Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Automated] Update net-istio nightly #14706

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
10 changes: 5 additions & 5 deletions .github/workflows/kind-e2e.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ jobs:
- kourier
- kourier-tls
- istio
- istio-tls
# - istio-tls
# Disabled due to flakiness: https://github.com/knative/serving/issues/14637
# - istio-ambient
- contour
Expand All @@ -119,10 +119,10 @@ jobs:
- ingress: istio
namespace-resources: virtualservices

- ingress: istio-tls
ingress-class: istio
namespace-resources: virtualservices
enable-tls: 1
# - ingress: istio-tls
# ingress-class: istio
# namespace-resources: virtualservices
# enable-tls: 1

# Disabled due to flakiness: https://github.com/knative/serving/issues/14637
# - ingress: istio-ambient
Expand Down
5 changes: 2 additions & 3 deletions test/e2e/systeminternaltls/system_internal_tls_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -44,9 +44,8 @@ func TestSystemInternalTLS(t *testing.T) {
t.Skip("Alpha features not enabled")
}

if !(strings.Contains(test.ServingFlags.IngressClass, "kourier") ||
strings.Contains(test.ServingFlags.IngressClass, "istio")) {
t.Skip("Skip this test for non-kourier or non-istio ingress.")
if !strings.Contains(test.ServingFlags.IngressClass, "kourier") {
t.Skip("Skip this test for non-kourier ingress.")
}

t.Parallel()
Expand Down
52 changes: 29 additions & 23 deletions third_party/istio-latest/net-istio.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Generated when HEAD was ca1607073bf133f274a8a15b3c6bb640c8931fdb
# Generated when HEAD was 04509ce7e3e23875f97abfcf82c95038e0ec8df4
#
# Copyright 2019 The Knative Authors
#
Expand All @@ -22,7 +22,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
serving.knative.dev/controller: "true"
networking.knative.dev/ingress-provider: istio
rules:
Expand Down Expand Up @@ -54,7 +54,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
selector:
Expand Down Expand Up @@ -93,7 +93,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
selector:
Expand All @@ -114,7 +114,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
experimental.istio.io/disable-gateway-port-translation: "true"
spec:
Expand Down Expand Up @@ -149,7 +149,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
data:
# TODO(nghia): Extract the .svc.cluster.local suffix into its own config.
Expand Down Expand Up @@ -203,7 +203,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
selector:
Expand All @@ -221,7 +221,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
selector:
Expand Down Expand Up @@ -254,7 +254,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
selector:
Expand All @@ -271,14 +271,14 @@ spec:
app: net-istio-controller
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
spec:
serviceAccountName: controller
containers:
- name: controller
# This is the Go import path for the binary that is containerized
# and substituted here.
image: gcr.io/knative-nightly/knative.dev/net-istio/cmd/controller@sha256:7ddf80fdc8807ac2b05d12f3fa8190269384426bcb4e178b2fb8b7caf33def11
image: gcr.io/knative-nightly/knative.dev/net-istio/cmd/controller@sha256:6a3844ed4e779996c50339f416a57d1ea9189ba1c382303a8d6f370d9d126589
resources:
requests:
cpu: 30m
Expand Down Expand Up @@ -357,7 +357,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
selector:
Expand All @@ -371,14 +371,14 @@ spec:
role: net-istio-webhook
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
spec:
serviceAccountName: controller
containers:
- name: webhook
# This is the Go import path for the binary that is containerized
# and substituted here.
image: gcr.io/knative-nightly/knative.dev/net-istio/cmd/webhook@sha256:f019acde3c4d4741e58facf5bdc6625adc0c66547639718b70c588ebb5a73efb
image: gcr.io/knative-nightly/knative.dev/net-istio/cmd/webhook@sha256:af4a5e38a05fd9682fcc1b3d8f6b68aea803fa7f380f1650805442a37ffd39dc
resources:
requests:
cpu: 20m
Expand Down Expand Up @@ -462,7 +462,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio

---
Expand All @@ -489,7 +489,7 @@ metadata:
role: net-istio-webhook
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
spec:
ports:
Expand Down Expand Up @@ -528,7 +528,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
webhooks:
- admissionReviewVersions:
Expand Down Expand Up @@ -567,7 +567,7 @@ metadata:
labels:
app.kubernetes.io/component: net-istio
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "20231201-ca160707"
app.kubernetes.io/version: "20240115-04509ce7"
networking.knative.dev/ingress-provider: istio
webhooks:
- admissionReviewVersions:
Expand Down Expand Up @@ -600,14 +600,20 @@ webhooks:
# See the License for the specific language governing permissions and
# limitations under the License.

apiVersion: v1
kind: Secret
apiVersion: networking.internal.knative.dev/v1alpha1
kind: Certificate
metadata:
annotations:
networking.knative.dev/certificate.class: cert-manager.certificate.networking.knative.dev
labels:
networking.knative.dev/certificate-type: system-internal
knative.dev/install-knative-certificate: "true"
name: routing-serving-certs
namespace: istio-system
labels:
serving-certs-ctrl: "data-plane-routing"
networking.internal.knative.dev/certificate-uid: "serving-certs"
spec:
dnsNames:
- kn-routing
secretName: routing-serving-certs
# The data is populated when system-internal-tls is enabled.

---