SANDBOX-1769 | feature: specify integration types with constants#503
Conversation
The goal is to avoid having misconfigurations by having a wrong value in the "disabledIntegrations" field. Kubernetes will be aware of which are the accepted values to avoid those misconfigurations. SANDBOX-1769
WalkthroughThis PR introduces a new Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~8 minutes 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
alexeykazakov
left a comment
There was a problem hiding this comment.
Well.. this is another DevSandbox specific thing leaking in our operators.. Is it really necessarily? We won't look at the warnings in most cases anyway, right? And if something is not working then we will notice it right away in the dashboard (something is still enabled while it shouldn't)
The idea was to help spot misconfigurations on the fly while disabling the integrations, but I guess we can pass on this one if you think it is unnecessary. |



Description
The goal is to avoid having misconfigurations by having a wrong value in the "disabledIntegrations" field. Kubernetes will be aware of which are the accepted values to avoid those misconfigurations.
Related PRs
Checks
make generatetarget? yes/noYes.
make generatechange anything in other projects (host-operator, member-operator)? yes/noNo.
resources/setup/roles/host.yamlin the sandbox-sre repositoryPROJECTfile: https://github.com/codeready-toolchain/host-operator/blob/master/PROJECTCSVfile: https://github.com/codeready-toolchain/host-operator/blob/master/config/manifests/bases/host-operator.clusterserviceversion.yamlIt's not a new CRD.
Summary by CodeRabbit
New Features
Improvements