Skip to content

OCPBUGS-1731: Merge 1.10.0#76

Merged
openshift-merge-robot merged 190 commits intoopenshift:masterfrom
gcs278:merge-1.10.0
Oct 1, 2022
Merged

OCPBUGS-1731: Merge 1.10.0#76
openshift-merge-robot merged 190 commits intoopenshift:masterfrom
gcs278:merge-1.10.0

Conversation

@gcs278
Copy link
Copy Markdown

@gcs278 gcs278 commented Sep 27, 2022

Rebased to CoreDNS 1.10.0 so that we use the Kubernetes 1.25 packages.

I made this PR using the same process as #73, #52, #60, and #70:

  1. git remote update
  2. git checkout v1.10.0
  3. git checkout -b merge-1.10.0-tmp
  4. git checkout origin/master
  5. echo 'merge coredns/coredns v1.10.0' | git commit-tree 'merge-1.10.0-tmp^{tree}' -p HEAD -p merge-1.10.0-tmp -F -
    ead3b6507d7bd2fc3e67b79d8ff0dff296396bac
  6. git branch merge-1.10.0 ead3b6507d7bd2fc3e67b79d8ff0dff296396bac
  7. git checkout merge-1.10.0
  8. git rev-list --reverse --no-merges 555dd549ee36ba7f626cf8c53707c74af318ec09..origin/master | git cherry-pick --stdin
    Note: 555dd549ee36ba7f626cf8c53707c74af318ec09 is the merge commit from the last merge Bug 2090827: Merge 1.9.2 #73
  9. My merge commit from the above process was commit ead3b65.

Before the rebase, we had the following commits:

% git --no-pager log --oneline --no-merges 555dd549ee36ba7f626cf8c53707c74af318ec09..origin/master
ad24eacf6 Updating coredns images to be consistent with ART Reconciling with https://github.com/openshift/ocp-build-data/tree/2e5eba0108299087402c119ba0dc979a0a6c0bd1/images/coredns.yml
349db7a33 UPSTREAM: <carry>: openshift: Revert "Revert "add wildcard warnings (#5030)" (#5167)"
461cbbf60 UPSTREAM: <carry>: openshift: Revert "remove wildcard query functionality (#5019)"
7a41d2b87 UPSTREAM: <carry>: openshift: Disable dependabot
1d2d4f767 UPSTREAM: <carry>: openshift: Vendor required modules
3dc197d15 UPSTREAM: <carry>: openshift: .gitignore: Properly ignore coredns binary
9176cd5bf UPSTREAM: <carry>: openshift: Make coredns exclusion more specific
488cc73b1 UPSTREAM: <carry>: openshift: Add a `make test` target
b648be195 UPSTREAM: <carry>: openshift: Add product build config
1e6995352 UPSTREAM: <carry>: openshift: Add OWNERS
% 

I edited the "Vendor required modules" commit by running go mod vendor and go mod tidy and ammend commit 1d2d4f767 UPSTREAM: <carry>: openshift: Vendor required modules.

I squashed/merged the following commit into the existing "Add product build config" commit:

ad24eacf6 Updating coredns images to be consistent with ART Reconciling with https://github.com/openshift/ocp-build-data/tree/2e5eba0108299087402c119ba0dc979a0a6c0bd1/images/coredns.ym

Git merge conflicts for 461cbbf60 UPSTREAM: <carry>: openshift: Revert "remove wildcard query functionality (#5019)":
plugin/kubernetes/kubernetes.go

  • Line 630: matchPortAndProtocol function comment update, but matchPortAndProtocol function has been removed so I ignored the updates (see PR Delta)

plugin/kubernetes/external.go

  • Line 52: changes to variables declaration conflicted because they added endpoint as a string. I merged by taking upstream variable declarations, but added port = "*" and protocol = "*" assignment below for reversion (see PR Delta)
  • Line 114 & 134: Refactoring moved calls to matchPortAndProtocol and added it in an additional location for resolving headless services (see PR delta)
    • I'm assuming we want wildcard support for headless and that wildcard support is remove via matchPortAndProtocol, but we don't have that function anyways so just using the match function.

