs/kube-network-policies PR to add GitHub teams for the new repo: #4892 will wait for input on the subproject name #4856 (comment) and then create another PR to add documentation in k/community. Thanks! |
PR to document new repo to k/community - kubernetes/community#7832 |
All PRs are merged. New Repo is ready. /close |
@Priyankasaggu11929: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
New repo, staging repo, or migrate existing
New repo
Is it a staging repo?
no
Requested name for new repository
kube-network-policies
Which Organization should it reside
kubernetes-sigs
Who should have admin access?
aojea, danwinship, thockin
Who should have write access?
aojea, danwinship, thockin
Who should be listed as approvers in OWNERS?
aojea, danwinship, thockin
Who should be listed in SECURITY_CONTACTS?
aojea, danwinship, thockin
What should the repo description be?
Kubernetes network policies
What SIG and subproject does this fall under?
sig-network, subg project https://github.com/kubernetes/community/blob/master/sig-network/README.md#network-policy
Please provide references to appropriate approval for this new repo
There are only two jobs that test network policies and are using calico
Calico is a third dependency we don't have control and jobs are failing for some time now kubernetes/kubernetes#124130
It turns out that is easier to have our own implementation of network policies, that can also expanded to support admin network policies, than to debug third party network plugins, so I created one in https://github.com/aojea/kube-netpol that I'd like to donate to the kubernetes project
Additional context for request
No response
The text was updated successfully, but these errors were encountered: