-
Notifications
You must be signed in to change notification settings - Fork 553
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prepare / Tag v1.1.0 release #1052
Comments
Not to further hold up an already long process, but #1040 should also be very close to finished (just waiting for final review). |
#1040 should be probably v1.0.4 or later |
Given that it's adding new features, #1040 should probably bump the minor version to stick with SemVer (so |
Thinking of that, possibly #1046 warrants a "minor" version bump as well, as it's adding new functionality. |
Yeah, we should tag a |
@cyphar what more do you expect from croupv2 work? |
@mskarbek We need to have at least one implementation of it so that we can be sure that the specification changes actually work on real systems, and if they don't work we should go back and fix issues we may find in the specification. In addition, it wouldn't hurt to talk to other container runtimes (such as LXC) to get their feedback since they've supported cgroupv2 for much longer than any OCI runtime. EDIT: Ignore this section, it's pretty much gibberish. I shouldn't write comments while I'm still half-awake...And looking at the PR right now, we also need to address how to deal with unknown configuration values. Currently it says that:
But also:
Which could in theory conflict in the future if there is a controller that requires some extra setup other than writing its name to Remember, once something is in the runtime-spec we cannot remove it (without a major version bump) -- shoe-horning it in would be a mistake. |
The v1-to-v2 conversion convention can be cherry picked to v1.0.3? |
@AkihiroSuda which change is that? Do you have a specific PR? Looking at the changes since the last release; v1.0.2...8e2f17c, those all (at a glance) look ok for a (v1.0.3) "patch" release. Having that would help projects declare that they require |
@thaJeztah I think he's referring to the v1-to-v2 conversion text that's in #1040 right now (in other words, should we take the conversion text -- which is something runtimes are already implementing -- and leave the whole @AkihiroSuda Since the text for the v1-to-v2 conversion is all gated by SHOULD and MAY, we could merge it now and change it in future releases without breaking backwards compatibility (since it's effectively just a recommendation or option for implementations, respectively). Do runc and crun already implement the semantics described (I haven't been following all of the cgroupv2 work in both projects)? |
The v1-to-v2 conversion is already implemented, but the pure unified struct is not. |
Thanks for clarifying, yes that sounds reasonable |
@vbatts @mrunalp @AkihiroSuda @cyphar @crosbymichael Can we get this done? |
@opencontainers/runtime-spec-maintainers Do we want to have #1040 split up now so that we can quickly review and merge the cgroup v1->v2 conversion table? |
I think it would make sense to at least prepare a PR for that |
I'd drop the conversion table completely. Despite being the author of it, I am still not convinced it should be part of the runtime specs. I'd just leave the generic |
Let's release v1.0.3 as-is and handle the cgroup v2 stuff separately |
I've dropped the conversion table, that can be added again later if needed |
How can we move this forward? @opencontainers/runtime-spec-maintainers |
I can do this, but others could as well. Open a PR of the commit with a version bump and then back to "-dev" (2 commits). |
I've simplified #1040 Is there any chance it can be reviewed before we cut a new release? |
I am fine with it |
#1059 seems also harmless for v1.0.3 and easy to review |
Now that #1040 is also in, is there anything still necessary for this? Looking at the open PRs since 1.0.2:
|
From here, regarding deprecation of KernelMemory (which also happens to be broken on RHEL 7):
EDIT (April '21): Should be done now: #1093, opencontainers/runc#2840 |
@opencontainers/runtime-spec-maintainers |
Any news? Currently most consumers(runc containers/common) are not using the tagged version, which makes the version of the spec meaningless.. |
@kolyshkin @thaJeztah Please cut a release. |
Please let's merge #1143 before we cut a new release |
Neither me nor @thaJeztah are maintainers of this repo (as of right now, although this is being changed by #1150). |
You both are maintainers now 😃. |
Sure, let's cut |
Which PRs? |
@kolyshkin ping 🙏 |
runtime-spec releases really are a sisyphean story... There's a bunch of high-quality PRs that would suggest themselves for inclusion, but perhaps the current state of the repo should just be released to finally provide a new baseline, and then focus on getting those PRs merged for another release that's similarly just cut without a lot of ceremony? It's a pity for those features, but it seems we're stuck in an infinite "just these couple more PRs before we release" cycle. |
Let's move this forward |
RC has been live for 6 weeks - is there anything in particular that's still necessary to happen for a release? |
|
Proposal for releasing v1.1.0-rc.2: |
Can 1.1.0 include these at a minimum? I am not talking about the next rc.2. |
Proposal for v1.1.0-rc.3 This should be the last RC for v1.1.0. |
If there is no objection, I'd like to propose releasing v1.1 GA very soon. |
👍 |
(related to https://github.com/containerd/containerd/pull/4357/files#r448837520)
Runc tagged a new release (v1.0.0-rc91), and is currently depending on a non-tagged version of the runtime-spec. With various distribution packagers requiring tagged releases, and with go modules encouraging consumers to packages to use tagged releases, I'm wondering if a new release should be tagged.
runc is currently consuming 237cc4f, (changes since v1.0.2: v1.0.2...237cc4f), but there's a couple more changes in master (237cc4f...master)
Are there pending pull requests that should be merged before tagging v1.0.3? (perhaps #1046 would be nice to have). tags should be "cheap" so, perhaps not a blocker for a v1.0.3, but suggestions welcome 🤗
@cyphar @crosbymichael @tianon @mrunalp @vbatts
The text was updated successfully, but these errors were encountered: