Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bring Network Policy to GA #185

Closed
23 tasks
mdelio opened this issue Jan 27, 2017 · 20 comments
Closed
23 tasks

Bring Network Policy to GA #185

mdelio opened this issue Jan 27, 2017 · 20 comments
Assignees
Labels
sig/network Categorizes an issue or PR as relevant to SIG Network. stage/stable Denotes an issue tracking an enhancement targeted for Stable/GA status
Milestone

Comments

@mdelio
Copy link

mdelio commented Jan 27, 2017

Feature Description

  • One-line feature description (can be used as a release note): NetworkPolicy promoted to GA
  • Primary contact (assignee): @danwinship
  • Responsible SIGs: @kubernetes/sig-network-misc
  • Design proposal link (community repo): Design Proposal
  • Reviewer(s): @thockin @caseydavenport
  • Approver: @thockin
  • Feature target (which target equals to which milestone):
    • Alpha release target (x.y) N/A
    • Beta release target (x.y) v1.5.0
    • Stable release target (x.y) v1.7.0
# Description Network Policy is a specification of how selections of pods are allowed to communicate with each other and other network endpoints.

Progress Tracker

  • Alpha
    • Write and maintain draft quality doc
      • During development keep a doc up-to-date about the desired experience of the feature and how someone can try the feature in its current state. Think of it as the README of your new feature and a skeleton for the docs to be written before the Kubernetes release. Paste link to Google Doc: DOC-LINK
    • Design Approval
      • Design Proposal. This goes under design-proposals. Doing a proposal as a PR allows line-by-line commenting from community, and creates the basis for later design documentation. Paste link to merged design proposal here: PROPOSAL-NUMBER
      • Decide which repo this feature's code will be checked into. Not everything needs to land in the core kubernetes repo. REPO-NAME
      • Initial API review (if API). Maybe same PR as design doc. PR-NUMBER
        • Any code that changes an API (/pkg/apis/...)
        • cc @kubernetes/api
      • Identify shepherd (your SIG lead and/or kubernetes-pm@googlegroups.com will be able to help you). My Shepherd is: replace.me@replaceme.com (and/or GH Handle)
        • A shepherd is an individual who will help acquaint you with the process of getting your feature into the repo, identify reviewers and provide feedback on the feature. They are not (necessarily) the code reviewer of the feature, or tech lead for the area.
        • The shepherd is not responsible for showing up to Kubernetes-PM meetings and/or communicating if the feature is on-track to make the release goals. That is still your responsibility.
      • Identify secondary/backup contact point. My Secondary Contact Point is: replace.me@replaceme.com (and/or GH Handle)
    • Write (code + tests + docs) then get them merged. ALL-PR-NUMBERS
      • Code needs to be disabled by default. Verified by code OWNERS
      • Minimal testing
      • Minimal docs
        • cc @kubernetes/docs on docs PR
        • cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
        • New apis: Glossary Section Item in the docs repo: kubernetes/kubernetes.github.io
      • Update release notes
  • Beta
    • Testing is sufficient for beta
    • User docs with tutorials
      - Updated walkthrough / tutorial in the docs repo: kubernetes/kubernetes.github.io
      - cc @kubernetes/docs on docs PR
      - cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
    • Thorough API review
      • cc @kubernetes/api
  • Stable
    • docs/proposals/foo.md moved to docs/design/foo.md
      - cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
    • Soak, load testing
    • detailed user docs and examples
      • cc @kubernetes/docs
      • cc @kubernetes/feature-reviewers on this issue to get approval before checking this off

FEATURE_STATUS is used for feature tracking and to be updated by @kubernetes/feature-reviewers.
FEATURE_STATUS: IN_DEVELOPMENT

More advice:

Design

  • Once you get LGTM from a @kubernetes/feature-reviewers member, you can check this checkbox, and the reviewer will apply the "design-complete" label.

Coding

  • Use as many PRs as you need. Write tests in the same or different PRs, as is convenient for you.
  • As each PR is merged, add a comment to this issue referencing the PRs. Code goes in the http://github.com/kubernetes/kubernetes repository,
    and sometimes http://github.com/kubernetes/contrib, or other repos.
  • When you are done with the code, apply the "code-complete" label.
  • When the feature has user docs, please add a comment mentioning @kubernetes/feature-reviewers and they will
    check that the code matches the proposed feature and design, and that everything is done, and that there is adequate
    testing. They won't do detailed code review: that already happened when your PRs were reviewed.
    When that is done, you can check this box and the reviewer will apply the "code-complete" label.

