Closed inge4pres closed 2 months ago
@inge4pres: This issue is currently awaiting triage.
If Ingress contributors determines this is a relevant issue, they will accept it by applying the triage/accepted
label and provide further guidance.
The triage/accepted
label can be added by org members by writing /triage accepted
in a comment.
Lets wait for other comments, but I would think that configMap is not part of the ingress api so would the admissionWebhook validate configmaps. Or is it expected to. And usually faulty values yaml changes are addressed with a helm upgrade
execution with the corrected values.yaml (my opinion)
/remove-kind bug
good day @longwuyuan 😄 thanks for the reply, I had a similar memory of the webhook not working on the configMap, but I was suggested in Slack to raise an issue anyway 🤷🏼 it would be nice though if those changes could be intercepted by the webhook as well: I think it would be possible in theory to extend the webhook to check also a specific configMap?
hello @inge4pres , the project has become difficult to maintain because developers are not available to support all the features. There was a announcement 2 weeks ago to freeze-feature development and focus on stabilization and bug fixing. So this feature can be looked at after 6 months. Sorry since its not expected result but there is a survey out to ask what users want and expect. You can respond to that as feedback so maintainers will get the message.
/kind feature
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
/remove-lifecycle stale
/remove-lifecycle-stale
I still think this is an important enhancement for operating ingress-nginx, especially when iterating over global configs.
hi @inge4pres , the volume of changes to the controller since November 2022 is too high to consider this issue at its face value.
Due to the security landscape now and the intention to move towards implementing the Gateway API, a undesired config test needs to be posted here with precise live real example data like the config yaml , the command used to insert it to the object , the logs the results etc etc. This has to be posted here with a test on the recent supported release of the controller.
I will close this issue for now just because its adding to the open issues tally without any trackable data. Please feel free to re-open the issue after you have posted data as I suggested in this post. Thanks
/close
@longwuyuan: Closing this issue.
What happened: Sending a
patch
with a faulty configuration in theingress-nginx-controller
configMap resulted in a Deployment being upgraded, despite the[emerg]
message from the tested config.What you expected to happen: The patch request should've been stopped by
ValidatingAdmissionWebhook
.NGINX Ingress controller version (exec into the pod and run nginx-ingress-controller --version.):
Kubernetes version (use
kubectl version
):Environment:
Cloud provider or hardware configuration: AWS / EKS
OS (e.g. from /etc/os-release): Amazon Linux 2
Kernel (e.g.
uname -a
): 5.4.117-58.216.amzn2.x86_64Install tools:
How was the ingress-nginx-controller installed: -
ingress-nginx ingress 31 2022-07-11 18:18:47.349848726 +0200 CEST deployed ingress-nginx-4.1.4 1.2.1
Current State of the controller:
kubectl describe ingressclasses
All services and Pods are OK after a rollback to a sane configuration.
How to reproduce this issue:
ingress-nginx-controller
configMap with the customhttp-snippet
above, setting the same map key with 2 different values (this can happen when the list of keys is long, and its invalid innginx.conf
)patch
op, and the configmap-reloader try to reload the faulty configrollout restart deploy ingress-nginx-controller
in the namespace where the ingress is deployedCrashLoopBackoff
state, because the configuration is invalidAnything else we need to know: The validating admission webhook is deployed, works perfectly and does its job when passing in a similar faulty configuration in a
networking.k8s.io/ingress
resource, but it doesn't when the configMap has it.I asked about the support for testing configMap changes in the Kubernetes Slack