Conversation
Signed-off-by: Winicius Silva <winiciusab12@gmail.com>
To test properly the binding:profile field, we need to override the default policies to allow stack user to create and update it. The warning section here[1] on docs discuss better. [1] https://docs.openstack.org/api-ref/network/v2/index.html#port-binding-extended-attributes Signed-off-by: Winicius Silva <winiciusab12@gmail.com>
|
There is a difference between this implementation and the implemented on CAPO - I have used the Wdty? cc. @mandre Also, I'm spending some time configuring an environment to test the changes to the CI that I made before running again. |
mandre
left a comment
There was a problem hiding this comment.
I wonder if we really want to add binding profile. Neutron recently changed their policy to restrict this API to service accounts via https://review.opendev.org/c/openstack/neutron/+/909075 as we're not supposed to use this API directly.
CAPO needs to be updated: kubernetes-sigs/cluster-api-provider-openstack#2172
|
Oh,thanks, I didn't know of this change on upstream. But yeah, the docs says it mustn't be used for end users
When implementing I was wondering too what was the use case for supporting this. @lentzi90, do you have any idea if this is strictly necessary? |
I must confess I don't have a clue. It could even be something that was implemented for CI convenience. I remember cleaning up a few places where we used to rely on OpenStack admin credentials in the e2e tests. |
Ok, got it. Thanks. So, I'll move forward to close this pull request and create another one that adds the I believe we won't want an incompatible API and expose a non-supported field for the end users. |
|
It seems that we will need to add this extension to gophercloud first, I have created this issue for tracking. |
This PR adds the binding:profile field to the Port controller.
Partial: #616