-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix privateendpoints panic and diff #4014
fix privateendpoints panic and diff #4014
Conversation
/cherry-pick release-1.11 |
@nojnhuh: once the present PR merges, I will cherry-pick it on top of release-1.11 in a new PR and assign it to you. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## main #4014 +/- ##
==========================================
- Coverage 56.59% 56.57% -0.02%
==========================================
Files 187 187
Lines 19124 19126 +2
==========================================
- Hits 10823 10821 -2
- Misses 7671 7674 +3
- Partials 630 631 +1
☔ View full report in Codecov by Sentry. |
🚀 |
LGTM label has been added. Git tree hash: 5d2a78c6b486b03bd3dce4e2a3d83f2c9de823a6
|
Just curious, could we add a guardrail to this scenario via e2e tests? |
I suppose we could add at least one private endpoint somewhere in the e2e templates, but I'm not exactly sure where that would fit best or what we could really have it link to. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/test pull-cluster-api-provider-azure-e2e-optional
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
/hold in case we want to contemplate adding an e2e test
if not an e2e test, is there a specific unit test that could validate the scenarios described in the PR description?
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: CecileRobertMichon The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I already updated the unit tests to account for the first 3 issues I listed above. Just pushed a change to cover the fourth. |
70f7456
to
8e3bcea
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/hold cancel
/lgtm
LGTM label has been added. Git tree hash: 1c4cfea85a68cb48e3f743b6ad81aeef4f8da9bc
|
@nojnhuh: new pull request created: #4015 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What type of PR is this?
/kind bug
What this PR does / why we need it:
This PR fixes four neighboring issues with how private endpoints are constructed:
properties.subnet.properties
when GET-ing an existing private endpoints resource, which was assumed to be populated and would cause CAPZ to panic (Creating a cluster with a privateLink (ACR) will lead capz-controller-manager to crash loop on AzureCluster reconcile #4013)properties.customNetworkInterfaceName
as the non-nil empty string""
in GETs after passingnil
in an initial PUT. This was causing theParameters
method to always log a diff (but not reconcile forever sinceCreateOrUpdateAsync
was finishing more-or-less immediately and successfully).properties.ipConfigurations
as the non-nil empty array[]
in GETs when created asnil
, causing the same issue as 2.properties.applicationSecurityGroups
when created as the non-nil empty array[]
.Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #4013
Special notes for your reviewer:
/cherry-pick release-1.11
TODOs:
Release note: