Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix reverting ingress security to oauth-proxy on openshift if set to none #301

Merged
merged 3 commits into from
Mar 12, 2019

Conversation

pavolloffay
Copy link
Member

Resolves #298

The ingress security on OCP was always reverted to "oauth-proxy" if it was configured as "none".

Signed-off-by: Pavol Loffay ploffay@redhat.com

…none

Signed-off-by: Pavol Loffay <ploffay@redhat.com>
Signed-off-by: Pavol Loffay <ploffay@redhat.com>
@jpkrohling
Copy link
Contributor

This change is Reviewable

Signed-off-by: Pavol Loffay <ploffay@redhat.com>
@codecov
Copy link

codecov bot commented Mar 12, 2019

Codecov Report

Merging #301 into master will not change coverage.
The diff coverage is 100%.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #301   +/-   ##
=======================================
  Coverage   88.56%   88.56%           
=======================================
  Files          70       70           
  Lines        3121     3121           
=======================================
  Hits         2764     2764           
  Misses        244      244           
  Partials      113      113
Impacted Files Coverage Δ
pkg/strategy/controller.go 100% <100%> (ø) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update f128fa3...5c2b33d. Read the comment docs.

@pavolloffay pavolloffay merged commit c55de17 into jaegertracing:master Mar 12, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants