-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for ambient capabilities in kubernetes. #2763
Comments
/sig security |
/assign @vinayakankugoyal |
/milestone 1.23 |
@vinayakankugoyal: You must be a member of the kubernetes/milestone-maintainers GitHub team to set the milestone. If you believe you should be able to issue the /milestone command, please contact your and have them propose you as an additional delegate for this responsibility. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hello @vinayakankugoyal, 1.23 Enhancements shadow here. Just checking in as we approach enhancements freeze on Thursday 09/09. Here's where this enhancement currently stands:
Starting with 1.23, we have implented a soft freeze on production readiness reviews beginning on Thursday 09/02. If your enhancement needs a PRR, please make sure to try and complete it by that date! For this enhancement, it looks like we need the following to be updated in the PR #2757:
Thanks! |
Hello @vinayakankugoyal, 1.23 Enhancements shadow here. Just checking in once again as we approach more closer to the enhancements freeze on Thursday 09/09. Here's where this enhancement currently stands:
For this enhancement, we need the following to be updated in the PR #2757 to be tracked under the kubernetes 1.23 release:
Thanks! |
Woops, completely missed your previous messages. Sorry about that! |
@vinayakankugoyal , thank you so much for providing more information on the current status of the enhancement.
As stated above, that this enhancement would not be able to the meet the requirements by the enhancements freeze time, would it be alright then if I remove the 1.23 release milestone for now? And when you have more information in favor of marking it as Thanks once again. :) |
@vinayakankugoyal, Thanks for the confirmation. I'll remove the 1.23 release milestone. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Hi @vinayakankugoyal ! 1.24 Enhancements team here. Just checking in as we approach enhancements freeze on 18:00pm PT on Thursday Feb 3rd. This enhancements is targeting
The status of this enhancement is track as |
Hello @gracenng - This KEP is targeting |
@vinayakankugoyal can you please update your PR to ensure that the KEP is marked |
Hi @vinayakankugoyal , 1.24 Enhancements Team here. Reaching out as we're less than a week away from Enhancement Freeze on Thursday, February 3rd. |
We still haven't agreed upon the field to mark it implementable. I am going to remove it from milestone. /remove milestone 1.24 |
/milestone clear |
I just noticed this is owned by SIG-Security, but the sig-security charter explicitly states that
https://github.com/kubernetes/community/blob/master/sig-security/charter.md#out-of-scope I think this feature should probably be owned by SIG-Node, with SIG-Security as a participating SIG. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Link the related pr |
Are there any plans to make progress on this in the v1.26 cycle? |
I would appreciate if this KEP could get some love. At least this limitation should be documented in https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container and the current workaround to use setcap in the dockerfile. |
The feature PRs in CRI-O and Containerd are all closed now.
@mrunalp @vinayakankugoyal Should we revisit the feature at this point(v1.32 KEP planning)? |
Enhancement Description
k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update PR(s):Please keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
The text was updated successfully, but these errors were encountered: