Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Gateway API TLSRouteInvalidReferenceGrant conformance test #4562

Open
1 task
mlavacca opened this issue Aug 24, 2023 · 0 comments
Open
1 task

Gateway API TLSRouteInvalidReferenceGrant conformance test #4562

mlavacca opened this issue Aug 24, 2023 · 0 comments
Labels
area/gateway-api Relating to upstream Kubernetes SIG Networking Gateway API kind/conformance Conformance to upstream Kubernetes SIG Networking Gateway API nice-to-have

Comments

@mlavacca
Copy link
Member

Problem Statement

The test TLSRouteInvalidReferenceGrant has been recently added upstream and is going to be shipped in 0.8.0. Such a test aims to check that the ungranted reference is not allowed by the controller. We have such a logic in the HTTPRoute controller, but not yet in the TLSRoute controller.

Additional Information

Since TLSRoute conformance is currently on-hold, and this issue is very related to it, we can likely mark it as a nice-to-have.
An ideal implementation would be creating a common pattern to check such a ReferenceGrant condition to be shared among all the Route types.

Acceptance Criteria

  • The test TLSRouteInvalidReferenceGrant is enabled and passes.
@mlavacca mlavacca added area/gateway-api Relating to upstream Kubernetes SIG Networking Gateway API kind/conformance Conformance to upstream Kubernetes SIG Networking Gateway API nice-to-have labels Aug 24, 2023
@mlavacca mlavacca mentioned this issue Aug 24, 2023
1 task
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/gateway-api Relating to upstream Kubernetes SIG Networking Gateway API kind/conformance Conformance to upstream Kubernetes SIG Networking Gateway API nice-to-have
Projects
None yet
Development

No branches or pull requests

1 participant