-
Notifications
You must be signed in to change notification settings - Fork 1.5k
KEP 1645: fix ServiceExport conditions #5438
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
KEP 1645: fix ServiceExport conditions #5438
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: MrFreezeex The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
90f2e48
to
55d870a
Compare
keps/sig-multicluster/1645-multi-cluster-services-api/README.md
Outdated
Show resolved
Hide resolved
keps/sig-multicluster/1645-multi-cluster-services-api/README.md
Outdated
Show resolved
Hide resolved
keps/sig-multicluster/1645-multi-cluster-services-api/README.md
Outdated
Show resolved
Hide resolved
55d870a
to
d5b2a4f
Compare
I'd suggest just using a simple There's substantial prior art on standardized reasons over in https://github.com/kubernetes-sigs/gateway-api/blob/main/apis/v1/gateway_types.go#L974-L1027 with explanation of positive ( |
Thanks for the link/suggestions! Hmm I guess then let's define those things in the MCS-API repo first and then fix up those example once done. /hold |
@MrFreezeex I think it's actually fine to show the intent/example in the KEP first if we add a caveat that this is just an example and we hope to standardize these condition types and reasons in the project eventually? I expect that may take a bit longer and don't want to block this. |
Well we would probably have around ~10 case to define so I don't think this should take that long if it takes too long we can unblock that but the KEP was broken for years on this matter it can stay broken for a few more week(s) probably IMO |
Sounds good - conditions like this are extensible too so this shouldn't be a limiting factor. Implementations can add their own types or reasons (especially if they can have implementation-specific failure scenarios, and we add/promote these later if broadly applicable), but covering the core set of expected states/conflicts would be great. (The |
d5b2a4f
to
2bc4ef4
Compare
I adapted this vs my current (non definitive so far ofc!) proposal here: kubernetes-sigs/mcs-api#112 to showcase what it would look like |
Add missing reason in the ServiceExport conditions example and adjust the KEP to the reasons defined in the mcs-api repo. Signed-off-by: Arthur Outhenin-Chalandre <arthur@cri.epita.fr>
2bc4ef4
to
a96e064
Compare
Signed-off-by: Arthur Outhenin-Chalandre <arthur@cri.epita.fr>
/lgtm |
Followup fixes from https://github.com/kubernetes/enhancements/pull/5437/files#r2169361973
ServiceExport definitions are introduced in: kubernetes-sigs/mcs-api#112