-
Notifications
You must be signed in to change notification settings - Fork 331
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🧹 Give users the ability to disable namespace ownership of webhook configurations #3095
🧹 Give users the ability to disable namespace ownership of webhook configurations #3095
Conversation
Hi @jonathan-innis. Thanks for your PR. I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #3095 +/- ##
==========================================
- Coverage 78.47% 78.45% -0.02%
==========================================
Files 191 191
Lines 8938 8941 +3
==========================================
+ Hits 7014 7015 +1
- Misses 1662 1663 +1
- Partials 262 263 +1 ☔ View full report in Codecov by Sentry. |
/assign ReToCode |
Instead of adding such a knob I'm wondering if we should remove this functionality @ReToCode @pierDipi @skonto curious about your thoughts? Also I asked a clarifying question here: knative/serving#15483 (comment) |
/ok-to-test |
I'm going to approve this to unblock - but I think we should revisit the practice of the setting the owner reference here /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, jonathan-innis The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…k configurations (knative#3095) (cherry picked from commit c4843b7)
Changes
Allow users to configure
DisableNamespaceOwnership
in webhook options. This ensures that users that have other manifest managers of ValidatingWebhookConfigurations and MutatingWebhookConfigurations don't hit conflicts when ownership is overridden.This has specific detrimental impact when using ArgoCD which checks for ownerReferences before determining whether it should prune a resource. This has caused issues for
kubernetes-sigs/karpenter
, which usesknative/pkg
for webhook management.I've tested this change in the
sigs.k8s.io/karpenter
codebase with this commit and it's completely solved our Argo interaction issues./kind cleanup
Fixes knative/serving#15483
Release Note
Docs