@@ -109,7 +109,7 @@ tags, and then generate with `hack/update-toc.sh`.
109
109
- [ Troubleshooting] ( #troubleshooting )
110
110
- [ Implementation History] ( #implementation-history )
111
111
- [ Alternatives] ( #alternatives )
112
- - [ Content-Type Header ] ( #content-type- header )
112
+ - [ HTTP header mechanism ] ( #http- header-mechanism )
113
113
- [ Other Alternatives Considered] ( #other-alternatives-considered )
114
114
<!-- /toc -->
115
115
@@ -287,6 +287,17 @@ validation is that it uses openapiv2 which will be less actively supported
287
287
as openapiv3 becomes standard and will cause client-side validation to
288
288
continue to diverge from server-side validation.
289
289
290
+ We propose offering a separate KEP to tackle deprecating client-side validation
291
+ once server-side validation is GA. Our initial thoughts on this are that in
292
+ order to deprecate client-side validation we will need to build a separate
293
+ out-of-tree client-side validation mechanism so that users can continue to
294
+ validate their configs.
295
+
296
+ The [ kubeval] ( https://www.kubeval.com/ ) project is an example of an out-of-tree solution that does this, and
297
+ we will look into expanding its support of open API to v3, and investigate
298
+ whether it makes sense as a permanent solution to client-side validation that
299
+ will allow for deprecation of current client-side validation.
300
+
290
301
<!--
291
302
What are the caveats to the proposal?
292
303
What are some important details that didn't come across above?
@@ -908,7 +919,7 @@ Why should this KEP _not_ be implemented?
908
919
909
920
## Alternatives
910
921
911
- ### Content-Type Header
922
+ ### HTTP header mechanism
912
923
913
924
Instead of opting-in to server-side validation via a query parameter, we
914
925
considered passing a specific content-type header that would indiciate strict
0 commit comments