Skip to content

MGDSTRM-10232 initial configuration to control the ic scope #840

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jan 9, 2023

Conversation

shawkins
Copy link
Contributor

@shawkins shawkins commented Dec 6, 2022

Adds a new stanza to the agent spec to control the scope of the ic NLBs.

Since we have a timed job for reconciliation, we don't need to add a specific event handler for the managedkafkaagent - an assumption we were already making about the profile logic.

@github-actions github-actions bot added api changes related to api operator changes related to operator labels Dec 6, 2022
@shawkins
Copy link
Contributor Author

shawkins commented Dec 6, 2022

Looks like we're still prone to inconsistent test / mock behavior - changed the test to not need the direct mocking.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Dec 6, 2022

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 1 Code Smell

91.7% 91.7% Coverage
0.0% 0.0% Duplication

Copy link
Contributor

@MikeEdgar MikeEdgar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. My only comments are optional/purely cosmetic.

  • Consider using network instead of net
  • Rather than boolean _private use String visibility with enumeration Public and Private

@shawkins
Copy link
Contributor Author

shawkins commented Dec 9, 2022

Consider using network instead of net

That's one vote for an annotation, one vote for network, and one vote for access.

Rather than boolean _private use String visibility with enumeration Public and Private

We want to leave open the possibility that this won't be a single case - there could be separate public and private configurations.

@shawkins
Copy link
Contributor Author

To round things out here:

  • If we switch to an annotation we'll need to update the managedkafkaagent sync logic as it currently only copies the spec. It shouldn't have the same problem as managedkafka with both control plane and data plane managed annotations.
  • It probably doesn't matter what change we make to the spec, it will just be a throw-away once we have a better understanding of the pod. Since there's no real public usage of the crd that is fine.

To combine the above and most of the suggestions, how about just:

spec:
  access: Private

which we will likely throw away once we need refine things further.

@MikeEdgar
Copy link
Contributor

To combine the above and most of the suggestions, how about just:

spec:
  access: Private

which we will likely throw away once we need refine things further.

I'm fine with this ^

@rareddy
Copy link
Contributor

rareddy commented Jan 6, 2023

do we need changes here to reflect the above?

@shawkins
Copy link
Contributor Author

shawkins commented Jan 6, 2023

do we need changes here to reflect the above?

Oh, I thought we said on the issue / standup before break, just to leave the pr as is because it's likely a throw away in any case.

@rareddy
Copy link
Contributor

rareddy commented Jan 6, 2023

:)

Copy link
Contributor

@rareddy rareddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
api changes related to api operator changes related to operator
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants