-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provision volumes from cross-namespace snapshots #3294
Comments
/milestone v1.25 |
Hello @mkimuram 👋, 1.25 Enhancements team here. Just checking in as we approach enhancements freeze on 18:00 PST on Thursday June 16, 2022. For note, This enhancement is targeting for stage Here's where this enhancement currently stands:
Looks like for this one, we would need to update the open KEP PR #3295 for the following:
For note, the status of this enhancement is marked as |
Hello @mkimuram 👋, just a quick check-in again, as we approach the 1.25 enhancements freeze. Please plan to get the above criterias done before the upcoming enhancements freeze on Thursday, June 16, 2022 at 18:00 PM PT. For note, the current status of the enhancement is at |
Hello @mkimuram 👋, another check-in, as we approach the 1.25 enhancements freeze. All required criteria are fulfilled by the open PR #3295. We just now require merging it before enhancements freeze on Thursday, June 23, 2022 at 18:00 PM PT, which is just over 3 days away from now. For note, the current status of the enhancement is at |
Hello, 1.25 Enhancements Lead here 👋. With Enhancements Freeze now in effect, this enhancement has not met the criteria for the freeze and has been removed from the milestone. As a reminder, the criteria for enhancements freeze is:
Feel free to file an exception to add this back to the release. If you plan to do so, please file this as early as possible. Thanks! |
/milestone v1.25 |
/milestone v1.26 |
/assign @ttakahashi21 |
@xing-yang: GitHub didn't allow me to assign the following users: ttakahashi21. Note that only kubernetes members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This issue should remain open so long as the feature isn't deprecated or graduated to GA. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/assign @ttakahashi21 It is currently under discussion. |
@ttakahashi21: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen This is still awaiting #4387, which is currently still progressing. |
@sgielen: You can't reopen an issue/PR unless you authored it or you are a collaborator. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen |
@ttakahashi21: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@liggitt @deads2k @enj @robscott Is my understanding right that CrossNamespaceVolumeDataSource feature can be implemented with AuthorizeWithSelectors feature(*1)(*2), instead of ReferenceGrant? |
I'm not sure what this feature was planning to use reference grant for. The field/label selector authorization feature just makes selectors visible to authorization. The node authorization feature only applies to kubelet API clients. There is not yet a way to selectively grant selector-based authorization to arbitrary users / clients. |
With this feature enabled, you specify a namespace in the dataSourceRef field of a new PersistentVolumeClaim. I thought this was #4601 that was implemented instead of #4387, am I correct in my understanding? |
I'm not aware of any work or design to frame that authorization check in terms of field or label selectors, so I'm not sure how #4601 would impact this feature.
#4601 was implemented as a first step and possible building block in a reference grant design. |
Enhancement Description
k/enhancements
) update PR(s): KEP-3294: Add proposal for provisioning volumes from cross-namespace snapshots #3295k/k
) update PR(s):kubernetes-csi/external-provisioner
): Alpha support for provision volumes from cross-namespace data sources kubernetes-csi/external-provisioner#805k/website
) update PR(s):k/enhancements
) update PR(s): TBDk/k
) update PR(s):k/website
) update(s): TBDPlease keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
The text was updated successfully, but these errors were encountered: