OCPBUGS-31666: route: Fix insecureEdgeTerminationPolicy default#1845
Conversation
|
@Miciah: This pull request references Jira Issue OCPBUGS-31666, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
Hello @Miciah! Some important instructions when contributing to openshift/api: |
|
@Miciah: This pull request references Jira Issue OCPBUGS-31666, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
1c23023 to
8a46cb2
Compare
|
/lgtm |
|
It was strange after this change, the output looked as same as before
% oc get clusterversion
FIELD: insecureEdgeTerminationPolicy DESCRIPTION: % |
I'm taking this to mean that the default isn't changing, we're just fixing the doc. If I understand correctly, please release the hold at your discretion. /approve |
That is correct. Thanks! /hold cancel |
Fix the godoc for the spec.tls.insecureEdgeTerminationPolicy field
to say that "None", not "Allow", is the default value.
Also, add a more explicit statement about the default value.
Finally, fix the formatting so that the list displays properly in the
output of oc explain. Before, the output looked like this:
% oc explain routes.spec.tls.insecureEdgeTerminationPolicy
KIND: Route
VERSION: route.openshift.io/v1
FIELD: insecureEdgeTerminationPolicy <string>
DESCRIPTION:
insecureEdgeTerminationPolicy indicates the desired behavior for insecure
connections to a route. While each router may make its own decisions on
which ports to expose, this is normally port 80.
* Allow - traffic is sent to the server on the insecure port
(edge/reencrypt terminations only) (default). * None - no traffic is
allowed on the insecure port. * Redirect - clients are redirected to the
secure port.
After this commit, the output looks like this:
% oc explain routes.spec.tls.insecureEdgeTerminationPolicy
KIND: Route
VERSION: route.openshift.io/v1
FIELD: insecureEdgeTerminationPolicy <string>
DESCRIPTION:
insecureEdgeTerminationPolicy indicates the desired behavior for insecure
connections to a route. While each router may make its own decisions on
which ports to expose, this is normally port 80. If a route does not
specify insecureEdgeTerminationPolicy, then the default behavior is "None".
* Allow - traffic is sent to the server on the insecure port
(edge/reencrypt terminations only).
* None - no traffic is allowed on the insecure port (default).
* Redirect - clients are redirected to the secure port.
This commit fixes OCPBUGS-31666.
https://issues.redhat.com/browse/OCPBUGS-31666
* route/v1/types.go: Update.
* openapi/generated_openapi/zz_generated.openapi.go:
* openapi/openapi.json:
* route/v1/generated.proto:
* route/v1/zz_generated.crd-manifests/routes-CustomNoUpgrade.crd.yaml:
* route/v1/zz_generated.crd-manifests/routes-Default.crd.yaml:
* route/v1/zz_generated.crd-manifests/routes-DevPreviewNoUpgrade.crd.yaml:
* route/v1/zz_generated.crd-manifests/routes-TechPreviewNoUpgrade.crd.yaml:
* route/v1/zz_generated.featuregated-crd-manifests/routes.route.openshift.io/AAA_ungated.yaml:
* route/v1/zz_generated.featuregated-crd-manifests/routes.route.openshift.io/ExternalRouteCertificate.yaml:
* route/v1/zz_generated.swagger_doc_generated.go: Regenerate.
8a46cb2 to
b9885cc
Compare
|
https://github.com/openshift/api/compare/8a46cb2399761db925d8987c308b344423c09df6..b9885cc0c986b493f6ea5f4b6fc2583fe7182cd1 rebases and updates |
|
@frobware, would you mind retagging the PR? |
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: deads2k, frobware, Miciah The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@Miciah: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@Miciah: Jira Issue OCPBUGS-31666: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-31666 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[ART PR BUILD NOTIFIER] This PR has been included in build ose-cluster-config-api-container-v4.16.0-202404250649.p0.g8203151.assembly.stream.el9 for distgit ose-cluster-config-api. |
|
openshift/openshift-apiserver#433 bumps openshift/api in openshift-apiserver in order to incorporate the API godoc update from this PR. |
|
Fix included in accepted release 4.16.0-0.nightly-2024-05-08-222442 |
Fix the godoc for the
spec.tls.insecureEdgeTerminationPolicyfield to say that "None", not "Allow", is the default value.Also, add a more explicit statement about the default value.
Finally, fix the formatting so that the list displays properly in the output of oc explain. Before, the output looked like this:
After this change, the output looks like this: