Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review KIC GWAPI docs for cross-namespace route references #5691

Closed
2 tasks done
rainest opened this issue Jun 9, 2023 · 1 comment
Closed
2 tasks done

Review KIC GWAPI docs for cross-namespace route references #5691

rainest opened this issue Jun 9, 2023 · 1 comment

Comments

@rainest
Copy link
Contributor

rainest commented Jun 9, 2023

Where is the problem?

Kong/kubernetes-ingress-controller#4142

What happened?

The Gateway API standard was previously ambiguous about or did not strictly enforce rules about Routes attaching to Gateways in another namespace. As of 0.7 (maybe a bit earlier, but whatever), the spec now enforces a requirement that a ReferenceGrant permit this access.

As the controller did not enforce this requirement as of 2.10, if we wrote docs using cross-namespace route->gateway references, those examples will break.

What did you expect to happen?

Prior to KIC 2.11, review docs for Routes that reference Gateways in another namespace. If any are found, either move the Route into the Gateway namespace or add a ReferenceGrant that allows the reference.

This is a documentation task for the Kubernetes team and should not require Docs team action.

Code of Conduct and Community Expectations

  • I agree to follow this project's Code of Conduct
  • I agree to abide by the Community Expectations
@rainest
Copy link
Contributor Author

rainest commented Jun 12, 2023

This was a misread of the spec. Route/Gateway cross-namespace association is handled via a separate allowedRoutes mechanism within Listener.

@rainest rainest closed this as completed Jun 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant