-
Notifications
You must be signed in to change notification settings - Fork 559
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rbd: Implement FenceClusterNetwork and UnfenceClusterNetwork #2738
Conversation
This pull request now has conflicts with the target branch. Could you please resolve conflicts and force push the corrected changes? 🙏 |
/retest ci/centos/mini-e2e/k8s-1.22 |
Tested the |
a84448a
to
17b9b66
Compare
} | ||
|
||
_, err := controller.FenceClusterNetwork(context.TODO(), req) | ||
assert.Error(t, err) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
unit tests should test for the specific error message in most of the cases to make sure things are working as expected.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
few minor comments
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
just some initial remarks, not completely reviewed yet
aa4af09
to
03308d5
Compare
there are few more comments from my side, ptal..
/retest ci/centos/mini-e2e/k8s-1.22 |
Signed-off-by: Yug Gupta <[email protected]>
Signed-off-by: Yug Gupta <[email protected]>
Convert the CIDR block into a range of IPs, and then add network fencing via "ceph osd blocklist" for each IP in that range. Signed-off-by: Yug Gupta <[email protected]>
Signed-off-by: Yug Gupta <[email protected]>
implement FenceClusterNetwork grpc call which allows to blocks access to a CIDR block by creating a network fence. Signed-off-by: Yug Gupta <[email protected]>
implement UnfenceClusterNetwork grpc call which allows to unblock the access to a CIDR block by removing it from network fence. Signed-off-by: Yug Gupta <[email protected]>
Signed-off-by: Yug Gupta <[email protected]>
Signed-off-by: Yug Gupta <[email protected]>
/retest ci/centos/mini-e2e-helm/k8s-1.22 |
/retest ci/centos/mini-e2e-helm/k8s-1.22 |
/retest ci/centos/mini-e2e-helm/k8s-1.22 |
Add implementation for
FenceClusterNetwork
andUnfenceClusterNetwork
grpc calls.FenceClusterNetwork
: allows to blocks access to a CIDR block bycreating a network fence using blocklisting.
UnfenceClusterNetwork
: allows unblocking the access to aCIDR block by removing it from the network fence.
Since the controller is not available yet, e2e will be added later.
Currently, all the grpcs have been manually tested and verified.
Show available bot commands
These commands are normally not required, but in case of issues, leave any of
the following bot commands in an otherwise empty comment in this PR:
/retest ci/centos/<job-name>
: retest the<job-name>
after unrelatedfailure (please report the failure too!)
/retest all
: run this in case the CentOS CI failed to start/report any testprogress or results