-
Notifications
You must be signed in to change notification settings - Fork 150
Bug 1824934: Fix console oauthEndpointCAFile setting #403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 1824934: Fix console oauthEndpointCAFile setting #403
Conversation
Configure the console to use the default-ingress-cert configmap if the configmap exists, or else to use the default CA if the configmap is absent. Before this commit, the operator did exactly the reverse. Fix a comment that falsely stated that the configmap would be absent if the administrator provided a default certificate for every ingress controller. Follow-up to commit 489dfd0. * pkg/console/operator/sync_v400.go: Invert the value of useDefaultCAFile. Fix a comment.
|
Thanks @Miciah. Seeing a test error that looks related. |
benjaminapetersen
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
/lgtm
But looking into the e2e failures. something funny.
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: benjaminapetersen, Miciah The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
1 similar comment
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
I have been performing some manual testing: Sometimes the test succeeds in about 30 to 90 seconds, sometimes it hangs for several minutes and eventually fails. When it hangs, I can see the failing status condition: But curling the route works: Could the status update code be failing to update? |
|
I've been running the tests locally as well, they appear to be working for me. Very curious. |
|
It may be that we just need to increase the timeout a bit. I've ran these a number of times and only hit a fail once. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
I only did a small number of tests on my test cluster. I saw two successes and two failures. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
1 similar comment
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
We will keep an eye on this, perhaps our timeout needs to increase... but will look to see if there is anything else wrong. |
|
/cherry-pick release-4.4 I think we need to backport this. |
|
@benjaminapetersen: new pull request created: #407 DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@Miciah: All pull requests linked via external trackers have merged: . Bugzilla bug 1824934 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/bugzilla assign-qa |
|
@benjaminapetersen: All pull requests linked via external trackers have merged: . Bugzilla bug 1824934 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Configure the console to use the
default-ingress-certconfigmap if the configmap exists, or else to use the default CA if the configmap is absent. Before this commit, the operator did exactly the reverse.Fix a comment that falsely stated that the configmap would be absent if the administrator provided a default certificate for every ingress controller.
Follow-up to #361.
pkg/console/operator/sync_v400.go: Invert the value ofuseDefaultCAFile. Fix a comment.@jhadvig