►
Description
KEP Review
B
Welcome
to
the
january
27th
2022
sig
cloud
provider,
cloud
provider,
extraction
working
group
meeting:
this
meeting
is
part
of
the
cncf
and,
as
such
we
adhere
to
their
standards
for
behavior
so
which
amount
to
please
be
considered,
inclusive
and
polite
to
all
your
fellow
members
and
contributors.
So
yeah,
please
do
so.
B
B
So
I
think
the
big
thing
there
is.
We
need
to
review
it
for
adherence
to
what
we
believe
to
be
the
ga
requirements.
B
A
B
Okay,
there
was
one
interesting
point
which
came
up
during
the
review
of
jared's
ga
requirements
and
I
think
it's
pertinent
to
the
whole
sig.
Interestingly,
there
is
a
requirement
for
ga
that
any
apis
be.
B
What's
the
term
comply,
I'm
thinking
conforming
conformant,
that's
actually
a
little
challenging
for
our
sig.
Since
cloud
provider,
specific
specificities
are
not
supposed
to
be
tested,
in
conformance.
C
Is
this
an
api
though,
like
it's
a,
I
know
we
have
a
type
with
a
kind,
but
it's
not
a
resource.
So
does
it
count
as
no
api.
B
Well,
yeah,
I
mean
it's,
it's
sort
of
an
interesting
one,
it
uses
a
resource
and
but
arguably
that
resource
is
agnostic,
but
the
some
of
the
coding
around
it.
Isn't
it's
a
great
question.
I
think
we
just
need
to
be
very
careful
about
the
performance
piece
and
make
sure
that
we're
okay
yeah.
I
think
that
I
I
I
think
that
if
we
need
to,
we
can
ask
for
an
exception
and
make
a
good
case.
It's
just
that.
D
B
B
C
I
think
we
also
need
like
rollback
testing,
but
I
know
rollback
testing
is
really
hard
to
automate
so
like
even
like
just
doing
it
manually
a
few
times
and
just
jotting
down
that
we
did.
A
rollback
test
is
probably
something
we
need.
B
That's
fair,
I
actually
feel
like.
If
we
do
upgrade
testing,
then
the
system
that
does
the
upgrade
testing
can
probably
do
the
rollback,
testing,
they're
sort
of
part
and
parcel
of
one
another,
but
we
can
we
can
deal
with
that
when
we
get
there.
The
other
thing
I
will
say
which
I've
mentioned
before
is
this
has
to
go
to
ga,
but
it
doesn't
actually
have
to
go
to
ga
this
soon
yeah.
So
I
think
it
is
good.
B
B
Okay-
and
I
will
say
I
mean
if
you
read
through
the
cap
it
the
cap
talks
about
rollback,
so
I
mean
it
does
make
sense.
The
the
entire
steps
needed
to
go
from
migrating
from
something
like
the
service
controller
running
in
the
kcm
to
running
in
the
ccm.
The
the
cap
also
speaks
about
running
it
in
the
ccm
and
then
rolling
back
to
it
running
in
the
kcm,
so
it
is
actually
covered
by
the
cap,
and
s
I
mean
I
would
say
would
have
to
be
tested
anyway.
B
D
And
I'm
making
a
note
here
to
go
back
and
reread
these
things,
because
I
don't
but
you're
talking
about
the
this
leader
extra
leader
migration
cap
right.
B
D
B
All
right-
and
then
there
were
also
someone
says
minor
tweaks
to
the
cubelet
credential
provider-
is
that
from
you.
C
C
Sorry
we
set
the
beta
criteria
like
a
release
or
two
ago,
but
then
like
we
never
got
to
them.
So
I
think
this
release
is
just
marking
that
we're
gonna
work
on
it
in
124
keeping
the
beta
criteria's
the
same,
but
I
did
add
one
extra
beta
criteria,
saying
that
we
need
two
working
implementations
which
I
think
we
already
have
right
like
we
have
the
gcp
and
aws
one
out
there.
So
I
like
that's
kind
of
a
free
one,
but
just
putting
it
there
as
a
formality.
C
B
Quick
on
that
subject,
I
know
kermit
was
working
on
the
windows
gcp
credential
provider.
Do
we
actually
specify
in
the
cap
that
we
that
someone
has
to
have
shown
that
the
credential
provider
works
on
windows.
E
B
B
So
so
we
can
double
check
with
kermit.
So
let's
let's
follow
up,
but
the
nice
thing
is
all
we
have
like.
There's
two
things:
there's
testing
anything
specific
to
the
credential
provider,
but
a
large
amount
of
the
testing
can
just
be
turning
the
credential
provider
on
and
then
running
the
ee
tests,
and
I
think
that
may
be
the
state
we're
in
in
cloud
provider.
Gcp.
C
C
B
B
C
Okay,
so
so
maybe
like
that's
a
good
decision
to
make
like
for
beta,
we
just
have
to
we
for
beta.
We
want
to
make
sure
that
the
on
the
implementation
side,
we
have
e2e
tests
and
then
for
ga,
we
can
say,
like
the
whole
kubernetes
suite,
like
kubernetes
core
suite,
runs
on
the
cringe
provider
as
well,
which
is
going
to
be
like
a
larger
effort,
but
give
us
more
time
to
work
on
that.
B
So
as
a
side
note
nick
and
I
met
earlier
this
week,
and
so
I
think
we
tentatively
and
correct
me
if
I'm
being
dishonest
here
nick,
but
I
think
we
tentatively
have
a
plan
for
getting
some
of
the
alpha
stuff
needed
for
web
hooks
in
the
ccm
done
in
this
release.
B
Cool
and
then
I'm
behind,
but
the
other
thing.
I
think
that
is
vitally
important-
that
we
need
to
get
done,
and
this
one's
on
me
is
enable
no
cp
on
cube
up.
B
And
I
think
that's
needed
for
the
the
entire
cloud
provider
feature
testing
effort,
because
that
I
think
that's
going
to
sort
of
highlight
a
series
of
places
where
we're
not
getting
the
testing.
We
need.
B
Provider,
oh
okay,
gotcha
cool,
so
we
have.
We
have
two
feature
gates
that
enforced
no
cloud,
no
cloud
provider,
one
does
it
I
mean
andrew
can
speak
to
this
better
than
I
can,
but
one
of
them
enforces
node
cl
no
cloud
provider
on
the
main
binaries,
so
cubelet
cube
up
or
sorry
cubelet,
cube,
api
server
and
cube
controller
manager,
and
I
believe
the
other
one
enforces
that
there's
no
credential
that
the
credential
provider
isn't
using
anything
cloud
provider
specific
right,
andrew.
D
B
Right
and
so
those
are
theirs,
you
know
those
are
currently
feature
gates
in
alpha.
They
get
turned
on
in
beta,
which
basically
means
all
of
our
testing
breaks,
and
we
know
this
for
sure.
So
I
think
it
would
be
good
to
have
one
set
up
one
test
suite
proud
job.
That
basically
shows
what'll
happen
when
those
get
turned
on,
but
the
weird
part
is
that
they
break
they
don't
bring.
I
know
this
sounds
like
a
weird
thing
to
say
they
don't
break
in
the
correct
way.
B
Currently
so
right
now,
if
you
turn
at
least
and-
and
let
me
be
specific-
they
don't
break
in
the
right
way
for
google.
So
right
now,
what
happens?
If
you
turn
them
on
in
with
the
cube
up
scripts
is
the
cube
up,
will
enable
cloud
provider
and
then
the
feature
gate
just
kills
the
binary,
which
is
correct,
but
not
what
we
want
to
test.
What
we
want
to
test
is
you
turn
off
the
credential,
the
key
we've
pacified
to
turn
off
the
credential
provider.
B
Cool
yeah,
so
anyone
have
anything
else.
They
want
to
chat
over.