Skip to content

Conversation

@zirain
Copy link
Member

@zirain zirain commented Oct 21, 2025

xref: #7290

@zirain zirain requested a review from a team as a code owner October 21, 2025 03:02
@codecov
Copy link

codecov bot commented Oct 21, 2025

Codecov Report

❌ Patch coverage is 89.79592% with 5 lines in your changes missing coverage. Please review.
✅ Project coverage is 72.01%. Comparing base (67f9b5d) to head (6e718d0).
⚠️ Report is 1 commits behind head on main.

Files with missing lines Patch % Lines
internal/gatewayapi/conformance/suite.go 0.00% 5 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #7291      +/-   ##
==========================================
+ Coverage   71.92%   72.01%   +0.08%     
==========================================
  Files         229      229              
  Lines       33189    33198       +9     
==========================================
+ Hits        23870    23906      +36     
+ Misses       7585     7561      -24     
+ Partials     1734     1731       -3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@zirain zirain force-pushed the fix-conformance-test branch 2 times, most recently from fcb8605 to 6c57d80 Compare October 21, 2025 07:22
@zirain zirain mentioned this pull request Oct 21, 2025
6 tasks
@arkodg arkodg added this to the v1.6.0-rc.1 Release milestone Oct 21, 2025
@zirain zirain force-pushed the fix-conformance-test branch 3 times, most recently from f9d423d to 07e2372 Compare October 22, 2025 03:15
// 3. If SubjectAltNames are specified, Hostname can be used for certificate selection
// but MUST NOT be used for authentication. If you want to use the value
// of the Hostname field for authentication, you MUST add it to the SubjectAltNames list.
if tlsConfig.SNI != nil && len(tlsConfig.SubjectAltNames) == 0 {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good to me, cc @guydc

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


protocol := inspectAppProtocolByRouteKind(routeType)

// Always processing BackendTLSPolicy if possible.
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

key changes: always processing BackendTLSPolicy


if err != nil {
status.SetTranslationErrorForPolicyAncestors(&policy.Status,
status.SetConditionForPolicyAncestors(&policy.Status,
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

key changes: set BackendTLSPolicyReasonNoValidCACertificate status

Copy link
Contributor

@arkodg arkodg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM thanks

@arkodg arkodg requested review from a team October 24, 2025 00:06
@zirain zirain enabled auto-merge (squash) October 24, 2025 01:20
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
@zirain zirain force-pushed the fix-conformance-test branch from 5c5deab to 6e718d0 Compare October 24, 2025 01:21
@zirain zirain requested a review from zhaohuabing October 24, 2025 01:26
Copy link
Member

@zhaohuabing zhaohuabing left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks!

@zirain zirain merged commit dacf790 into envoyproxy:main Oct 24, 2025
60 of 65 checks passed
@zirain zirain deleted the fix-conformance-test branch October 24, 2025 03:22
protocol := inspectAppProtocolByRouteKind(routeType)

// Process BackendTLSPolicy first to ensure status is set.
tls, tlsErr := t.applyBackendTLSSetting(
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for making this change so that BackendTLSPolicyObservedGenerationBump passes.

@kkk777-7
Copy link
Member

LGTM, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants