New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ingress await semantics are too strict #1810
Comments
FWIW before #1795 networking.v1.Ingress was not being waited on at all - essentially the equivalent of setting pulumi-kubernetes/provider/pkg/await/ingress.go Lines 365 to 369 in 920ed43
skipAwait annotation above.
|
Hi @viveklak I will try to see if It's hard for me to say if this usage is invalid or not but what I can say is that we use this in production and ingress-nginx allows it. |
I am a bit puzzled about this myself. I will check with @lblackstone when he is back from vacation since it struck me as odd as well. For the time being the skipAwait workaround should work - since essentially that was the behavior you were opaquely relying on previously. |
I am also running into this problem using the AWS ALB Controller + K8S Ingresses. The ALB controller uses annotations to forward traffic to a specific target group and therefore the backend service name is not an actual K8S service. (see here: https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/ingress/annotations/#traffic-routing) Here is my use case:
This results in error: |
I renamed the issue to use this as a tracking issue to consider relaxing the constraints currently imposed for ingress await logic. The suggested workaround for the moment is to use the |
I agree on both points, |
Yeah, I expect that we're being too strict on the await logic here. This logic was added back in 2019, so I don't recall the exact reasons for this assertion, but it's most likely just a misunderstanding of the allowed options. |
Hi
After upgrading to version 3.10.1 We are getting this error on creation of a ingress object
We are using a default Ingress object without any http rules other then host. This has allowed us to share TLS setting with other Ingress objects. This is suppoted by the nginx controller we use.
Issue details
Steps to reproduce
Expected: The update to have no breaking changes
Actual: Did have a breaking change
The text was updated successfully, but these errors were encountered: