-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
📖 New Provider documentation #1682
Conversation
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for working on this. A great start!
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/provider_implementations/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
Every Kubernetes resource has a *Group*, *Version* and *Kind* that uniquely | ||
identifies it. | ||
|
||
* The resource *Kind* is the short name of the API, for example, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A Kind here would be MailgunMachine - the spec and status structs are not exposed as Kubernetes GVKs.
andMailgunMachineList
as well.
API for `Machine` resources. | ||
* The resource *Version* defines the stability of the API and its backward | ||
compatibility guarantees. Examples include v1alpha1, v1beta1, v1, etc. | ||
and are governed by the Kubernetes API Deprecation Policy [^1]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we should set the expectations that we expect providers to also abide by the k8s api deprecation policy as well.
|
||
{% sample lang="yaml" %} | ||
```yaml | ||
apiVersion: mailgun.cluster.k8s.io/v1alpha1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should this be mailgun.infrastructure.cluster.x-k8s.io
instead to align with the other infrastructure providers? (at least until we potentially change that)
I only pushed this PR so I could have a backup and view the netlify responses, it's not quite ready for review yet |
I started from a check-out of the v1 docs and am slowly updating them, that's why you see so much outdated information |
7d0e44f
to
09bb93b
Compare
/retest |
09bb93b
to
90547bc
Compare
91b9582
to
313a860
Compare
A more general question: I build capm for this, but I'm not sure where the code should live. We could leave it in my own repo, move it to kubernetes-sigs, or vendor it into this repo. I don't have strong feelings either way. |
/retest |
docs/book/src/providers/implementers-guide/building_running_and_testing.md
Show resolved
Hide resolved
docs/book/src/providers/implementers-guide/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/src/providers/implementers-guide/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/src/providers/implementers-guide/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
docs/book/src/providers/implementers-guide/building_running_and_testing.md
Outdated
Show resolved
Hide resolved
LGTM. Squash please! |
/lgtm |
/assign |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liztio, ncdc The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Non-blocking issues found, filed #1831 to address them as a followup.
git init | ||
``` | ||
|
||
You'll then need to set up [go modules][gomod] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Broken link
// Request is where you ask extra nicely | ||
Request string `json:"request"` | ||
// Requester is the email of the person sending the request | ||
Requester string |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
missing json tag, and different indentation.
|
||
Before you can deploy the infrastructure controller, you'll need to deploy Cluster API itself. | ||
|
||
You can [use a precompiled manifest][install], or clone [`cluster-api`][capi] and apply its manifests using `kustomize`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
capi link is broken
What this PR does / why we need it:
We want everyone to use Cluster API, exapnding our reach to the stars above!
So we should make it easier to get started with a new provider.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #1090