-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Projected service account tokens for Kubelet image credential providers #4412
Comments
/sig auth |
Hello @aramase and @enj 👋, Enhancements team here. Just checking in as we approach enhancements freeze on 02:00 UTC Friday 9th February 2024. This enhancement is targeting for stage Here's where this enhancement currently stands:
For this KEP, we would just need to update the following:
The status of this enhancement is marked as |
cc @mikebrow @SergeyKanzhelev @ndixita @ruiwen-zhao @harche @haircommander Will have an KEP open for this soon. |
Per the slack thread conversation, I am moving this KEP out of the v1.30 release. |
Hello @enj, thanks for the update. I'm changing the status of this enhancement to |
/milestone clear |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
@aramase: GitHub didn't allow me to assign the following users: mainred. Note that only kubernetes members with read permissions, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hello @aramase @enj @mainred 👋, v1.32 Enhancements team here. Just checking in as we approach enhancements freeze on 02:00 UTC Friday 11th October 2024 / 19:00 PDT Thursday 10th October 2024. This enhancement is targeting for stage /stage alpha Here's where this enhancement currently stands:
For this KEP, we would need to update the following:
It looks like #4846 will address most of these issues.
The status of this enhancement is marked as If you anticipate missing enhancements freeze, you can file an exception request in advance. Thank you! |
Hi @aramase @enj @mainred 👋, v1.32 Enhancements team here. Just a quick friendly reminder as we approach the enhancements freeze later this week, at 02:00 UTC Friday 11th October 2024 / 19:00 PDT Thursday 10th October 2024. The current status of this enhancement is marked as If you anticipate missing enhancements freeze, you can file an exception request in advance. Thank you! |
@dipesh-rawat #4846 is merged. |
I'd love to see some thinking done regarding short lived tokens and how image streaming will be able to refresh the token. See comment: #4846 (comment). |
Hello @aramase @enj @mainred 👋, v1.32 Enhancements team here, Now that PR #4846 has been merged, all the KEP requirements are in place and merged into k/enhancements. Before the enhancement freeze, it would be appreciated if following nits could be addressed:
Aside from the minor nit mentioned above, this enhancement is all good for the upcoming enhancements freeze. 🚀 The status of this enhancement is now marked as |
Hello again @aramase @enj 👋 from the v1.32 Communications Team! We'd love for you to consider writing a feature blog about your enhancement. To opt-in, let us know by opening a Feature Blog placeholder PR against the website repository by 30th Oct 2024. For more information about writing a blog see the blog contribution guidelines. Note: In your placeholder PR, use |
@mbianchidev Thanks for the ping! I've opened kubernetes/website#48343 for the blog placeholder. |
Hello @aramase @enj 👋, 1.32 Docs Shadow here. |
Hey again @aramase @enj 👋 v1.32 Enhancements team here, Just checking in as we approach code freeze at 02:00 UTC Friday 8th November 2024 / 19:00 PDT Thursday 7th November 2024 . Here's where this enhancement currently stands:
For this enhancement, it looks like the following PRs are open and need to be merged before code freeze (and we need to update the Issue description to include all the related PRs of this KEP):
Additionally, please let me know if there are any other PRs in k/k not listed in the description or not linked with this GitHub issue that we should track for this KEP, so that we can maintain accurate status. The status of this enhancement is marked as If you anticipate missing code freeze, you can file an exception request in advance. Thank you! |
Hey again @aramase @enj 👋, v1.32 Enhancements team here, Just a quick friendly reminder as we approach code freeze in few days, at 02:00 UTC Friday 8th November 2024 / 19:00 PDT Thursday 7th November 2024 . The current status of this enhancement is marked as If you anticipate missing code freeze, you can file an exception request in advance. |
Hello @aramase @enj 👋 v1.32 Enhancements team here, Unfortunately, the implementation (code related) PR(s) associated with this enhancement is not in the merge-ready state by code-freeze and hence this enhancement is now removed from the v1.32 milestone. If you still wish to progress this enhancement in v1.32, please file an exception request as soon as possible, within three days. If you have any questions, you can reach out in the #release-enhancements channel on Slack and we'll be happy to help. Thanks! /label tracked/no |
Enhancement Description
k/enhancements
) update PR(s): KEP-4412: Projected Service Account Tokens for Kubelet Image Credential Providers #4846k/k
) update PR(s):k/website
) update PR(s):The text was updated successfully, but these errors were encountered: