Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add error status for Policy targetRefs targeting routing objects in different namespaces #9877

Open
lgadban opened this issue Aug 9, 2024 · 0 comments
Labels
Area: K8S Gateway API Issues related to the Kubernetes Gateway API Area: UX Type: Enhancement New feature or request

Comments

@lgadban
Copy link
Contributor

lgadban commented Aug 9, 2024

Gloo Edge Product

Open Source

Gloo Edge Version

v1.17+

Is your feature request related to a problem? Please describe.

Currently Kube Gateway Policies (e.g. RouteOptions, VHostOptions, etc.) cannot target routing objects (e.g. HTTPRoute, Gateway, etc.) across namespaces; that is, policy objects must live in the same namespace as the object they are targeting.
Adding support for this is tracked in #9832

As a user, you may not know this limitation, and If you attempt to target across namespaces, you get no feedback that this binding is not allowed. The only signal that the attachment was not successful is the lack of a status. This UX can be improved.

Describe the solution you'd like

We should add a status to policy objects to indicate that a cross-namespace binding was attempted and not successful

Describe alternatives you've considered

No response

Additional Context

When RefGrant support is added, the status should be updated to reflect that

See also:
https://github.com/solo-io/solo-projects/issues/6172
#9832

┆Issue is synchronized with this Asana task by Unito

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Area: K8S Gateway API Issues related to the Kubernetes Gateway API Area: UX Type: Enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant