-
Notifications
You must be signed in to change notification settings - Fork 172
HNC: consider simplifying the inheritance of allowCascadingDelete #730
Comments
@adrianludwin: Please ensure the request meets the requirements listed here. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
My concern is that users may set it for a one-time deletion and forget to unset it. To support this simplified inheritance, we may need to come up with a new mechanism to prevent that case? WDYT @adrianludwin |
I agree it's a bit less safe - but not *that* much less safe. You should
already be setting it on the lowest possible level anyway, and usually you
won't have full and subnamespaces interleaved either. So the way it works
now just seems a bit arbitrary.
The only other option I can think of is to get rid of the inheritance
completely. You can only delete is aCD is set on the *current *namespace,
or if your immediate parent is *already *being deleted.
…On Fri, May 15, 2020 at 2:42 PM yiqigao217 ***@***.***> wrote:
My concern is that users may set it for a one-time deletion and forget to
unset it. To support this simplified inheritance, we may need to come up
with a new mechanism to prevent that case? WDYT @adrianludwin
<https://github.com/adrianludwin>
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#730 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AE43PZB4HACQ2AFGBPB6ABLRRWEJ7ANCNFSM4NBSDI4Q>
.
|
What is the usecase justifying cascading deletes? Do we expect users to often want to delete subtrees? I feel like namespace trees will not be something that have short lifecycle, this is not a filesystem. I guess I am questioning the overall product motivation for such a feature. The downsides is that it creates a SPOF with a large blast radius. |
Hi @rcolline , this is a great question. Cascading delete only applies to subnamespaces that are created by HNC from Subnamespaces are created/deleted by creating/deleting the anchor CR in the parent. Therefore, cascading delete would happen on subnamespace chains. That's also why we have Please let me know if it doesn't answer your question or if you were asking why we need cascading delete on subnamespaces. |
Right now, allowCascadingDelete is only inherited up through subnamespaces to the first full namespace. This is probably the "right" thing to do but it's kind of hard to explain. It might be simpler to just accept it if any ancestor has it, which is actually what we say in the user guide right now (the real definition is just shown in a "note" block).
/assign @yiqigao217
Yiqi, wdyt?
/good-first-issue
The text was updated successfully, but these errors were encountered: