-
Notifications
You must be signed in to change notification settings - Fork 408
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
bugfix post header accept error #560
bugfix post header accept error #560
Conversation
@JameKeal: GitHub didn't allow me to assign the following users: your_reviewer. Note that only openyurtio members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@JameKeal Very appreciate for your bugfix, I agree with you that yurthub should keep the same action with kube-apiserver for client requests. btw: please fix unit test error. and you can check the details of github action results. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: JameKeal, rambohe-ch The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@JameKeal welcome you to apply OpenYurt community member, and you can reference apply example here: openyurtio/community#30 |
bugfix post header accept error
What type of PR is this?
What this PR does / why we need it:
When using kubectl exec/attach command after access Yurthub, yurthub will return error: no accept content type for request: kubectl create pods: /api/v1/namespaces/xxxx/pods/xxxx/attach?container=xxxx&stderr=true&stdout=true
We can see that the kubectl command is not set accept in request header when using native kubernetes.
So I don't think we need to do anything when the request header accept doesn't exist. Add only deal the context when accept not empty.
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Does this PR introduce a user-facing change?
other Note