-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFC] OCF modularity with optional standardized addon profiles #17
Comments
I have to say that for me personally I would prefer not to complicate things in this manner. I have seen specs before that enable modules and pluggable behavior, and the effect has always been two things:
I'm a strong proponent of simplicity over functionality. To the point of wishing that the OCF spec 2.0 could be smaller than the first iteration and remove features that have proven themselves to be less useful than first thought. One example is the |
See for example how Wayland leverages this simple core (simplicity!) Sadly some graphical toolkits with vested interest in Wayland already |
Yeah, there’s a difficult balance to strike between preserving a simple and stable specification and allowing changes to the spec to avoid fragmentation and implementations departing from the spec.. On the other hand, the spec is powerless to prevent an implementation from making incompatible changes that simply aren’t any good and shouldn’t go into the spec anyway. |
This is just a draft, but hopefully sheds some light into how we can proceed and tackle the pre-existing divergences from OCF standard as well as achieving future flexibility in the world where one standard doesn't map to a single implementation only. Initial idea: ClusterLabs#17 Signed-off-by: Jan Pokorný <[email protected]>
Another "profile" that might useful, say https://lists.clusterlabs.org/pipermail/users/2019-December/026681.html In fact, for this very use case, one might argue that adding an
|
I touched this topic recently [1]:
or
ocfao_na_set
for a shorter prefixSuggested profiles to legitimize current beyond-standard inverse
dependencies on CRM:
node-annotations
attrd_updater
(per the initial idea above)
multicluster-tickets
crm_ticket
(and perhaps more)Note that as mentioned, the mentioned delegation to particular
executables would be abstraced per particular CRM, allowing
interoperability with any CRM opting to deliver such addon
functionality and also easier testing (extensions to
ocft
?).Also current clones and multistate agents could be fully legitimized
when turned into OCF + addon profile(s) requirement on the interface
with CRM. This would require more robust coverage of the use cases,
as, e.g. IPaddr2 can optionally become clone, but it doesn't need
to be run like that.
[1] https://oss.clusterlabs.org/pipermail/users/2018-April/014815.html
The text was updated successfully, but these errors were encountered: