Skip to content

Promote RunAsGroup to Beta#73007

Merged
k8s-ci-robot merged 1 commit intokubernetes:masterfrom
krmayankk:runasgroup
Mar 1, 2019
Merged

Promote RunAsGroup to Beta#73007
k8s-ci-robot merged 1 commit intokubernetes:masterfrom
krmayankk:runasgroup

Conversation

@krmayankk
Copy link
Copy Markdown

@krmayankk krmayankk commented Jan 17, 2019

What this PR does / why we need it:
promote this feature to beta for 1.14 kubernetes/enhancements#213

  • API is unchanged
  • Leave all feature gate checks
  • Enable it by default
The `RunAsGroup` feature has been promoted to beta and enabled by default. PodSpec and PodSecurityPolicy objects can be used to control the primary GID of containers on supported container runtimes.

/milestone v1.14

@k8s-ci-robot k8s-ci-robot added release-note Denotes a PR that will be considered when it comes time to generate release notes. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-kind Indicates a PR lacks a `kind/foo` label and requires one. needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. labels Jan 17, 2019
@krmayankk
Copy link
Copy Markdown
Author

/assign @liggitt @tallclair

@krmayankk
Copy link
Copy Markdown
Author

/kind feature

@k8s-ci-robot k8s-ci-robot added kind/feature Categorizes issue or PR as related to a new feature. and removed needs-kind Indicates a PR lacks a `kind/foo` label and requires one. labels Jan 17, 2019
@krmayankk
Copy link
Copy Markdown
Author

/sig auth

@k8s-ci-robot k8s-ci-robot added sig/auth Categorizes an issue or PR as relevant to SIG Auth. and removed needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Jan 17, 2019
@krmayankk
Copy link
Copy Markdown
Author

/test pull-kubernetes-bazel-test

@krmayankk
Copy link
Copy Markdown
Author

/test pull-kubernetes-e2e-kops-aws

@liggitt
Copy link
Copy Markdown
Member

liggitt commented Jan 17, 2019

  • are there tests that should be promoted as part of this (so they run in non-alpha CI suites)?
  • do we have information about which container runtimes support this (and at which versions)? that might be good to include in the release notes
  • would also be good to go ahead and open a doc PR against the dev-1.14 website branch with doc updates for this and link it here

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 18, 2019
@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 18, 2019
@krmayankk
Copy link
Copy Markdown
Author

krmayankk commented Jan 18, 2019

@liggitt

are there tests that should be promoted as part of this (so they run in non-alpha CI suites)?

These are the e2e tests for this https://github.com/kubernetes/kubernetes/blob/master/test/e2e/node/security_context.go#L86 . I was told they always run for all CI suites. Trying to find the answer to this on testing

do we have information about which container runtimes support this (and at which versions)? that might be good to include in the release notes

Containerd and CRI-O support this there
Containerd: containerd/cri#710 (Available in v1.0.0-rc.1)
CRI-O: cri-o/cri-o#1601 (Available in v1.13.0)

would also be good to go ahead and open a doc PR against the dev-1.14 website branch with doc updates for this and link it here

kubernetes/website#12297

@liggitt
Copy link
Copy Markdown
Member

liggitt commented Jan 22, 2019

/assign @tallclair
cc @kubernetes/sig-node-api-reviews for lgtm

These are the e2e tests for this https://github.com/kubernetes/kubernetes/blob/master/test/e2e/node/security_context.go#L86 . I was told they always run for all CI suites. Trying to find the answer to this on testing

The [Feature:RunAsGroup] tag means they do not run in all CI tests, only when explicitly included. If this is being enabled by default, I think the feature tag should be removed from that test.

@k8s-ci-robot k8s-ci-robot added sig/node Categorizes an issue or PR as relevant to SIG Node. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API labels Jan 22, 2019
@krmayankk
Copy link
Copy Markdown
Author

Adding @BenTheElder for any insights . I am looking for direction in this area . Should I remove the feature flag from the e2e ?

@BenTheElder
Copy link
Copy Markdown
Member

just echoing what @liggitt said, in presubmit for example we exclude [Feature:.*] for feature gated things, if this is no longer feature gated then we should remove that tag from the test

@liggitt
Copy link
Copy Markdown
Member

liggitt commented Feb 22, 2019

progress! that made those tests actually run, which is good. looks like the selinux one ([k8s.io] [sig-node] Security Context should support volume SELinux relabeling) does not work in the CI environment. edit: it sometimes works, but flakes regularly.

@kubernetes/sig-node-pr-reviews do we need to add a [Feature:SELinux] tag to that test specifically, since it doesn't work in all environments?

@krmayankk
Copy link
Copy Markdown
Author

/test pull-kubernetes-e2e-gce

@krmayankk
Copy link
Copy Markdown
Author

@liggitt that seemed like a flake, everything is passing now including the selinux one

@liggitt
Copy link
Copy Markdown
Member

liggitt commented Feb 24, 2019

/test pull-kubernetes-e2e-gce

@BenTheElder
Copy link
Copy Markdown
Member

note: the SELinux one only passed in the last run due to our retry attempts which allows flaky tests to run again >.> https://gubernator.k8s.io/build/kubernetes-jenkins/pr-logs/pull/73007/pull-kubernetes-e2e-gce/69984/#k8sio-sig-node-security-context-should-support-volume-selinux-relabeling-when-using-hostpid

@BenTheElder
Copy link
Copy Markdown
Member

@liggitt
Copy link
Copy Markdown
Member

liggitt commented Feb 24, 2019

/test pull-kubernetes-e2e-gce

@liggitt
Copy link
Copy Markdown
Member

liggitt commented Feb 24, 2019

seems like we should tag the selinux test as [flaky] and open an issue for sig-node or sig-storage to resolve. this seems good to go otherwise

@krmayankk
Copy link
Copy Markdown
Author

Added #74482
How do i mark it as flaky, just add the [flaky] tag in the same way we add the feature flag tag ? (my grep didnt return anything in k/k

@krmayankk
Copy link
Copy Markdown
Author

krmayankk commented Feb 25, 2019

How do i mark it as flaky, just add the [flaky] tag in the same way we add the feature flag tag ? (my grep didnt return anything in k/k

ignore this found an example , adding

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

most of these seem specific to Linux... do we need to add [LinuxOnly] to these as some other tests do? xref #73922

cc @spiffxp

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

per https://kubernetes.slack.com/archives/C09QZ4DQB/p1551136840248100, let's add [LinuxOnly] to the individual tests that make use of linux-only function in the security context (which I think is all of these individual tests):

https://github.com/kubernetes/enhancements/blob/master/keps/sig-windows/20190103-windows-node-support.md#what-will-never-work:

  • uid (runasuser)
  • gid (fsgroup, runasgroup, supplementalgroup)
  • selinux
  • seccomp

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

added [LinuxOnly]

@k8s-ci-robot k8s-ci-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Mar 1, 2019
@liggitt
Copy link
Copy Markdown
Member

liggitt commented Mar 1, 2019

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 1, 2019
@liggitt liggitt removed the api-review Categorizes an issue or PR as actively needing an API review. label Mar 1, 2019
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: krmayankk, liggitt

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 1, 2019
@fejta-bot
Copy link
Copy Markdown

This PR may require API review.

If so, when the changes are ready, complete the pre-review checklist and request an API review.

Status of requested reviews is tracked in the API Review project.

@fejta-bot
Copy link
Copy Markdown

/retest
This bot automatically retries jobs that failed/flaked on approved PRs (send feedback to fejta).

Review the full test history for this PR.

Silence the bot with an /lgtm cancel or /hold comment for consistent failures.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API kind/feature Categorizes issue or PR as related to a new feature. lgtm "Looks good to me", indicates that a PR is ready to be merged. priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. release-note Denotes a PR that will be considered when it comes time to generate release notes. sig/auth Categorizes an issue or PR as relevant to SIG Auth. sig/node Categorizes an issue or PR as relevant to SIG Node. sig/testing Categorizes an issue or PR as relevant to SIG Testing. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants