denis-tingaikin
Repos
73
Followers
11
Following
2

Fast linters Runner for Go

11569
1089

Repository for the coredns fanout plugin used by Network Service Mesh

11
10

Goroutine leak detector

3166
117

CoreDNS is a DNS server that chains plugins

10023
1697

Events

Improve Dockerfile caching

Evidently Docker's "ADD" command downloads the target to compute the checksum to see if it can use a cached layer. This means that the file is downloaded every build, which is wasteful, both of bandwidth and time.

This patch replaces the "ADD" and "RUN tar" with a RUN command that uses wget to fetch the file and pipes it into curl. Docker decides to use the cached layer without fetching the file so it's quite a bit faster and more bandwidth-efficient.

Signed-off-by: Toby Cabot toby@acnodal.io

Merge pull request #478 from acnodal/better-caching

Improve Dockerfile caching

Created at 1 day ago
Improve Dockerfile caching

Evidently Docker's "ADD" command downloads the target to compute the checksum to see if it can use a cached layer. This means that the file is downloaded every build, which is wasteful, both of bandwidth and time.

This patch replaces the "ADD" and "RUN tar" with a RUN command that uses wget to fetch the file and pipes it into curl. Docker decides to use the cached layer without fetching the file so it's quite a bit faster and more bandwidth-efficient.

Signed-off-by: Toby Cabot toby@acnodal.io

Created at 1 day ago
Improve Dockerfile caching

@acnodal-tc Thanks!

Created at 1 day ago

Log the response patch in human-readable form

The response patch is important but it was logged as an array of bytes which is difficult for humans to decode. This patch converts the bytes to a string and logs that instead.

Signed-off-by: Toby Cabot toby@acnodal.io

Merge pull request #187 from acnodal/log-response-patch

Log the response patch in human-readable form

Created at 1 day ago
Log the response patch in human-readable form

The response patch is important but it was logged as an array of bytes which is difficult for humans to decode. This patch converts the bytes to a string and logs that instead.

Signed-off-by: Toby Cabot toby@acnodal.io

Created at 1 day ago
Log the response patch in human-readable form

@acnodal-tc Thanks!

Created at 1 day ago
closed issue
Update everything to go 1.18

Overview

All our code are based on go 1.16. We could update everything to go 1.18 and schedule refactorings based on generics to simplify many things in our codebase.

Created at 1 day ago
issue comment
Update everything to go 1.18

Looks done

Created at 1 day ago

Change delimiter in folder names (#7893)

Signed-off-by: Artem Glazychev artem.glazychev@xored.com

Signed-off-by: Artem Glazychev artem.glazychev@xored.com

Created at 1 day ago
[qfix] Change delimiter in folder names

Signed-off-by: Artem Glazychev artem.glazychev@xored.com

Description

Replce "-" with "_" gotestmd cannot work with "-" because it generates package name from the folder name

Issue link

https://github.com/networkservicemesh/deployments-k8s/actions/runs/3582100187/jobs/6025923268

How Has This Been Tested?

  • [ ] Added unit testing to cover
  • [ ] Tested manually
  • [ ] Tested by integration testing
  • [ ] Have not tested

Types of changes

  • [ ] Bug fix
  • [ ] New functionallity
  • [ ] Documentation
  • [ ] Refactoring
  • [ ] CI
Created at 1 day ago
Having issue while trying nse-composition example (using NSM v1.5.0 and Kind version 0.14.0)

I am trying to run nse-composition example (v1.5.0) , but have issue with the alpine pod stuck in Init state. Looks like a permission issue. Please let me know if I'm missing anything.

test@test-virtual-machine:~/source/nsm/tests/compos/1$ kubectl apply -k .
configmap/nginx-config-b9f75kh6cm created
configmap/vppagent-firewall-config-file created
deployment.apps/nse-firewall-vpp created
deployment.apps/nse-kernel created
deployment.apps/nse-passthrough-1 created
deployment.apps/nse-passthrough-2 created
deployment.apps/nse-passthrough-3 created
networkservice.networkservicemesh.io/nse-composition created
pod/alpine created
test@test-virtual-machine:~/source/nsm/tests/compos/1$ ls
client.yaml  kustomization.yaml  nse-composition-ns.yaml  patch-nse.yaml
test@test-virtual-machine:~/source/nsm/tests/compos/1$ ls -la
total 24
drwxrwxr-x 2 test test 4096 Oct  5 00:43 .
drwxrwxr-x 3 test test 4096 Oct  4 23:33 ..
-rw-rw-r-- 1 test test  307 Oct  5 00:44 client.yaml
-rw-rw-r-- 1 test test 1201 Oct  5 00:44 kustomization.yaml
-rw-rw-r-- 1 test test  702 Oct  4 23:40 nse-composition-ns.yaml
-rw-rw-r-- 1 test test  892 Oct  5 00:44 patch-nse.yaml

test@test-virtual-machine:~/source/nsm/tests/compos/1$ kubectl get pods -A
NAMESPACE            NAME                                         READY   STATUS     RESTARTS   AGE
kube-system          coredns-6d4b75cb6d-84xqw                     1/1     Running    0          104m
kube-system          coredns-6d4b75cb6d-mvkr2                     1/1     Running    0          104m
kube-system          etcd-kind-control-plane                      1/1     Running    0          104m
kube-system          kindnet-2bmnk                                1/1     Running    0          104m
kube-system          kindnet-645l4                                1/1     Running    0          104m
kube-system          kindnet-gvd8b                                1/1     Running    0          104m
kube-system          kube-apiserver-kind-control-plane            1/1     Running    0          104m
kube-system          kube-controller-manager-kind-control-plane   1/1     Running    0          104m
kube-system          kube-proxy-2tmq7                             1/1     Running    0          104m
kube-system          kube-proxy-8fwv5                             1/1     Running    0          104m
kube-system          kube-proxy-mmstk                             1/1     Running    0          104m
kube-system          kube-scheduler-kind-control-plane            1/1     Running    0          104m
local-path-storage   local-path-provisioner-9cd9bd544-xkx5p       1/1     Running    0          104m
ns-k88mw             alpine                                       0/2     Init:0/1   0          73s
ns-k88mw             nse-firewall-vpp-5c78d5c885-c4p95            1/1     Running    0          74s
ns-k88mw             nse-kernel-55c487ff76-gllsf                  2/2     Running    0          74s
ns-k88mw             nse-passthrough-1-85d46bf654-47jft           1/1     Running    0          73s
ns-k88mw             nse-passthrough-2-845775f7c5-4fw2v           1/1     Running    0          73s
ns-k88mw             nse-passthrough-3-86c7fff64-gj89k            1/1     Running    0          73s
nsm-system           admission-webhook-k8s-8595d6df88-72jp4       1/1     Running    0          74m
nsm-system           forwarder-vpp-68whc                          1/1     Running    0          74m
nsm-system           forwarder-vpp-zjhk4                          1/1     Running    0          74m
nsm-system           nsmgr-9762d                                  2/2     Running    0          74m
nsm-system           nsmgr-mvjmc                                  2/2     Running    0          74m
nsm-system           registry-8477565b8d-6rcq7                    1/1     Running    0          74m
spire                spire-agent-65x5c                            1/1     Running    0          103m
spire                spire-agent-nhnzc                            1/1     Running    0          103m
spire                spire-server-0                               2/2     Running    0          103m
test@test-virtual-machine:~/source/nsm/tests/compos/1$ kind --version
kind version 0.14.0

test@test-virtual-machine:~/source/nsm/tests/compos/1$ kubectl describe pods alpine -n ns-k88mw
Name:         alpine
Namespace:    ns-k88mw
Priority:     0
Node:         kind-worker/172.18.0.4
Start Time:   Wed, 05 Oct 2022 00:45:10 +0530
Labels:       app=alpine
              spiffe.io/spiffe-id=true
Annotations:  networkservicemesh.io: kernel://nse-composition/nsm-1
Status:       Pending
IP:           10.244.2.16
IPs:
  IP:  10.244.2.16
Init Containers:
  cmd-nsc-init:
    Container ID:   containerd://31086f02b4239da6da7d419662c4282328f7b7402908292d1fc9d1768b93388d
    Image:          ghcr.io/networkservicemesh/cmd-nsc-init:v1.5.0
    Image ID:       ghcr.io/networkservicemesh/cmd-nsc-init@sha256:b0e9e2b40a82a68a0c510e7865817ee66913a54b14b56c758cac31c545abd264
    Port:           <none>
    Host Port:      <none>
    State:          Running
      Started:      Wed, 05 Oct 2022 00:45:12 +0530
    Ready:          False
    Restart Count:  0
    Environment:
      NSM_LOG_LEVEL:           TRACE
      SPIFFE_ENDPOINT_SOCKET:  unix:///run/spire/sockets/agent.sock
      NSM_NAME:                alpine (v1:metadata.name)
      POD_NAME:                alpine (v1:metadata.name)
      NSM_NETWORK_SERVICES:    kernel://nse-composition/nsm-1
    Mounts:
      /run/spire/sockets from spire-agent-socket (ro)
      /var/lib/networkservicemesh from nsm-socket (ro)
      /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-f9mb6 (ro)
Containers:
  alpine:
    Container ID:
    Image:          alpine:3.15.0
    Image ID:
    Port:           <none>
    Host Port:      <none>
    State:          Waiting
      Reason:       PodInitializing
    Ready:          False
    Restart Count:  0
    Environment:    <none>
    Mounts:
      /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-f9mb6 (ro)
  cmd-nsc:
    Container ID:
    Image:          ghcr.io/networkservicemesh/cmd-nsc:v1.5.0
    Image ID:
    Port:           <none>
    Host Port:      <none>
    State:          Waiting
      Reason:       PodInitializing
    Ready:          False
    Restart Count:  0
    Environment:
      NSM_LOG_LEVEL:           TRACE
      SPIFFE_ENDPOINT_SOCKET:  unix:///run/spire/sockets/agent.sock
      NSM_NAME:                alpine (v1:metadata.name)
      POD_NAME:                alpine (v1:metadata.name)
      NSM_NETWORK_SERVICES:    kernel://nse-composition/nsm-1
    Mounts:
      /run/spire/sockets from spire-agent-socket (ro)
      /var/lib/networkservicemesh from nsm-socket (ro)
      /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-f9mb6 (ro)
Conditions:
  Type              Status
  Initialized       False
  Ready             False
  ContainersReady   False
  PodScheduled      True
Volumes:
  kube-api-access-f9mb6:
    Type:                    Projected (a volume that contains injected data from multiple sources)
    TokenExpirationSeconds:  3607
    ConfigMapName:           kube-root-ca.crt
    ConfigMapOptional:       <nil>
    DownwardAPI:             true
  spire-agent-socket:
    Type:          HostPath (bare host directory volume)
    Path:          /run/spire/sockets
    HostPathType:  Directory
  nsm-socket:
    Type:          HostPath (bare host directory volume)
    Path:          /var/lib/networkservicemesh
    HostPathType:  Directory
QoS Class:         BestEffort
Node-Selectors:    <none>
Tolerations:       node.kubernetes.io/not-ready:NoExecute op=Exists for 300s
                   node.kubernetes.io/unreachable:NoExecute op=Exists for 300s
Events:
  Type    Reason   Age   From     Message
  ----    ------   ----  ----     -------
  Normal  Pulled   14m   kubelet  Container image "ghcr.io/networkservicemesh/cmd-nsc-init:v1.5.0" already present on machine
  Normal  Created  14m   kubelet  Created container cmd-nsc-init
  Normal  Started  14m   kubelet  Started container cmd-nsc-init

test@test-virtual-machine:~/source/nsm/tests/compos/1$ kubectl get services -A
NAMESPACE     NAME                     TYPE           CLUSTER-IP      EXTERNAL-IP   PORT(S)                         AGE
default       kubernetes               ClusterIP      10.96.0.1       <none>        443/TCP                         143m
kube-system   kube-dns                 ClusterIP      10.96.0.10      <none>        53/UDP,53/TCP,9153/TCP          143m
nsm-system    admission-webhook-svc    ClusterIP      10.96.166.209   <none>        443/TCP                         112m
nsm-system    registry                 LoadBalancer   10.96.237.47    <pending>     5002:30040/TCP                  112m
spire         k8s-workload-registrar   ClusterIP      10.96.135.118   <none>        443/TCP                         141m
spire         spire-server             LoadBalancer   10.96.69.82     <pending>     8081:30360/TCP,8443:30287/TCP   141m


test@test-virtual-machine:~/source/nsm/tests/compos/1$ kubectl logs alpine -c cmd-nsc-init -n ns-k88mw | more
Oct  5 02:24:43.726^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(1) ⎆ sdk/pkg/networkservice/common/updatepath/updatePathClient.Request()
Oct  5 02:24:43.726^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(1.1)   request={"connection":{"id":"alpine-0","network_service":"nse-composition"},"mechanism_preferences":[{"cls":"LOCAL","type":"KERNEL","parameters":{"name":"nsm-1"}}]}
Oct  5 02:24:43.726^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(1.2)   request-diff={"connection":{"path":{"path_segments":{"+0":{"name":"alpine","id":"alpine-0"}}}}}
Oct  5 02:24:43.727^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(2)  ⎆ sdk/pkg/networkservice/common/begin/beginClient.Request()
Oct  5 02:24:43.727^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(3)   ⎆ sdk/pkg/networkservice/utils/metadata/metaDataClient.Request()
Oct  5 02:24:43.727^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(4)    ⎆ sdk/pkg/networkservice/common/clientinfo/clientInfo.Request()
Oct  5 02:24:43.727^[[33m [WARN] [id:alpine-0] [type:networkService] ^[[0m(4.1)      Environment variable CLUSTER_NAME is not set. Skipping.
Oct  5 02:24:43.728^[[33m [WARN] [id:alpine-0] [type:networkService] ^[[0m(4.2)      Environment variable NODE_NAME is not set. Skipping.
Oct  5 02:24:43.728^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(4.3)      request-diff={"connection":{"labels":{"+podName":"alpine"}}}
Oct  5 02:24:43.728^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(5)     ⎆ sdk-sriov/pkg/networkservice/common/token/multitoken/tokenClient.Request()
Oct  5 02:24:43.728^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(6)      ⎆ sdk/pkg/networkservice/common/mechanisms/mechanismsClient.Request()
Oct  5 02:24:43.728^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(7)       ⎆ sdk/pkg/networkservice/core/next/nextClient.Request()
Oct  5 02:24:43.729^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(8)        ⎆ sdk/pkg/networkservice/common/mechanisms/kernel/kernelMechanismClient.Request()
Oct  5 02:24:43.729^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(8.1)          request-diff={"mechanism_preferences":{"0":{"parameters":{"+inodeURL":"file:///proc/thread-self/ns/net"}}}}
Oct  5 02:24:43.729^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(9)         ⎆ sdk/pkg/networkservice/common/authorize/authorizeClient.Request()
Oct  5 02:24:43.729^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(10)          ⎆ sdk/pkg/networkservice/common/mechanisms/sendfd/sendFDClient.Request()
Oct  5 02:24:43.730^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(10.1)            request-diff={"mechanism_preferences":{"0":{"parameters":{"inodeURL":"inode://4/4026534295"}}}}
Oct  5 02:24:43.730^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(11)           ⎆ sdk/pkg/networkservice/common/excludedprefixes/excludedPrefixesClient.Request()
Oct  5 02:24:43.730^[[37m [TRAC] [id:alpine-0] [type:networkService] ^[[0m(12)            ⎆ api/pkg/api/networkservice/networkServiceClient.Request()
Oct  5 02:24:43.738^[[31m [ERRO] [id:alpine-0] [type:networkService] ^[[0m(12.1)              rpc error: code = Unknown desc = Error returned from sdk/pkg/networkservice/common/authorize/authorizeServer.Request: rpc error: code = PermissionDenied desc = no sufficient privileges; Error returned from api/pkg/api/networkservice/networkServiceClient.Request;    github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.logError;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/common.go:206;   github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*beginTraceClient).Request;        /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:57;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*endTraceClient).Request;      /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:81;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/common/excludedprefixes.(*excludedPrefixesClient).Request;     /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/common/excludedprefixes/client.go:113;  github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*beginTraceClient).Request;        /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:55;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*endTraceClient).Request;      /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:81;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/common/mechanisms/sendfd.(*sendFDClient).Request;      /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/common/mechanisms/sendfd/client.go:55;  github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*beginTraceClient).Request;        /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:55;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*endTraceClient).Request;      /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:81;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/common/authorize.(*authorizeClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/common/authorize/client.go:68;  github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*beginTraceClient).Request;        /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:55;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*endTraceClient).Request;      /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:81;    github.com/networkservicemesh/sdk/pkg/networkservice/core/next.(*nextClient).Request;       /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/next/client.go:60; github.com/networkservicemesh/sdk/pkg/networkservice/core/trace.(*endTraceClient).Request;      /go/pkg/mod/github.com/networkservicemesh/sdk@v1.5.0/pkg/networkservice/core/trace/client.go:81;    github.c

test@test-virtual-machine:~/source/nsm/tests/compos/1$ cat client.yaml
---
apiVersion: v1
kind: Pod
metadata:
  name: alpine
  labels:
    app: alpine
  annotations:
    networkservicemesh.io: kernel://nse-composition/nsm-1
spec:
  containers:
  - name: alpine
    image: alpine:3.15.0
    imagePullPolicy: IfNotPresent
    stdin: true
    tty: true
  nodeName: kind-worker

Created at 2 days ago
Having issue while trying nse-composition example (using NSM v1.5.0 and Kind version 0.14.0)

Seems like resolved

Created at 2 days ago

Unify spire setup (#7733)

  • use separate deployments for spire for each cluster

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • remove old spire configs

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

Conflicts:

examples/interdomain/spire/README.md

examples/interdomain/spire/cluster1/kustomization.yaml

examples/interdomain/spire/cluster2/kustomization.yaml

examples/multicluster/spire/README.md

examples/multicluster/spire/cluster1/kustomization.yaml

examples/multicluster/spire/cluster3/kustomization.yaml

examples/spire/README.md

Conflicts:

examples/interdomain/spire/README.md

examples/interdomain/spire/cluster1/kustomization.yaml

examples/interdomain/spire/cluster2/kustomization.yaml

examples/multicluster/spire/README.md

examples/multicluster/spire/cluster1/kustomization.yaml

examples/multicluster/spire/cluster3/kustomization.yaml

examples/spire/README.md

  • adjust documentation

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • update spire requirement links

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • fix k8s_monolith example

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • change trust domain in single-cluster spire setup unify trust domain with k8s_monolith

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • add docker federation to spire single-cluster setup

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • use spire single-cluster setup for k8s monolith examples

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

Conflicts:

examples/k8s_monolith/external_nsc/spire/README.md

examples/k8s_monolith/external_nse/spire/README.md

Conflicts:

examples/k8s_monolith/external_nsc/spire/README.md

examples/k8s_monolith/external_nse/spire/README.md

  • add comment in spire config

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • fix spire reference in jaeger example

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • remove commented config part in spire base config

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • update refs

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • adjust spire readme

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • fix multi-cluster config

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • fix links in spire readme

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • update refs

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

  • update refs

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

Signed-off-by: Danil Uzlov DanilUzlov@yandex.ru

Created at 2 days ago
Unify spire setup

Description

This PR moves spire setup for multi-cluster and k8s_monolith examples into examples/spire.

Single-cluster and monolith examples share spire/single-cluster setup. Multi-cluster examples share spire/clusterX setups.

In examples/interdomain, examples/floating_interdomain, examples/k8s_monolith/external_nsc, examples/k8s_monolith/external_nse there are new spiffe-federation setups, that contain scenario-specific setup.

Issue link

https://github.com/networkservicemesh/deployments-k8s/issues/7673

How Has This Been Tested?

  • [ ] Added unit testing to cover
  • [x] Tested manually
  • [x] Tested by integration testing
  • [ ] Have not tested

Types of changes

  • [ ] Bug fix
  • [ ] New functionallity
  • [ ] Documentation
  • [x] Refactoring
  • [ ] CI
Created at 2 days ago

Add MTU adjustment checks in remote VLAN examples (#7739)

Related issue:

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Created at 2 days ago
Add MTU adjustment checks in remote VLAN examples

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Description

The MTU value of the interface in NSC can not be bigger than the MTU value set on base interface

Issue link

#7738

How Has This Been Tested?

  • [ ] Added unit testing to cover
  • [X] Tested manually
  • [X] Tested by integration testing
  • [ ] Have not tested

Types of changes

  • [X] Bug fix
  • [ ] New functionallity
  • [ ] Documentation
  • [ ] Refactoring
  • [ ] CI
Created at 2 days ago

Fix MTU adjustment in case of remote vlan mechanism

The MTU should be updated in connection context based on the base interface MTU

Relates PR: networkservicemesh/sdk-vpp/pull/656

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Merge pull request #203 from Nordix/fix-mtu

Fix MTU adjustment in case of remote vlan mechanism

Created at 2 days ago
pull request closed
Fix MTU adjustment in case of remote vlan mechanism

Description

The MTU should be updated in connection context based on the base interface MTU

Issue link

networkservicemesh/deployments-k8s/issues/7738

Relates PR

networkservicemesh/sdk-vpp/pull/656

How Has This Been Tested?

  • [ ] Added unit testing to cover
  • [X] Tested manually
  • [X] Tested by integration testing
  • [ ] Have not tested

Types of changes

  • [X] Bug fix
  • [ ] New functionallity
  • [ ] Documentation
  • [ ] Refactoring
  • [ ] CI
Created at 2 days ago

Add test case to vlan break-trough (#7686)

Different applications connecting to the same NS and using the the same VLAN. These NSCs now can run on the same node.

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Created at 2 days ago
Add test case to vlan break-trough

Different applications connecting to the same NS and using the the same VLAN. These NSCs now can run on the same node.

Signed-off-by: Laszlo Kiraly laszlo.kiraly@est.tech

Description

The test script with multiple network services and and k8s namespaces was modified. A remote-vlan-nse type NSE provides two NS defining the same VLAN ID. The NSC connecting to these NSs are collocated on the same host.

Issue link

networkservicemesh/deployments-k8s/issues/7687

How Has This Been Tested?

  • [ ] Added unit testing to cover
  • [X] Tested manually
  • [X] Tested by integration testing
  • [ ] Have not tested

Types of changes

  • [X] Bug fix
  • [ ] New functionallity
  • [ ] Documentation
  • [ ] Refactoring
  • [ ] CI
Created at 2 days ago

fix weights

Signed-off-by: denis-tingaikin denis.tingajkin@xored.com

Created at 2 days ago

fix weights

Signed-off-by: denis-tingaikin denis.tingajkin@xored.com

Created at 2 days ago
pull request opened
bump: Add release notes v1.7.0

Signed-off-by: denis-tingaikin denis.tingajkin@xored.com

Created at 2 days ago