-
Notifications
You must be signed in to change notification settings - Fork 144
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add special handling for Aggregatin ClusterRole #1407
Add special handling for Aggregatin ClusterRole #1407
Conversation
@grdryn added this special handling for |
13a57a9
to
b521f0f
Compare
Signed-off-by: Luca Burgazzoli <lburgazzoli@gmail.com>
b521f0f
to
341f2e0
Compare
so |
This is to reduce chattering so upon the deployment of a cluster roles, then we don't overrides the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
Thanks!
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## feature-operator-refactor #1407 +/- ##
============================================================
Coverage ? 27.32%
============================================================
Files ? 61
Lines ? 4901
Branches ? 0
============================================================
Hits ? 1339
Misses ? 3406
Partials ? 156 ☔ View full report in Codecov by Sentry. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: zdtsw The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
15ca54e
into
opendatahub-io:feature-operator-refactor
Description
For
ClusterRole
, ifAggregationRule
is set, then the Rules are controller managed and direct changes to Rules will be stomped by the controller. This also happen if the rules are set to an empty slice or nil. This commit add a special handling for theClusterRole
resource so that therules
filed is removed in case aggregation is configured.How Has This Been Tested?
KServe
ClusterRole
namedkserve-admin
KServe
pods are deleted, then theClusterRole
namedkserve-admin
should not receive updatesScreenshot or short clip
Merge criteria