Skip to content

Conversation

@Mia-Cross
Copy link
Contributor

The validation of the CNI field depends on the version of the sdk-go currently used in the provider, which means that newly added values could be refused by the provider when they are actually handled by the API. To prevent this, we should switch to soft validation for this field and only show a warning when the given value is not in the enum.

@Mia-Cross Mia-Cross requested review from a team and remyleone as code owners September 29, 2025 14:28
@Mia-Cross Mia-Cross self-assigned this Sep 29, 2025
@github-actions github-actions bot added k8s Kubernetes Kapsule issues, bugs and feature requests vpc Virtual Private Cloud (VPC) issues, bugs and feature requests labels Sep 29, 2025
@Mia-Cross Mia-Cross added bug priority:highest Bugs filled by customers, security issues and removed vpc Virtual Private Cloud (VPC) issues, bugs and feature requests labels Sep 29, 2025
@github-actions github-actions bot added the vpc Virtual Private Cloud (VPC) issues, bugs and feature requests label Sep 29, 2025
@Mia-Cross Mia-Cross added this pull request to the merge queue Sep 29, 2025
Merged via the queue into scaleway:master with commit 27a6b65 Sep 29, 2025
44 checks passed
@Mia-Cross Mia-Cross deleted the k8s_fix_cni_allowed_values branch September 29, 2025 15:09
@Mia-Cross Mia-Cross linked an issue Sep 29, 2025 that may be closed by this pull request
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bug k8s Kubernetes Kapsule issues, bugs and feature requests priority:highest Bugs filled by customers, security issues vpc Virtual Private Cloud (VPC) issues, bugs and feature requests

Projects

None yet

Development

Successfully merging this pull request may close these issues.

K8s CNI type validation incorrect

2 participants