@jcbsmpsn please, provide us with the design proposal link.
@jcbsmpsn please, provide us with the design proposal link and docs PR link (and update the features tracking spreadsheet with it).
/cc @kubernetes/sig-auth-feature-requests @timstclair
@jcbsmpsn Can you please update this feature's status for v1.8?
AFAIK, beta is targeted, right?
@jcbsmpsn @kubernetes/sig-auth-feature-requests @luxas can you confirm that this feature is still on track for 1.8?
@idvoretskyi Yep! Client certificate rotation will be beta in 1.8 and a release note has been added in the release note draft.
@jcbsmpsn an addition to the docs for this feature would be very useful for users. Is it already documented?
Related documentation updates: https://github.com/kubernetes/kubernetes.github.io/pull/5639
cc @alexcope
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale
/lifecycle frozen
@jcbsmpsn @mikedanese @kubernetes/sig-auth-feature-requests
Any plans for this in 1.11?
If so, can you please ensure the feature is up-to-date with the appropriate:
stage/{alpha,beta,stable}
sig/*
kind/feature
cc @idvoretskyi
This feature current has no milestone, so we'd like to check in and see if there are any plans for this in Kubernetes 1.12.
If so, please ensure that this issue is up-to-date with ALL of the following information:
Set the following:
Once this feature is appropriately updated, please explicitly ping @justaugustus, @kacole2, @robertsandoval, @rajendar38 to note that it is ready to be included in the Features Tracking Spreadsheet for Kubernetes 1.12.
Please make sure all PRs for features have relevant release notes included as well.
Happy shipping!
P.S. This was sent via automation
Hi
This enhancement has been tracked before, so we'd like to check in and see if there are any plans for this to graduate stages in Kubernetes 1.13. This release is targeted to be more ‘stable’ and will have an aggressive timeline. Please only include this enhancement if there is a high level of confidence it will meet the following deadlines:
Please take a moment to update the milestones on your original post for future tracking and ping @kacole2 if it needs to be included in the 1.13 Enhancements Tracking Sheet
Thanks!
@kubernetes/sig-auth-feature-requests will this feature graduate to stable in v1.14?
@jcbsmpsn Hello - I’m the enhancement’s lead for 1.14 and I’m checking in on this issue to see what work (if any) is being planned for the 1.14 release. Enhancements freeze is Jan 29th and I want to remind that all enhancements must have a KEP
Hello @jcbsmpsn , I'm the Enhancement Lead for 1.15. Is this feature going to be graduating alpha/beta/stable stages in 1.15? Please let me know so it can be tracked properly and added to the spreadsheet. This will also need a KEP to be included.
Once coding begins, please list all relevant k/k PRs in this issue so they can be tracked properly.
Hi @jcbsmpsn , I'm the 1.16 Enhancement Lead/Shadow. Is this feature going to be graduating alpha/beta/stable stages in 1.16? Please let me know so it can be added to the 1.16 Tracking Spreadsheet. If not's graduating, I will remove it from the milestone and change the tracked label.
Once coding begins or if it already has, please list all relevant k/k PRs in this issue so they can be tracked properly.
As a reminder, every enhancement requires a KEP in an implementable state with Graduation Criteria explaining each alpha/beta/stable stages requirements.
Milestone dates are Enhancement Freeze 7/30 and Code Freeze 8/29.
Thank you.
Hey there @jcbsmpsn , 1.17 Enhancements shadow here. I wanted to check in and see if you think this Enhancement will be graduating to alpha/beta/stable in 1.17?
The current release schedule is:
If you do, I'll add it to the 1.17 tracking sheet (https://bit.ly/k8s117-enhancement-tracking). Once coding begins please list all relevant k/k PRs in this issue so they can be tracked properly. 👍
Please note that all enhancements should have a KEP, the KEP PR should be merged, the KEP should be in an implementable state, have a testing plan and graduation criteria.
Thanks!
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale
/remove-lifecycle stale
@mikedanese is this something that you expect any progress on in the 1.18 cycle? I am enhancements shadow for the release team and so we need to know if it should be tracked.
This is blocked on the Certificates API GA. No change in 1.18.
Enhancement issues opened in kubernetes/enhancements
should never be marked as frozen.
Enhancement Owners can ensure that enhancements stay fresh by consistently updating their states across release cycles.
/remove-lifecycle frozen
@mikedanese is this real that in k8s 1.17.2 there is still no kubelet server certificate rotation? i have upgraded just to 1.17 and i see only client certificate rotation working ...
$ll /var/lib/kubelet/pki/
insgesamt 20
-rw------- 1 root root 1143 26. Mär 2018 kubelet-client-2018-03-26-22-42-46.pem
-rw------- 1 root root 1143 11. Feb 2019 kubelet-client-2019-02-11-12-06-27.pem
-rw------- 1 root root 1143 10. Feb 11:22 kubelet-client-2020-02-10-11-22-37.pem
lrwxrwxrwx 1 root root 59 10. Feb 11:22 kubelet-client-current.pem -> /var/lib/kubelet/pki/kubelet-client-2020-02-10-11-22-37.pem
-rw-r--r-- 1 root root 1196 14. Feb 2018 kubelet.crt
-rw------- 1 root root 1679 14. Feb 2018 kubelet.key
Regarding the documentation the feature should already be active by default?
RotateKubeletClientCertificate and RotateKubeletServerCertificate feature flags on the kubelet and are enabled by default.
The serving certificate feature is active, but is opt-in, since it requires a certificate signing request approval process be set up by the cluster deployer (there is not sufficient information available to the kube-controller-manager to know whether it should approve a serving certificate request from a node for a given IP or DNS name)
/assign
/milestone v1.19
The CSR API is targeting v1 in 1.19
Hi @liggitt !
1.19 Enhancements shadow here. I wanted to check in and see if you think this Enhancement will be graduating in 1.19?
In order to have this part of the release:
The KEP PR must be merged in an implementable state
The KEP must have test plans
The KEP must have graduation criteria.
The current release schedule is:
Monday, April 13: Week 1 - Release cycle begins
Tuesday, May 19: Week 6 - Enhancements Freeze
Thursday, June 25: Week 11 - Code Freeze
Thursday, July 9: Week 14 - Docs must be completed and reviewed
Tuesday, August 4: Week 17 - Kubernetes v1.19.0 released
Please let me know and I'll add it to the 1.19 tracking sheet (http://bit.ly/k8s-1-19-enhancements). Once coding begins please list all relevant k/k PRs in this issue so they can be tracked properly. 👍
Thanks!
Yes, this is planned to graduate in 1.19.
The original design and feature pre-dated the KEP process, so https://github.com/kubernetes/enhancements/pull/1756 has been opened to convert it to KEP format.
/milestone v1.19
@liggitt -- Thank you for the update. I have updated the tracking sheet accordingly. :+1:
Hi @liggitt 👋 1.19 docs shadow here! Does this enhancement work planned for 1.19 require new or modification to docs?
Friendly reminder that if new/modification to docs are required, a placeholder PR against k/website (branch dev-1.19
) are needed by Friday, June 12.
https://kubernetes.io/docs/tasks/tls/certificate-rotation/ would need updating to note the GA status and non-experimental signing duration flag. Placeholder open at https://github.com/kubernetes/website/pull/21108
Thank you @liggitt , I will update the tracking sheet accordingly
Hi @liggitt
I see that https://github.com/kubernetes/kubernetes/pull/91116 has merged already, if you have any other PRs, please link them to this issue so that we can track them. As a reminder Code Freeze is June 25th :)
Thanks!!
Hi @liggitt !
To follow-up on the email sent to k-dev today, I wanted to let you know that Code Freeze has been extended to Thursday, July 9th. You can see the revised schedule here: https://github.com/kubernetes/sig-release/tree/master/releases/release-1.19
We expect all PRs to be merged by that time. Please let me know if you have any questions. 😄
Best,
Kirsten
Hi @liggitt, a friendly reminder of the next deadline coming up.
Please remember to populate your placeholder doc PR and get it ready for review by Monday, July 6th.
Hi @liggitt ,
Is this enhancement now code complete? As a reminder Code Freeze is Thursday July 9th.
Thanks!
Yes
Hi @liggitt, just a quick reminder to get your doc PR ready for review (Remove WIP/rebased/all ready to go) by EOD. Thank you!
Doc PR is ready for review
Hi @liggitt !
Since this KEP is GA in 1.19 can you please update the status to implemented so that we can close this issue?
Thank you!
Kirsten
KEP update in https://github.com/kubernetes/enhancements/pull/1984
/close
@liggitt: Closing this issue.
In response to this:
KEP update in https://github.com/kubernetes/enhancements/pull/1984
/close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.