-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Propagate status from KCert to Route #7163
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@nak3: 2 warnings.
In response to this:
Proposed Changes
When autoTLS is enabled, KCert is one of the critical resources. This
patch changes changes to propagate status status from KCert to Route./lint
Fixes #7162
Release Note
Route does not become Ready if KCert is not Ready on autoTLS enabled env
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
/retry |
/hold I have modified files under |
@nak3 seems like the hold can be removed? |
/unhold Yes, it is ready for review now. Thank you. |
/assign @ZhiminXiang |
@@ -29,6 +29,9 @@ import ( | |||
var routeCondSet = apis.NewLivingConditionSet( | |||
RouteConditionAllTrafficAssigned, | |||
RouteConditionIngressReady, | |||
|
|||
// TODO(nak3): Add RouteConditionCertificateProvisioned in the next release. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we don't plan to do this in this release (I assume 0.14), could you remove the "Release Note" from the description of this PR?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, done.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why in the next release?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The downgrade test TestServicePostDowngrade
failed if we added the new condition in routeCondSet
. The Route became Unknown
status. (I have confirmed that it does not happen if previous version already has the condition.)
Here is the failure log
/lgtm |
/assign @tcnghia |
@@ -29,6 +29,9 @@ import ( | |||
var routeCondSet = apis.NewLivingConditionSet( | |||
RouteConditionAllTrafficAssigned, | |||
RouteConditionIngressReady, | |||
|
|||
// TODO(nak3): Add RouteConditionCertificateProvisioned in the next release. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
File an issue to track?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, I do. Thank you!
/approve |
/assgin @mattmoor |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm cool with this change, I would just like to understand the rationale behind the release staging.
thanks!
If NewLivingConditionSet is added new condition, it fails when downgrade test. Add RouteConditionCertificateProvisioned in the next release
I think both are good. Making minimal impact to UX is better so we should change it to "only when plain HTTP has been disabled"? I have added Here is the example output:
|
The following is the coverage report on the affected files.
|
/retest |
/retest @knative-test-reporter-robot is not correct.. The test failed only |
/lgtm |
I think we only want this behavior when plain HTTP has been disabled. |
@mattmoor could you take another look? It needs your approval :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
Sorry for the delay, feel free to ping me more aggressively when things are blocked on me because I get a TON of notifications, and I'd love to have had this bake more.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mattmoor, nak3, tcnghia, ZhiminXiang The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Thank you! 😄 |
/retest |
The following jobs failed:
Automatically retrying due to test flakiness... |
Proposed Changes
When autoTLS is enabled, KCert is one of the critical resources so
Route and KSvc should not be Ready status until Cert is deployed
correctly.
This patch changes to propagate status from KCert to Route.
/lint
Fixes #7162
Release Note