-
Notifications
You must be signed in to change notification settings - Fork 398
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🐛 Fix permissionclaim patch thrashing #2174
🐛 Fix permissionclaim patch thrashing #2174
Conversation
/approve |
/cherry-pick release-0.9 |
@ncdc: once the present PR merges, I will cherry-pick it on top of release-0.9 in a new PR and assign it to you. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: csams, ncdc, stevekuznetsov The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
- Add map keys to APIBinding.Status.AppliedPermissionClaims and .ExportPermissionClaims - Switched to using a sorted list when calculating applied permission claims so it doesn't keep generating new patches because of different ordering in the list. Signed-off-by: Andy Goldstein <andy.goldstein@redhat.com>
6921d77
to
f0bb055
Compare
/lgtm |
@ncdc: new pull request created: #2175 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This PR is wrong. It might be a hot-fix, but it's the wrong direction. |
/revert |
AppliedPermissionClaims []PermissionClaim `json:"appliedPermissionClaims,omitempty"` | ||
|
||
// exportPermissionClaims records the permissions that the export provider is asking for | ||
// the binding to grant. | ||
// +optional | ||
// +listType=map |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this must be atomic
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if atomic broke something, then the patch code is wrong.
@@ -174,11 +174,17 @@ type APIBindingStatus struct { | |||
// state in spec.permissionClaims. | |||
// | |||
// +optional | |||
// +listType=map |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this must be atomic
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the spec one can be set.
Summary
Related issue(s)
Fixes #