-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Bring your own network #1472
base: main
Are you sure you want to change the base?
✨ Bring your own network #1472
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In general this approach seems good to me. Thanks a lot for this contribution!
@guettli @batistein what's your opinion?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks a lot again for this PR @johannesfrey. I think we can merge it if you follow the suggestions I gave. It's really good work!
|
||
if network != nil { | ||
if len(network.Subnets) > 1 { | ||
return nil, fmt.Errorf("multiple subnets not allowed") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this should not be an error, but we rather should set an appropriate condition on the HetznerCluster object, create an event, and return nil here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I hope I understood you correctly here. I set the NetworkReadyCondition to false in that case. Also what do you mean with "create an event"?
3f6b8f6
to
b27b859
Compare
Sorry for the long delay 🙏 . Thx for the reviews! I hope I addressed your suggestions correctly. PTAL. Thx! |
b27b859
to
028f798
Compare
What this PR does / why we need it:
This PR makes it possible to "adopt" a pre-existing network by passing its ID to
hetznerCluster.spec.hcloudNetwork.id
instead of the network being created during cluster creation. Furthermore, during cluster deletion it only deletes the attached network if it does not have theowned
label attached to it (currently the only way here to discriminate between a CAPH-managed network and an unmanaged one).Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #762
Special notes for your reviewer:
This has been lingering around for a while untouched on my fork and I decided to rebase it onto the current main branch. Please consider this as a first attempt to approach this topic as a whole. I also tried to already add some unit tests. I guess it also might require some e2e tests!? No idea if this is the desired way to do this and about other side-effects I did not see. So looking forward for feedback or any pointers. And also feel free to push changes to the PR, as I'll be pretty occupied with other things almost the whole September. Just wanted to push this out there already for you to take a look at 🙂
The most controversial changes so far:
hcloudNetwork.id
mutually exclusive withcidrBlock
,subnetCidrBlock
andnetworkZone
cidrBlock
,subnetCidrBlock
andnetworkZone
to be pointers (I guess this could also be done with empty strings, but pointers make it possible to be not shown at all, when not provided)Please confirm that if this PR changes any image versions, then that's the sole change this PR makes.
TODOs: