-
Notifications
You must be signed in to change notification settings - Fork 1.6k
KEP-2535: retarget alpha in 1.31 and update to readd the disk check #4693
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
based on prior feedback kubernetes/kubernetes#114847 (comment) - there was a request to consider splitting up the config items, one to specify the duration for rechecking, and another for whether or not cross pod checking is enabled on the node.
Thanks for the reminder! I have updated it |
| when the feature gate is on the second pod will receive an error message, where | ||
| before and with the feature gate off the second pod would be able to use the image | ||
| pulled with credentials by the first pod. | ||
| For the `Never` policy, the behavior also must change. Otherwise, a user who wishes to use the image of another pod could just use `Never` and hope |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
note to a reviewer: this is a net-new aspect of this KEP, PTAL
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see comments..
|
I reworked the summary @mikebrow PTAL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
|
Since PRR approval was nearly 3 years ago, I am sure the PRR questions have a few new ones since then. Please sync up with the latest template. Also, glancing through it, rather than saying "see above" for the "default behavior" question, can you call out the significant user-visible default behavior changes? Something like "some pods may begin to see errors if they do not have imagePullSecrets defined under such-and-such conditions". Also "going back to works as designed" is not very clear for the question on disablement. Maybe something like "pods will be able to use images without verifying their access to secrets" or something a little more complete. May I also suggest you add a metric NOW, with the feature gate DISABLED, which identifies which Pods would have had an error, if the feature gate were enabled. This allows admins to see if they will get errors in their clusters, before they even anbel the feature gate. |
|
/hold for PRR question updates |
…uration flag to define different behaviors" This reverts commit b14b2ee. As the suggestion to drop the persist caused it to be blocked at code merge in 1.30. Reintroduce the cache concept Signed-off-by: Peter Hunt <[email protected]>
Signed-off-by: Peter Hunt <[email protected]>
Signed-off-by: Peter Hunt <[email protected]>
…be added Signed-off-by: Peter Hunt <[email protected]>
Signed-off-by: Peter Hunt <[email protected]>
Signed-off-by: Peter Hunt <[email protected]>
Signed-off-by: Peter Hunt <[email protected]>
93dec15 to
7abe3dd
Compare
|
thanks @johnbelamaric! I checked and didn't see any PRR sections that had changed since this was filled out. I updated based on some of your feedback and embellished generally, PTAL |
|
/approve for PRR I am leaving the hold on for SIG approval. Once there is SIG approval, you can release the hold. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: haircommander, johnbelamaric, mikebrow, mrunalp The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/lgtm |
Ensure secret pulled images #2535