-
Notifications
You must be signed in to change notification settings - Fork 1.6k
ensure secret pulled images #1608
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ensure secret pulled images #1608
Conversation
2c0a91e to
0625f87
Compare
mattjmcnaughton
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mikebrow thanks for your KEP!
I jotted down some quick questions that I'm hopeful will help drive some more discussion. Thanks :)
|
I had an offline discussion with @mikebrow. This is a bit different from what he discussed a while back (something similar to #1608 (comment)). However, after he explained the ideas to me, I think it makes even more sense now! When the kubelet flag This seems to be a good first step, and even be a good default behavior in the future (no need to change the pod spec). Based on my understanding, usually people use cached images with
The "new default behavior" seems safe and won't break the 2 cases above. |
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
/remove-lifecycle stale |
0625f87 to
cfd0f8f
Compare
|
Ready to go forward with this on a 1.20 schedule now that the 1.19 log jamb is behind us :-) |
|
Updated to address comments and reflect detail around the current implementation kubernetes/kubernetes#94899 |
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
/remove-lifecycle stale |
Signed-off-by: Mike Brown <[email protected]>
Signed-off-by: Mike Brown <[email protected]>
Signed-off-by: Mike Brown <[email protected]>
Signed-off-by: Mike Brown <[email protected]>
96ea11a to
a66c822
Compare
|
updated for 1.23 and added test plan detail.. |
fa8e449 to
53ddcab
Compare
|
PRR is OK, but needs SIG approval |
|
/approve for PRR |
derekwaynecarr
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you update the kep to reflect agreement that the feature should maintain security across kubelet restart and node reboot events?
the alpha could be restricted to an in-memory map, but the beta criteria should meet the above goals?
thanks!
Signed-off-by: Mike Brown <[email protected]>
53ddcab to
64a17e7
Compare
derekwaynecarr
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for the prompt updates.
/approve
/lgtm
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: derekwaynecarr, ehashman, mikebrow The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…tions add link to doc about declaring a feature Accessible-by-default
As discussed over a somewhat recent SIG-NODE meeting
We desire to add support for ensuring images pulled with pod imagePullSecrets are
always authenticated even if cached. With this feature always pull would not be required to ensure authentication for images pulled with secrets based auth. Instead kublet will check if the image was pulled with an image pull secret and if so would force a pull of the image to ensure the image pulled with the secret is not used by another pod unless that pod also has the proper auth.
Addresses kubernetes/kubernetes#18787
Signed-off-by: Mike Brown [email protected]