-
Notifications
You must be signed in to change notification settings - Fork 20
feat: add clusterProfile status fields #321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add clusterProfile status fields #321
Conversation
8248438 to
1230ba6
Compare
b870cf4 to
1985d16
Compare
michaelawyu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a few minor comments, otherwise LGTM.
|
The work applier IT failure is kind of interesting... The issue is that the system finds an unexpected diff in the This happens because a) with 0.34 API the and as a result when we do the comparison the system will find an extra field and complain about the diff accordingly |
6c434f3 to
2a32a1a
Compare
4a0f79b to
3452558
Compare
Signed-off-by: Ryan Zhang <yangzhangrice@hotmail.com>
Signed-off-by: Ryan Zhang <yangzhangrice@hotmail.com>
3452558 to
70cf9e3
Compare
| cp.Status.AccessProviders[0].Cluster.Server = clusterEntry.Value | ||
| } | ||
| // Get the CA Data | ||
| certificateAuthorityData, exists := mc.Status.Properties[propertyprovider.ClusterCertificateAuthorityProperty] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why are we storing/exposing the CAauthority here?
what makes this necessary?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is to implement kep5339
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the hub CA data is not a secret, right?
Signed-off-by: Ryan Zhang <yangzhangrice@hotmail.com>
Signed-off-by: Ryan Zhang <yangzhangrice@hotmail.com>
Codecov Report❌ Patch coverage is 📢 Thoughts on this report? Let us know! |
michaelawyu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added some minor comments, PTAL.
| } else { | ||
| // throw an alert | ||
| _ = controller.NewUnexpectedBehaviorError(fmt.Errorf("cluster certificate authority data not found in member cluster %s status", mc.Name)) | ||
| cp.Status.AccessProviders[0].Cluster.InsecureSkipTLSVerify = true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi Ryan! Maybe this should be controlled by another property (or flag) instead of falling back to the no TLS option (as it might not be available)?
michaelawyu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM ;)
Description of your changes
Add k8s version and cluster api-server to the clusterProfile status by fetching them from the member agent side.
This is to implement kep5339
Fixes #
I have:
make reviewableto ensure this PR is ready for review.How has this code been tested
Special notes for your reviewer