New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Solves #1966. Disable HTTP/2 when a SPDY request is detected in the okteto deploy proxy #1967
Conversation
…kteto deploy proxy Signed-off-by: Nacho Fuertes <nacho@okteto.com>
Codecov Report
@@ Coverage Diff @@
## master #1967 +/- ##
==========================================
- Coverage 33.31% 33.26% -0.06%
==========================================
Files 125 125
Lines 13935 13956 +21
==========================================
Hits 4642 4642
- Misses 8791 8812 +21
Partials 502 502
Continue to review full report at Codecov.
|
…troy operation Signed-off-by: Nacho Fuertes <nacho@okteto.com>
if gvk.Kind == jobKind { | ||
deletePropagation := metav1.DeletePropagationBackground | ||
deleteOpts.PropagationPolicy = &deletePropagation | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pchico83 with the example provided by Tere in the issue, the pod generated by a Job is not being deleted. As it is created by the job controller, it does not have the deployed-by
label, and it seems that by default, client-go don't include the propagation policy (while kubectl
does). So I'm including it in case of jobs (I see we already have this propagation policy on our code). For now I just added it for Jobs, should I include it for other Kinds?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ifbyol nothing else comes to my mind
if gvk.Kind == jobKind { | ||
deletePropagation := metav1.DeletePropagationBackground | ||
deleteOpts.PropagationPolicy = &deletePropagation | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ifbyol nothing else comes to my mind
…eploy-with-spdy-requests
Thank you for your contribution. unfortunately, one or more of your commits are missing the required "Signed-off-by:" statement. Signing off is part of the Developer Certificate of Origin (DCO) which is used by this project. Read the DCO and project contributing guide carefully, and amend your commits using the git CLI. Note that this does not require any cryptography, keys or special steps to be taken. 💡 Shall we fix this?This will only take a few moments. First, clone your fork and checkout this branch using the git CLI. Next, set up your real name and email address:
Finally, run one of these commands to add the "Signed-off-by" line to your commits. If you only have one commit so far then run: Check that the message has been added properly by running "git log". |
Signed-off-by: Nacho Fuertes nacho@okteto.com
Fixes #1966
Proposed changes