-
Notifications
You must be signed in to change notification settings - Fork 261
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Move spec.allowAllInClusterTraffic
to spec.ManagedSecurityGroups
#1892
Conversation
✅ Deploy Preview for kubernetes-sigs-cluster-api-openstack ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
spec.allowAllInClusterTraffic
to spec.ManagedSecurityGroups`
spec.allowAllInClusterTraffic
to spec.ManagedSecurityGroups`spec.allowAllInClusterTraffic
to spec.ManagedSecurityGroups
We need #1826 to merge first. |
/lgtm |
/lgtm |
/hold cancel |
@@ -168,7 +168,7 @@ func (s *Service) generateDesiredSecGroups(openStackCluster *infrav1.OpenStackCl | |||
controlPlaneRules = append(controlPlaneRules, getSGControlPlaneAdditionalPorts(openStackCluster.Spec.APIServerLoadBalancer.AdditionalPorts)...) | |||
} | |||
|
|||
if openStackCluster.Spec.AllowAllInClusterTraffic { | |||
if openStackCluster.Spec.ManagedSecurityGroups != nil && openStackCluster.Spec.ManagedSecurityGroups.AllowAllInClusterTraffic { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It seems odd that we'd be in this function if ManagedSecurityGroups was nil. Also we checked it explicitly at the top of the function.
Still, belt and braces is no bad thing when dereferencing a pointer.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah I thought the same but i'm trying to avoid pointer errors later.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: EmilienM, mdbooth The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
What this PR does / why we need it:
Move
OpenStackCluster.Spec.AllowAllInClusterTraffic
underOpenStackCluster.Spec.ManagedSecurityGroups
.Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #1878
TODOs: