Skip to content

refactor(coordinated-policy): add name field in policy#235

Merged
cheyang merged 1 commit intosgl-project:mainfrom
Syspretor:refactor/add-policy-name-cooridnated-policy
Mar 24, 2026
Merged

refactor(coordinated-policy): add name field in policy#235
cheyang merged 1 commit intosgl-project:mainfrom
Syspretor:refactor/add-policy-name-cooridnated-policy

Conversation

@Syspretor
Copy link
Copy Markdown
Collaborator

Ⅰ. Motivation

Ⅱ. Modifications

Ⅲ. Does this pull request fix one issue?

fixes #XXXX

Ⅳ. List the added test cases (unit test/integration test) if any, please explain if no tests are needed.

Ⅴ. Describe how to verify it

VI. Special notes for reviews

Checklist

  • Format your code make fmt.
  • Add unit tests or integration tests.
  • Update the documentation related to the change.

@Syspretor Syspretor requested a review from cheyang March 23, 2026 08:29
@gemini-code-assist
Copy link
Copy Markdown

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request refactors the coordinated policy API by introducing a mandatory name field within the CoordinatedPolicyRule structure. This change aims to provide a clear identifier for each policy rule, improving manageability and clarity. The update also includes necessary adjustments to the generated client-go apply configurations and the CRD schema to ensure consistency and proper validation across the system.

Highlights

  • API Definition Update: A Name field has been added to the CoordinatedPolicyRule struct in api/workloads/v1alpha2/coordinatedpolicy_types.go. This field is now required and must have a minimum length of 1, enhancing the identification of policy rules.
  • Client-Go Apply Configuration Refinement: The client-go apply configurations have been updated. This includes removing an unused RoleBasedGroupTemplateSpecApplyConfiguration entry, and modifying RoleBasedGroupSetSpecApplyConfiguration to replace GroupTemplate with Template and update its type to RoleBasedGroupSpecApplyConfiguration. Additionally, the Name field and its WithName method were added to CoordinatedPolicyRuleApplyConfiguration.
  • CRD Schema Alignment: The Custom Resource Definition (CRD) for CoordinatedPolicyRule in config/crd/bases/workloads.x-k8s.io_coordinatedpolicies.yaml has been updated to reflect the new name field, ensuring schema validation aligns with the API changes.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new name field to CoordinatedPolicyRule and also refactors RoleBasedGroupSetSpec. While the changes themselves seem internally consistent, there are a few important points. Firstly, the refactoring of RoleBasedGroupSetSpec is a breaking API change that is not mentioned in the PR title or description. It's also mixed with an unrelated feature, which makes the PR harder to review and track. It's recommended to split these changes into separate PRs. Secondly, the new name field in CoordinatedPolicyRule should likely be unique within a policy, but this is not enforced. Finally, there are no test updates, which is a concern for a PR with API changes.

Comment thread client-go/applyconfiguration/workloads/v1alpha1/rolebasedgroupsetspec.go Outdated
Comment thread api/workloads/v1alpha2/coordinatedpolicy_types.go
@Syspretor Syspretor force-pushed the refactor/add-policy-name-cooridnated-policy branch from a5209b1 to 41ffe7b Compare March 23, 2026 09:28
@Syspretor Syspretor force-pushed the refactor/add-policy-name-cooridnated-policy branch from 41ffe7b to 674882e Compare March 23, 2026 09:33
@Syspretor Syspretor changed the title refactor(coordinated-policy): add name policy in field refactor(coordinated-policy): add name in field policy Mar 23, 2026
@Syspretor Syspretor changed the title refactor(coordinated-policy): add name in field policy refactor(coordinated-policy): add name field in policy Mar 23, 2026
@cheyang cheyang requested a review from Copilot March 23, 2026 09:44
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the CoordinatedPolicy v1alpha2 API schema to introduce a required name field on each spec.policies[] rule and to treat spec.policies as a map-like list keyed by that name (improving patch/SSA merge behavior for individual rules).

Changes:

  • Add required CoordinatedPolicyRule.name with validation (minLength=1).
  • Change spec.policies to listType=map / listMapKey=name (CRD x-kubernetes-list-type: map keyed by name).
  • Regenerate/update client-go applyconfiguration to support name (WithName).

Reviewed changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 2 comments.

File Description
config/crd/bases/workloads.x-k8s.io_coordinatedpolicies.yaml CRD schema updated to require spec.policies[].name and define policies as a map-keyed list.
client-go/applyconfiguration/workloads/v1alpha2/coordinatedpolicyrule.go Apply configuration updated with Name field and WithName() builder.
api/workloads/v1alpha2/coordinatedpolicy_types.go API types updated to add Name on policy rules and mark Policies as listType=map keyed by name.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread api/workloads/v1alpha2/coordinatedpolicy_types.go
Comment thread config/crd/bases/workloads.x-k8s.io_coordinatedpolicies.yaml
Copy link
Copy Markdown
Collaborator

@cheyang cheyang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@cheyang cheyang merged commit e1c3692 into sgl-project:main Mar 24, 2026
13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants