-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add proposal for ofo flagd service #59
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Simple and to the point. This sounds like a nice, flexible deployment option.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved with small suggestion.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As a Platform Eng, I would have some reservation deploying an operator that can control K8s Services in any namespace. In the implementation details, I would suggest to enable/disable this behavior via (Open)Feauture Flag 😉 In the docs, we could explain that if this asking is too much permissions, this behavior can also be done manually by applying a manifest with the svc
Signed-off-by: Skye Gill <[email protected]>
Signed-off-by: Skye Gill <[email protected]>
Signed-off-by: Skye Gill <[email protected]>
Signed-off-by: Skye Gill <[email protected]>
Signed-off-by: Skye Gill <[email protected]>
1252505
to
8118d37
Compare
I think it might make sense to restrict OFO to only create services in it's own namespace (which is customizable via helm). I think that would work for most use-cases and would help keep the permissions surface area smaller. I don't see a need for OFO to have the ability to create services in any namespace. Not sure that needs to be mentioned in this OFEP though |
Signed-off-by: Skye Gill <[email protected]>
I agree with both points. I have updated the OFEP to restrict OFO's Services permissions to its own namespace. |
Signed-off-by: Skye Gill <[email protected]>
Further POC work has led me to discover that services cannot expose deployments across namespaces. The simplest circumvention to this is to enforce both the Deployment and Service to be created in OFO's namespace. Thoughts @toddbaert @beeme1mr @thisthat @AlexsJones ? |
I am really confused, I left a comment on this and it's been merged but I can't find the comment |
Okay I'll add what I think I wrote the other day:
I think this is somewhat misleading, this doesn't make deploying clientside application deployment simpler, it makes it prescriptive, it's providing a way we think is best to do it, rather than letting people do it themself.
This is going to make all the service and endpoint types resident inside the OFO namespace, meaning you can route between them, it breaks tenancy isolation boundaries.
Why not simply route from the container that has the client SDK inside itself? |
Here's a link to your comment: #59 (comment) |
Your comment is still visible to me: #59 (comment)
People are still able to do it themselves if they don't fit to this prescription but imo the Service behind Deployment is common enough to warrant this enhancement.
Can you elaborate further on this please? Not sure I fully understand. |
@AlexsJones I think you may be misunderstanding what we mean when we say "client flags".
In client side flagging, there is no container with an SDK. The SDK and the provider exist in client code (an iOS app, web browser, etc). |
See my previous comment here for more background on the paradigm. |
This PR
OFEP for ofo flagd service
Related Issues
open-feature/open-feature-operator#371
Notes
Follow-up Tasks
How to test