-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Show DNS Resolver in NNS #867
Conversation
Signed-off-by: Radim Hrazdil <[email protected]>
Context("With DNS Resolver populated", func() { | ||
BeforeEach(func() { | ||
state = nmstate.NewState(`interfaces: | ||
- name: eth1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
could we use the firstSecondaryNic
variable here instead of using eth1
directly? Because the e2e tests in OCP use another NIC name for the first secondary (from FIRST_SECONDARY_NIC
env var)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey, this is just a unit test and the names don't really matter
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah sorry. My fault
So this was introduced at #709, maybe we don't need that anymore. |
/retest Something is fishy at CI maybe it's time to use podman.
|
Thanks for adding this fix. Checked it in my env - looks OK. It is worth mentioning that (at least based on what I get in my env) , it seems that nns.dnsresolver equals to /var/run/NetworkManager/resolv.conf and not /etc/resolv.conf |
/lgtm |
That depends on the NetworkManager configuration, you can configure if you want it to manage /etc/resolv.conf or not, for example at OCP we have NetworkManager not manager /etc/resolv.conf but at the same time we have the prepend dispatcher script. From an kubernetes-nmstate perspectives safest is to just check NNS. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: qinqon The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Signed-off-by: Radim Hrazdil [email protected]
Is this a BUG FIX or a FEATURE ?:
What this PR does / why we need it:
DNS Resolver is not included in NodeNetworkState, adding types to marshal/unmarshal
DNS data and include it in the NNS as well.
Special notes for your reviewer:
Release note: