-
Notifications
You must be signed in to change notification settings - Fork 15.1k
add doc for new delete option ignoreStoreReadErrorWithClusterBreakingPotential #48463
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
👷 Deploy Preview for kubernetes-io-vnext-staging processing.
|
✅ Pull request preview available for checkingBuilt without sensitive environment variables
To edit notification comments on pull requests, go to your Netlify site configuration. |
|
Hello @tkashem 👋 please take a look at Documenting for a release - PR Ready for Review to get your PR ready for review before Tuesday November 19th 2024 18:00 PST. Thank you! |
|
Hello @tkashem 👋, 1.32 Docs Shadow here, A quick reminder to get your PR ready for review before the deadline, Tuesday November 19th at 18:00 PDT. For additional information, refer to: Documenting for a release - PR Ready for Review. Thank you! |
|
I have a couple of questions: a) do i need to generate the updated api-reference? b) from https://kubernetes.io/docs/contribute/new-content/new-features/#ready-for-review-feature-gates I guess it is referring to the same markdown file at the beginning of the section, for a net new feature, i just need to create one markdown file, correct? |
|
/assign |
393eabf to
5deea87
Compare
|
|
||
| Once the last finalizer is removed, the resource is actually removed from etcd. | ||
|
|
||
| ### Force deletion |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(nit)
| ### Force deletion | |
| ### Forcible resource deletion {#forced-deletion} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should be {#force-deletion}, no d, to preserve existing links.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tengqm this is new content (no existing links). Here I'm just recommending a way to make the eventual URL shorter.
| The user performing the force **delete** operation must have the | ||
| `unsafe-delete-ignore-read-errors` permission on the resource. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(style nit)
| The user performing the force **delete** operation must have the | |
| `unsafe-delete-ignore-read-errors` permission on the resource. | |
| The user performing the force **delete** operation must be permitted to perform | |
| both the **delete** and **unsafe-delete-ignore-read-errors** verbs on that resource. |
We write API verbs in non-monospaced bold. I assume that unsafe-delete-ignore-read-errors is a verb and that a SubjectAccessReview happens. Have I got that right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, unsafe-delete-ignore-read-errors is a right/verb. I was going through the existing doc (for example https://kubernetes.io/docs/concepts/security/rbac-good-practices/) and how they format RBAC rights. I used the same format ( verb ) in this doc. It seems the format delete is used to represent an API operation, thoughts?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you're defining access through RBAC, you use monospace. But: outside of the RBAC docs, we avoid assuming that clusters use RBAC for authz. It's a common choice but not the only option.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm rewording here to avoid an RBAC-centric framing.
sftim
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
This is already alpha quality.
|
LGTM label has been added. Git tree hash: 048f93145320f6d10ab034abf0ef3d2af6882320
|
|
@sftim i dropped the |
| In addition to `delete` rights, the user performing the force **delete** | ||
| operation must have `unsafe-delete-ignore-read-errors` rights on the given resource. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(style nit)
| In addition to `delete` rights, the user performing the force **delete** | |
| operation must have `unsafe-delete-ignore-read-errors` rights on the given resource. | |
| The user performing the force **delete** operation must be permitted to perform | |
| both the **delete** and **unsafe-delete-ignore-read-errors** verbs on that resource. |
We write API verbs in non-monospaced bold. I assume that unsafe-delete-ignore-read-errors is a verb and that a SubjectAccessReview happens. Have I got that right?
Also, avoid implying that clusters always use Kubernetes RBAC. Many do but it's not mandatory to.
|
I'm happy with the changes since #48463 (review) /lgtm |
|
LGTM label has been added. Git tree hash: bdd3173a87feaa1b76dcaa75278a71fd685898d5
|
dgrisonnet
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dgrisonnet, sftim The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Also, please fix the changelog for the k/k PR; see kubernetes/kubernetes#127513 (comment) |
KEP: https://kep.k8s.io/3926
PR: kubernetes/kubernetes#127513
/sig api-machinery
/sig auth