Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expose tls port for broker #3305

Merged
merged 3 commits into from
Aug 25, 2023

Conversation

Leo6Leo
Copy link
Contributor

@Leo6Leo Leo6Leo commented Aug 24, 2023

Proposed Changes

  • Expose the port 8443

Leo6Leo and others added 2 commits August 24, 2023 17:58
Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>
@knative-prow knative-prow bot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. area/data-plane labels Aug 24, 2023
@codecov
Copy link

codecov bot commented Aug 24, 2023

Codecov Report

Merging #3305 (c94a5e3) into main (c6e8f3c) will decrease coverage by 0.03%.
Report is 3 commits behind head on main.
The diff coverage is n/a.

@@             Coverage Diff              @@
##               main    #3305      +/-   ##
============================================
- Coverage     61.69%   61.66%   -0.03%     
- Complexity      767      768       +1     
============================================
  Files           182      182              
  Lines         12298    12312      +14     
  Branches        268      268              
============================================
+ Hits           7587     7592       +5     
- Misses         4118     4125       +7     
- Partials        593      595       +2     
Flag Coverage Δ
java-unittests 70.96% <ø> (-0.05%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

see 4 files with indirect coverage changes

@Leo6Leo
Copy link
Contributor Author

Leo6Leo commented Aug 24, 2023

/cc @pierDipi @Cali0707 @matzew

@knative-prow knative-prow bot requested review from Cali0707 and matzew August 24, 2023 22:10
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>
@Leo6Leo
Copy link
Contributor Author

Leo6Leo commented Aug 25, 2023

/cc @pierDipi

@knative-prow knative-prow bot requested a review from pierDipi August 25, 2023 11:56
Copy link
Member

@pierDipi pierDipi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@knative-prow knative-prow bot added the lgtm Indicates that a PR is ready to be merged. label Aug 25, 2023
@knative-prow
Copy link

knative-prow bot commented Aug 25, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Leo6Leo, pierDipi

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 25, 2023
@knative-prow knative-prow bot merged commit 119f499 into knative-extensions:main Aug 25, 2023
Leo6Leo added a commit to Leo6Leo/eventing-kafka-broker that referenced this pull request Nov 13, 2023
* Expose the port for HTTPS broker

Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Change the format

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>

* Update 500-receiver.yaml

Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

---------

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>
Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>
knative-prow bot pushed a commit that referenced this pull request Nov 29, 2023
…#3287 (#3387)

* E2E tests for broker: TLS key pair rotation (#3287)

* progress save

* add the new cert rotation test

* Update the rekt test

* Format the files

* workspace save

* maven

* Clean up

* Clean up

* Format

* Fix the rekt test CA cert issue on Source

Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Format fix

* Re-order the prerequisite

* Enable the strict transportation mode in TLS rekt tests

* Fix the reviewDog comment

* Update test/e2e_new/broker_eventing_tls_test.go

Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

* Fix the format of the shell script

* Fix the format of the shell script

* Update the Strict feature flag

* Add the code to inject the feature flag to the context in the broker controller

* Run go import

* Fix the controller tests

* Set the default value to all other feature flags when we are updating the transport-encryption feature flag

---------

Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

* Run Dependency update

* Upgrade Knative eventing to release-1.11

* Upgrade Knative eventing to release-1.11

* Upgrade Knative eventing to release-1.11

* Expose tls port for broker (#3305)

* Expose the port for HTTPS broker

Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Change the format

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>

* Update 500-receiver.yaml

Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

---------

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>
Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

* Change the name of the secretVolumePath (#3303)

* Workaround for cert-manager update spec issue (#3390)

I'm setting the fields to what cert-manager expects so that
we don't run into this issue cert-manager/cert-manager#6408

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Cherry pick b30da88

* Update to the latest knative eventing V1.11.6

* Cherry pick the keypair rotation commit

* Cherry pick 1ddc823

* Run update-codegen

* Update the receiververticle import

* Run update-codegen

* Run spotless

* Modify the CI test, it seems like prow is using the wrong config to run the tests

* Modify the CI test, it seems like prow is using the wrong config to run the tests

* Modify the CI test, it seems like prow is using the wrong config to run the tests

* Install the knative TLS eventing component

* Install the knative TLS eventing component

* Update missed dependencies

* Update codegen

* Revert the dependency version to the latest

---------

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>
Co-authored-by: Calum Murray <cmurray@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/data-plane lgtm Indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants