-
Notifications
You must be signed in to change notification settings - Fork 161
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ADR-0012: Initial Proposal for Cluster Wide Custom Resources (e.g. ClusterScanType) #1270
Conversation
…ype) Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
MegaLinter status:
|
Descriptor | Linter | Files | Fixed | Errors | Elapsed time |
---|---|---|---|---|---|
actionlint | 4 | 3 | 0.37s | ||
bash-exec | 14 | 4 | 0.06s | ||
shellcheck | 14 | 18 | 0.21s | ||
shfmt | 14 | 14 | 0.01s | ||
dockerfilelint | 3 | 1 | 0.87s | ||
hadolint | 3 | 2 | 0.17s | ||
✅ GIT | git_diff | yes | no | 0.16s | |
golangci-lint | 11 | 11 | 17.29s | ||
revive | 11 | 4 | 0.18s | ||
checkstyle | 2 | 2 | 5.01s | ||
eslint | 9 | 1 | 0.66s | ||
✅ JSON | eslint-plugin-jsonc | 9 | 0 | 2.72s | |
✅ JSON | jsonlint | 9 | 0 | 3.21s | |
prettier | 9 | 1 | 1.51s | ||
✅ JSON | v8r | 9 | 0 | 17.94s | |
bandit | 36 | 24 | 0.99s | ||
black | 36 | 1 | 4.18s | ||
flake8 | 36 | 869 | 1.23s | ||
isort | 36 | 24 | 0.24s | ||
pylint | 36 | 72 | 11.58s | ||
misspell | 326 | 1 | 2.28s | ||
eslint | 3 | 1 | 0.36s | ||
prettier | 233 | 1 | 15.66s | ||
v8r | 233 | 6 | 302.05s | ||
yamllint | 233 | 1 | 27.85s |
See errors details in artifact MegaLinter reports on CI Job page
Set VALIDATE_ALL_CODEBASE: true
in mega-linter.yml to validate all sources, not only the diff
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Very well laid out proposal :)
Some comments might be very minor, but will hopefully help most readers to follow your arguments a bit better.
https://github.blog/changelog/2022-06-08-admins-can-require-sign-off-on-web-based-commits/ Co-authored-by: Sebastian Franz <32578476+SebieF@users.noreply.github.com> Signed-off-by: Jannik Hollenbach <jannik@hollenbach.de>
Co-authored-by: Sebastian Franz <32578476+SebieF@users.noreply.github.com> Signed-off-by: Jannik Hollenbach <jannik@hollenbach.de>
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
Signed-off-by: Max Maass <max.maass@iteratec.com>
I just added a second proposal to the ADR, which features stricter separation between cluster-wide resources and namespace-local ones. I will discuss this with @J12934 to complete the "TBD" parts before we can bring this to the rest of the team for discussion. |
Signed-off-by: Max Maass <max.maass@iteratec.com>
Signed-off-by: Max Maass <max.maass@iteratec.com>
Signed-off-by: Max Maass <max.maass@iteratec.com>
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
@malexmave I don't think this can cause problems: There are following options to install the Cascading Scans hook after the PR all should be ok: 1. As a normal `ScanCompletionHook`, behaving exactly like it does now 2. As a `ClusterScanCompletionHook` *without* an `executionNamespace`. Would use cluster cascading rules and start the cascaded scans in the scans namespace. 3. As a `ClusterScanCompletionHook` *with* an `executionNamespace`. Would use cluster cascading rules and start the cascaded scans in the scans namespace. (this is already explicitly stated in the proposal) If I'm overlooking something feel free to revert this commit :) Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
This PR contain a Proposal for new variants for some of our CustomResourceDefinitions which could be used on a cluster level and then be reused across namespaces.