-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Allow using serve mode with system-internal-tls #16183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Skipping CI for Draft Pull Request. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #16183 +/- ##
==========================================
- Coverage 80.05% 80.00% -0.06%
==========================================
Files 214 214
Lines 13281 13282 +1
==========================================
- Hits 10632 10626 -6
- Misses 2291 2298 +7
Partials 358 358 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
We'll likely need an e2e test for this scenario. Since this feature is expected to work with net-kourier, we can restrict the test environments to that specific Ingress controller. |
98fda9c to
99dbad5
Compare
When system-internal-tls is enabled, the KPA reconciler now checks the SystemInternalTLSAllowServeMode flag to determine whether to use serve mode or force proxy mode. This allows configurations where internal TLS is enabled but serve mode is still desired.
99dbad5 to
3099645
Compare
|
I added an e2e test verifying this functionality and verified already locally that it works (both directions). /hold until is knative/networking#1093 is merged, released and deps are updated |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi,
related PR in networking: knative/networking#1093
Proposed Changes
Release Note
Questions:
Thanks for the feedback!
/kind enhancement
/cc @Fedosin