Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Week Ending November 8, 2020 #265

Open
github-actions bot opened this issue Nov 10, 2020 · 0 comments
Open

Week Ending November 8, 2020 #265

github-actions bot opened this issue Nov 10, 2020 · 0 comments
Labels
liens/Kubernetes Liens à propos de l'aktu

Comments

@github-actions
Copy link

Developer News

Kubectl is moving the last bits to staging repos,
which means that contributions to kubectl need to move there in the future.

In order to avoid accidental disclosure of private data,
the Data Management WG
is planning to add field tags across many APIs. Comment now
if you have any feedback.

We’re participating in the GitHub Kudos beta, so thank a contributor today!

Release Schedule

Next Deadline: CODE FREEZE November 12

Working on a 1.20 feature? Get your PRs merged by EOD Thursday, or get delayed
to 1.21. If you need to postpone, the Release Team can change your milestones.
After this, it’s all about getting tests to pass.

Patch releases 1.19.4, 1.18.11, and 1.17.14 are planned for Wednesday this week.

Featured PRs

#94115: kubelet: respect exec probe timeouts

A relatively small fix, correctly checking for timeout errors during an exec probe, however this change pushes the dreaded Correct But A Compatibility Change button. All Kubernetes users are advised to review their usage of exec checks in readiness, liveness, and startup probes to see if you have a timeout set that will cause your checks to fail now. A default-true ExecProbeTimeout feature gate has been added to restore the old behavior, however it will only be maintained until 1.22 so proactive action is recommended.

#96097: Introduce a simple datapolicy library

As a follow up to the recent security issues with tokens being logged, we have a prototype for a data policy library, and a second PR adding an example log filter that uses it. The hope is this can prevent future data leakage by tagging data at the struct level. Currently this is implemented in a highly dynamic way using reflect, so if your subsystems will make heavy use of it you may want to do some performance testing. If you have any feedback about the current implementation or questions about how to integrate with it, please contact SIG-APIMachinery or respond on k-dev.

The heart of the new library is a datapolicy:"type" struct tag that will be used to mark struct fields that contain a certain type of sensitive data, such as datapolicy:"password" or datapolicy:"apikey". A final list of standard type names has not yet been created. The data policy library exposes a Validate() method which takes any value and returns an array of all the data policy labels on fields in that object, recursively validating sub-objects below the one passed in. The simplest use cases can check if len() > 0 and refuse to process or output the value, but specific types can be allowed by ignoring them in the array.

Other Merges

Promotions

  • kubectl debug to beta, replacing kubectl alpha debug (the EphemeralContainers feature gate is still alpha status)

Deprecated

@github-actions github-actions bot added the liens/Kubernetes Liens à propos de l'aktu label Nov 10, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
liens/Kubernetes Liens à propos de l'aktu
Projects
None yet
Development

No branches or pull requests

0 participants