Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tweaks to ReferencePolicy GEP #722

Merged

Conversation

robscott
Copy link
Member

@robscott robscott commented Jul 15, 2021

What type of PR is this?
/kind gep

What this PR does / why we need it:
This is a quick follow up to #711 that addresses a few leftover comments on that PR + does some minor cleanup.

Does this PR introduce a user-facing change?:

NONE

Deploy Preview: https://deploy-preview-722--kubernetes-sigs-gateway-api.netlify.app/geps/gep-709/

@k8s-ci-robot k8s-ci-robot added kind/gep PRs related to Gateway Enhancement Proposal(GEP) cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Jul 15, 2021
@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 15, 2021
@robscott
Copy link
Member Author

I think we're pretty close to consensus on this, but will hold as a precaution.

/hold

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 15, 2021
@@ -82,8 +88,8 @@ decisions:
more powerful it may encourage unnecessarily insecure configuration.

```go
// ReferencePolicy identifies cross namespace relationships that are trusted for
// Gateway API.
// ReferencePolicy identifies cross namespace relationships between types of
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the previous PR, a suggestion was made to rename this to InboundReferencePolicy. Wanted to pick up the conversation in this PR. I think I slightly prefer the shorter ReferencePolicy name, but admit that InboundReferencePolicy would make room for something like OutboundReferencePolicy. That might allow admins to restrict where Gateways in their namespace could forward to. Thoughts?

/cc @youngnick @bowei @danehans @hbagdi @jpeach

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeh, my preference is also for a single ReferencePolicy with From+To.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah as I've been thinking about it more, it would not be that difficult to expand ReferencePolicy to cover both inbound and outbound references. I don't think that's something we actually want to do, but the only required change would be adding namespace to the to struct. The larger hurdle would be the complexity for users in trying to restrict/allow both inbound and outbound references.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As discussed in community meeting today, we believe it is unlikely that we will ever have a need for an OutboundReferencePolicy. Given that, the preference is to keep the simpler ReferencePolicy name. I'll update the comments around ReferencePolicy to make it clearer that it refers to inbound references.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've updated the wording around this, PTAL

@@ -33,6 +33,8 @@ nav:
- API specification: references/spec.md
- Releases: references/releases.md
- Implementations: references/implementations.md
- Enhancement Proposals:
- "709: Cross Namespace References from Routes": geps/gep-709.md
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Adding full GEP names here could end up being a bit much for our existing nav structure, would anyone prefer a single GEP index page that then linked to each individual GEP? I don't feel strongly either way, but wanted to start with something. (https://deploy-preview-722--kubernetes-sigs-gateway-api.netlify.app/geps/gep-709/)

@robscott robscott added this to the v1alpha2 milestone Jul 17, 2021
@robscott
Copy link
Member Author

Thanks to everyone for the great feedback around this! Based on the discussion at the community meeting today, it sounds like this was pretty close to consensus with no major objections. Given that, I'm going to remove the hold and move this back to a place where an LGTM can merge this in.

/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 20, 2021
@youngnick
Copy link
Contributor

I did the last one, so I should probably leave this to someone else? :)

@robscott
Copy link
Member Author

ping @hbagdi @jpeach @bowei for final review

Copy link
Contributor

@jpeach jpeach left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Omitting /lgtm until other reviewers can take a look.

@bowei
Copy link
Contributor

bowei commented Jul 22, 2021

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jul 22, 2021
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: bowei, howardjohn, jpeach, robscott

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [bowei,jpeach,robscott]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit d8d28f4 into kubernetes-sigs:master Jul 22, 2021
@robscott robscott deleted the referencepolicy-gep-v2 branch January 8, 2022 01:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/gep PRs related to Gateway Enhancement Proposal(GEP) lgtm "Looks good to me", indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants