-
Notifications
You must be signed in to change notification settings - Fork 915
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rollout spec validation #358
Comments
Just to elaborate. The checks performed by the validating admission webhook, need to actually be less strict than what is required when validating a rollout as part of reconciliation, which will be stricter and deeper. For example, the validating admission webhook should not deny admission of a rollout when the rollout references a non-existent service (imagine the scenario when the service is deleted out-of-band). This could cause the controller to stop updating status of the rollout. Instead, during reconciliation, the rollout will have an error condition which identifies the problem of the non-existent service. |
Examples of things that would need to be in the validating webhook and static validation during reconciliation:
I am assuming we will be able to leverage existing kubernetes static validation libraries for ReplicaSet and/or PodTemplate. |
Another example would be preventing a rollout that creates an experiment that never terminates |
Experiment templates names should be lowercased since we will be having reserved words when referencing the |
Closing as fixed. Will punt on the validating admission webhook since we now have the tolerant informer preventing users from borking the controller with an invalid spec. |
There are some static validation checks we can do to prevent updates of rollouts in an invalid way.
We need two things:
Some things to be aware of:
kubectl applied
to the system simply because it came lower in the YAML file.The text was updated successfully, but these errors were encountered: