Skip to content

KEP-2033: KubeletInUserNamespace: update the template; promote to beta #5388

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

AkihiroSuda
Copy link
Member

  • One-line PR description: Rootless Kubernetes
  • Other comments: The first commit only updates the template. The actual content is updated in the second commit.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jun 8, 2025
@k8s-ci-robot k8s-ci-robot requested a review from dchen1107 June 8, 2025 17:35
@k8s-ci-robot k8s-ci-robot added the kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory label Jun 8, 2025
@k8s-ci-robot k8s-ci-robot added sig/node Categorizes an issue or PR as relevant to SIG Node. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. labels Jun 8, 2025
@AkihiroSuda

This comment was marked as resolved.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: AkihiroSuda
Once this PR has been reviewed and has the lgtm label, please assign jpbetz, mrunalp for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Contributor

@soltysh soltysh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are multiple PRR questions not answered.

@@ -15,7 +15,7 @@ reviewers:
- "@dims"
- "@sftim"
approvers:
- TBD
- "@ehashman"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Elena was approving the PRR section, so she's a separate entry in 2033.yaml. Here you'll need someone who actually approved this document. It seems last time it was Derek, not sure who will be approving it this time, but it has to be someone from sig-node.

Copy link
Member Author

@AkihiroSuda AkihiroSuda Jun 20, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

May I add your name tentatively ?

extending the production code to implement this enhancement.
-->

N/A, as unit tests do not make sense here.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since you're touching kubelet, at minimum I'd expect information about current unit coverage for the affected area.

Copy link
Member Author

@AkihiroSuda AkihiroSuda Jun 20, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

```

- Prow manifest: https://github.com/kubernetes/test-infra/blob/4b7824ff1cfe00c36062035ab6aea3bb6c2e6ba2/config/jobs/kubernetes/sig-testing/kubernetes-kind.yaml#L615-L678
- Logs: https://prow.k8s.io/job-history/gs/kubernetes-ci-logs/logs/ci-kubernetes-e2e-kind-rootless
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The lack of integration and/or e2e residing in k8s repository makes me worry about the stability of this functionality. How can we ensure this is working correctly, if there are no tests? This introduces a risk that if someone introduces a breaking change we won't notice it until somewhere else that test is being run.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The test is covered by running the entire NodeConformance test with the node components running in UserNS.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FYI, this feature gate doesn't really add a new "feature".
This gate only touches a few lines of kubelet so as to ignore permission denied errors related to sysctl running in UserNS.

https://github.com/kubernetes/kubernetes/blob/168e02fb3513231c80601ad7a5f873278eda1022/pkg/kubelet/cm/container_manager_linux.go#L445-L448
https://github.com/kubernetes/kubernetes/blob/168e02fb3513231c80601ad7a5f873278eda1022/pkg/kubelet/kubelet.go#L557-L562

So I'm not sure what kind of integration/e2e test you want to see here.

@AkihiroSuda
Copy link
Member Author

Thanks for review and sorry for my delay in addressing the comments.
I guess I have to change the milestone to v1.35.

@AkihiroSuda AkihiroSuda force-pushed the rootless2 branch 4 times, most recently from 9c29ef0 to e064467 Compare June 20, 2025 21:46
Only the template is updated in this commit.
The actual content will be updated in follow-up commits.

Signed-off-by: Akihiro Suda <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/node Categorizes an issue or PR as relevant to SIG Node. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants