-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
encryption: e2e w/ real controllers against real cluster with fake deployer #614
encryption: e2e w/ real controllers against real cluster with fake deployer #614
Conversation
f051870
to
2ea54b3
Compare
0f0de1b
to
530ca73
Compare
Unrelated flakes. /retest |
Infra. |
eventRecorder := events.NewLoggingEventRecorder(component) | ||
deployer := NewInstantDeployer(stopCh, kubeInformers, kubeClient.CoreV1(), fmt.Sprintf("encryption-config-%s", component)) | ||
|
||
controllers, err := encryption.NewControllers( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can the following set up influence the real ka-o working in a cluster? I think that at least both controllers will watch the same secrets
. Note that in the future encryption will be on by default.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the component is different (=> different secrets), and I use another operator config and fake APIServer config, for that reason to separate it.
530ca73
to
33c8413
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: p0lyn0mial, sttts The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This allows us to run exhaustive e2e tests without the 20min slow-down of the static-pod deployer per key rotation.