-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP for promoting AppArmor to GA #1444
Conversation
This is ready for a first rough review, if you have some cycles @kubernetes/sig-node-proposals |
Awesome to push that forward! I will have a read as soon as I can. |
I'd love to help with the work defined in this KEP! I’ll keep my eyes on the threads 👀 |
Hey @timothysc, do you think we can target this KEP for 1.19? I think it would be a good fit and I can allocate some resources on my side to work on this. |
re: #1444 (comment)
informing https://testgrid.k8s.io/sig-release-master-informing#node-kubelet-features [moving my comment, it turns out if you have any existing review comments you are a reviewer forever, which puts the PR on gubernator.k8s.io/pr, I do not intend to review this PR currently] |
The original plan was to wait to figure out how to get seccomp to GA before moving forward with this PR. However, there are a couple things that make Apparmor easier to move to GA:
Given that, I think it's feasible to get this to GA for v1.19. I'm happy to be a reviewer, but I think you also need to get an api machinery API reviewer for some of the corner cases around the conversions. @liggitt was the reviewer on the seccomp to GA KEP, but I don't know whether he has time to take this on for v1.19 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mostly comments about updating this to be inline with the latest seccomp proposal changes.
d9a5b48
to
296b938
Compare
Thank you for the review! I implemented most of your suggestions. @liggitt do you think we can move forward with this one? |
I'm focusing on other GA efforts in 1.19 (CSR, Ingress, conformance without beta, deprecating beta APIs, and informing users and admins about deprecated API use) and don't have capacity to shepherd this for 1.19. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@saschagrunert I added a few points based on the recent changes to Seccomp GA KEP.
296b938
to
048e4c5
Compare
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
048e4c5
to
6b2b4d6
Compare
Thank you! Updated the KEP metadata. |
Signed-off-by: Sascha Grunert <[email protected]> Signed-off-by: Sascha Grunert <[email protected]>
0b9916c
to
685e057
Compare
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten Unfortunately I had no capacity in the last while to work on this. So it would be great if someone else could pick it up and move it forward. |
/remove-kind design |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
I have added this as an agenda item for next week's SIG Security meeting to discuss and possibly find an owner to drive this. Will update the thread here after the discussion. |
Thanks @PushkarJ! I'm happy to jump in and help drive this effort. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
@jan0ski since #3298 supersedes this PR could you close this one? |
@mccormickt: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/close |
…pdate SPLAT-653: Updates in installer/aws-localzones
This is the first draft of promoting AppArmor to GA
Relates to: #24
Analogous to: #1148
/cc @timothysc