-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prevent negative values for requeue times #204
Conversation
I see this as being a common pattern, main is frozen while QA tests, but to continue developing the operator we do new changes on vnext. This will become main after the next release. To aid in testing of this branch, all pushes to vnext will do the e2e tests now.
There are two parms in the CR that allow you to control the requeue time of a controller reconciler iteration. Both of these parameters could be assigned negative values. This PR adds new rules to the webhook to prevent that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. I just have one question.
@@ -890,6 +890,7 @@ func MakeVDB() *VerticaDB { | |||
DataPath: "/data", | |||
DepotPath: "/depot", | |||
}, | |||
KSafety: KSafety1, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why adding this now?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I used the MakeVDB()
function in the webhook UT. When I tried to test the successful case, where the requeue times were valid, it still complained that the kSafety was not valid. We just never set it properly, so any webhook test will complain about it.
There are two parms in the CR that allow you to control the requeue time of a controller reconciler iteration. Both of these parameters could be assigned negative values. This PR adds new rules to the webhook to prevent that.