-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Encrypted Images in Kubernetes #1067
Comments
/sig node |
/cc @tallclair |
/stage alpha Hi @@harche, I'm the 1.16 Enhancement Lead. I've added this to the 1.16 Tracking Spreadsheet. Once coding begins or if it already has, please list all relevant k/k PRs in this issue so they can be tracked properly. As a reminder, every enhancement requires a KEP in an implementable state with Graduation Criteria explaining each alpha/beta/stable stages requirements. Milestone dates are Enhancement Freeze 7/30 and Code Freeze 8/29. |
Thanks @kacole2 |
@harche this is a reminder that Enhancement Freeze is tomorrow and this keep needs to be merged by EOD. Thanks |
@kacole2 After the discussion in the sig-node call last Tuesday it was suggested that we should target 1.17 instead of 1.16 for this feature. |
/milestone v1.17 |
Hey there @harche -- 1.17 Enhancements lead here. I wanted to check in and see if you think this Enhancement will be graduating to alpha in 1.17? Just a reminder that for it to be accepted -- the KEP must be merged, in an implementable state and have both a test plan and graduation criteria defined before the Enhancement Freeze. The current release schedule is: Monday, September 23 - Release Cycle Begins If you do, once coding begins please list all relevant k/k PRs in this issue so they can be tracked properly. 👍 Thanks! |
👋 Hey @harche, enhancements team here! We wanted to check in again and see if you're still targeting 1.17 for this? The enhancements freeze is right around the corner (EOD PT, October 15th) and you''ll need to have your KEP merged by then. It looks like you're still waiting on some reviews? |
Yea - we are... unfortunately there seems to be some delay on getting the api review started :(. We have been trying to reach out the the reviewers on #1066. But no progress yet. Fingers crossed. |
@lumjjb - Unfortunately the deadline for the 1.17 Enhancement freeze has passed and the KEP is still not merged. For now this is being removed from the milestone and 1.17 tracking sheet. If there is a need to get this in, please file an enhancement exception. |
/milestone clear |
Thanks @jeremyrickard for the followup! Should hopefully meet the deadline for 1.18! |
Hey there @lumjjb @harche -- 1.18 Enhancements shadow here. I wanted to check in and see if you think this Enhancement will be graduating to alpha|beta|stable in 1.18? |
@kikisdeliveryservice this enhancement will not be graduating in 1.18. |
thanks @harche ! |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
1.19 Enhancements shadow here. I wanted to check in and see if you think this Enhancement will be graduating in 1.19? In order to have this part of the release: The KEP PR must be merged in an implementable state The current release schedule is: Monday, April 13: Week 1 - Release cycle begins Please let me know and I'll add it to the 1.19 tracking sheet (http://bit.ly/k8s-1-19-enhancements). Once coding begins please list all relevant k/k PRs in this issue so they can be tracked properly. 👍 Thanks! |
@kikisdeliveryservice We aren't targeting 1.19 at for this enhancement. |
thanks for the update @harche ! |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Hi @harche Enhancements Lead here. Any plans for this in 1.20? Thanks! |
@kikisdeliveryservice thanks for reaching out. We aren't planning this for 1.20. |
I am going to close this for now. If we ever decide to revive this in future, I will reopen this issue. |
Hi, what's the status and do you need any help? |
Hi @danmx ! Currently, the enablement of the feature in crio/containerd is via an operator: https://github.com/IBM/k8s-enc-image-operator This is a talk we did at kubecon a while back: https://kccnceu20.sched.com/event/Zepc, has a demo and some more info. There is definitely potential for more native support and per service account/namespace decryption, but there hasn't been an ask for it yet. |
Enhancement Description
/sig node
/sig architecture
The text was updated successfully, but these errors were encountered: