Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

I 38 watch namespace #39

Merged
merged 1 commit into from
Oct 1, 2019
Merged

I 38 watch namespace #39

merged 1 commit into from
Oct 1, 2019

Conversation

fcgravalos
Copy link
Contributor

Fixes #38

The idea is being able of restrict the controller to a particular namespace as proposed here:

hashicorp/vault#7364

@dannyk81
Copy link
Contributor

@fcgravalos this is awesome! I wonder if we should consider using an "include/exclude" approach instead though?

Current PR implementation allows for either all namespaces or one namespace to be watched, I could imagine use cases where we would like a single secrets-manager to handle a group of namespaces (or exclude just several ones).

WDYT? overkill? or perhaps could be a welcome flexibility?

@fcgravalos
Copy link
Contributor Author

@fcgravalos this is awesome! I wonder if we should consider using an "include/exclude" approach instead though?

Current PR implementation allows for either all namespaces or one namespace to be watched, I could imagine use cases where we would like a single secrets-manager to handle a group of namespaces (or exclude just several ones).

WDYT? overkill? or perhaps could be a welcome flexibility?

I was considering it too, but took as an example nginx ingress controller that seems to just watch either one or all and thought it would be simpler.

In any case it seems a good idea too! Thanks! Let me figure out what are the implications and I'll get back to you :)

@fcgravalos fcgravalos self-assigned this Oct 1, 2019
@fcgravalos fcgravalos requested a review from eduardogr October 1, 2019 09:57
Copy link
Contributor

@dannyk81 dannyk81 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍 thank you!

just some minor rephrasing suggestions for the flag descriptions.

@codecov-io
Copy link

codecov-io commented Oct 1, 2019

Codecov Report

Merging #39 into master will increase coverage by 0.25%.
The diff coverage is 100%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master      #39      +/-   ##
==========================================
+ Coverage      84%   84.25%   +0.25%     
==========================================
  Files           8        8              
  Lines         425      432       +7     
==========================================
+ Hits          357      364       +7     
  Misses         51       51              
  Partials       17       17
Impacted Files Coverage Δ
controllers/secretdefinition_controller.go 77.03% <100%> (+1.25%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update b7b5ccc...f705b14. Read the comment docs.

@fcgravalos fcgravalos requested a review from dannyk81 October 1, 2019 14:21
dannyk81
dannyk81 previously approved these changes Oct 1, 2019
Copy link
Contributor

@dannyk81 dannyk81 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm 👍 thank you!

@dannyk81 dannyk81 merged commit e0db2d9 into tuenti:master Oct 1, 2019
@fcgravalos fcgravalos deleted the I-38-watch-namespace branch October 1, 2019 15:18
@fcgravalos
Copy link
Contributor Author

@eduardogr Thanks for your comments and sorry, we went ahead and merged and didn't realize about them.

I think it would be great if you can file a PR with your suggestion and let's build snapshot-2.

We can also sit down together and discuss about versioning/release process.

@eduardogr
Copy link
Collaborator

eduardogr commented Oct 2, 2019

i thinks it could be nice for my PR here, I'll do it! Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

add the ability to watch secretDefinitions scoped to a particular namespace
4 participants