Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HAProxy router fix for ip whitelist exceeding max config arguments that haproxy allows. #20357

Merged
merged 1 commit into from
Aug 1, 2018

Conversation

ramr
Copy link
Contributor

@ramr ramr commented Jul 18, 2018

Changes to use a file based acl if the annotation for the ip whitelist exceeds the max haproxy config line arguments.

fixes bugz #1598738

/cc @openshift/sig-network-edge

@openshift-ci-robot openshift-ci-robot added sig/network-edge size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Jul 18, 2018
@Miciah
Copy link
Contributor

Miciah commented Jul 18, 2018

/lgtm

But... How much would it hurt performance (a) to use a file always and (b) to write the file using the template? Doing so could simplify the code, obviate the need for validateHAProxyWhiteList, and increase re-usability for other template-based routers.

Edit: By "always", I mean for any positive number of whitelist entries, but not if there are zero entries.

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Jul 18, 2018
@ramr
Copy link
Contributor Author

ramr commented Jul 18, 2018

@Miciah yeah agree using a file always would be simpler. Bu it does come with a performance effect if a lot of routes use that annotation - does mean more IO + the processing is sequential so it makes for a slower startup. If there's not a lot of routes using that annotation, then it would be ok.

@imcsk8
Copy link
Contributor

imcsk8 commented Jul 19, 2018

LGTM

@ironcladlou
Copy link
Contributor

/approve

@ironcladlou
Copy link
Contributor

/lgtm

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 31, 2018
Copy link

@pravisankar pravisankar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
Thanks Ram.

@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ironcladlou, Miciah, pravisankar, ramr

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ramr
Copy link
Contributor Author

ramr commented Jul 31, 2018

/retest

1 similar comment
@ramr
Copy link
Contributor Author

ramr commented Aug 1, 2018

/retest

@openshift-merge-robot openshift-merge-robot merged commit c50ef91 into openshift:master Aug 1, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. sig/network-edge size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants