Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-6661, OCPBUGS-9464: Move mTLS CRL handling into the router, and fix accidental duplication of CRLs #939

Merged

Conversation

rfredette
Copy link
Contributor

Fix #930 by pulling cluster-wide proxy configuration from proxies.config.openshift.io/cluster rather than the operator's environment

@openshift-ci-robot openshift-ci-robot added jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels May 24, 2023
@openshift-ci-robot
Copy link
Contributor

@rfredette: This pull request references Jira Issue OCPBUGS-9464, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.14.0) matches configured target version for branch (4.14.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @lihongan

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

Fix #930 by pulling cluster-wide proxy configuration from proxies.config.openshift.io/cluster rather than the operator's environment

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot requested review from lihongan, knobunc and Miciah May 24, 2023 17:17
@rfredette rfredette force-pushed the ocpbugs-9464-take2 branch 2 times, most recently from c9636c1 to 4397524 Compare May 24, 2023 22:58
@rfredette
Copy link
Contributor Author

/retest

1 similar comment
@rfredette
Copy link
Contributor Author

/retest

@sferich888
Copy link

/label px-approved

@openshift-ci openshift-ci bot added the px-approved Signifies that Product Support has signed off on this PR label May 25, 2023
@frobware
Copy link
Contributor

/assign

@lihongan
Copy link
Contributor

@frobware
Copy link
Contributor

TestAWSELBConnectionIdleTimeout failed which is bug https://issues.redhat.com/browse/OCPBUGS-13810.

/test e2e-aws-operator

@rfredette
Copy link
Contributor Author

Hit TestAWSELBConnectionIdleTimeout failure again.
/retest

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 31, 2023
…to the router, and fix accidental duplication of CRLs""

This reverts commit 274bc1d.
@rfredette rfredette force-pushed the ocpbugs-9464-take2 branch from 0c43253 to 037c417 Compare May 31, 2023 20:51
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 31, 2023
@rfredette
Copy link
Contributor Author

More TestAWSELBConnectionIdleTimeout failure
/retest

@lihongan
Copy link
Contributor

lihongan commented Jun 1, 2023

built payload with this PR and tested in https proxy cluster, it works well.

$ oc get proxy cluster -oyaml | yq .spec
httpProxy: http://proxy-user1:[email protected]:3128
httpsProxy: https://proxy-user1:[email protected]:3130
noProxy: rhos-d.infra.xxx.com
trustedCA:
  name: user-ca-bundle

sh-4.4$ ls /etc/pki/ca-trust/extracted/pem/
tls-ca-bundle.pem


sh-4.4$ ls ../mtls/latest/ -lh
total 75M
-rw-r--r--. 1 1000610000 root 4.5K Jun  1 07:06 ca-bundle.pem
-rw-r--r--. 1 1000610000 root  75M Jun  1 07:06 crls.pem


$ oc get co/ingress
NAME      VERSION                                                AVAILABLE   PROGRESSING   DEGRADED   SINCE   MESSAGE
ingress   4.14.0-0.test-2023-06-01-015813-ci-ln-sxdb03k-latest   True        False         False      6h5m    

@lihongan
Copy link
Contributor

lihongan commented Jun 1, 2023

/label qe-approved

@openshift-ci openshift-ci bot added the qe-approved Signifies that QE has signed off on this PR label Jun 1, 2023
@Miciah
Copy link
Contributor

Miciah commented Jun 1, 2023

/approve

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 1, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Miciah

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 1, 2023
@rfredette rfredette force-pushed the ocpbugs-9464-take2 branch from 037c417 to ee58397 Compare June 1, 2023 18:44
@rfredette
Copy link
Contributor Author

The latest force push removes the additional code for adding the trusted-ca bundle to the router pods. From testing, the only connections that should need the cluster-wide proxy are those for downloading CRLs, and the router does not support downloading CRLs via https. As such, additional code adding the trusted-ca bundle is unnecessary and will only serve to complicate backports.

@frobware
Copy link
Contributor

frobware commented Jun 1, 2023

/lgtm

@rfredette
Copy link
Contributor Author

I've pushed the orphaned commit for trusted-ca bundle support to the branch rfredette/cluster-ingress-operator:router-https-proxy, but at this time there are no plans to try to merge it.

@openshift-ci-robot
Copy link
Contributor

/retest-required

Remaining retests: 0 against base HEAD 5725691 and 2 for PR HEAD ee58397 in total

@rfredette
Copy link
Contributor Author

e2e-aws-operator appears to have passed, but must-gather failed?
/retest

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 2, 2023

@rfredette: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-robot openshift-merge-robot merged commit b2af379 into openshift:master Jun 2, 2023
@openshift-ci-robot
Copy link
Contributor

@rfredette: Jira Issue OCPBUGS-9464: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-9464 has been moved to the MODIFIED state.

In response to this:

Fix #930 by pulling cluster-wide proxy configuration from proxies.config.openshift.io/cluster rather than the operator's environment

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. px-approved Signifies that Product Support has signed off on this PR qe-approved Signifies that QE has signed off on this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants