Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: allow argocd-notification ingress to repo-server #6746

Merged
merged 2 commits into from Jul 16, 2021
Merged

fix: allow argocd-notification ingress to repo-server #6746

merged 2 commits into from Jul 16, 2021

Conversation

ZymoticB
Copy link
Contributor

@ZymoticB ZymoticB commented Jul 16, 2021

This change allows an argocd-notification installation using the provided
manifests to ingress to the repo-server.

I am not sure if there is a prevailing opinion about how to manage a
cross project network policy for these related components so I thought
I would put up a PR to spark that discussion. This could live in a separate
NetworkPolicy object managed by the argocd-notifications manifests but I
thought it wuold be better for the possible ingresses for the argocd project
to all live in the argo-cd manifests. I know that notifications are an optional
component, so maybe this is better provided as a separate manifest that can
be strategic merged in? (I am a kustomize user).

Regardless, I think this policy is something that be maintained by argoproj
in some form to reduce release burden of users trying to hand maintain network
policies.

Fixes #argoproj-labs/argocd-notifications#294

Note on DCO:

If the DCO action in the integration test fails, one or more of your commits are not signed off. Please click on the Details link next to the DCO action for instructions on how to resolve this.

Checklist:

  • Either (a) I've created an enhancement proposal and discussed it with the community, (b) this is a bug fix, or (c) this does not need to be in the release notes.
  • The title of the PR states what changed and the related issues number (used for the release note).
  • I've included "Closes [ISSUE #]" or "Fixes [ISSUE #]" in the description to automatically close the associated issue.
  • I've updated both the CLI and UI to expose my feature, or I plan to submit a second PR with them.
  • Does this PR require documentation updates?
  • I've updated documentation as required by this PR.
  • Optional. My organization is added to USERS.md.
  • I have signed off all my commits as required by DCO
  • I have written unit and/or e2e tests for my change. PRs without these are unlikely to be merged.
  • My build is green (troubleshooting builds).

This change allows an argocd-notification installation using the provided
manifests to ingress to the repo-server.

I am not sure if there is a prevailing opinion about how to manage a
cross project network policy for these related components so I thought
I would put up a PR to spark that discussion. This could live in a separate
NetworkPolicy object managed by the argocd-notifications manifests but I
thought it wuold be better for the possible ingresses for the argocd project
to all live in the argo-cd manifests. I know that notifications are an optional
component, so maybe this is better provided as a separate manifest that can
be strategic merged in? (I am a kustomize user).

Regardless, I think this policy is something that be maintained by argoproj
in some form to reduce release burden of users trying to hand maintain network
policies.

Signed-off-by: Tyler Dixon <tdixon@buf.build>
@ZymoticB ZymoticB changed the title Allow argocd-notification ingress to repo-server fix: allow argocd-notification ingress to repo-server Jul 16, 2021
Copy link
Collaborator

@alexmt alexmt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you ! Cherry-picking into 2.0 as well

@ZymoticB
Copy link
Contributor Author

Do I need to amend my commit to resolve the Semantic Pull Request check? Happy for you to edit / push an empty commit as is needed. Thanks!

@alexmt
Copy link
Collaborator

alexmt commented Jul 16, 2021

@ZymoticB it is ok - semantic title check is optional . Mering PR once tests are green.

@alexmt
Copy link
Collaborator

alexmt commented Jul 16, 2021

@ZymoticB , Please run make manifests please to reflect changes in generated install.yaml files.

Signed-off-by: Tyler Dixon <tdixon@buf.build>
@ZymoticB
Copy link
Contributor Author

Done!

@codecov
Copy link

codecov bot commented Jul 16, 2021

Codecov Report

Merging #6746 (e397e75) into master (30d2ba1) will increase coverage by 0.01%.
The diff coverage is n/a.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #6746      +/-   ##
==========================================
+ Coverage   41.30%   41.31%   +0.01%     
==========================================
  Files         156      156              
  Lines       20702    20709       +7     
==========================================
+ Hits         8550     8556       +6     
+ Misses      10944    10942       -2     
- Partials     1208     1211       +3     
Impacted Files Coverage Δ
util/settings/settings.go 47.36% <0.00%> (+0.36%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 30d2ba1...e397e75. Read the comment docs.

@alexmt alexmt merged commit e17565a into argoproj:master Jul 16, 2021
@ZymoticB ZymoticB deleted the td-notifications-network-policy branch July 16, 2021 21:29
alexmt pushed a commit that referenced this pull request Jul 22, 2021
* Allow argocd-notification ingress to repo-server

This change allows an argocd-notification installation using the provided
manifests to ingress to the repo-server.

I am not sure if there is a prevailing opinion about how to manage a
cross project network policy for these related components so I thought
I would put up a PR to spark that discussion. This could live in a separate
NetworkPolicy object managed by the argocd-notifications manifests but I
thought it wuold be better for the possible ingresses for the argocd project
to all live in the argo-cd manifests. I know that notifications are an optional
component, so maybe this is better provided as a separate manifest that can
be strategic merged in? (I am a kustomize user).

Regardless, I think this policy is something that be maintained by argoproj
in some form to reduce release burden of users trying to hand maintain network
policies.

Signed-off-by: Tyler Dixon <tdixon@buf.build>

* make manifests

Signed-off-by: Tyler Dixon <tdixon@buf.build>
@alexmt alexmt self-assigned this Jul 28, 2021
@alexmt alexmt added the needs-verification PR requires pre-release verification label Jul 28, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs-verification PR requires pre-release verification
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants