-
Notifications
You must be signed in to change notification settings - Fork 666
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC: Add --envoy-ingress-name
, and --envoy-ingress-namespace
flags. (#4952)
#5083
Conversation
…rojectcontour#4952) Signed-off-by: kahirokunn <okinakahiro@gmail.com>
40f9cc5
to
6122063
Compare
--envoy-ingress-name
, and --envoy-ingress-namespace
flags. (#4952)--envoy-ingress-name
, and --envoy-ingress-namespace
flags. (#4952)
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
@kahirokunn first of all I want to apologize for how long it's taken us to review this. We appreciate your contributions to the project! One thought I have here - maybe instead of having a pair of flags/config fields for Service, Ingress, Gateway, etc., we could just have three flags/fields -- resource type, namespace, and name. This would help avoid flag/config sprawl, and would be more extensible for any future ways of sourcing the LoadBalancerStatus. If we do like this pattern, then we need to decide whether we want to keep the existing fields for Service namespace/name, or deprecate them and replace them with more generally named fields. Deprecation is possible but requires a series of changes over multiple releases to allow folks a chance to migrate to the replacements. What are your thoughts on this approach? |
@skriss I agree, because that approach worked in all cases with minimal code. |
👍 I'd like to get @sunjayBhatia and/or @tsaarni's input here as well before we move forward. Also, if you could take a look at #2539 and see if anything there would impact our approach here, that would be great! I haven't had a chance to review that issue in detail myself yet. |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
Keep |
@sunjayBhatia @tsaarni's Could you give me your opinion? |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
Since there were no objections to suggestion #5083 (comment) it would be great to have short API proposal here - to get this PR unblocked! 😅 @skriss wrote:
One more thought: what do people think about single switch with format like |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
keep |
I like @tsaarni's suggestion above for the flag design. @kahirokunn to move this forward, could you write up a brief summary of the changes we plan here, taking into account the comments above? In short, I think we would be adding two new generic flags that would provide the existing functionality for getting the IP from a Service, adding the functionality to alternate get it from an Ingress, and then deprecating the existing Assuming everyone supports that approach, then we can move forward with the implementation. |
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
@skriss Sorry, I agree with you. |
#4952
I want to add
--envoy-ingress-name
and--envoy-ingress-namespace
.I'm thinking something like this, what do you think?
If you like it, I can implement the rest.