New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
skip checking nodeport on external addrs in conformance tests #98791
Conversation
@pacoxu: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc aojea |
0ae21a0
to
c60768a
Compare
test/e2e/framework/service/jig.go
Outdated
return err | ||
|
||
// By default, skip node port checking with node external ips | ||
if os.Getenv("CHECK_NODEPORT_WITH_EXTERNALADDR") == "true" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
let me ask about this, I´m not sure how @BenTheElder @spiffxp prefer to parameterise these things?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure whether it is rude to remove this directly.
BTW, we should decide the default behavior: skip or check?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ah yeah, but there is a miriad of flags, skips, checks, ... just what I prefer to wait for them so we can align all the test to behave the same
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this (parameters) are usually done with a flag? though this seems awfully specific and more like a different test entirely.
Also conformance tests should not have variable behavior, so IMO the correct answer is actually to split this out into another test and give it tag to filter on if we're keeping this test.
Changes to conformance tests behavior should also be approved by the conformance subproject.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
so like [Feature:ExternalNodeAccess]
on the new tests or something.
But also why are we changing this? commenting back on the issue.
Just because some clusters can fail it doesn't necessarily mean we change conformance 😕
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
for the PR, I will update as you suggest later after the holiday(maybe a week later😄)
for the issue, we can disscuss it in #90764.
/uncc |
c60768a
to
3261926
Compare
I updated the PR. We may remove it as this is not clear.( It should be removed for "secured clusters" )
Per #90764 (comment), I prefer to remove it before a clear definition for the external IPs. |
from conformance, not from sig-network tests 😄 but that is a call that conformance people has to do, my point is that verifying in Conformance something that is not well-defined is not very conformant 🙃 |
I think that I got it. Sorry for misunderstanding. 😂
What we should do is removing it from Conformance test cases and check it in other cases. |
let's hold until the discussion ends, Conformance has to make the call, and then we'll talk with sig-testing to see what is the best way to implement it |
3261926
to
00c5ebf
Compare
I think that this makes it, but I think that it will be better to add it as a new field part of the TestJig
something like It sounds more scalable and intuitive to me, what do you think? |
Yeah I like that approach. I prefer ExternalIPs as the field name, it's more explicit about what's being enabled or disabled. |
00c5ebf
to
520ce44
Compare
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
/lgtm
/milestone v1.21
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: pacoxu, spiffxp The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind bug
/sig testing
/sig network
What this PR does / why we need it:
In some user scenarios, the external IP nodeport is for access from APPs outside this cluster/zone.
Different users have different proposals.
Per #90764 (comment), I prefer to remove it before a clear definition for the external IPs.
Which issue(s) this PR fixes:
Fixes #90764
Special notes for your reviewer:
And @BenTheElder suggestion is like adding a feature filter. I will work on it if this is needed.
Does this PR introduce a user-facing change?: