-
Notifications
You must be signed in to change notification settings - Fork 517
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
API-1843: KMSEncryptionProvider Feature Gate #2071
base: master
Are you sure you want to change the base?
Conversation
Skipping CI for Draft Pull Request. |
Hello @swghosh! Some important instructions when contributing to openshift/api: |
/test all |
/test all |
2 similar comments
/test all |
/test all |
@swghosh: This pull request references API-1843 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.18.0" version, but no target version was set. In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/retest |
Please add an appropriate PR description to explain the motivation behind this change. Neither the PR, nor the card linked really explain what we are doing here, or why |
@swghosh: This pull request references API-1843 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.18.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@JoelSpeed added description about the feature. |
/retest |
1 similar comment
/retest |
According to the upstream documentation, this feature is stable as of 1.29, which would be 4.16. It is my understanding that if an upstream feature is declared stable, and we have not otherwise specified the gate status, then the feature is already enabled. This PR appears to disable a feature that has previously been enabled. /hold |
/test ci/prow/verify |
@deads2k: The specified target(s) for
The following commands are available to trigger optional jobs:
Use
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/test verify |
PR is good to go, but we should get the EP into a state where the first round of reviews are in before we merge the gate, if we don't have at least some consensus, merging this would add a gate that is unneeded |
/test all |
/retest |
* generated files from `PROTO_OPTIONAL="true" make update` Signed-off-by: Swarup Ghosh <[email protected]>
this looks good to me for tech-preview |
/label acknowledge-critical-fixes-only |
thanks @tkashem |
/retest Looks good, but I'd like to see if these test failures are related |
/lgtm PR is inert, I don't believe the tests failures are related and relevant components (eg KAS) don't recognise the gate, so we've got past my concern about overlapping gates |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: JoelSpeed, swghosh, tkashem The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold It sounds like this feature might need a little more time to bake, I'd like to hold this until the API is ready to go and the EP has at least had some review. From discussion with @wallylewis we don't need to rush this into 4.18 so lets wait until after branch cut |
/hold |
@swghosh: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Feature: KMS Encryption Provider for sensitive etcd Resources
A user-configurable interface to support encryption of data stored in etcd using a supported Key Management Service (KMS).
OpenShift would need to align closer with KMS evolution upstream with respect to the different Kubernetes Encryption Providers available today that can encrypt resources from APIServer EncryptionConfig, https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/.
User Stories:
xref: OCPSTRAT-108, API-1684