-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Combine backend map files to fix path based routing #18840
Combine backend map files to fix path based routing #18840
Conversation
@knobunc PTAL |
/retest |
/test extended_networking_minimal |
/retest |
/test gcp |
/test extended_networking_minimal |
/test extended_conformance_install |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@JacobTanenbaum the cleanup looks great, thx. Just a minor nit/comment re: the inconsistency of the names and an extra comma.
images/router/haproxy/Dockerfile
Outdated
@@ -11,7 +11,7 @@ RUN INSTALL_PKGS="haproxy18" && \ | |||
yum clean all && \ | |||
mkdir -p /var/lib/haproxy/router/{certs,cacerts} && \ | |||
mkdir -p /var/lib/haproxy/{conf,run,bin,log} && \ | |||
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_http_be,os_tcp_be,os_sni_passthrough,os_reencrypt,os_route_http_expose,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \ | |||
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remove extra comma: os_tcp_be,os_sni_passthrough,,os_route_http_redirect
# Note: If no match, haproxy uses the default_backend, no other | ||
# use_backend directives below this will be processed. | ||
use_backend be_http:%[base,map_reg(/var/lib/haproxy/conf/os_http_be.map)] | ||
use_backend %[base,map_reg(/var/lib/haproxy/conf/os_http_be.map)] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Any reason why you only added be_http:
and be_edge_http:
to the map backend entry value and not for the redirect and tcp maps? It makes it inconsistent.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left out the redirects because that is a specific operation that does not link to a use_backend statement. It is determining to allow redirect based on if there is an entry in the map.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No worries - I was just asking. I've made the change in my branch to make it consistent as part of the dynamic config changes anyway so its cool.
3d1349b
to
2f42e0d
Compare
/test cmd |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@@ -11,7 +11,7 @@ RUN INSTALL_PKGS="haproxy18" && \ | |||
yum clean all && \ | |||
mkdir -p /var/lib/haproxy/router/{certs,cacerts} && \ | |||
mkdir -p /var/lib/haproxy/{conf,run,bin,log} && \ | |||
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_http_be,os_tcp_be,os_sni_passthrough,os_reencrypt,os_route_http_expose,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \ | |||
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ooh, I was just merging in these changes into my branch and I noticed the map is still called os_edge_http_be
and not os_edge_reencrypt_be
and it is still being referenced as "os_edge_http_be" in the use backend directives. So this PR needs changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is now done, but github hasn't noticed.
combined the two maps for insecure routes os_edge_http_be.map and os_route_http_expose.map and the two maps for secure routes os_reencrypt.map and os_edge_http_be.map reducing the number of map files and fixing path based routing Bug 1534816
2f42e0d
to
8d5346e
Compare
/test gcp |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: JacobTanenbaum, rajatchopra The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Please add an e2e test that validates path based routing (if it really was
broken) in the extended suite.
…On Mon, Mar 19, 2018 at 5:06 PM, OpenShift CI Robot < ***@***.***> wrote:
[APPROVALNOTIFIER] This PR is *APPROVED*
This pull-request has been approved by: *JacobTanenbaum
<#18840#>*, *rajatchopra
<#18840 (comment)>*
The full list of commands accepted by this bot can be found here
<https://go.k8s.io/bot-commands>.
The pull request process is described here
<https://git.k8s.io/community/contributors/guide/owners.md#the-code-review-process>
Needs approval from an approver in each of these files:
- images/router/OWNERS
<https://github.com/openshift/origin/blob/master/images/router/OWNERS>
[rajatchopra]
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
—
You are receiving this because your review was requested.
Reply to this email directly, view it on GitHub
<#18840 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABG_p4UVDHvDsAeqHMhhj5A1fkfRYfP9ks5tgB3bgaJpZM4ScxSI>
.
|
Doesn't have to be part of this PR
On Mon, Mar 19, 2018 at 11:08 PM, Clayton Coleman <[email protected]>
wrote:
… Please add an e2e test that validates path based routing (if it really was
broken) in the extended suite.
On Mon, Mar 19, 2018 at 5:06 PM, OpenShift CI Robot <
***@***.***> wrote:
> [APPROVALNOTIFIER] This PR is *APPROVED*
>
> This pull-request has been approved by: *JacobTanenbaum
> <#18840#>*, *rajatchopra
> <#18840 (comment)>*
>
> The full list of commands accepted by this bot can be found here
> <https://go.k8s.io/bot-commands>.
>
> The pull request process is described here
> <https://git.k8s.io/community/contributors/guide/owners.md#the-code-review-process>
> Needs approval from an approver in each of these files:
>
> - images/router/OWNERS
> <https://github.com/openshift/origin/blob/master/images/router/OWNERS>
> [rajatchopra]
>
> Approvers can indicate their approval by writing /approve in a comment
> Approvers can cancel approval by writing /approve cancel in a comment
>
> —
> You are receiving this because your review was requested.
> Reply to this email directly, view it on GitHub
> <#18840 (comment)>,
> or mute the thread
> <https://github.com/notifications/unsubscribe-auth/ABG_p4UVDHvDsAeqHMhhj5A1fkfRYfP9ks5tgB3bgaJpZM4ScxSI>
> .
>
|
/test gcp |
/retest |
/refresh |
/test end_to_end |
combined the two maps for insecure routes os_edge_http_be.map and os_route_http_expose.map and the two maps for secure routes os_edge_reencrypt.map and os_edge_http_be.map reducing the number of map files and fixing path based routing
Bug 1534816