Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Workaround for cert-manager update spec issue #3390

Conversation

pierDipi
Copy link
Member

I'm setting the fields to what cert-manager expects so that we don't run into this issue cert-manager/cert-manager#6408

I'm setting the fields to what cert-manager expects so that
we don't run into this issue cert-manager/cert-manager#6408

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
@pierDipi
Copy link
Member Author

/cherry-pick release-1.11

@knative-prow knative-prow bot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Oct 11, 2023
@knative-prow-robot
Copy link
Contributor

@pierDipi: once the present PR merges, I will cherry-pick it on top of release-1.11 in a new PR and assign it to you.

In response to this:

/cherry-pick release-1.11

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@knative-prow knative-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 11, 2023
@knative-prow knative-prow bot requested review from creydr and matzew October 11, 2023 13:17
Copy link
Contributor

@matzew matzew left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@knative-prow knative-prow bot added the lgtm Indicates that a PR is ready to be merged. label Oct 11, 2023
@knative-prow
Copy link

knative-prow bot commented Oct 11, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: matzew, pierDipi

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@codecov
Copy link

codecov bot commented Oct 11, 2023

Codecov Report

Merging #3390 (aa2a7c6) into main (310891f) will increase coverage by 0.00%.
The diff coverage is n/a.

@@            Coverage Diff            @@
##               main    #3390   +/-   ##
=========================================
  Coverage     61.54%   61.54%           
- Complexity      761      762    +1     
=========================================
  Files           181      181           
  Lines         12322    12322           
  Branches        265      265           
=========================================
+ Hits           7583     7584    +1     
  Misses         4142     4142           
+ Partials        597      596    -1     
Flag Coverage Δ
java-unittests 70.88% <ø> (+0.03%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

see 1 file with indirect coverage changes

@knative-prow knative-prow bot merged commit e7017ef into knative-extensions:main Oct 11, 2023
16 of 18 checks passed
@knative-prow-robot
Copy link
Contributor

@pierDipi: failed to push cherry-picked changes in GitHub: pushToNamedFork is not implemented in the v2 client

In response to this:

/cherry-pick release-1.11

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

pierDipi added a commit to pierDipi/eventing-kafka-broker that referenced this pull request Oct 12, 2023
I'm setting the fields to what cert-manager expects so that
we don't run into this issue cert-manager/cert-manager#6408

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
openshift-ci bot pushed a commit to openshift-knative/eventing-kafka-broker that referenced this pull request Oct 12, 2023
…e-extensions#3390)  (#854)

* Workaround for cert-manager update spec issue (knative-extensions#3390)

I'm setting the fields to what cert-manager expects so that
we don't run into this issue cert-manager/cert-manager#6408

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Run make generate-release

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>

---------

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Leo6Leo pushed a commit to Leo6Leo/eventing-kafka-broker that referenced this pull request Nov 14, 2023
I'm setting the fields to what cert-manager expects so that
we don't run into this issue cert-manager/cert-manager#6408

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
knative-prow bot pushed a commit that referenced this pull request Nov 29, 2023
…#3287 (#3387)

* E2E tests for broker: TLS key pair rotation (#3287)

* progress save

* add the new cert rotation test

* Update the rekt test

* Format the files

* workspace save

* maven

* Clean up

* Clean up

* Format

* Fix the rekt test CA cert issue on Source

Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Format fix

* Re-order the prerequisite

* Enable the strict transportation mode in TLS rekt tests

* Fix the reviewDog comment

* Update test/e2e_new/broker_eventing_tls_test.go

Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

* Fix the format of the shell script

* Fix the format of the shell script

* Update the Strict feature flag

* Add the code to inject the feature flag to the context in the broker controller

* Run go import

* Fix the controller tests

* Set the default value to all other feature flags when we are updating the transport-encryption feature flag

---------

Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

* Run Dependency update

* Upgrade Knative eventing to release-1.11

* Upgrade Knative eventing to release-1.11

* Upgrade Knative eventing to release-1.11

* Expose tls port for broker (#3305)

* Expose the port for HTTPS broker

Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Change the format

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>

* Update 500-receiver.yaml

Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

---------

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>
Co-authored-by: Calum Murray <cmurray@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>

* Change the name of the secretVolumePath (#3303)

* Workaround for cert-manager update spec issue (#3390)

I'm setting the fields to what cert-manager expects so that
we don't run into this issue cert-manager/cert-manager#6408

Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>

* Cherry pick b30da88

* Update to the latest knative eventing V1.11.6

* Cherry pick the keypair rotation commit

* Cherry pick 1ddc823

* Run update-codegen

* Update the receiververticle import

* Run update-codegen

* Run spotless

* Modify the CI test, it seems like prow is using the wrong config to run the tests

* Modify the CI test, it seems like prow is using the wrong config to run the tests

* Modify the CI test, it seems like prow is using the wrong config to run the tests

* Install the knative TLS eventing component

* Install the knative TLS eventing component

* Update missed dependencies

* Update codegen

* Revert the dependency version to the latest

---------

Signed-off-by: Leo HC Li <36619969+Leo6Leo@users.noreply.github.com>
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Co-authored-by: Pierangelo Di Pilato <pierangelodipilato@gmail.com>
Co-authored-by: Calum Murray <cmurray@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/data-plane lgtm Indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants