1
1
# Roadmap and Vision
2
2
3
- ## SIG Release Roadmap for 2022 and beyond
3
+ ## SIG Release Roadmap for 2024 and beyond
4
4
5
- This document contains the SIG Release Roadmap for 2022 and beyond. More
5
+ This document contains the SIG Release Roadmap for 2024 and beyond. More
6
6
detailed information can be found on the corresponding project boards.
7
7
8
8
### Primary Focus
9
9
10
- Establish a ** consumable** , ** introspectable** , and ** secure** supply chain for
11
- Kubernetes. As a supply chain we understand the defining, building and
12
- publishing of Kubernetes related artifacts.
13
-
14
- 1 . ** Consumable** : Improving the usability of artifacts by making their
15
- consumption easier. This includes being process independent of vendor,
16
- employer and individuals.
17
- 1 . ** Introspectable** : It is clear for users at which point and how Kubernetes
18
- artifacts are being built. This includes the documentation of all
19
- deliverables as well as clarifying what we do not support. All official
20
- release artifacts will be built by a hermetic process that is impervious to
21
- human interference.
22
- 1 . ** Secure** : The artifacts we produce are verified for their integrity. This
23
- applies to their functionality (we know what we deliver) as well as their
24
- software security (we know when CVEs occur).
10
+ Provide a more ** robust** , ** fast** and ** flexible** release pipeline for
11
+ Kubernetes.
12
+
13
+ 1 . ** Robust** : The process of creating release metadata should be consistent
14
+ across consecutive runs as well as resilient to infrastructure failures.
15
+ 1 . ** Fast** : The creation time of Kubernetes releases should be minimized.
16
+ 1 . ** Flexible** : Future enhancements to the process will be taken into
17
+ consideration from the beginning on, for example when thinking about
18
+ extending the release metadata.
25
19
26
20
### Deliverables
27
21
@@ -31,71 +25,59 @@ state.
31
25
32
26
### Work in progress (WIP)
33
27
34
- 1 . ** SLSA compliance in the Kubernetes Release Process (Secure) **
28
+ 1 . ** Make artifact validation more robust **
35
29
36
- Outcome: Ensure that our release process is [ SLSA] ( https://slsa.dev )
37
- compliant. We also intend to participate actively in the development of the
38
- framework.
30
+ Outcome: Provide a fast and error-resistant workflow for artifact promotion
31
+ compliant with SLSA.
39
32
40
- Enhancement: https://github.com/kubernetes/enhancements/issues/3027
33
+ Enhancement: was https://github.com/kubernetes/enhancements/issues/3027
41
34
42
- Project board: https://github.com/orgs/kubernetes/projects/138
35
+ Project board: https://github.com/orgs/kubernetes/projects/171
43
36
44
- 1 . ** Moving deb/ rpm package builds to community infrastructure (Consumable) **
37
+ 1 . ** Making deb and rpm package builds more robust **
45
38
46
- Outcome: Automated builds of signed ` deb ` and ` rpm ` Kubernetes packages
47
- within community infrastructure.
39
+ Outcome: Provide a fast and error-resistant workflow for building and
40
+ publishing packages to the community-owned infrastructure.
48
41
49
42
Enhancement: https://github.com/kubernetes/enhancements/issues/1731
50
43
51
44
Project board: https://github.com/orgs/kubernetes/projects/137
52
45
53
- 1 . ** Signing of release artifacts (Secure)**
54
-
55
- Outcome: Being able to ship signed release artifacts, which includes
56
- container images in the first iteration as well as all artifacts following
57
- on.
58
-
59
- Enhancement: https://github.com/kubernetes/enhancements/issues/3031
46
+ 1 . ** Enable other Kubernetes subprojects to use our packages infrastructure**
60
47
61
- 1 . ** Migrate away from GCS bucket: gs://kubernetes-release**
48
+ Outcome: Building a CLI, library and documentation for Kubernetes related
49
+ projects to use the existing packaging infrastructure.
62
50
63
- Outcome: Ensure we migrate away from gs://kubernetes-release, use a community-owned Object Storage bucket for binaries releases, serve the binaries published through a CDN service.
51
+ Enhancement: _ none _
64
52
65
- ### To be done (TODO)
53
+ Project board: https://github.com/orgs/kubernetes/projects/137
66
54
67
- 1 . ** Enhance Kubernetes binary artifact management (Consumable) **
55
+ 1 . ** Migrate away from GCS bucket: gs://kubernetes-release **
68
56
69
- https://github.com/kubernetes/sig-release/issues/1372
57
+ Outcome: Ensure we migrate away from gs://kubernetes-release, use a
58
+ community-owned Object Storage bucket for binaries releases, serve the
59
+ binaries published through a CDN service.
70
60
71
61
Enhancement: _ none_
72
62
73
- Outcome: Being able to promote files as artifacts and using this mechanism
74
- for Kubernetes releases.
75
-
76
- 1 . ** Define and collect metrics about Kubernetes releases (Introspectable)**
77
-
78
- https://github.com/kubernetes/sig-release/issues/1527
63
+ ### To be done (TODO)
79
64
80
- Enhancement: _ none _
65
+ 1 . ** Modernize and Extend Release Metadata **
81
66
82
- Outcome: Being able to measure and interpret a set of defined metrics about
83
- Kubernetes releases to associate actions with those .
67
+ Outcome: Providing release metadata compliant to the latest industry
68
+ standards .
84
69
85
- 1 . ** Establish Cluster API as first-class signal for upstream releases
86
- (Consumable)**
70
+ Enhancement: _ none_ (was https://github.com/kubernetes/enhancements/issues/3027 )
87
71
88
- Enhancement: _ none _
72
+ Project board: https://github.com/orgs/kubernetes/projects/138
89
73
90
- Outcome: Cluster API provides a CI signal for blocking release test jobs.
74
+ 1 . ** Make Kubernetes releases more flexible **
91
75
92
- 1 . ** Enhance and simplify Kubernetes version markers (Consumable)**
76
+ Outcome: Provide more possibilities for Kubernetes releases to be created in
77
+ custom infrastructure environments.
93
78
94
79
Enhancement: _ none_
95
80
96
- Outcome: Clear documentation about available version markers as well as their
97
- simplified automation.
98
-
99
81
### Known Risks
100
82
101
83
1 . ** We rely on different SIGs for our work**
@@ -110,25 +92,39 @@ state.
110
92
means that there is a risk of delaying because of investing more time in
111
93
pre-research.
112
94
113
- 1 . SLSA framework is in earlier stages and changes to it can/may affect some of
114
- the direction of roadmap items.
115
-
116
95
### Requests to Other Teams
117
96
97
+ 1 . ** SIG K8s Infra**
98
+
99
+ For general infrastructure support we rely on.
100
+
118
101
1 . ** SIG Architecture**
119
102
120
103
For the formalization of the released platforms and input about the overall
121
104
supply chain.
122
105
123
- 1 . ** SIG Cluster Lifecycle **
106
+ 1 . ** SIG Security **
124
107
125
- To get input for making Cluster API a first-class signal for upstream releases .
108
+ For content which should be part of the release metadata .
126
109
127
- 1 . ** SIG K8s Infra **
110
+ ### Done Deliverables
128
111
129
- For general infrastructure support we rely on.
112
+ 1 . ** Moving deb/rpm package builds to community infrastructure (Consumable) **
130
113
131
- ### Done Deliverables
114
+ Outcome: Automated builds of signed ` deb ` and ` rpm ` Kubernetes packages
115
+ within community infrastructure.
116
+
117
+ Enhancement: https://github.com/kubernetes/enhancements/issues/1731
118
+
119
+ Project board: https://github.com/orgs/kubernetes/projects/137
120
+
121
+ 1 . ** Signing of release artifacts (Secure)**
122
+
123
+ Outcome: Being able to ship signed release artifacts, which includes
124
+ container images in the first iteration as well as all artifacts following
125
+ on.
126
+
127
+ Enhancement: https://github.com/kubernetes/enhancements/issues/3031
132
128
133
129
1 . ** Formalize supported release platforms (Introspectable)**
134
130
@@ -174,3 +170,40 @@ state.
174
170
175
171
Outcome: A documented and simple process for handling CVE information within
176
172
Kubernetes releases.
173
+
174
+ ### Stale
175
+
176
+ This section covers items from the past 2022 roadmap which have not been
177
+ started or became stale.
178
+
179
+ 1 . ** Enhance Kubernetes binary artifact management (Consumable)**
180
+
181
+ https://github.com/kubernetes/sig-release/issues/1372
182
+
183
+ Enhancement: _ none_
184
+
185
+ Outcome: Being able to promote files as artifacts and using this mechanism
186
+ for Kubernetes releases.
187
+
188
+ 1 . ** Define and collect metrics about Kubernetes releases (Introspectable)**
189
+
190
+ https://github.com/kubernetes/sig-release/issues/1527
191
+
192
+ Enhancement: _ none_
193
+
194
+ Outcome: Being able to measure and interpret a set of defined metrics about
195
+ Kubernetes releases to associate actions with those.
196
+
197
+ 1 . ** Establish Cluster API as first-class signal for upstream releases
198
+ (Consumable)**
199
+
200
+ Enhancement: _ none_
201
+
202
+ Outcome: Cluster API provides a CI signal for blocking release test jobs.
203
+
204
+ 1 . ** Enhance and simplify Kubernetes version markers (Consumable)**
205
+
206
+ Enhancement: _ none_
207
+
208
+ Outcome: Clear documentation about available version markers as well as their
209
+ simplified automation.
0 commit comments