-
Notifications
You must be signed in to change notification settings - Fork 261
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ AllNodes security groups API #1826
✨ AllNodes security groups API #1826
Conversation
✅ Deploy Preview for kubernetes-sigs-cluster-api-openstack ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
eeedb9d
to
ebb6cc6
Compare
ebb6cc6
to
ce9b441
Compare
d4a3641
to
59034d8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just one remark, otherwise this looks good!
195ac07
to
c54e5f0
Compare
/test pull-cluster-api-provider-openstack-e2e-full-test |
/test pull-cluster-api-provider-openstack-e2e-test |
/test pull-cluster-api-provider-openstack-e2e-full-test |
/test pull-cluster-api-provider-openstack-e2e-test |
1 similar comment
/test pull-cluster-api-provider-openstack-e2e-test |
c54e5f0
to
dd1f1c1
Compare
/hold I've spotted an issue where Security Groups never stop reconciling :( |
dd1f1c1
to
e2f1d46
Compare
found it and fixed it 👍 |
Comparing pointers instead of their values! It's obvious once you've seen it, but I could probably stare at it for an hour and not spot it. Thanks for the extra testing diligence. Do you think there's an automated test we could have written which would have caught this? |
e2f1d46
to
0ff6779
Compare
done |
out.Name = in.Name | ||
out.Rules = make([]SecurityGroupRule, len(in.Rules)) | ||
for i, rule := range in.Rules { | ||
out.Rules[i] = SecurityGroupRule{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couldn't this be written as ?
out.Rules[i] = SecurityGroupRule{ | |
out.Rules[i] = SecurityGroupRule{ | |
ID: rule.ID, | |
Direction: rule.Direction, | |
Description: pointer.StringDeref(rule.Description, ""), | |
.... |
On a related out of scope note, we should probably upgrade k8s.io/utils and start using k8s.io/utils/ptr that uses generics instead
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, I started doing it and it's a big change. Here is an issue to track it: #1896
Co-Authored-By: Emilien Macchi <[email protected]> Co-Authored-By: Matthew Booth <[email protected]>
0ff6779
to
418ce3d
Compare
/test pull-cluster-api-provider-openstack-e2e-full-test |
/test pull-cluster-api-provider-openstack-e2e-full-test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this!
/lgtm
What this PR does / why we need it:
New API for all nodes managed security group API.
TODOs:
Fixes: #1274 #1704
/hold