Description
See additional context in #7708
cri-o packages depending on our CDN and being under of Kubernetes' package ISV was raised to SIG K8s infra long after it was announced publicly, however this still represents a regression both in conflating the security boundaries of publishing these packages and in the liability for end-user download traffic, the worst kind of uncapped liability that we've typically been asking projects to instead use e.g. github releases, avoiding digging that hole deeper. This was not discussed with SIG K8s Infra.
This is a problematic regression and represents inconsistent policy, I don't think we would have agreed to this or would agree to do this for other similar projects, we do not want to be liable for downloads for the entire Kubernetes landscape nor do we want to grant other projects access to our package ISV (even if currently the same people are doing both for both projects, we have to consider long term).
AFAICT this was never discussed or approved with SIG K8s Infra.
I suggest that we:
- Stop publishing additional third party package builds, given these are a recent addition anyhow, to limit further adoption.
- Leave the existing builds so as not to break users.
- Signal boost whatever migration path cri-o publishes to their own package hosting.
See: #7708 for an umbrella tracking remaining third-party dependency on Kubernetes' resources, we've mostly but not-quite eliminated this since 2018.
/sig k8s-infra
cc @kubernetes/sig-k8s-infra-leads @kubernetes/release-engineering