Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Combine backend map files to fix path based routing #18840

Merged
merged 1 commit into from
Mar 28, 2018

Conversation

JacobTanenbaum
Copy link
Contributor

combined the two maps for insecure routes os_edge_http_be.map and os_route_http_expose.map and the two maps for secure routes os_edge_reencrypt.map and os_edge_http_be.map reducing the number of map files and fixing path based routing

Bug 1534816

@openshift-ci-robot openshift-ci-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Mar 5, 2018
@JacobTanenbaum
Copy link
Contributor Author

@knobunc PTAL

@imcsk8
Copy link
Contributor

imcsk8 commented Mar 5, 2018

/retest

@JacobTanenbaum
Copy link
Contributor Author

/test extended_networking_minimal

@pravisankar pravisankar changed the title Combine backend map files to fix bath based routing Combine backend map files to fix path based routing Mar 5, 2018
@JacobTanenbaum
Copy link
Contributor Author

/retest

@knobunc knobunc self-assigned this Mar 7, 2018
@knobunc knobunc requested review from ramr and rajatchopra and removed request for smarterclayton March 7, 2018 19:53
@JacobTanenbaum
Copy link
Contributor Author

/test gcp

@JacobTanenbaum
Copy link
Contributor Author

/test extended_networking_minimal

@JacobTanenbaum
Copy link
Contributor Author

/test extended_conformance_install

Copy link
Contributor

@ramr ramr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@JacobTanenbaum the cleanup looks great, thx. Just a minor nit/comment re: the inconsistency of the names and an extra comma.

@@ -11,7 +11,7 @@ RUN INSTALL_PKGS="haproxy18" && \
yum clean all && \
mkdir -p /var/lib/haproxy/router/{certs,cacerts} && \
mkdir -p /var/lib/haproxy/{conf,run,bin,log} && \
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_http_be,os_tcp_be,os_sni_passthrough,os_reencrypt,os_route_http_expose,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remove extra comma: os_tcp_be,os_sni_passthrough,,os_route_http_redirect

# Note: If no match, haproxy uses the default_backend, no other
# use_backend directives below this will be processed.
use_backend be_http:%[base,map_reg(/var/lib/haproxy/conf/os_http_be.map)]
use_backend %[base,map_reg(/var/lib/haproxy/conf/os_http_be.map)]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any reason why you only added be_http: and be_edge_http: to the map backend entry value and not for the redirect and tcp maps? It makes it inconsistent.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I left out the redirects because that is a specific operation that does not link to a use_backend statement. It is determining to allow redirect based on if there is an entry in the map.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No worries - I was just asking. I've made the change in my branch to make it consistent as part of the dynamic config changes anyway so its cool.

@JacobTanenbaum
Copy link
Contributor Author

/test cmd

Copy link
Contributor

@ramr ramr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@@ -11,7 +11,7 @@ RUN INSTALL_PKGS="haproxy18" && \
yum clean all && \
mkdir -p /var/lib/haproxy/router/{certs,cacerts} && \
mkdir -p /var/lib/haproxy/{conf,run,bin,log} && \
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_http_be,os_tcp_be,os_sni_passthrough,os_reencrypt,os_route_http_expose,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ooh, I was just merging in these changes into my branch and I noticed the map is still called os_edge_http_be and not os_edge_reencrypt_be and it is still being referenced as "os_edge_http_be" in the use backend directives. So this PR needs changes.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is now done, but github hasn't noticed.

combined the two maps for insecure routes os_edge_http_be.map and os_route_http_expose.map and the two maps for secure routes os_reencrypt.map and os_edge_http_be.map  reducing the number of map files and fixing path based routing

Bug 1534816
@JacobTanenbaum
Copy link
Contributor Author

/test gcp

Copy link

@pravisankar pravisankar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@rajatchopra
Copy link
Contributor

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Mar 19, 2018
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: JacobTanenbaum, rajatchopra

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 19, 2018
Copy link
Contributor

@ramr ramr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@smarterclayton
Copy link
Contributor

smarterclayton commented Mar 20, 2018 via email

@smarterclayton
Copy link
Contributor

smarterclayton commented Mar 20, 2018 via email

@dcbw
Copy link
Contributor

dcbw commented Mar 20, 2018

/test gcp

@knobunc
Copy link
Contributor

knobunc commented Mar 26, 2018

/retest

@0xmichalis
Copy link
Contributor

/refresh

@0xmichalis
Copy link
Contributor

/test end_to_end

@openshift-merge-robot openshift-merge-robot merged commit 3f52063 into openshift:master Mar 28, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. component/routing lgtm Indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.