Skip to content

Run downstream test with net-istio & mTLS#1085

Merged
openshift-merge-robot merged 14 commits intoopenshift-knative:mainfrom
nak3:add-net-istio-downstream
Jul 29, 2021
Merged

Run downstream test with net-istio & mTLS#1085
openshift-merge-robot merged 14 commits intoopenshift-knative:mainfrom
nak3:add-net-istio-downstream

Conversation

@nak3
Copy link
Contributor

@nak3 nak3 commented Jul 3, 2021

This patch adds test-e2e-with-mesh for downstream test with net-istio&mTLS.

servinge2e tests excludes the following tests for net-istio&mTLS:

  • servicemesh_test.go ... test for kourier&istio
  • service_to_service_test.go ... test for kourier&istio
  • verify_http_and_https_test.go ... test for OpenShift Route's TLS. net-istio&mTLS does not use Route's TLS.
  • custom_route_test.go ... test for OpenShift Route's escape hatch. Istio's Gateway is flexible and we don't need to support it for istio.
  • verify_route_conflict_test.go ... needs to add extra namespace conflict-test and test to SMMR.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 3, 2021

@nak3: GitHub didn't allow me to request PR reviews from the following users: nak3.

Note that only openshift-knative members and repo collaborators can review this PR, and authors cannot review their own PRs.

Details

In response to this:

/cc

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

trafficControl:
inbound:
excludedPorts:
- 15020
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add port 8444 here for metrics to work?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you @skonto I added 8444.
By the way, do you have an idea how to stop alert error - alerts.json.
We need to set metrics.backend-destination to "none" like #1014 ?

Copy link
Collaborator

@skonto skonto Jul 26, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nope we should have the backend as is. The workaround that exposes the port should make things work.

@nak3 nak3 changed the title wip - Run downstream test with net-istio & mTLS Run downstream test with net-istio & mTLS Jul 14, 2021
@nak3
Copy link
Contributor Author

nak3 commented Jul 14, 2021

/hold

@markusthoemmes @skonto @mgencur This is ready for review. Could you please take a look?

@skonto
Copy link
Collaborator

skonto commented Jul 26, 2021

As long as we dont lose coverage down some code path we are fine. I tested the setup locally.

/lgtm

Copy link
Contributor

@markusthoemmes markusthoemmes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM on the surface. Have we verified that the "normal" test targets are not affected by the pkg move?

@@ -0,0 +1,14 @@
apiVersion: networking.k8s.io/v1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we ship this together with Knative Serving maybe? Or are we going to document that users have to apply this manually?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think that it should be alright to ship it with Knative Serving (When istio ingress class is enabled, the networkpolicy is applied.).
@skonto are you alright? I think we need to update the doc https://docs.openshift.com/container-platform/4.6/serverless/serverless-release-notes.html#serverless-rn-1-16-0_serverless-release-notes as well.

replicas: 2
config:
observability:
metrics.backend-destination: "none"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

YAY!

@openshift-ci openshift-ci bot removed the lgtm label Jul 27, 2021
kind: NetworkPolicy
metadata:
name: allow-from-openshift-monitoring-ns
namespace: knative-serving
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This lacks the provider label, so it'll be applied even with kourier, which we don't want.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you! Updated.

nak3 added 2 commits July 28, 2021 09:21
This is a test so I am running both patterns.

- test-upstream-e2e-no-upgrade -> test-e2e-with-mesh
- test-e2e-with-kafka -> test-upstream-e2e-no-upgrade
@nak3
Copy link
Contributor Author

nak3 commented Jul 28, 2021

Downstream test -> Upstream test passes - log
Upstream test -> Downstream test fails due to subscription already exist - log.

I will clean up the Makefile to run the mesh CI with Downstream test -> Upstream test order.

@nak3
Copy link
Contributor Author

nak3 commented Jul 28, 2021

/test 4.7-upstream-e2e-mesh-aws-ocp-47

@skonto
Copy link
Collaborator

skonto commented Jul 28, 2021

=== RUN   TestKafkaUserPermissions/edit_user
    user_permissions.go:51: Unexpected error creating bindings.knative.dev/v1beta1, Resource=kafkabindings, allowed = true, err = object is being deleted: kafkabindings.bindings.knative.dev "test-kafkabindings" already exists
    --- FAIL: TestKafkaUserPermissions/edit_user (0.10s)

@nak3
Copy link
Contributor Author

nak3 commented Jul 28, 2021

/retest

Hmm... the error should not be related to this PR.
I opened #1123

@nak3
Copy link
Contributor Author

nak3 commented Jul 29, 2021

/hold cancel
@markusthoemmes I think this is ready to merge now.

Copy link
Contributor

@markusthoemmes markusthoemmes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/assign @maschmid

LGTM! Want to give Marek the right of the last word.

@markusthoemmes
Copy link
Contributor

/lgtm

@maschmid
Copy link
Contributor

/lgtm

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 29, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: markusthoemmes, maschmid, nak3, skonto

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-robot openshift-merge-robot merged commit 4d7a869 into openshift-knative:main Jul 29, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants