-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secret updates/deletes only trigger DAG rebuilds if referenced #4792
Conversation
This is at least partly covered by existing tests, but I'll take another look to see if coverage should be improved anywhere. |
Codecov Report
Additional details and impacted files@@ Coverage Diff @@
## main #4792 +/- ##
==========================================
+ Coverage 76.16% 76.20% +0.04%
==========================================
Files 140 140
Lines 16914 16920 +6
==========================================
+ Hits 12882 12894 +12
+ Misses 3780 3776 -4
+ Partials 252 250 -2
|
yeah i think there is a featuretest that unrelated secret additions dont cause config version changes, might be good to test removal of an unreferenced secret doesnt cause a dag build etc. for some more coverage: contour/internal/featuretests/v3/secrets_test.go Lines 162 to 176 in 0467b84
|
@sunjayBhatia good call, added to that test and also found/fixed some bugs in that test that were resulting in it not testing what we thought it was 😅 |
On Secret updates and deletes, only trigger DAG rebuilds if the Secret is referenced by an Ingress, HTTPProxy, Gateway or global config. Closes projectcontour#4386. Signed-off-by: Steve Kriss <krisss@vmware.com>
691d57c
to
fa52ad0
Compare
…ctcontour#4792) On Secret updates and deletes, only trigger DAG rebuilds if the Secret is referenced by an Ingress, HTTPProxy, Gateway or global config. Closes projectcontour#4386. Signed-off-by: Steve Kriss <krisss@vmware.com>
On Secret updates and deletes, only
trigger DAG rebuilds if the Secret
is referenced by an Ingress, HTTPProxy,
Gateway or global config.
Closes #4386.
Signed-off-by: Steve Kriss krisss@vmware.com