-
Notifications
You must be signed in to change notification settings - Fork 578
enable supported conformance test #7291
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #7291 +/- ##
==========================================
+ Coverage 71.92% 72.01% +0.08%
==========================================
Files 229 229
Lines 33189 33198 +9
==========================================
+ Hits 23870 23906 +36
+ Misses 7585 7561 -24
+ Partials 1734 1731 -3 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
fcb8605 to
6c57d80
Compare
f9d423d to
07e2372
Compare
| // 3. If SubjectAltNames are specified, Hostname can be used for certificate selection | ||
| // but MUST NOT be used for authentication. If you want to use the value | ||
| // of the Hostname field for authentication, you MUST add it to the SubjectAltNames list. | ||
| if tlsConfig.SNI != nil && len(tlsConfig.SubjectAltNames) == 0 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good to me, cc @guydc
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
45c82ff to
0e77c7a
Compare
internal/gatewayapi/route.go
Outdated
|
|
||
| protocol := inspectAppProtocolByRouteKind(routeType) | ||
|
|
||
| // Always processing BackendTLSPolicy if possible. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
key changes: always processing BackendTLSPolicy
|
|
||
| if err != nil { | ||
| status.SetTranslationErrorForPolicyAncestors(&policy.Status, | ||
| status.SetConditionForPolicyAncestors(&policy.Status, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
key changes: set BackendTLSPolicyReasonNoValidCACertificate status
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM thanks
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
Signed-off-by: zirain <[email protected]>
5c5deab to
6e718d0
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Thanks!
| protocol := inspectAppProtocolByRouteKind(routeType) | ||
|
|
||
| // Process BackendTLSPolicy first to ensure status is set. | ||
| tls, tlsErr := t.applyBackendTLSSetting( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for making this change so that BackendTLSPolicyObservedGenerationBump passes.
|
LGTM, thanks! |
xref: #7290