Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cmd/contour: pass pointers to StatusAddressUpdater #3412

Merged
merged 1 commit into from
Feb 26, 2021

Conversation

skriss
Copy link
Member

@skriss skriss commented Feb 25, 2021

Fixes an issue where non-pointers were being passed to
the StatusAddressUpdater when the load balancer address
changed, which was resulting in HTTPProxies/Ingresses
not immediately getting updated with the new address.

Fixes #3411.

Signed-off-by: Steve Kriss krisss@vmware.com

@codecov
Copy link

codecov bot commented Feb 25, 2021

Codecov Report

Merging #3412 (ad29e59) into main (df97829) will increase coverage by 0.04%.
The diff coverage is 0.00%.

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #3412      +/-   ##
==========================================
+ Coverage   75.45%   75.49%   +0.04%     
==========================================
  Files          98       98              
  Lines        6592     6591       -1     
==========================================
+ Hits         4974     4976       +2     
+ Misses       1510     1508       -2     
+ Partials      108      107       -1     
Impacted Files Coverage Δ
cmd/contour/ingressstatus.go 34.54% <0.00%> (ø)
internal/k8s/statusaddress.go 85.71% <0.00%> (+0.93%) ⬆️
internal/dag/cache.go 91.51% <0.00%> (+0.60%) ⬆️

@skriss
Copy link
Member Author

skriss commented Feb 25, 2021

I've confirmed manually that with v1.13.0, changes to the LB IP are not immediately reflected in an HTTPProxy, whereas with this patch, they are. (To be clear, I'm pretty sure this bug pre-dates v1.13 though).

@skriss skriss marked this pull request as ready for review February 25, 2021 20:18
@skriss skriss requested a review from a team as a code owner February 25, 2021 20:18
@skriss skriss requested review from stevesloka and sunjayBhatia and removed request for a team February 25, 2021 20:18
Fixes an issue where non-pointers were being passed to
the StatusAddressUpdater when the load balancer address
changed, which was resulting in HTTPProxies/Ingresses
not immediately getting updated with the new address.

Fixes projectcontour#3411.

Signed-off-by: Steve Kriss <krisss@vmware.com>
@skriss skriss merged commit 1436335 into projectcontour:main Feb 26, 2021
@skriss skriss deleted the fix-lbaddress-upd branch February 26, 2021 17:37
skriss added a commit to skriss/contour that referenced this pull request Mar 1, 2021
Fixes an issue where non-pointers were being passed to
the StatusAddressUpdater when the load balancer address
changed, which was resulting in HTTPProxies/Ingresses
not immediately getting updated with the new address.

Fixes projectcontour#3411.

Signed-off-by: Steve Kriss <krisss@vmware.com>
skriss added a commit that referenced this pull request Mar 1, 2021
* internal/xdscache: include global rate limits for secure vhosts (#3410)

Fixes a bug where global rate limit policies were being ignored
when defined at the virtual host level on secure vhosts.

Fixes #3409.

Signed-off-by: Steve Kriss <krisss@vmware.com>

* cmd/contour: pass pointers to StatusAddressUpdater (#3412)

Fixes an issue where non-pointers were being passed to
the StatusAddressUpdater when the load balancer address
changed, which was resulting in HTTPProxies/Ingresses
not immediately getting updated with the new address.

Fixes #3411.

Signed-off-by: Steve Kriss <krisss@vmware.com>

* examples: update Envoy to 1.17.1 (#3417)

Signed-off-by: Steve Kriss <krisss@vmware.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

seeing "unsupported type received" context=StatusAddressUpdater in logs
4 participants