Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Persistent Volume Endpoints and Secrets do not have explicit namespace #32131

Closed
childsb opened this issue Sep 6, 2016 · 13 comments
Closed

Persistent Volume Endpoints and Secrets do not have explicit namespace #32131

childsb opened this issue Sep 6, 2016 · 13 comments
Assignees
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. milestone/removed priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. sig/storage Categorizes an issue or PR as relevant to SIG Storage.

Comments

@childsb
Copy link
Contributor

childsb commented Sep 6, 2016

For both Secrets and Endpoints the namespace is assumed to be the binding PVC namespace. This is problematic when creating PVs & secrets/endpoints before the PVC exist.

Any field specifying an Endpoint or Secret in PV should also specify the namespace for each item.

Example:

apiVersion: v1 
kind: PersistentVolume
metadata:
  name: ceph
spec:
  capacity:
   storage: 5Gi
  accessModes:
   - ReadWriteOnce
  persistentVolumeReclaimPolicy: Recycle
  rbd:
   monitors: ['172.17.0.2:6789']
   pool: rbd
   image: foo
   user: admin
   secretRef:
     name: 'ceph-secret'
     namespace: 'storage-admin'
   keyring: ''
   fsType: 'ext4'
   readOnly: false
@childsb childsb added the sig/storage Categorizes an issue or PR as relevant to SIG Storage. label Sep 6, 2016
@childsb childsb self-assigned this Sep 6, 2016
@childsb
Copy link
Contributor Author

childsb commented Sep 6, 2016

Oops, closing in favor of this: #31869

@childsb childsb closed this as completed Sep 6, 2016
@childsb
Copy link
Contributor Author

childsb commented Sep 6, 2016

After talking with others this issue is similar to #31869 but requires a fix to current API objects and not a design decision on how StorageClass implements a similar function.

@childsb childsb reopened this Sep 6, 2016
@eparis
Copy link
Contributor

eparis commented Sep 7, 2016

Thanks brad. I think #31869 is specifically asking about StorageClass and provisioning. You are specifically asking about attach/mount/unmount/detach. I personally think the solutions to your problem are more restrictive than the problem in #31869 as I describe in #31869 (comment) . If we choose to follow my thoughts there for how to do a PV it may inform our decision on how to handle StorageClass.

@eparis eparis added this to the v1.5 milestone Sep 7, 2016
@eparis eparis added the priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. label Sep 7, 2016
@eparis
Copy link
Contributor

eparis commented Sep 7, 2016

potential solutions to the 'endpoints' problem are also discussed:
#31616 - just hard code that mess yo'
openshift/origin#6331 - lets talk

@erinboyd
Copy link

erinboyd commented Sep 7, 2016

That generally seems like a bad idea

@dims
Copy link
Member

dims commented Nov 15, 2016

ok to move this to 1.6? please holler if not appropriate

@dims dims modified the milestones: v1.6, v1.5 Nov 15, 2016
@ethernetdan
Copy link
Contributor

Moving to 1.7 as late to happen in 1.6. Feel free to switch back if this is incorrect.

@ethernetdan ethernetdan modified the milestones: v1.7, v1.6 Mar 13, 2017
@saad-ali
Copy link
Member

saad-ali commented Jun 7, 2017

@liggitt to make sure this is kosher.

Moving to 1.8 since this didn't make it in to 1.7

@childsb
Copy link
Contributor Author

childsb commented Sep 5, 2017

The design is to specify the namespace for secrets or endpoints as part of the storageClass. RBD work was completed in 1.8, but iscsi, gluster and others are still in progress:

#51530

@k8s-github-robot
Copy link

[MILESTONENOTIFIER] Milestone Removed

@childsb

Important: This issue was missing labels required for the v1.9 milestone for more than 3 days:

kind: Must specify exactly one of kind/bug, kind/cleanup or kind/feature.

Help

@k8s-github-robot k8s-github-robot removed this from the v1.9 milestone Oct 9, 2017
k8s-github-robot pushed a commit that referenced this issue Dec 16, 2017
Automatic merge from submit-queue (batch tested with PRs 56413, 56322, 56490, 56460, 56487). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Allow FlexVolume PV secret namespaces

Completes the secret namespace PV refactor, so all PV volume sources that specify secrets can reference them outside the PVC namespace.

Finished the secret-related aspect of #32131

```release-note
PersistentVolume flexVolume sources can now reference secrets in a namespace other than the PersistentVolumeClaim's namespace.
```
k8s-publishing-bot added a commit to kubernetes/api that referenced this issue Dec 16, 2017
Automatic merge from submit-queue (batch tested with PRs 56413, 56322, 56490, 56460, 56487). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Allow FlexVolume PV secret namespaces

Completes the secret namespace PV refactor, so all PV volume sources that specify secrets can reference them outside the PVC namespace.

Finished the secret-related aspect of kubernetes/kubernetes#32131

```release-note
PersistentVolume flexVolume sources can now reference secrets in a namespace other than the PersistentVolumeClaim's namespace.
```

Kubernetes-commit: d9b45d08c011a200d67a2130348d9cf17b10569d
@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

Prevent issues from auto-closing with an /lifecycle frozen comment.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or @fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jan 7, 2018
@fejta-bot
Copy link

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle rotten
/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Feb 10, 2018
@fejta-bot
Copy link

Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen.
Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. milestone/removed priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. sig/storage Categorizes an issue or PR as relevant to SIG Storage.
Projects
None yet
Development

No branches or pull requests

9 participants