-
Notifications
You must be signed in to change notification settings - Fork 880
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: istio destionationrule subsets enforcement #3126
fix: istio destionationrule subsets enforcement #3126
Conversation
Signed-off-by: Dennis Nguyen <[email protected]>
c354708
to
23706d6
Compare
Signed-off-by: Dennis Nguyen <[email protected]>
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## master #3126 +/- ##
==========================================
+ Coverage 81.85% 81.86% +0.01%
==========================================
Files 134 134
Lines 20556 20568 +12
==========================================
+ Hits 16826 16839 +13
+ Misses 2866 2865 -1
Partials 864 864
☔ View full report in Codecov by Sentry. |
…nforcement Signed-off-by: Dennis Nguyen <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me overall. @zachaller Could you please take a look as well?
@dnguy078 Could you please also add some tests for the failure cases?
return nil, false, err | ||
} | ||
|
||
if host != "" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it possible to have an empty host? We should check if Istio allows it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks like the host is required for Istio DestinationRule. We can do this check on the DestinationRule if included in .spec.strategy.canary.trafficRouting.istio.destinationRule
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ah that check already exist :)
if r.rollout.Spec.Strategy.Canary.TrafficRouting.Istio.DestinationRule != nil { |
Thank you for the review @agrawroh ! |
Signed-off-by: Dennis Nguyen <[email protected]>
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
* istio destionationrule subsets enforcement Signed-off-by: Dennis Nguyen <[email protected]> * add users Signed-off-by: Dennis Nguyen <[email protected]> * add test case for failure cases Signed-off-by: Dennis Nguyen <[email protected]> --------- Signed-off-by: Dennis Nguyen <[email protected]>
@agrawroh thanks for the review, I also picked this back to v1.6.1 which I am releasing now |
@dnguy078 This might have caused this: https://cloud-native.slack.com/archives/C01U781DW2E/p1698875164861259 you mind taking a peak? |
Here is the issue: #3141 |
I'll take a look @zachaller |
This reverts commit 04e1119. Signed-off-by: zachaller <[email protected]>
…#3147) Revert "fix: istio destionationrule subsets enforcement (#3126)" This reverts commit 04e1119. Signed-off-by: zachaller <[email protected]>
…#3147) Revert "fix: istio destionationrule subsets enforcement (#3126)" This reverts commit 04e1119. Signed-off-by: zachaller <[email protected]>
…rgoproj#3126)" (argoproj#3147)" This reverts commit 0593d92.
…rgoproj#3126)" (argoproj#3147)" This reverts commit 0593d92. Signed-off-by: Dennis Nguyen <[email protected]>
Checklist:
Relates to issue in #3125
"fix(controller): Updates such and such. Fixes #1234"
.