-
Notifications
You must be signed in to change notification settings - Fork 555
TLSRoute: Require hostnames #3872
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
TLSRoute: Require hostnames #3872
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: rostislavbobo The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Welcome @rostislavbobo! |
Hi @rostislavbobo. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
8a842f0
to
5630d40
Compare
75ab19e
to
563794e
Compare
2cc1661
to
bf124db
Compare
bf124db
to
1c19f20
Compare
Thanks @rostislavbobo! /ok-to-test |
1b1ea5d
to
3051c77
Compare
I think this is a good idea, but unfortunately, I think we need to add the new version, and move the That will have the generator include both Alternatively, we will need to very clearly document that folks must ensure that the |
This is because I know that people are using TLSRoute in production. I know they shouldn't be, but they definitely are, and we will screw them over very hard if we are not careful. |
+1
+1 I agree: as long as the costs are reasonably low, we should at least try to avoid breaking people on the API today. Normally alpha APIs are fair game for complete disruption at any time, but /cc @Rycieos |
😆 yeah that's me. In my defense, I started using TLSRoutes in non-prod environments 2.5 years ago, hoping that it would graduate to GA along with the rest of Gateway API, at which point I would move it into prod. Obviously that didn't happen, and I recognize that taking that risk is on me. I appreciate the work done to make such migrations painless, but I definitely understand that this part of the API is still in alpha and that disruptions are expected. I can't ask for more than keeping me in the loop, which the team has done great with so far. |
Of course, @shaneutt , @youngnick , that's why we're not introducing this breaking change in
I hear you, makes sense. Let me alias TLSRoutes |
This year I'm revamping TLSRoutes and hope this @Rycieos , let me know if there's anything else we should include. |
I have brought up #2111 a lot already, but I think it bears repeating. As @robscott pointed out in the original Slack thread for this PR (which I will quote here since Slack is dying soon),
So IMO, #2111 should come at the same time as v1alpha3, or at the very latest in v1beta1, assuming we don't skip the beta stage for TLSRoute. How that ties in to Gateway resource versions I don't think has been figured out yet. |
11146d7
to
b5c8228
Compare
TLSRoute: Update config crd TLSRoute: Update pkg TLSRoute: Update hack example
663631a
to
e71e087
Compare
@youngnick , I've put the new TLSRoute into If we want to add all remaining XRoutes to |
29dbaa9
to
fd1db55
Compare
fd1db55
to
4eb32a7
Compare
@rostislavbobo: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@rostislavbobo Yeah, I think that's fine. The intent here was to end up with the generated YAML having both versions, to save users from a breaking change when they install the v1.4 YAMLs (it's possible to have a TLSRoute saved in So, we're going to have to break people who weren't already setting a But, if we only include So I think that the options here are:
We can test this to find out what would happen in the first case by:
|
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR makes the
hostnames
field in TLSRoute non-optional. Hostnames is the only available match for TLSRoutes and, per the TLSRoute spec, at least one hostname match is required. If SNI hostname matching is not needed, TCPRoute should be used instead.Which issue(s) this PR fixes:
Fixes #3871
Does this PR introduce a user-facing change?: