-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-6661, OCPBUGS-9464: Move mTLS CRL handling into the router, and fix accidental duplication of CRLs #939
OCPBUGS-6661, OCPBUGS-9464: Move mTLS CRL handling into the router, and fix accidental duplication of CRLs #939
Conversation
@rfredette: This pull request references Jira Issue OCPBUGS-9464, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
c9636c1
to
4397524
Compare
/retest |
1 similar comment
/retest |
/label px-approved |
/assign |
4397524
to
7b3e115
Compare
TestAWSELBConnectionIdleTimeout failed which is bug https://issues.redhat.com/browse/OCPBUGS-13810. /test e2e-aws-operator |
Hit |
…to the router, and fix accidental duplication of CRLs"" This reverts commit 274bc1d.
0c43253
to
037c417
Compare
More |
built payload with this PR and tested in https proxy cluster, it works well.
|
/label qe-approved |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Miciah The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
… the ingress operator's environment
037c417
to
ee58397
Compare
The latest force push removes the additional code for adding the trusted-ca bundle to the router pods. From testing, the only connections that should need the cluster-wide proxy are those for downloading CRLs, and the router does not support downloading CRLs via https. As such, additional code adding the trusted-ca bundle is unnecessary and will only serve to complicate backports. |
/lgtm |
I've pushed the orphaned commit for trusted-ca bundle support to the branch rfredette/cluster-ingress-operator:router-https-proxy, but at this time there are no plans to try to merge it. |
e2e-aws-operator appears to have passed, but must-gather failed? |
@rfredette: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
@rfredette: Jira Issue OCPBUGS-9464: All pull requests linked via external trackers have merged:
Jira Issue OCPBUGS-9464 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Fix #930 by pulling cluster-wide proxy configuration from
proxies.config.openshift.io/cluster
rather than the operator's environment