-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Perform full validation of IngressRoute resources to protect from missing CRD validation #513
Comments
Would this need to be implemented as an admission controller or are you thinking that we perform the validation when Contour sees the object change and update the status then? |
Updates projectcontour#513 Add a logger to the KubernetesCache. This is useful at the moment to spot failures to promulgate the projectcontour.HTTPLoadbalancer objects through Contour. This will also be useful to log cert validation failures, see projectcontour#513. Signed-off-by: Dave Cheney <[email protected]>
Updates projectcontour#513 Add a logger to the KubernetesCache. This is useful at the moment to spot failures to promulgate the projectcontour.HTTPLoadbalancer objects through Contour. This will also be useful to log cert validation failures, see projectcontour#513. Signed-off-by: Dave Cheney <[email protected]>
Updates projectcontour#513 Add a logger to the KubernetesCache. This is useful at the moment to spot failures to promulgate the projectcontour.HTTPLoadbalancer objects through Contour. This will also be useful to log cert validation failures, see projectcontour#513. Signed-off-by: Dave Cheney <[email protected]>
Updates #513 Add a logger to the KubernetesCache. This is useful at the moment to spot failures to promulgate the projectcontour.HTTPLoadbalancer objects through Contour. This will also be useful to log cert validation failures, see #513. Signed-off-by: Dave Cheney <[email protected]>
Updates projectcontour#513 Add a logger to the KubernetesCache. This is useful at the moment to spot failures to promulgate the projectcontour.HTTPLoadbalancer objects through Contour. This will also be useful to log cert validation failures, see projectcontour#513. Signed-off-by: Dave Cheney <[email protected]>
Updates #513 Add a logger to the KubernetesCache. This is useful at the moment to spot failures to promulgate the projectcontour.HTTPLoadbalancer objects through Contour. This will also be useful to log cert validation failures, see #513. Signed-off-by: Dave Cheney <[email protected]>
A wrong ingressroute or httpproxy configuration can pause further processing of ingressroute/httpproxy by contour controller. Example: ---
apiVersion: contour.heptio.com/v1beta1
kind: IngressRoute
metadata:
name: health-check-boom
namespace: default
spec:
- routes: # wrongly configured routes
- match: /
services:
- name: s1-health
port: 80
virtualhost:
fqdn: health.bar.com Once you apply this config you would see contour logging error (reflector.go: 98). recently the entire validation is removed from crd. A min validation is needed. validation:
openAPIV3Schema:
type: object
properties:
spec:
type: object please prioritise this issue |
@sudeeptoroy I'm sorry you got bitten by this. The good news is this is fixed in #1731 which will be available in Contour 1.0.0-rc.2 at the end of the week. I'm going to mark this issue as closed as I didn't realise this old issue was a duplicate. |
Signed-off-by: Steve Kriss <[email protected]>
We rely on the API server to perform validation of IngressRoute resources via the CRD validation implemented in #441
This validation is encoded in the CRD's deployment manifest, but it is possible for a user to deploy the CRD without it.
The text was updated successfully, but these errors were encountered: