-
Notifications
You must be signed in to change notification settings - Fork 472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conditions for Policy Attachment #738
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten We will need to address this more, but it needs some more work on actually using Policy. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/lifecycle frozen |
Where are we at with this one? 🤔 |
I think we still need this. /help |
@robscott: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There's been a single status for policy attachment added so far which is great, but for GA this isn't a blocker. We want this feature, but we consider it low priority until |
This may be a bit controversial given how complex policy already is, but we have a use case in Istio for adding a |
/assign I was looking for a ticket suitable for a new contributor, but the one I was working on has been taken by someone else. I found this ticket, which might be a bit of a challenge for me, but it seems detailed enough for me to work on. I'll try to make some progress on it this weekend. |
Hmm, there has been some initial work on this in GEP-2648 around expected status conditions for policy resources and the I'm not quite sure what is immediately actionable on this issue, so it may not be the best for a new contributor but hopefully we can help you find something more straightforward to work on @jgao1025 |
@mikemorris Thanks for replying. Given the fact that this issue is in the backup so there is no urgency for the team to implement it, I would possibly spend months to break down the ticket and work on this. So it won't be entirely impossible for a new contributor to work out this one. To start to work out this one. I plan to have following steps:
|
@jgao1025, great to see you starting work on this one, please feel free to reach out to me on Kubernetes slack @youngnick to have a chat about where this is at - I think that it would be good for me to walk you through some context before you get too far into work here. |
What would you like to be added:
As discussed in #715 (comment) and #590, any form of status per policy is going to be complex. These conditions may need to be per controller or even per referencing resource (ie policy targeting Route that is also targeted by several Gateways).
Why this is needed:
Although each implementation can currently take whichever approach makes the most sense for them, it would be better to standardize on this.
GEP: #713
The text was updated successfully, but these errors were encountered: