Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Whitelist management policy Observe & Update #692

Merged
merged 1 commit into from
May 13, 2024

Conversation

turkenh
Copy link
Member

@turkenh turkenh commented May 13, 2024

Description of your changes

As initially requested in this ticket, we have valid use cases to set a management policy as "Observe & Update", at least with Provider Kubernetes.

This PR whitelisting this variant of management policies so that runtime will not fail early.

I have:

  • Read and followed Crossplane's contribution process.
  • Run make reviewable test to ensure this PR is ready for review.

How has this code been tested

With provider-kubernetes, managementPolicies: ["Observe", "Update"].

Signed-off-by: Hasan Turken <turkenh@gmail.com>
@turkenh turkenh requested review from a team as code owners May 13, 2024 12:13
@@ -85,6 +85,10 @@ func defaultSupportedManagementPolicies() []sets.Set[xpv1.ManagementAction] {
// Like ObserveOnly, but the external resource is deleted when the
// managed resource is deleted.
sets.New[xpv1.ManagementAction](xpv1.ManagementActionObserve, xpv1.ManagementActionDelete),
// No Crate and no Delete. Just update/patch the external resource.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// No Crate and no Delete. Just update/patch the external resource.
// No Create and no Delete. Just update/patch the external resource.

Copy link
Contributor

@lsviben lsviben left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@turkenh turkenh merged commit e50f51a into crossplane:master May 13, 2024
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants