Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Usr/rodrigo bassil/traefikv2 #209

Merged
merged 15 commits into from
Feb 22, 2023
Merged

Conversation

rodrigobassil
Copy link
Contributor

@rodrigobassil rodrigobassil commented Jan 31, 2023

Description

  • This PR updates k3s to version 1.25.5+k3s2, cert-manager to v1.10.1 and traefik v2.9.4.
  • It also fixes the issues with signed and self-signed certificates. If no certificate is specified, then dellemc default certificate will be used.
  • It sets the minimum TLS version to 1.2
  • It introduces the static Nodeport option (traefik_web_port and traefik_websecure_port) for traefik
  • It increases the limit reader to 2GB related to rpm build issue.

GitHub Issues

List the GitHub issues impacted by this PR:

| GitHub Issue # |
| dell/csm#642 |
| |

Checklist:

  • [ x ] I have performed a self-review of my own code to ensure there are no formatting, vetting, linting, or security issues
  • I have verified that new and existing unit tests pass locally with my changes
  • [ x ] I have not allowed coverage numbers to degenerate
  • I have maintained at least 90% code coverage
  • [ x ] I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have added tests that prove my fix is effective or that my feature works
  • Backward compatibility is not broken

How Has This Been Tested?

Please describe the tests that you ran to verify your changes. Please also list any relevant details for your test configuration

  • Test A
  • Test B

@csmbot
Copy link
Collaborator

csmbot commented Jan 31, 2023

Can one of the admins verify this patch?

@bharathsreekanth
Copy link

We need a GH CSM issue, I am working on it, will update this PR when we have one.

@bharathsreekanth
Copy link

We need a GH CSM issue, I am working on it, will update this PR when we have one.

Done. updated.

@rodrigobassil rodrigobassil marked this pull request as draft January 31, 2023 18:57

if [ $($K3S kubectl get svc -n kube-system | grep traefik | wc -l) -eq 1 ]
then
sh ./traefik_nodeport.sh --traefik_web_port $webPort --traefik_websecure_port $websecurePort
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a need to have a separate script? Since the inputs for this configuration are already defined in this script , may just want to call a function here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@sharmilarama, the intent here is to give more flexibility to customers. In case customers forget to set the Nodeports during installation/upgrade, they can do it in a later stage using traefik_nodeport.sh. Also, it gives the possibility to change the Nodeports in a later stage without having to touch any other configuration.

@bharathsreekanth
Copy link

@rodrigobassil can you take the PR out of draft mode?

@rodrigobassil rodrigobassil marked this pull request as ready for review February 20, 2023 19:19
@shaynafinocchiaro
Copy link
Collaborator

run e2e test

@shaynafinocchiaro shaynafinocchiaro merged commit 34615f6 into main Feb 22, 2023
@rodrigobassil rodrigobassil deleted the usr/rodrigo_bassil/traefikv2 branch March 16, 2023 14:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants