gitops-engine
gitops-engine copied to clipboard
fix: show namespaced resources owned by cluster scoped resources
Currently, the namespaced resources owned by cluster scoped resources are not shown on the UI. This PR updates IterateHierarchy()
to consider all resources(both cluster and namespace scoped) while managing a cluster-level object.
Part of: https://github.com/argoproj/argo-cd/issues/7733
Signed-off-by: Chetan Banavikalmutt [email protected]
Kudos, SonarCloud Quality Gate passed!
0 Bugs
0 Vulnerabilities
0 Security Hotspots
2 Code Smells
No Coverage information
9.0% Duplication
Codecov Report
Attention: Patch coverage is 80.51948%
with 15 lines
in your changes are missing coverage. Please review.
Project coverage is 55.23%. Comparing base (
5fd9f44
) to head (b1e7466
). Report is 3 commits behind head on master.
:exclamation: Current head b1e7466 differs from pull request most recent head 1c693c0. Consider uploading reports for the commit 1c693c0 to get more accurate results
Files | Patch % | Lines |
---|---|---|
pkg/cache/cluster.go | 84.93% | 11 Missing :warning: |
pkg/cache/settings.go | 0.00% | 4 Missing :warning: |
Additional details and impacted files
@@ Coverage Diff @@
## master #366 +/- ##
==========================================
+ Coverage 54.71% 55.23% +0.51%
==========================================
Files 41 41
Lines 4834 4908 +74
==========================================
+ Hits 2645 2711 +66
- Misses 1977 1985 +8
Partials 212 212
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.
Is this issue dead?
@empath-nirvana Sorry! We moved it to v2.4 and I got busy with other stuff. I will try to address the comments soon and get them merged
Kudos, SonarCloud Quality Gate passed!
0 Bugs
0 Vulnerabilities
0 Security Hotspots
4 Code Smells
No Coverage information
4.0% Duplication
Are we still waiting on this?
when can this be added? we have a cluster scoped resource to represent a "tenant", which spins off many resources into a new namespace with the corresponding namespace name. without this merge we can only see the namespace, which is a huge bummer
@alexmt can you take another look?
is this issue dead? would love to see this feature get added
I would also really like to have this feature. It's a big deficiency from the perspective of our management team. What is blocking this feature being added?
Are more changes needed? Is there an external dependency?
@alexmt @crenshaw-dev The PR is ready for review. Please let me know if there are any changes needed
@alexmt You asked me at kubecon to remind you about this PR -- said it's possible to enable this as a feature flag because of performance implications?
Thank you for bringing this up @empath-nirvana ! Yeah, main concern was how this change might affect performance. Adding a feature flag is a good compromise.
@chetan-rns can you please allow conditionally disable analyzing cluster level resource children to mitigate performance degradation?
@chetan-rns Is there any progress on this issue? We would love to see this added since we are now missing tracking of some of our custom resources.
Kudos, SonarCloud Quality Gate passed!
0 Bugs
0 Vulnerabilities
2 Security Hotspots
5 Code Smells
No Coverage information
1.7% Duplication
@chetan-rns are there any remaining blockers for this feature to be added? Would love to see this make it into a release!
@the-scott-hand I've resolved the review comments @crenshaw-dev @leoluz Please do let me know if there are any other changes required to get this in.
@leoluz @crenshaw-dev @chetan-rns any blockers or remaining changes that need to be made to get this merged and included in a release?
We really would love to get this fix here, as we really want argo to manage and track resources created by operators, such as the gpu operator by nvidia, it hits this bug when you deploy it
@chetan-rns are you still able to work on this?
Kudos, SonarCloud Quality Gate passed!
0 Bugs
0 Vulnerabilities
0 Security Hotspots
4 Code Smells
No Coverage information
1.8% Duplication
@crenshaw-dev Thank you for your patience. I've addressed your comments. PTAL.
Is there anything blocking this PR?
@chetan-rns could you open an Argo CD PR using this branch so we can run tests there? Besides that, I think this is good to go.
Quality Gate failed
Failed conditions
C Security Rating on New Code (required ≥ A)
See analysis details on SonarCloud
Catch issues before they fail your Quality Gate with our IDE extension
SonarLint
@crenshaw-dev I've rebased the existing Argo CD PR pointing to this branch.
https://github.com/argoproj/argo-cd/pull/8222
I think the SonarCloud check is failing due to issues already in the master.
@chetan-rns @crenshaw-dev Anything else blocking this PR? Would love to see this feature finally added!
Quality Gate passed
Issues
4 New issues
0 Accepted issues
Measures
0 Security Hotspots
No data about Coverage
1.9% Duplication on New Code