Start converting Kubernetes to Rust#138147
Conversation
|
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/hold |
|
@rikatz: The label(s) DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
We should start with etcd first |
|
I would rather migrate etcd to Perl and make it a k/v regex database |
|
make sure to make cherry picks for the previous branches too. I'll LGTM and approve immediately. |
|
Which AI tool are you using to make this conversion? Looks like a weekend project to rewrite either way |
|
Exactly, no AI is needed, just me, a bucket of coffee and some free time during my weekend. |
|
I can’t wait to write Kubernetes TOML |
|
Wth is this 😂 |
|
Start by introducing the most important module: age verification for each kubectl apply. |
|
/kubernetes merge it to main 😂 |
|
Wasn't the goal to write it to assembly for performance gains* claude max pro will do it. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: dkanas, rikatz, shlomitubul The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
I am sure @rohitg00 will be the one to do the actual migration |
|
🦀 |
|
I was shocked for a while, then realised it's 1st of April today XD |
|
Just ask the AI to rewrite everything into plain C, they are so smart nowadays that they will write perfect code without bugs or security issues, GUARANTEED!!! :-D |
|
And call it Kubernetes 2.0.0, it's about time! |
|
+1 from me, great job @rikatz! 🙏🙏🙏 After a successful launch after the weekend, let's prioritize rewriting kubernetes-sigs. I volunteer to help with Gateway API. |
|
I would start with something less important than Gateway API on kubernetes-sigs, like controller-runtime. I am sure @sbueringer would approve it |
|
Perhaps it's also the right time to replace KubeDNS with generative AI DNS, which you've been planning for some time, @Michcioperz? |
|
Guys, if you're serious about tacking this project, I will be happy to participate. However, I need to clarify a few points first. What underlying OS are you considering? Is it an immutable one? We will need a better alternative to etcd. Are we prepared to develop a superior option that includes multisite, multicluster capabilities, an improved consensus protocol, robust backup and recovery systems. The project must be ready to support algorithms that enable post-quantum cryptography? Will it support HTTP/3 as the default? Are you planning to allow current operators to run on top of the platform, or are you aiming to create a new ecosystem? Will eBPF be the default for networking and observability? How many architects will you bring onto the team? Who will be tasked with creating extensive documentation? Are you planning to incorporate LLMs into this project, and what type of license are you considering? Will you create a completely new fork? How do you plan to fund the project and generate revenue? Thank you very much! |
This comment was marked as off-topic.
This comment was marked as off-topic.
|
troublemaker ricardo 😄 |
|
thanks @rikatz this was a lot of fun :) |
| [package] | ||
| name = "safer-api-server" | ||
| version = "0.1.0" | ||
| edition = "2021" |
There was a problem hiding this comment.
Oh I found a bug!!! The year is wrong!
| let path = req.uri().path().to_string(); | ||
|
|
||
| eprintln!( | ||
| "\x1b[32m[SAFER]\x1b[0m {} {} -> proxying to unsafe Go server (yikes)", |
There was a problem hiding this comment.
Consider proxying to a safe rust server
There was a problem hiding this comment.
Oh! If the Rust servers are chained in several proxy layers then it must be more secure in the end, right?
Good idea!!!

What type of PR is this?
/kind cleanup
What this PR does / why we need it:
We all know Rust is better for everything. Rust is the best language for every safe program, and given Kubernetes importance around, we must start converting it to Rust!
This is also the initial step to integrating Kubernetes into the Linux Kernel
Which issue(s) this PR is related to:
No KEP is needed, just yolo it
Special notes for your reviewer:
Look at your calendar
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: