-
Notifications
You must be signed in to change notification settings - Fork 3.4k
cli: Add the check for l7 proxy for to-fqdns
test
#40549
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
0bf4164
to
e4f490d
Compare
/test |
/ci-clustermesh |
Running clustermesh upgrade again because of the failure: https://github.com/cilium/cilium/actions/runs/16333665383/job/46141499817. There is an open #39855 that has a label of it being a flaky. |
Thanks for the PR 🙏 . Could you break down the change into two commits, one that does the refactor and one that makes the logical change? It's pretty hard to review the diff when there are both refactor and functional changes in the same commit. |
e4f490d
to
fb7476c
Compare
fb7476c
to
dfa94ba
Compare
c99b2dc
to
73dd0f0
Compare
to-fqdns
test
/test |
/ci-clustermesh |
Restarted conformance cluster mesh as it was failing due to open issue #39370 |
/ci-clustermesh |
Signed-off-by: Vipul Singh <singhvipul@microsoft.com>
73dd0f0
to
99b3349
Compare
/test |
Issue
PR #38750 introduced an IPv6 check for FQDN and other scenarios, gated by the
external-target-ipv6-capable
flag. However, deploying a DNS-only CNP on a cluster where the L7 proxy is disabled causes the test to fail with a timeout.On clusters without L7 proxy enabled, the Cilium CLI still applies the policy and marks it as "changed" since it's accepted by Kubernetes. However, the policy isn't actually enforced by Cilium due to unsupported L7 features — which is only visible in the Cilium agent logs:
Since the CLI detects two policies as applied but only one is enforced, it waits for the policy revision to increment by 2. But only one policy is truly applied, so the revision increases by 1, resulting in a timeout:
CLI applies both policies and assumes they are valid.
It does not validate if policies are supported by Cilium (e.g., L7 rules without L7 proxy).
It then waits for policy revisions based on the number of applied resources, not actual enforcement.
Fix
Since
to-fqdns
is not valid feature without l7 proxy, add that to the test.