-
Notifications
You must be signed in to change notification settings - Fork 498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
webhook: Basic validation for multiple HTTPRoute Rule filters #506
Conversation
Skipping CI for Draft Pull Request. |
3237166
to
f3d9228
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your work on this! Excited to see all the progress on this front!
f3d9228
to
d8aed04
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a good starting point!
21c1758
to
7d72900
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for all your work on this! Still need to test this out myself but it's looking really promising.
7d72900
to
d2189f6
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the work on this! I spun this up on a kind 1.20 cluster and the installation seemed to work until the webhook pod ran into a logging issue. Maybe we can build some form of basic e2e tests into this where it will spin up a kind cluster and apply the deploy yaml, the crd yaml, and some examples to make sure it all works well together.
deploy/admission_webhook.yaml
Outdated
spec: | ||
containers: | ||
- name: webhook | ||
image: cmluciano/service-apis-admission:latest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you're already working on this, but just in case, here's a reminder to change the image used here.
@cmluciano This PR has had so many comments that it is hard to keep track of. There are a few issues from the early PR review that need fixing. Could you take a look at those? |
fca95ef
to
3c1df19
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: cmluciano The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
3c1df19
to
f6c91f2
Compare
Signed-off-by: Christopher M. Luciano <cmluciano@isovalent.com>
f6c91f2
to
a693f03
Compare
@cmluciano: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Thanks for the work to update this @cmluciano! This feels like it's quite close, it just got tripped up by some of our API changes that made optional fields pointers. |
Note that #597 intends to add a validation package that should be consumed by the webhook implementation. |
@cmluciano PTAL at #597 that added a validation pkg. I have a branch that provides an example implementation for the admission controller. It would be great if this PR was updated, i.e. ValidateHTTPRoute(), to use the validation pkg. Ping me when this PR merges and I’ll submit a PR to add Gateway hostname validation to the admission controller. Does this make sense to you? cc: @robscott @bowei |
I talked to @cmluciano today. I'll try to get this over the finish line this week. |
A variation of this patch first appeared in kubernetes-sigs#506. This patch is derived from kubernetes-sigs#506 and has been reworked to include it in the validation package.
I'm reworking parts of this PR and breaking it up to get this over the finish line. |
A variation of this patch first appeared in kubernetes-sigs#506. This patch is derived from kubernetes-sigs#506 and has been reworked to include it in the validation package. Co-authored-by: Christopher M. Luciano <cmluciano@us.ibm.com>
A variation of this patch first appeared in kubernetes-sigs#506. This patch is derived from kubernetes-sigs#506 and has been reworked to include it in the validation package. Co-authored-by: Christopher M. Luciano <cmluciano@us.ibm.com>
@cmluciano: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
A variation of this patch first appeared in kubernetes-sigs#506. This patch is derived from kubernetes-sigs#506 and has been reworked to include it in the validation package. Co-authored-by: Christopher M. Luciano <cmluciano@isovalent.com>
A variation of this patch first appeared in kubernetes-sigs#506. This patch is derived from kubernetes-sigs#506 and has been reworked to include it in the validation package. Co-authored-by: Christopher M. Luciano <cmluciano@isovalent.com>
A variation of this patch first appeared in kubernetes-sigs#506. This patch is derived from kubernetes-sigs#506 and has been reworked to include it in the validation package. Co-authored-by: Christopher M. Luciano <cmluciano@isovalent.com>
Superseded by #617 |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes #349
Notes For Reviewers
Does this PR introduce a user-facing change?: