Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

CFE-748: Update CoreDNS EgressFirewall integration enhancement proposal #1579

Conversation

arkadeepsen
Copy link
Member

@arkadeepsen arkadeepsen commented Feb 29, 2024

Update EP with the location of the DNSNameResolver controller code. Update the EP with the latest API details from openshift/api#1524.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Feb 29, 2024

@arkadeepsen: This pull request references CFE-748 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the spike to target the "4.16.0" version, but no target version was set.

In response to this:

Update EP with the location of the DNSNameResolver controller code. Update the EP with the latest API details.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Feb 29, 2024
@openshift-ci openshift-ci bot requested review from alebedev87 and miheer February 29, 2024 10:24
Comment on lines +132 to +133
// +kubebuilder:validation:Pattern=`^(\*\.)?([a-z0-9]([-a-z0-9]{0,61}[a-z0-9])?\.){2,}$`
// +kubebuilder:validation:MaxLength=254
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

validation changes are coming from the api PR feedback right?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have updated the PR description with the link of the API PR: openshift/api#1524

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

validation changes are coming from the api PR feedback right?

Yes.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Feb 29, 2024

@arkadeepsen: This pull request references CFE-748 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the spike to target the "4.16.0" version, but no target version was set.

In response to this:

Update EP with the location of the DNSNameResolver controller code. Update the EP with the latest API details from openshift/api#1524.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

// but won't match 'sub2.sub1.example.com'
// +kubebuilder:validation:Pattern=^(\*\.)?([A-Za-z0-9]([-A-Za-z0-9]*[A-Za-z0-9])?\.)*[A-Za-z0-9]([-A-Za-z0-9]*[A-Za-z0-9])?\.?$
// but won't match 'sub2.sub1.example.com'.
// +kubebuilder:validation:Pattern=`^(\*\.)?([A-Za-z0-9-]+\.)*[A-Za-z0-9-]+\.?$`
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

where is this pattern coming from? IIUC it is different from the DNSName validation

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@huiran0826
Copy link

@arkadeepsen One question regarding only allow rule scenarios have been used in this enhancement proposal., does it mean it will not support Deny rule for dnsName any more in egressFirewall ? cc @npinaeva

@arkadeepsen
Copy link
Member Author

@arkadeepsen One question regarding only allow rule scenarios have been used in this enhancement proposal., does it mean it will not support Deny rule for dnsName any more in egressFirewall ? cc @npinaeva

Yes @huiran0826. However, the EgressFirewall CRD will not be changed for this and though it'll be possible to create Deny DNS rules using this feature, the behavior may not be as expected.

@npinaeva
Copy link
Member

npinaeva commented Mar 5, 2024

Right, for egress firewall we probably will stick to the current behaviour, but using DNS names for deny rules never made a lot of sense. We may need to update our docs to outline that

@npinaeva
Copy link
Member

npinaeva commented Mar 5, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2024
@candita
Copy link
Contributor

candita commented Mar 6, 2024

/assign @Miciah

@Miciah
Copy link
Contributor

Miciah commented Mar 6, 2024

/lgtm

@Miciah
Copy link
Contributor

Miciah commented Mar 6, 2024

/approve

Copy link
Contributor

openshift-ci bot commented Mar 6, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Miciah

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 6, 2024
Copy link
Contributor

openshift-ci bot commented Mar 6, 2024

@arkadeepsen: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit cd7c753 into openshift:master Mar 6, 2024
2 checks passed
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants