-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix cluster-local routes being stalled when external-domain-tls is enabled #15234
Conversation
/assign @ReToCode |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #15234 +/- ##
==========================================
- Coverage 84.76% 84.75% -0.01%
==========================================
Files 218 218
Lines 13473 13479 +6
==========================================
+ Hits 11420 11424 +4
- Misses 1687 1688 +1
- Partials 366 367 +1 ☔ View full report in Codecov by Sentry. |
/cherry-pick release-1.14 |
@dprotaso: once the present PR merges, I will cherry-pick it on top of release-1.14 in a new PR and assign it to you. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/retest |
Aw, that is a tricky one. The code was confusing before, but with this it is even more implicit. Maybe it would be a good idea to introduce another condition to separate cluster-local from external-domain certificates? It's a bit hard to follow that the condition is influenced by two feature flags and if there is actually a route (e.g. external-domain-tls enabled but no external routes and cluster-local-domain-tls disabled). We could even have better messages like
@dprotaso WDYT? And if ok, this PR or we can do it as a followup for 1.15? |
Lets talk about this and do follow up for 1.15 - can you make an issue? This PR is to unblock the bug and cherry-pick back to 1.14 release branch. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, ReToCode The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@dprotaso: new pull request created: #15243 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Fixes: #15232
Proposed Changes
Release Note