- 
                Notifications
    You must be signed in to change notification settings 
- Fork 281
✨ AllNodes security groups API #1826
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ AllNodes security groups API #1826
Conversation
| ✅ Deploy Preview for kubernetes-sigs-cluster-api-openstack ready!
 To edit notification comments on pull requests, go to your Netlify site configuration. | 
eeedb9d    to
    ebb6cc6      
    Compare
  
    ebb6cc6    to
    ce9b441      
    Compare
  
    d4a3641    to
    59034d8      
    Compare
  
    There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just one remark, otherwise this looks good!
195ac07    to
    c54e5f0      
    Compare
  
    | /test pull-cluster-api-provider-openstack-e2e-full-test | 
| /test pull-cluster-api-provider-openstack-e2e-test | 
| /test pull-cluster-api-provider-openstack-e2e-full-test | 
| /test pull-cluster-api-provider-openstack-e2e-test | 
    
      
        1 similar comment
      
    
  
    | /test pull-cluster-api-provider-openstack-e2e-test | 
c54e5f0    to
    dd1f1c1      
    Compare
  
    | /hold I've spotted an issue where Security Groups never stop reconciling :( | 
dd1f1c1    to
    e2f1d46      
    Compare
  
    | found it and fixed it 👍 | 
| 
 Comparing pointers instead of their values! It's obvious once you've seen it, but I could probably stare at it for an hour and not spot it. Thanks for the extra testing diligence. Do you think there's an automated test we could have written which would have caught this? | 
e2f1d46    to
    0ff6779      
    Compare
  
    | 
 done | 
| out.Name = in.Name | ||
| out.Rules = make([]SecurityGroupRule, len(in.Rules)) | ||
| for i, rule := range in.Rules { | ||
| out.Rules[i] = SecurityGroupRule{ | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couldn't this be written as ?
| out.Rules[i] = SecurityGroupRule{ | |
| out.Rules[i] = SecurityGroupRule{ | |
| ID: rule.ID, | |
| Direction: rule.Direction, | |
| Description: pointer.StringDeref(rule.Description, ""), | |
| .... | 
On a related out of scope note, we should probably upgrade k8s.io/utils and start using k8s.io/utils/ptr that uses generics instead
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, I started doing it and it's a big change. Here is an issue to track it: #1896
Co-Authored-By: Emilien Macchi <[email protected]> Co-Authored-By: Matthew Booth <[email protected]>
0ff6779    to
    418ce3d      
    Compare
  
    | /test pull-cluster-api-provider-openstack-e2e-full-test | 
| /test pull-cluster-api-provider-openstack-e2e-full-test | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this!
/lgtm
What this PR does / why we need it:
New API for all nodes managed security group API.
TODOs:
Fixes: #1274 #1704
/hold