-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ClusterIssuer and Issuer solvers schema #2249
base: main
Are you sure you want to change the base?
Conversation
My thinking is that this is way to much to be able to include a resource in the schema and I will see if we can make this easier somehow. |
I'd love to see us reducing the different possible config options here to only what we know and support instead of everything that cert-manager allows in |
I am on the opposite side, I want to pull in the relevant parts of the CRD as verbatim as possible and automatically update it from the chart, so it gets tracked if there are changes. 😅 |
Regarding solving the schema explosion being able to directly reference upstream schemas would be fantastic. Regarding maintainability of ck8s, keeping the config as small as possible I think would be preferable since then we can more accurately predict what users have put in their config so that we don't break it in future releases. |
Yeah, I agree, but given that we would track this schema more closely it would be easy to see the entirety of how it changes. |
I'm good with that! At least if we keep track of what parameters are available in the schema it will be noticable. I would love to see a big red CAUTION: THIS IS OUT OF OUR HAND in front of all "additional properties", "extra config" and what not where everything goes. 😄 |
Simplifying config, reducing complexity is nice.
Makes sense where we do pass things through as-is. |
I like the idea of this, trying to keep the possible config as small as possible. But I feel as if we would need to do the same then for every other part of config that accepts arbitrary yaml (extra args etc) which I feel would make the schema explode and hard to maintain but also might lock us in too much. Since we rely so much on upstream I worry it might make chart upgrades and other upstream changes more difficult to deal with, resulting in us avoiding or delaying upgrades and falling behind. |
The counter-point to this is that for every part of the config that accepts arbitrary yaml we have no idea what is being set by the user. That means that when we upgrade something we risk breaking deployments without having a migration path. |
Warning
This is a public repository, ensure not to disclose:
What kind of PR is this?
Required: Mark one of the following that is applicable:
Optional: Mark one or more of the following that are applicable:
Important
Breaking changes should be marked
kind/admin-change
orkind/dev-change
depending on typeCritical security fixes should be marked with
kind/security
What does this PR do / why do we need this PR?
I wanted to validate my cluster issuer solver config but noticed that we did not support that. This fixes that.
Information to reviewers
The schema change is really large since we don't narrow down the solvers config. I'm not sure if this is acceptable or not. Let me know what you think!
Checklist
NetworkPolicy Dashboard