-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: provider generic annotations #3959
feat: provider generic annotations #3959
Conversation
Hi @farodin91. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@Raffo I tried to fix provider specific annotations in generic way as possible. |
I'm not sure "without changing anything" should be a design goal. I think we're going to need to have providers filter such annotations. The vast majority of providers don't have any provider-specific annotations and these should filter them all out. |
30bab39
to
60fc787
Compare
60fc787
to
e4deea9
Compare
@johngmyers I added a filter out for generic annotation without filtering out old ProviderSpecific stuff. |
I hadn't planned on tackling the problem of provider-specific annotations quite yet, but since someone's got the desire to work on them right now I should write down my thoughts:
|
@johngmyers I will look into this next week. |
@johngmyers I started to look into the implementation. |
e4deea9
to
b076420
Compare
@johngmyers My first idea based on your feedback.
ToDo:
|
b076420
to
5092328
Compare
9ae70ac
to
d49985d
Compare
d49985d
to
3d80bce
Compare
/assign @johngmyers |
@farodin91 This PR is quite interesting. Do you think you can rebase it ? |
3d80bce
to
f59f0fa
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@mloiseleur Updated, if you like to give feedback and go for it. |
/ok-to-test |
provider/ibmcloud/ibmcloud.go
Outdated
func (p *IBMCloudProvider) GetProviderSpecific(_ context.Context) (apis.ProviderSpecificConfig, error) { | ||
return apis.ProviderSpecificConfig{ | ||
PrefixTranslation: map[string]string{ | ||
"external-dns.alpha.kubernetes.io/aws-": "aws/", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"external-dns.alpha.kubernetes.io/aws-": "aws/", | |
"external-dns.alpha.kubernetes.io/ibmcloud-": "ibmcloud/", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed
provider/scaleway/scaleway.go
Outdated
func (p *ScalewayProvider) GetProviderSpecific(_ context.Context) (apis.ProviderSpecificConfig, error) { | ||
return apis.ProviderSpecificConfig{ | ||
PrefixTranslation: map[string]string{ | ||
"external-dns.alpha.kubernetes.io/ibmcloud-": "ibmcloud/", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"external-dns.alpha.kubernetes.io/ibmcloud-": "ibmcloud/", | |
"external-dns.alpha.kubernetes.io/scw-": "scw/", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Btw, is there really scaleway specific annotations ? I cannot find any in external-dns or scaleway tutorials ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed. It looks like https://github.com/kubernetes-sigs/external-dns/pull/3959/files#diff-c2c587e9de1acc152a646c08609ac201aa8f5b78494e4ec069d340ad89b2ceb2L215 . Probably never documented.
f59f0fa
to
96e911e
Compare
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
96e911e
to
052de90
Compare
052de90
to
6e7a92d
Compare
@mloiseleur Would you like to review? |
6e7a92d
to
d987f4b
Compare
Signed-off-by: Jan Jansen <[email protected]>
d987f4b
to
cfa75ab
Compare
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@farodin91 I totally missed this PR, sorry. Can you walk me through your changes here and how you'd like to proceed with respect to #4458 ? |
My change allows every provider to easily provide their own set of annotations. For me it was also important to support every existing custom annotation. |
We shipped #4458, so I'm closing this PR. |
Description
With the new webhook functionality, it is possible to add provider specific annotations for webhook provider at moment.
This solves it in a generic way without changing anything.
Checklist