-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
readOnly for ConfigMaps #48
Conversation
@himanshug Can we run the CI and test on microk8s in travis. Maybe use helm to bootstrap the CR and Operator. |
I think we should just make them "always read-only" ... that option doesn't need to exist. please remove the option and make it always read-only unless you know of a use case that requires writing into mounted config, I think we should never need to write into that. |
can you please create a proposal around the benefits of doing that, then feel free to work on it. only request is to retain the existing things that build does. |
yeah sure i ll create proposal around the travis, and send a workaround propsal. Plus its great to have readonly set to true. |
@himanshug i am looking forward for some help around fixing the Unit tests. Any suggestion |
you definitely need to update |
@himanshug Do tell your thoughts on this unit tests. |
reflect.DeepEquals is not the issue, the way the k8s object is coming out is the issue as i see. Its a notion of a three way merge original, current, and updated. |
i guess we need to use this library. Its addressing the same issue. |
I am still not sure what causes no problems using the proposed library as long as we understand the problem with |
so if i log the actual, existing objects the only difference i found was in the hash annotation. If i pass in existed.Spec and actual.Spec they pass without any error. So the only difference was in the hash object. I dont know how was it passing the test earlier. Regarding the libraries, i searched kubernetes issues and found some identical problems during spec matching plus if i remove the empty interface{} in the assertion function and pass *appsv1.StatefulSet it will still pass without any error. i had faced the same issues when i earlier tried to map the difference in objects, so would map each spec, template, like here I am still confused though how was it working earlier, we never had the same hash. :( |
@himanshug once you approve here, ill do changes #52 . Then cut out a new release. Thanks |
Description
This PR has:
Key changed/added files in this PR
handler.go
types.go