Skip to content

feat(api): allow pinning custom image repository for Envoy Proxy.#6296

Merged
arkodg merged 5 commits intoenvoyproxy:mainfrom
sudiptob2:feat/6066/image-repo-in-kube-provider
Jun 19, 2025
Merged

feat(api): allow pinning custom image repository for Envoy Proxy.#6296
arkodg merged 5 commits intoenvoyproxy:mainfrom
sudiptob2:feat/6066/image-repo-in-kube-provider

Conversation

@sudiptob2
Copy link
Member

This PR allows users to specify a custom image repository for EnvoyProxy without needing to provide a tag.

Fixes #6066

Release Notes: No

@sudiptob2 sudiptob2 marked this pull request as ready for review June 11, 2025 19:24
@sudiptob2 sudiptob2 requested a review from a team as a code owner June 11, 2025 19:24
@codecov
Copy link

codecov bot commented Jun 11, 2025

Codecov Report

Attention: Patch coverage is 80.64516% with 6 lines in your changes missing coverage. Please review.

Project coverage is 70.60%. Comparing base (d34f514) to head (cd5f962).
Report is 12 commits behind head on main.

Files with missing lines Patch % Lines
...ternal/infrastructure/kubernetes/proxy/resource.go 80.64% 4 Missing and 2 partials ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #6296      +/-   ##
==========================================
+ Coverage   70.57%   70.60%   +0.03%     
==========================================
  Files         220      220              
  Lines       36829    36859      +30     
==========================================
+ Hits        25993    26026      +33     
+ Misses       9299     9298       -1     
+ Partials     1537     1535       -2     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@sudiptob2 sudiptob2 force-pushed the feat/6066/image-repo-in-kube-provider branch 2 times, most recently from c307510 to 56bb6c3 Compare June 12, 2025 10:55
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we change this message to something more meaningful like "only one of image or imageRepository can be set"

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated with simpler wording.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add a cel test for this?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added test for CEL validation

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we have any validation in place to ensure user is not passing a tag in imageRepository?

Copy link
Member Author

@sudiptob2 sudiptob2 Jun 13, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, a validation could be useful, but in my opinion, it's redundant. There are many ways an imageRepository string can be invalid—not just tag. Also, the image field doesn’t currently validate whether a tag is present. So, I think we can skip this validation in this case as well.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good to track this with a GH issue, so we dont forget about general image validation

@sudiptob2 sudiptob2 force-pushed the feat/6066/image-repo-in-kube-provider branch 4 times, most recently from 5d45703 to 8885a89 Compare June 13, 2025 19:11
Signed-off-by: sudipto baral <sudiptobaral.me@gmail.com>
Signed-off-by: sudipto baral <sudiptobaral.me@gmail.com>
Signed-off-by: sudipto baral <sudiptobaral.me@gmail.com>
Signed-off-by: sudipto baral <sudiptobaral.me@gmail.com>
Signed-off-by: sudipto baral <sudiptobaral.me@gmail.com>
@sudiptob2 sudiptob2 force-pushed the feat/6066/image-repo-in-kube-provider branch from e4a043a to cd5f962 Compare June 16, 2025 18:37
@sudiptob2 sudiptob2 requested a review from rudrakhp June 16, 2025 19:39
Copy link
Contributor

@arkodg arkodg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM thanks

@arkodg arkodg requested review from a team June 19, 2025 01:18
@arkodg arkodg merged commit 5d26513 into envoyproxy:main Jun 19, 2025
31 checks passed
@sudiptob2 sudiptob2 deleted the feat/6066/image-repo-in-kube-provider branch March 1, 2026 23:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Allow custom image repository for Envoy Proxy image

3 participants