Open candita opened 1 year ago
Thanks @candita! I think it would be worth differentiating between tests of our API validation and tests of the actual underlying implementation. At least so far, I've been working with the assumption that conformance tests are only intended to cover implementation details, not our CRD or webhook validation. https://github.com/kubernetes-sigs/gateway-api/issues/1514 has a bit more context on that discussion though.
I agree that for now, if one of these cases is covered by CRD validation, webhook validation, or both, we can check it off, and then come back to testing it as part of sorting out #1514.
Does this adjusted list make more sense @robscott @youngnick ?
Yep, that looks great, thanks @candita!
Suggested additions to the list of conformance tests since we've discussed disallowing mode: "terminate"
with TLSRoute:
mode: "terminate"
, attempting to set TLSRoute in AllowedRoutes.kinds would yield a ListenerConditionType Accepted
with status: false
and ListenerConditionReason InvalidRouteKinds
mode: "terminate"
, TLSRoute should not be present in ListenerStatus.SupportedKindsmode: "terminate"
should yield RouteConditionType Accepted
with status: false
and RouteConditionReason NotAllowedByListeners
on the TLSRouteThose additions look great, thanks @mikemorris.
@mikemorris
Suggested additions to the list of conformance tests since we've discussed disallowing
mode: "terminate"
with TLSRoute:
[ ] for a Listener setting
mode: "terminate"
, attempting to set TLSRoute in AllowedRoutes.kinds would yield a ListenerConditionTypeAccepted
withstatus: false
and ListenerConditionReasonInvalidRouteKinds
- [ ] this could probably be validated by webhook too
- [ ] for a Listener setting
mode: "terminate"
, TLSRoute should not be present in ListenerStatus.SupportedKinds- [ ] attempting to attach a TLSRoute to a Listener setting
mode: "terminate"
should yield RouteConditionTypeAccepted
withstatus: false
and RouteConditionReasonNotAllowedByListeners
on the TLSRoute
I added these to the description so they wouldn't get lost. Can you provide more detail about this could probably be validated by webhook too? It's just a comment, not a test, right?
Added an issue here https://github.com/kubernetes-sigs/gateway-api/issues/2153 which is a follow up for https://github.com/kubernetes-sigs/gateway-api/pull/2076
Looks relevant to include as part of the checklist here
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
/remove-lifecycle rotten
This is a blocker for #2643.
@sunjayBhatia
Added an issue here #2153 which is a follow up for #2076
Looks relevant to include as part of the checklist here
That is this one, correct?
Updating my prior comment about passthrough
and terminate
- there's not a conclusive determination yet on what the expected behavior should be for this, and we'll probably need to figure that out as part of encoding anything in conformance.
Refs Slack thread, #1474 and #2111
/cc @kate-osborn
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
/remove-lifecycle-stale
/lifecycle frozen /priority important-soon
This issue is intended to track conformance test development for TLSRoute Passthrough. Comment below if you're interested in working on covering any of these areas.
Core Capabilities:
- [ ] Invalid TLSRoute - no backendRef/rule doesn't become Ready- [ ] Invalid TLSRoute - invalid backendRef/rule doesn't become Ready (some or all from sublist?)- [ ] Missing Rule- [ ] Missing Port- [ ] Kind, if not nil, is also not Service- [ ] Multi ParentRef sections names not set- [ ] Multi ParentRef sections names not unique- [ ] SNI hostname invalid - IP address- [ ] SNI hostname invalid - not RFC1123, not wildcard prefix- [ ] More than 16 hostnames- [ ] More than 16 rules- [ ] More than 16 backendRef-[ ] Invalid TLSRoute with 1 backendRef/Rule that doesn’t exist performs no default forwarding- [ ] Name not set- [ ] Kind not set- [ ] Port missing when Kind is Service