Skip to content

Conversation

@enj
Copy link
Member

@enj enj commented Apr 24, 2025

/kind feature
/triage accepted
/sig auth
/milestone v1.34

TODO
TODO

Signed-off-by: Monis Khan <mok@microsoft.com>
@k8s-ci-robot k8s-ci-robot added the release-note Denotes a PR that will be considered when it comes time to generate release notes. label Apr 24, 2025
@k8s-ci-robot k8s-ci-robot added this to the v1.34 milestone Apr 24, 2025
@k8s-ci-robot k8s-ci-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. kind/feature Categorizes issue or PR as related to a new feature. triage/accepted Indicates an issue or PR is ready to be actively worked on. sig/auth Categorizes an issue or PR as relevant to SIG Auth. labels Apr 24, 2025
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Apr 24, 2025
@github-project-automation github-project-automation bot moved this to Needs Triage in SIG Auth Apr 24, 2025
@k8s-ci-robot k8s-ci-robot added the needs-priority Indicates a PR lacks a `priority/foo` label and requires one. label Apr 24, 2025
@k8s-ci-robot k8s-ci-robot added area/apiserver area/kubelet sig/api-machinery Categorizes an issue or PR as relevant to SIG API Machinery. sig/node Categorizes an issue or PR as relevant to SIG Node. labels Apr 24, 2025
@enj enj moved this from Needs Triage to In Review in SIG Auth Apr 24, 2025
Signed-off-by: Monis Khan <mok@microsoft.com>
@k8s-ci-robot k8s-ci-robot added area/kubeadm sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. labels Apr 24, 2025
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: enj
Once this PR has been reviewed and has the lgtm label, please assign dchen1107 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

enj added 5 commits April 24, 2025 17:04
…ontext

Signed-off-by: Monis Khan <mok@microsoft.com>
…ialTLSContext

Signed-off-by: Monis Khan <mok@microsoft.com>
…e and DialTLSContext

Signed-off-by: Monis Khan <mok@microsoft.com>
… rewrite and DialTLSContext

Signed-off-by: Monis Khan <mok@microsoft.com>
…ia host rewrite and DialTLSContext

Signed-off-by: Monis Khan <mok@microsoft.com>
@k8s-ci-robot
Copy link
Contributor

k8s-ci-robot commented Apr 25, 2025

@enj: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-kubernetes-linter-hints fd49b05 link false /test pull-kubernetes-linter-hints
pull-kubernetes-unit fd49b05 link true /test pull-kubernetes-unit
pull-kubernetes-e2e-kind-ipv6 fd49b05 link true /test pull-kubernetes-e2e-kind-ipv6
pull-kubernetes-conformance-kind-ga-only-parallel fd49b05 link true /test pull-kubernetes-conformance-kind-ga-only-parallel
pull-kubernetes-e2e-kind fd49b05 link true /test pull-kubernetes-e2e-kind
pull-kubernetes-integration fd49b05 link true /test pull-kubernetes-integration
pull-kubernetes-verify fd49b05 link true /test pull-kubernetes-verify

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

// TODO add unit test
// 1. unique transport per call for same inputs
// 2. unwrapping still works at high log levels when the transport is actually wrapped
Proxy: http.ProxyFromEnvironment,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't love relying on this to get a unique transport without a test ... at least unit test this results in two distinct underlying http.Transport objects when set

edit: ha, just noticed you literally have a TODO to add a unit test for this

also, if you want to avoid trying to support HTTP_PROXY / HTTPS_PROXY in combination with this (since egress selector is available), you could set this to a no-op no-proxy function (just return nil always)

also, I think we only need to do this when config.TLSClientConfig.ValidateNodeName is set

@k8s-ci-robot
Copy link
Contributor

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jun 26, 2025
@sarthaksarthak9
Copy link
Member

Hello @enj,

This PR has not seen updates for about 1.5 months since the last activity in early May, and it currently needs a rebase along with multiple failing tests. I’d like to check what’s the current status or if there’s anything we can do to help move this forward.

The code freeze for the 1.34 release starts at 02:00 UTC on Friday, 25th July 2025 (about 3 weeks from now). Please make sure this PR has both /lgtm and /approve labels, and that merge conflicts and test failures are resolved before the code freeze.

Thanks!

@sarthaksarthak9 sarthaksarthak9 moved this from Pending inclusion to Tracked in [sig-release] Bug Triage Jul 1, 2025
@sarthaksarthak9
Copy link
Member

sarthaksarthak9 commented Jul 22, 2025

👋 Hello!
Appreciate all of your efforts with this PR to validate kubelet serving cert CN via host rewrite and DialTLSContext! Is the plan still to resolve it for the v1.34 release?

If so, a gentle reminder that the code freeze will start at 02:00 UTC Friday 25th July 2025 . Please make sure any PRs have both lgtm and approved labels ASAP, and file an Exception if you think this PR needs additional time.
Thanks!

Thanks!

@jenshu
Copy link
Contributor

jenshu commented Aug 5, 2025

As code freeze has passed, I'm removing this from the 1.34 milestone.

/milestone clear

@k8s-ci-robot k8s-ci-robot removed this from the v1.34 milestone Aug 5, 2025
@dims dims added the lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. label Oct 8, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/apiserver area/kubeadm area/kubelet cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/feature Categorizes issue or PR as related to a new feature. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. release-note Denotes a PR that will be considered when it comes time to generate release notes. sig/api-machinery Categorizes an issue or PR as relevant to SIG API Machinery. sig/auth Categorizes an issue or PR as relevant to SIG Auth. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/node Categorizes an issue or PR as relevant to SIG Node. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. triage/accepted Indicates an issue or PR is ready to be actively worked on.

Projects

Status: In Review
Status: Waiting on Author
Status: Tracked

Development

Successfully merging this pull request may close these issues.

7 participants