Load image policies from all namespaces. #151
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR allows the image update automation to apply image update policies from namespaces other than its own, as a quick way of implementing #85. This is done by loading the policies for consideration from all namespaces rather than from just the automation's own namespace.
In our company we have multiple semi-independent teams working on different
projects in our cluster and a single infrastructure team managing the
infrastructure for them, including the cluster itself. For the purposes of
data protection we have to keep the teams isolated, so each team has a
namespace it controls, and the infrastructure team runs the system namespaces,
including
flux-system
, where the repository and image automation CRDs aredefined. The individual teams control the exact set of images they generate
and push and the image selection criteria for deployment so we want to allow
them to manage the
ImageRepository
andImageUpdatePolicy
in theirnamespaces. But with the
GitRepository
andImageUpdateAutomation
residingin
flux-system
, they can't, unless ImageUpdateAutomation can handle policiesfrom other namespaces.