You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: keps/sig-node/4639-oci-volume-source/README.md
+35-23Lines changed: 35 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,9 +151,9 @@ Items marked with (R) are required *prior to targeting to a milestone / release*
151
151
-[x] (R) KEP approvers have approved the KEP status as `implementable`
152
152
-[x] (R) Design details are appropriately documented
153
153
-[x] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input (including test refactors)
154
-
-[] e2e Tests for all Beta API Operations (endpoints)
155
-
-[] (R) Ensure GA e2e tests meet requirements for [Conformance Tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/conformance-tests.md)
156
-
-[] (R) Minimum Two Week Window for GA e2e tests to prove flake free
154
+
-[x] e2e Tests for all Beta API Operations (endpoints)
155
+
-[x] (R) Ensure GA e2e tests meet requirements for [Conformance Tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/conformance-tests.md)
156
+
-[x] (R) Minimum Two Week Window for GA e2e tests to prove flake free
157
157
-[x] (R) Graduation criteria is in place
158
158
-[x] (R) [all GA Endpoints](https://github.com/kubernetes/community/pull/1806) must be hit by [Conformance Tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/conformance-tests.md)
159
159
-[x] (R) Production readiness review completed
@@ -209,7 +209,7 @@ which go beyond running particular images.
209
209
artifact, we don't want the runtime to be the entity responsible for
210
210
interpreting and correctly processing it to its final consumable state.
211
211
That could be delegated to the consumer or perhaps to some hooks and is
212
-
out of scope for alpha.
212
+
out of scope for this enhancement.
213
213
- Manifest list use cases are left out for now and will be restricted to
214
214
matching architecture like we do today for images. In the future (if there are
215
215
use cases) we will consider support for lists with items separated by
@@ -586,7 +586,8 @@ feature cannot be used. Pods using the new `VolumeSource` combined with a not
586
586
supported container runtime version will fail to run on the node, because the
587
587
`Mount.host_path` field is not set for those mounts.
588
588
589
-
For security reasons, `ro` (read-only) options by default.
589
+
For security reasons, `ro` (read-only) option is set by default. Having `rw`
590
+
(read-write) support will require a follow-up enhancement.
590
591
591
592
Note: in the process of mounting images into the container's rootfs, there may need to be intermediate mounts created. This is especially relevant if
592
593
the CRI implementation wishes to support one image being mounted with multiple different SELinux labels. If that's done, the CRI implementation is responsible
@@ -781,13 +782,11 @@ We expect no non-infra related flakes in the last month as a GA graduation crite
781
782
-[sig-node] ImageVolume [NodeFeature:ImageVolume] should succeed with multiple pods and same image on the same node
782
783
-[sig-node] ImageVolume [NodeFeature:ImageVolume] should succeed with pod and multiple volumes
783
784
-[sig-node] ImageVolume [NodeFeature:ImageVolume] should succeed with pod and pull policy of Always
785
+
-[sig-node] ImageVolume [NodeFeature:ImageVolume] subPath should succeed when using a valid subPath
786
+
-[sig-node] ImageVolume [NodeFeature:ImageVolume] subPath should fail if subPath in volume is not existing
0 commit comments