Docs

  • Write user docs and get them merged in.
  • User docs go into http://github.com/kubernetes/kubernetes.github.io.
  • When the feature has user docs, please add a comment mentioning @kubernetes/docs.
  • When you get LGTM, you can check this checkbox, and the reviewer will apply the "docs-complete" label.
@mdelio mdelio added sig/storage Categorizes an issue or PR as relevant to SIG Storage. stage/stable Denotes an issue tracking an enhancement targeted for Stable/GA status labels Jan 27, 2017
@mdelio mdelio added this to the v1.6 milestone Jan 27, 2017
@calebamiles calebamiles added sig/network Categorizes an issue or PR as relevant to SIG Network. and removed sig/storage Categorizes an issue or PR as relevant to SIG Storage. labels Jan 30, 2017
@idvoretskyi
Copy link
Member

@mdelio @thockin are there any updates on the feature status?

@idvoretskyi idvoretskyi modified the milestones: next-milestone, v1.6 Feb 28, 2017
@thockin
Copy link
Member

thockin commented Feb 28, 2017 via email

@andrewhowdencom
Copy link

Ohh I know this is inappropriate for GitHub but I was super excited about this feature!

@thockin
Copy link
Member

thockin commented Mar 1, 2017 via email

@idvoretskyi
Copy link
Member

@thockin thank you for clarifying.

@lazyfunctor
Copy link

Thanks for the clarification @thockin. I'm guessing this will make it to GKE once it reaches GA in open source kubernetes?

@calebamiles calebamiles modified the milestones: v1.7, next-milestone May 4, 2017
@calebamiles
Copy link
Contributor

can someone from @kubernetes/sig-network-feature-requests update the issue description to the new template. Thanks!

@caseydavenport
Copy link
Member

@calebamiles happy to update the description to the new template, but I don't seem to have the right GitHub permissions to do so.

@idvoretskyi
Copy link
Member

@caseydavenport invited to the features maintainers. Please, update the description.

@idvoretskyi idvoretskyi added the help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. label May 18, 2017
@idvoretskyi idvoretskyi added this to Action required in Kubernetes 1.7 features May 18, 2017
@cmluciano
Copy link

/assign @danwinship

@idvoretskyi idvoretskyi removed the help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. label May 19, 2017
@idvoretskyi idvoretskyi moved this from Action required to In Progress in Kubernetes 1.7 features May 19, 2017
@caseydavenport
Copy link
Member

caseydavenport commented Jun 6, 2017

Current status:

@danwinship
Copy link
Contributor

danwinship commented Jun 7, 2017

But also, we have to figure out if we want to get kubernetes/kubernetes#47123 (ability to update NetworkPolicy.spec) in

@danwinship
Copy link
Contributor

Oh, what do we do about the old design proposal (which now documents incorrect semantics)? Delete it? Update it to reflect reality? Add a prominent comment noting that it is out of date?

@luxas
Copy link
Member

luxas commented Jun 8, 2017

@danwinship I'd update it with a history section linking to relevant historic versions of it

@danwinship
Copy link
Contributor

Current status:

All three of those are now complete

But also, we have to figure out if we want to get kubernetes/kubernetes#47123 (ability to update NetworkPolicy.spec) in

It looks like people are OK with that sliding to 1.8.

@danwinship
Copy link
Contributor

I think this can be closed?

@cmluciano
Copy link

@idvoretskyi Anything left for us to do here?

@idvoretskyi
Copy link
Member

@cmluciano please keep it open until the release will be shipped - it may happen that the discussion has to continue.

@cmluciano
Copy link

@idvoretskyi This feature is complete for 1.8. Is there anymore to do with this issue or do we just close it?

@luxas
Copy link
Member

luxas commented Jul 13, 2017

I think we can close this

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
sig/network Categorizes an issue or PR as relevant to SIG Network. stage/stable Denotes an issue tracking an enhancement targeted for Stable/GA status
Projects
No open projects
Development

No branches or pull requests

10 participants