Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MAISTRA-1980: Fix private destination rules in root namespace #210

Closed
wants to merge 3 commits into from

Conversation

bison
Copy link
Contributor

@bison bison commented Nov 24, 2020

This is cherry-picks or partially cherry-picks a few upstream commits to try to fix private destination rules in the root namespace for the maistra-1.1 branch.

This seems to fix the issue for me, but I'm actually not convinced we should merge this. It's a fairly big change, and it wasn't possible to fully bring over the changes to this stuff from 1.6 and above without making the diff huge. So, it's hard to say whether this has other side effects. There's also a workaround, which is to simply run the gateway in a namespace that is not the root config namespace. In any case, I wanted to put this PR up so we can decide one way or the other.

@maistra-bot
Copy link
Contributor

@bison: The following test failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
istio_1.1-unit bcc4987 link /test istio_1.1-unit

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Copy link
Contributor

@dgn dgn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think this would be very problematic to merge, as its impact is pretty well-defined. it shouldn't impact anything but DestinationRule processing.

Then again though, I'm not sure in which support phase we are with 1.1 - it's likely that we're only fixing security and critical issues at this point, which I wouldn't think this is, as there's a quite simple workaround

@@ -606,14 +600,6 @@ func (ps *PushContext) GetAllSidecarScopes() map[string][]*SidecarScope {

// DestinationRule returns a destination rule for a service name in a given domain.
func (ps *PushContext) DestinationRule(proxy *Proxy, service *Service) *Config {
// FIXME: this code should be removed once the EDS issue is fixed
if proxy == nil {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can't remove this check in this older version; you can see some unit tests stack tracing. I suppose the mentioned "EDS issue" isn't fixed on this branch yet 👎

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, yeah you're right. I couldn't easily bring over the refactor of services that I think make this unnecessary. Hmm.. not actually sure at first glance what the right thing to do here is.

@bison
Copy link
Contributor Author

bison commented Dec 2, 2020

After reviewing this, and some offline discussions. I'm not sure we can fix this without pulling in more changes. Given there's a workaround and the 1.1 release is going into maintenance mode, I'm going to close this. We can always revisit if it's determined to be more critical.

@bison bison closed this Dec 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants