Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ProcMount 1.30 update #45152

Merged

Conversation

haircommander
Copy link
Contributor

Copy link

netlify bot commented Feb 15, 2024

👷 Deploy Preview for kubernetes-io-vnext-staging processing.

Name Link
🔨 Latest commit c3e2106
🔍 Latest deploy log https://app.netlify.com/sites/kubernetes-io-vnext-staging/deploys/6602d5ddb15ecb00088f159b

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Feb 15, 2024
@dipesh-rawat
Copy link
Member

/retitle [WIP] ProcMount beta bump
/sig node

@k8s-ci-robot k8s-ci-robot added the sig/node Categorizes an issue or PR as relevant to SIG Node. label Feb 15, 2024
@k8s-ci-robot k8s-ci-robot changed the title placeholder for ProcMount beta bump [WIP] ProcMount beta bump Feb 15, 2024
@k8s-ci-robot k8s-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Feb 15, 2024
@reylejano
Copy link
Member

/milestone 1.30

@k8s-ci-robot k8s-ci-robot added this to the 1.30 milestone Feb 16, 2024
@Vyom-Yadav
Copy link
Member

Hey @haircommander 👋 please take a look at Documenting for a release - PR Ready for Review to get your PR ready for review before Tuesday March 12th 2024 18:00 PST. Thank you!

@k8s-ci-robot k8s-ci-robot added language/en Issues or PRs related to English language sig/docs Categorizes an issue or PR as relevant to SIG Docs. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Mar 11, 2024
@haircommander haircommander changed the title [WIP] ProcMount beta bump ProcMount 1.30 update Mar 11, 2024
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Mar 11, 2024
Copy link
Contributor

@sftim sftim left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks; it'll need a few changes before we can merge this.


{{< feature-state for_k8s_version="v1.12" state="alpha" >}}

By default, containers have multiple paths that are both
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
By default, containers have multiple paths that are both
For runtimes that follow the OCI runtime specification, containers default to running in a mode where
there are multiple paths that are both

Comment on lines 486 to 499
them. A list of the paths are found in the [Kubernetes source
code](https://github.com/kubernetes/kubernetes/blob/964529b227/pkg/securitycontext/util.go#L193-L211):
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Avoid linking to the source code; instead, if we want to put a list in, pop it inside a new (small) page within https://kubernetes.io/docs/reference/node/

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how do you feel about me dropping the link to the source code but not adding a reference? having it in 3 places seems more likely to skew eventually

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's fine.

- `/proc/timer_stats`
- `/proc/sched_debug`
- `/proc/scsi`
- `/sys/firmware`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We might want to call out this one especially, as it's outside /proc.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What I mean is: people might think that procMount only covers /proc.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I left a note below does that suffice?

@sftim
Copy link
Contributor

sftim commented Mar 15, 2024

Please also fix the merge conflict (rebase against dev-1.30)

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Mar 15, 2024
@Vyom-Yadav
Copy link
Member

Hello @mrunalp 👋 please provide a technical review for this PR by March 26th 2024 18:00 PT to get this into the release. Thank you!

@Vyom-Yadav
Copy link
Member

Hey @haircommander @mrunalp 👋🏼

I'm reaching out from the Docs team. Just checking in as we approach Docs Freeze on Tuesday March 26th 18:00 PDT. This documentation appears to still be under review. To meet the Docs Freeze, this PR must have a technical review as well as lgtm and approve labels applied, without any unaddressed comments or concerns from SIG Docs. The status of this enhancement is marked as at risk for docs freeze. Thank you!

@haircommander haircommander force-pushed the proc-mount-beta-1.30 branch 3 times, most recently from 9f7a627 to e1e410e Compare March 25, 2024 19:15
Copy link
Contributor

@mrunalp mrunalp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve
Technically LGTM from sig-node.

@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Mar 25, 2024
@drewhagen
Copy link
Member

Just a heads up that Doc Freeze is approaching fast tomorrow March 26th at 18:00 PDT and starting this cycle, we need to file an Exception after this time.
This one looks pretty close and we'd like to help you get it over the finish line!

@kubernetes/sig-docs-en-owners Does this one look good for an approve from y'all? Thanks!

Copy link
Member

@dipesh-rawat dipesh-rawat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@haircommander The PR is currently lacking the doc change to transition the feature gate from Alpha to Beta. The necessary change should be made in the feature gate description file - proc-mount-type.md (here).

Please refer to the documentation here for further information.

EDIT: This review comment can be disregarded as the confirmation (here) indicates that this feature is still in the alpha stage.

@Vyom-Yadav
Copy link
Member

The PR is currently lacking the doc change to transition the feature gate from Alpha to Beta.

@dipesh-rawat I don't think PR is targeting beta. KEP-4265 was updated to stage/alpha. So the feature gate will not be bumped. Rest @haircommander can confirm.

Comment on lines 480 to 487
{{< note >}}
<!-- remove after Kubernetes v1.30 is released -->
If you are running Kubernetes v1.25, refer to the v1.25 version of this task page:
[Configure a Security Context for a Pod or Container](https://v1-25.docs.kubernetes.io/docs/tasks/configure-pod-container/security-context/) (v1.25).
There is an important note in that documentation about a situation where the kubelet
can lose track of volume labels after restart. This deficiency has been fixed
in Kubernetes 1.26.
{{< /note >}}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
{{< note >}}
<!-- remove after Kubernetes v1.30 is released -->
If you are running Kubernetes v1.25, refer to the v1.25 version of this task page:
[Configure a Security Context for a Pod or Container](https://v1-25.docs.kubernetes.io/docs/tasks/configure-pod-container/security-context/) (v1.25).
There is an important note in that documentation about a situation where the kubelet
can lose track of volume labels after restart. This deficiency has been fixed
in Kubernetes 1.26.
{{< /note >}}

@sftim
Copy link
Contributor

sftim commented Mar 26, 2024

Also see #45152 (comment)

@haircommander
Copy link
Contributor Author

The PR is currently lacking the doc change to transition the feature gate from Alpha to Beta.

@dipesh-rawat I don't think PR is targeting beta. KEP-4265 was updated to stage/alpha. So the feature gate will not be bumped. Rest @haircommander can confirm.

correct! we're not bumping this to beta in this release

@drewhagen
Copy link
Member

Looks like feedback was addressed. @kubernetes/sig-docs-en-owners Is this ready to approve?

@reylejano
Copy link
Member

Looks like feed back has been addressed and there is a technical lgtm from SIG Node
/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mrunalp, reylejano

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 26, 2024
@drewhagen
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 26, 2024
@k8s-ci-robot
Copy link
Contributor

LGTM label has been added.

Git tree hash: ad6831d71905f05dcaa0904442d3075d6baf7d32

@k8s-ci-robot k8s-ci-robot merged commit 5145a6a into kubernetes:dev-1.30 Mar 26, 2024
6 checks passed
@@ -523,3 +575,7 @@ kubectl delete pod security-context-demo-4
* For more information about security mechanisms in Linux, see
[Overview of Linux Kernel Security Features](https://www.linux.com/learn/overview-linux-kernel-security-features)
(Note: Some information is out of date)
* Read about [User Namespaces](/docs/concepts/workloads/pods/user-namespaces.md)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ideally we'd have fixed this broken link before a merge. I'll file an issue.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actually, I'll just send in a PR.

@drewhagen
Copy link
Member

/milestone 1.30

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. language/en Issues or PRs related to English language lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/docs Categorizes an issue or PR as relevant to SIG Docs. sig/node Categorizes an issue or PR as relevant to SIG Node. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
Development

Successfully merging this pull request may close these issues.

8 participants