-
Notifications
You must be signed in to change notification settings - Fork 2
feat: support SSL #52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@AlinsRan Can you take a look at again at certificate extraction? I have taken reference from
|
|
@AlinsRan Currently E2E tests are in dysfunctional state. So for the completion of this subtask, the passing tests need to be there or not? |
|
@Revolyssup At present, e2e testing is mainly focused on basic functions. |
|
locally the tests passing. trying to fix the ci issue |
|
@AlinsRan E2E test passing, need to pass conformance test |
|
We also need a use case for accessing HTTPS based on |
test/conformance/conformance_test.go
Outdated
| var skippedTestsForTraditionalRoutes = []string{ | ||
| // TODO: Support ReferenceGrant resource | ||
| tests.HTTPRouteInvalidReferenceGrant.ShortName, | ||
| tests.GatewayWithAttachedRoutes.ShortName, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why skip it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One test in this was failing. Trying to pass it now
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Passed it
| continue | ||
| } | ||
| secret := corev1.Secret{} | ||
| for _, ref := range listener.TLS.CertificateRefs { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need condition ref.kind == secret
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added
| Snis: []string{}, | ||
| } | ||
| name := listener.TLS.CertificateRefs[0].Name | ||
| secret := tctx.Secrets[types.NamespacedName{Namespace: ns, Name: string(ref.Name)}] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ditto.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added

No description provided.