-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically enable detected GVKs #2219
Comments
We would probably need to use https://godoc.org/k8s.io/client-go/discovery or similar, for future reference. |
xref: #1241 |
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
After some consideration of this, I'm going ahead with it, as it will allow for people to make an ultimate "disable this configuration type" decision by removing a CRD from the cluster. This will help with IngressRoute -> HTTPProxy migration, version changes, and so on. |
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
This is in preparation for adding in filtering by discovered CRD types. Updates projectcontour#2219 Signed-off-by: Nick Young <[email protected]>
This is in preparation for adding in filtering by discovered CRD types. Updates #2219 Signed-off-by: Nick Young <[email protected]>
This is further refactoring for projectcontour#2219. Moves Service and Ingress to the client-go dynamic client, leaving only Secrets and Endpoints not handled by the new InformerSet. Secrets need namespace handling, and Endpoints need a separate handler. Signed-off-by: Nick Young <[email protected]>
This is further refactoring for projectcontour#2219. Moves Service and Ingress to the client-go dynamic client, leaving only Secrets and Endpoints not handled by the new InformerSet. Secrets need namespace handling, and Endpoints need a separate handler. Signed-off-by: Nick Young <[email protected]>
This is further refactoring for #2219. Moves Service and Ingress to the client-go dynamic client, leaving only Secrets and Endpoints not handled by the new InformerSet. Secrets need namespace handling, and Endpoints need a separate handler. Signed-off-by: Nick Young <[email protected]>
@youngnick I have some work for this started, did you already start? I don't want to duplicate efforts. |
I started in that I did some refactoring in preparation - my idea was that we would build the default set of informers using the bits I added already, and then wash that set against what's actually present on the apiserver. Could also do it the other way around, of course. |
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes projectcontour#2219 Signed-off-by: Steve Sloka <[email protected]>
Add a discovery client to look up server groups and resources which allows for a check to be made that a resource type exists before starting any informers against. Fixes #2219 Signed-off-by: Steve Sloka <[email protected]>
This issue is to discuss whether Contour should autodetect supported GVKs, both CRD and core, at startup and watch any supported objects that are installed in a cluster.
The current option is to have specific flags for types we want to enable or disable (#1461, #1241). We will keep doing this for now, but we can consider doing a more dynamic solution.
Pros of autodetecting:
Cons of autodetecting:
The text was updated successfully, but these errors were encountered: