You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Have a test that will identify CRs with invalid values (e.g. shoot.kubernetes.kubeAPIServer.oidcConfig.clientID, and shoot.kubernetes.kubeAPIServer.oidcConfig.issuerURL should not be empty, there should be at least one workers pool)
Ensure required fields will be added with default values
KIM will store the default values for some fields in our RuntimeCR (e.g. oidcConfig)
We will have a few fields in the RuntimeCR , which won't be necessarily provided by KEB but have to be filled out with default values by KIM (<< having them in the RuntimeCR included is helpful for later operational actions applied by SRE - they will sometimes have to adjust these values when major cluster-upgrades are applied)
It's KIMs responsibility, to check for each creation/update of a RuntimeCR instance, that missing fields will be added to this CR with their default values (could be done by an webhook executed before KIM starts processing the values etc.)
Right now, we know two fields, which have to be filled out with default-values by KIM if KEB is not providing them:
oidcConfig (<< will be filled out with default Kyma-OIDC provider if nothing else is provided by KEB)
additionalOidcConfigs (<< if list is empty, KIM has to add one entry to the list - as soon as the list is not empty, nothing has to be checked by KIM)
Support setting of default values for missing fields (these fields cannot be set to be mandatory in the contract as it's allowed for KEB to leave them out, but before the Shoot-spec get created, these values have to be defined in the RuntimeCR).
oidcConfig has to be set if KEB is not providing it
oidcConfiguration list is not allowed to be empty, if empty one entry has to be added by KIM
The text was updated successfully, but these errors were encountered:
Disper
changed the title
Validation webkhook should make sure that Runtime CRs are valid
Runtime CRs should be validated to assure they're correct
Jun 13, 2024
Description
Take the ADR that defines the contract
Have a test that will identify CRs with invalid values (e.g.
shoot.kubernetes.kubeAPIServer.oidcConfig.clientID
, andshoot.kubernetes.kubeAPIServer.oidcConfig.issuerURL
should not be empty, there should be at least one workers pool)Ensure required fields will be added with default values
RuntimeCR
(e.g.oidcConfig
)RuntimeCR
, which won't be necessarily provided by KEB but have to be filled out with default values by KIM (<< having them in theRuntimeCR
included is helpful for later operational actions applied by SRE - they will sometimes have to adjust these values when major cluster-upgrades are applied)RuntimeCR
instance, that missing fields will be added to this CR with their default values (could be done by an webhook executed before KIM starts processing the values etc.)Right now, we know two fields, which have to be filled out with default-values by KIM if KEB is not providing them:
oidcConfig
(<< will be filled out with default Kyma-OIDC provider if nothing else is provided by KEB)additionalOidcConfigs
(<< if list is empty, KIM has to add one entry to the list - as soon as the list is not empty, nothing has to be checked by KIM)AC:
RuntimeCR
).oidcConfig
has to be set if KEB is not providing itoidcConfiguration
list is not allowed to be empty, if empty one entry has to be added by KIMThe text was updated successfully, but these errors were encountered: