Skip to content

Umbrella Issue: Lingering 3rd Party Resource Usage #7708

Open
@BenTheElder

Description

@BenTheElder

Since 2018 then workgroup K8s Infra (now SIG K8s Infra) has been disentangling CI / content hosting for third parties from the Kubernetes project's infra as we began to plan migrating everything to Kubernetes community control (versus largely having been provided and run directly by Google).

This meant kicking out e.g. CI for rules_k8s and rules_docker that were not actually Kubernetes projects but were using our CI, due to decisions made by Googlers at the time, when it was all funded and run by Google anyhow.

Today we have all but eliminated these issues so that the Kubernetes project can self-manage resources to run the Kubernetes project, without being responsible to or exposed to external project's utilization.

We have one notable recent regression, and a few specific lingering legacies. This issue tracks resolving them in total.

  1. cri-o packages depending on our CDN and being under of Kubernetes' package ISV was raised to SIG K8s infra long after it was announced publicly, however this still represents a regression both in conflating the security boundaries of publishing these packages and in the liability for end-user download traffic, the worst kind of uncapped liability that we've typically been asking projects to instead use e.g. github releases, avoiding digging that hole deeper. This was not discussed with SIG K8s Infra.
    • Tracking issue: To be filed ...
  2. CNI binaries GCS bucket still remains from pre-sig-k8s-infra, we've discussed a plan with kops maintainers to wind this down in the last SIG K8s Infra meeting.
  3. We still have some limited CI for cadvisor (which is at least a kubelet dependency) and containerd on prow.k8s.io, lingering from pre-SIG-K8s-infra. We should revisit this, though at least it has limited liability, we could just disable it without breaking end users or immediately breaking the project (it's only testing, not project automation), and the costs should be relatively low. This still represents an inconsistent policy, where we've eliminated all other external projects (of which there were many) from our CI.

I don't think there are others, excepting perhaps the coreDNS image used by kubeadm, this is debatably an essential Kubernetes release artifact, it again predates SIG K8s Infra. We may also revisit this however.

/sig k8s-infra
/priority important-longterm
cc @kubernetes/sig-k8s-infra-leads

Metadata

Metadata

Assignees

No one assigned

    Labels

    priority/important-longtermImportant over the long term, but may not be staffed and/or may need multiple releases to complete.sig/k8s-infraCategorizes an issue or PR as relevant to SIG K8s Infra.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions