-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
1710: selinux: Update the KEP for 1.33 and graduate to Beta #5096
base: master
Are you sure you want to change the base?
Conversation
jsafrane
commented
Jan 28, 2025
•
edited
Loading
edited
- One-line PR description: Update the KEP with current development (1.32/33) and a plan to graduate to Beta in 1.33
- Issue link: Speed up recursive SELinux label change #1710
- Other comments: See individual small commits.
- Specify SELinux controller tests.
- Add notes about other Linux distros (tested on Debian).
- Add a note that the controller / KCM cannot implement SELinux label defaulting.
- A new job + testgrid with `SELinuxChangePolicy` enabled + `SELinuxMount` disabled is available.
cd8f528
to
b993cf3
Compare
b993cf3
to
fead564
Compare
* Telemetry numbers from OpenShift show that <5% of clusters would need to change any of their Pods. | ||
* GA: | ||
* This phase signalizes that the feature is ready for real testing. Only non-breaking parts (`SELinuxChangePolicy`) are enabled by default. | ||
* GA of Phase 2 (`SELinuxChangePolicy` + `SELinuxMountReadWriteOncePod` are GA and locked to default): | ||
* All known issues fixed. Otherwise, we will GA Phase 1 only. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you clarify which phase we will be in when this is implemented? Will - SELinuxChangePolicy
will have an material effect beyond allowing users to opt-out of mount-option for applying selinux labels?
What happens if SELinuxMount
is enabled (because we are moving this to beta), will SELinuxChangePolicy
will then have an material impact?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not sure I understand. The feature gates need to be enabled in order, as described elsewhere in the KEP. Each feature gate enables a different piece of code and counts that the previous ones are enabled.
In addition, in this phase is SELinuxMount
is beta, but disabled by default. "Beta" here really tells it's ready for testing,. just as we did with CSI migration and other potentially breaking changes.
I added some wording around to make it more explicit.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
okay, I noticed that we are already excluding pods from using mount option as selinux policy if they have SELinuxChangePolicy
enabled and have opted-out of it.
So this question is kinda moot.
PRR shadow: I was reading the KEP and I think some updates for phase 1 may be needed. There is no mention of Phase 1 graduation. From the KEP issue, it sounds like you want to promote it to stable in 1.34. |
PRR shadow: looks good. This was tested manually before releasing SELinuxMountReadWriteOncePod enabled by default. It will be tested before SELinuxMount gets enabled by default. |
On a side note, what events are emitted in this case? The KEP mentions events but I didnt see what event would be emitted. |
And I think a prod-readiness should be updated as you are changing stage for one of the feature gates https://github.com/kubernetes/enhancements/blob/master/keps/prod-readiness/sig-storage/1710.yaml |
fead564
to
e45571c
Compare
I updated the issue, 1.35 is the earliest and optimistic GA of SELinuxMountReadWriteOncePod + SELinuxChangePolicy. SELinuxMount at least 1 release later.
Good catch. I added "e2e tests implemented + green".
I will do it in a subsequent PR, once the enhancement text is polished and merged. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: jsafrane The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Ok, I added PRR request. We want all three feature gates beta in 1.33. |
from sig-storage and implementation POV. LGTM /lgtm |
I tested upgrade + downgrade + upgrade, it seems working to me. One interesting observation is that when SELinuxChangePolicy FG got from After flipping Details:
|