CRI API version skew policy (original) (raw)

CRI is a plugin interface which enables the kubelet to use a wide variety of container runtimes, without the need to recompile. CRI consists of a protocol buffers and gRPC API. Read more about CRI API at kubernetes docs.

The CRI API is only intended to be used for the kubelet to container runtime interactions, or for node-level troubleshooting using a tool such as crictl. It is not a common purpose container runtime API for general use, and is intendedto be Kubernetes-centric. This is why there may be an undocumented logic within a container runtimes that assumes the order or specific parameters of call(s) that the kubelet makes. Attempts to call CRI API in a different order by a client different than the kubelet, might result in unrecoverable error. Whenever discovered, this logic is being documented and avoided.

Version skew on a node

On a single Node there may be installed multiple components implementing different versions of CRI API.

For example, on a single node there might be:

So on a single node it may happen that Container Runtime is serving a newer version’d kubelet and older versioned crictl. This is a supported scenario within the version skew policy.

Version Skew Policy for CRI API

CRI API has two versions:

Major semantic version (e.g. v1) is used to introduce breaking changes and major new features that are incompatible with the current API.

Kubernetes version is used to indicate a specific feature set implemented on top of the major semantic version. All changes made without the change of a major semantic version API must be backward and forward compatible.

Versioning

This library contains go classes generated from the CRI API protocol buffers and gRPC API.

The library versioned as 0.XX as Kubernetes doesn’t provide any guarantees on backward compatibility of Go wrappers between versions. However CRI API itself (protocol buffers and gRPC API) is marked as stable v1 version and it is backward compatible between versions.

Versions like v0.<minor>.<patch> (e.g. v0.25.5) are considered stable. It is discouraged to introduce CRI API changes in patch releases and recommended to use versions like v0.<minor>.0.

All alpha and beta versions (e.g. k8s.io/cri-api@v0.26.0-beta.0) should be backward and forward compatible.

Feature development

Some features development requires changes in CRI API and corresponding changes in Container Runtime. Coordinating between Kubernetes branches and release versions and Container Runtime versions is not always trivial.

The recommended feature development flow is following:

Designing new CRI APIs

The following are considerations to take into account designing new features:

  1. The intended behavior, expectations, and call sequence, must be documented directly in the protocol definition to simplify runtime adoption.
  2. The CRI API change must be as simple as possible. Choosing between simplicity and expressiveness, simplicity has a preference.
  3. Existing fields must be reused only if their logical meaning allows it and does not interfere with the existing features. Changing the expected value format or call sequence may break things in a way that is hard to test and should be avoided.

Feature testing

It is highly encouraged to add critest to every new CRI API. Read about CRI API validation.

What’s next

Feedback

Was this page helpful?