NE-2449: add netedge tool and get_coredns_config#131
Conversation
Update Kubernetes client-go apply configurations and controller-runtime fake client. Signed-off-by: bentito <btofel@redhat.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: bentito The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Signed-off-by: bentito <btofel@redhat.com>
Signed-off-by: bentito <btofel@redhat.com>
|
@bentito: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
get_coredns_configget_coredns_config
|
@bentito: This pull request references NE-2449 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/jira-refresh |
1 similar comment
|
/jira-refresh |
| } | ||
|
|
||
| cm := &corev1.ConfigMap{} | ||
| err = cl.Get(params.Context, types.NamespacedName{Name: "dns-default", Namespace: "openshift-dns"}, cm) |
There was a problem hiding this comment.
I guess this is anyways just OCP - hence the hardcoded ns value is ok?
| "sigs.k8s.io/controller-runtime/pkg/client" | ||
| "sigs.k8s.io/controller-runtime/pkg/client/fake" | ||
| ) | ||
|
|
There was a problem hiding this comment.
Could we group the tests to use the testify/suite pattern, as mentioned on the AGENTS.md file?
e.g. like
type CoreDNSSuite struct {
suite.Suite
}and have tests registered on that CoreDNSSuite ?
|
I guess this conflicts with your "prometheus" PR (e.g. |
This PR introduces the
netedgetoolset for Network Ingress & DNS troubleshooting, starting with a specialized tool to inspect CoreDNS configuration.Changes:
pkg/toolsets/netedgeto house network edge diagnostic tools.get_coredns_config):dns-defaultConfigMap in theopenshift-dnsnamespace to extract theCorefile.controller-runtimeclient for Kubernetes interactions, setting a pattern for future tools in this set.OpenWorldHint: trueto allow broad usage in troubleshooting contexts.controller-runtime'sfakeclient to verify handler logic (ConfigMap retrieval, error handling for missing keys/resources) without requiring a live cluster.vendor/to includecontroller-runtime/pkg/client/fakeand related packages to support the new testing pattern.