lobshunter and others added 30 commits May 12, 2022 14:13
* plugin/dnstap: support FQDN TCP endpoint

Signed-off-by: lob <pengyu@pingcap.com>

* plugin/dnstap: remove unused variable

Signed-off-by: lob <pengyu@pingcap.com>
Signed-off-by: Chris O'Haver <cohaver@infoblox.com>
…s#5379)

Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.78.0 to 0.79.0.
- [Release notes](https://github.com/googleapis/google-api-go-client/releases)
- [Changelog](https://github.com/googleapis/google-api-go-client/blob/main/CHANGES.md)
- [Commits](googleapis/google-api-go-client@v0.78.0...v0.79.0)

---
updated-dependencies:
- dependency-name: google.golang.org/api
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…#5380)

Bumps [github.com/miekg/dns](https://github.com/miekg/dns) from 1.1.48 to 1.1.49.
- [Release notes](https://github.com/miekg/dns/releases)
- [Changelog](https://github.com/miekg/dns/blob/master/Makefile.release)
- [Commits](miekg/dns@v1.1.48...v1.1.49)

---
updated-dependencies:
- dependency-name: github.com/miekg/dns
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…oredns#5382)

Bumps [github.com/aws/aws-sdk-go](https://github.com/aws/aws-sdk-go) from 1.44.9 to 1.44.14.
- [Release notes](https://github.com/aws/aws-sdk-go/releases)
- [Changelog](https://github.com/aws/aws-sdk-go/blob/main/CHANGELOG.md)
- [Commits](aws/aws-sdk-go@v1.44.9...v1.44.14)

---
updated-dependencies:
- dependency-name: github.com/aws/aws-sdk-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Bumps [github.com/Azure/azure-sdk-for-go](https://github.com/Azure/azure-sdk-for-go) from 63.4.0+incompatible to 64.1.0+incompatible.
- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)
- [Changelog](https://github.com/Azure/azure-sdk-for-go/blob/main/CHANGELOG.md)
- [Commits](Azure/azure-sdk-for-go@v63.4.0...v64.1.0)

---
updated-dependencies:
- dependency-name: github.com/Azure/azure-sdk-for-go
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Bumps [actions/setup-go](https://github.com/actions/setup-go) from 3.0.0 to 3.1.0.
- [Release notes](https://github.com/actions/setup-go/releases)
- [Commits](actions/setup-go@f6164bd...fcdc436)

---
updated-dependencies:
- dependency-name: actions/setup-go
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…5385)

Bumps [github/codeql-action](https://github.com/github/codeql-action) from 2.1.9 to 2.1.10.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@7502d6e...2f58583)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…ns#5381)

Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.46.0 to 1.46.2.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.46.0...v1.46.2)

---
updated-dependencies:
- dependency-name: google.golang.org/grpc
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
> Dependency Review GitHub Action in your repository to enforce dependency
> reviews on your pull requests.
> The action scans for vulnerable versions of dependencies introduced by package version
> changes in pull requests,
> and warns you about the associated security vulnerabilities.
> This gives you better visibility of what's changing in a pull request,
> and helps prevent vulnerabilities being added to your repository.

https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
Signed-off-by: coredns[bot] <bot@bot.coredns.io>
…oredns#5387)

* Fixing coredns#5376 by adding a check to parse out Zone information

Signed-off-by: Tintin <samrath.sodi@gmail.com>

* using IndexByte instead of strings.Split()

Signed-off-by: Tintin <samrath.sodi@gmail.com>

* using plugin logger for logging parsing failure

Signed-off-by: Tintin <samrath.sodi@gmail.com>

* using var keywork instead of short declaration operator

Signed-off-by: Tintin <samrath.sodi@gmail.com>

* reordering imports

Signed-off-by: Tintin <samrath.sodi@gmail.com>
…oredns#5400)

Bumps [github.com/aws/aws-sdk-go](https://github.com/aws/aws-sdk-go) from 1.44.14 to 1.44.19.
- [Release notes](https://github.com/aws/aws-sdk-go/releases)
- [Changelog](https://github.com/aws/aws-sdk-go/blob/main/CHANGELOG.md)
- [Commits](aws/aws-sdk-go@v1.44.14...v1.44.19)

---
updated-dependencies:
- dependency-name: github.com/aws/aws-sdk-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…s#5398)

Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.79.0 to 0.80.0.
- [Release notes](https://github.com/googleapis/google-api-go-client/releases)
- [Changelog](https://github.com/googleapis/google-api-go-client/blob/main/CHANGES.md)
- [Commits](googleapis/google-api-go-client@v0.79.0...v0.80.0)

---
updated-dependencies:
- dependency-name: google.golang.org/api
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Bumps [github.com/prometheus/client_golang](https://github.com/prometheus/client_golang) from 1.12.1 to 1.12.2.
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](prometheus/client_golang@v1.12.1...v1.12.2)

---
updated-dependencies:
- dependency-name: github.com/prometheus/client_golang
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
It looks like dependabot couldn't update golang.org/x/crypto
automatically to fix the  CVE-2022-27191:

coredns#5403 (comment)

This PR manually fix the dependency.

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
…s#5405)

Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.80.0 to 0.81.0.
- [Release notes](https://github.com/googleapis/google-api-go-client/releases)
- [Changelog](https://github.com/googleapis/google-api-go-client/blob/main/CHANGES.md)
- [Commits](googleapis/google-api-go-client@v0.80.0...v0.81.0)

---
updated-dependencies:
- dependency-name: google.golang.org/api
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Bumps [github.com/Azure/azure-sdk-for-go](https://github.com/Azure/azure-sdk-for-go) from 64.1.0+incompatible to 65.0.0+incompatible.
- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)
- [Changelog](https://github.com/Azure/azure-sdk-for-go/blob/main/CHANGELOG.md)
- [Commits](Azure/azure-sdk-for-go@v64.1.0...v65.0.0)

---
updated-dependencies:
- dependency-name: github.com/Azure/azure-sdk-for-go
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…oredns#5406)

Bumps [github.com/aws/aws-sdk-go](https://github.com/aws/aws-sdk-go) from 1.44.19 to 1.44.22.
- [Release notes](https://github.com/aws/aws-sdk-go/releases)
- [Changelog](https://github.com/aws/aws-sdk-go/blob/main/CHANGELOG.md)
- [Commits](aws/aws-sdk-go@v1.44.19...v1.44.22)

---
updated-dependencies:
- dependency-name: github.com/aws/aws-sdk-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
As the dependabot cannot update the go-yaml automatically,
this PR updates gopkg.in/yaml.v3 to v3.0.0 to fix CVE-2022-28948
(See go-yaml/yaml#666)

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
* Update version and release note to 1.9.3

This PR update version and release note to prepare for 1.9.3.
Main reason is to address CVE-2022-27191 and CVE-2022-28948

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>

* Update notes/coredns-1.9.3.md

Co-authored-by: Chris O'Haver <cohaver@infoblox.com>
Signed-off-by: Yong Tang <yong.tang.github@outlook.com>

* Update notes/coredns-1.9.3.md

Co-authored-by: Chris O'Haver <cohaver@infoblox.com>
Signed-off-by: Yong Tang <yong.tang.github@outlook.com>

Co-authored-by: Chris O'Haver <cohaver@infoblox.com>
Signed-off-by: coredns[bot] <bot@bot.coredns.io>
Copy link
Copy Markdown

@brandisher brandisher left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall the changes look good and match what we discussed yesterday. I left one question for @Miciah about whether we need a release note for the change in SERVFAIL response caching; I'm assuming that SERVFAILs were not cached previously and will now be cached for 5s.

Comment thread plugin/cache/cache.go Outdated
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Miciah this could be a nit so I'll defer to you, but would it be worth including in the release notes that SERVFAIL responses will now be cached for 5s (the value of minNTTL)?

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SERVFAIL was cached for 5s in CoreDNS 1.9.2.
https://github.com/coredns/coredns/blob/092c144491e7f62d71eda98a07e4ce815d9df035/plugin/cache/cache.go#L159-L161
This change only makes it configurable, but the default is 5 seconds, and we aren't changing the default.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah okay, thanks for catching that and the link! That's what I get for making an assumption :-)

@gcs278
Copy link
Copy Markdown
Author

gcs278 commented Sep 29, 2022

Just OVN alerts now.

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Sep 29, 2022

@gcs278: The /retest command does not accept any targets.
The following commands are available to trigger required jobs:

  • /test e2e-aws
  • /test e2e-aws-upgrade
  • /test e2e-gcp-serial
  • /test images
  • /test unit

The following commands are available to trigger optional jobs:

  • /test e2e-metal-ipi
  • /test e2e-metal-ipi-dualstack

Use /test all to run the following jobs that were automatically triggered:

  • pull-ci-openshift-coredns-master-e2e-aws
  • pull-ci-openshift-coredns-master-e2e-aws-upgrade
  • pull-ci-openshift-coredns-master-e2e-gcp-serial
  • pull-ci-openshift-coredns-master-e2e-metal-ipi
  • pull-ci-openshift-coredns-master-images
  • pull-ci-openshift-coredns-master-unit
Details

In response to this:

/retest ci/prow/e2e-metal-ipi
May be fixed now.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@gcs278
Copy link
Copy Markdown
Author

gcs278 commented Sep 29, 2022

/test ci/prow/e2e-metal-ipi
may be fixed now.

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Sep 29, 2022

@gcs278: The specified target(s) for /test were not found.
The following commands are available to trigger required jobs:

  • /test e2e-aws
  • /test e2e-aws-upgrade
  • /test e2e-gcp-serial
  • /test images
  • /test unit

The following commands are available to trigger optional jobs:

  • /test e2e-metal-ipi
  • /test e2e-metal-ipi-dualstack

Use /test all to run the following jobs that were automatically triggered:

  • pull-ci-openshift-coredns-master-e2e-aws
  • pull-ci-openshift-coredns-master-e2e-aws-upgrade
  • pull-ci-openshift-coredns-master-e2e-gcp-serial
  • pull-ci-openshift-coredns-master-e2e-metal-ipi
  • pull-ci-openshift-coredns-master-images
  • pull-ci-openshift-coredns-master-unit
Details

In response to this:

/test ci/prow/e2e-metal-ipi
may be fixed now.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@gcs278
Copy link
Copy Markdown
Author

gcs278 commented Sep 29, 2022

/test e2e-metal-ipi
may be fixed now.

@cybertron
Copy link
Copy Markdown
Member

/test e2e-metal-ipi

I'm seeing a lot of io timeouts in the coredns logs and it looks like the whole deployment timed out. Maybe the test node was having issues?

@brandisher
Copy link
Copy Markdown

OVNKubernetesControllerDisconnectedSouthboundDatabase
/test e2e-gcp-serial

@gcs278
Copy link
Copy Markdown
Author

gcs278 commented Sep 30, 2022

e2e-metal-ipi worked ✔️ thanks @cybertron

e2e-gcp-serial is a lost cause given the outstanding OVN and disruption bugs. I think we need an override now.

Miciah and others added 2 commits September 30, 2022 10:19
Should be reevaluated next rebase.

Co-authored-by: Ryan Fredette <rfredette@redhat.com>
Modified-by: Grant Spence <gspence@redhat.com>
Disable dependabot in the openshift fork
Comment thread plugin/kubernetes/external.go Outdated
Comment on lines 49 to 57
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's some weird re-indentation going on here.

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you mean spaces vs. indents? Great catch, I didn't see that my edits used spaces in github diff or in my editors.
fixed

…lity (coredns#5019)"

This reverts commit abaf938.

We will carry this commit in OpenShift 4.11 to provide any users with
applications that use wildcard DNS lookups more time to migrate their
applications.

Modified-by: Grant Spence <gspence@redhat.com>
@Miciah
Copy link
Copy Markdown

Miciah commented Sep 30, 2022

In the course of reviewing the wildcard carry patch (where @gcs278 had to resolve some conflicts for this rebase), I found and reported coredns#5657. If I apply coredns#5657 on top of #76, then this test case for TestExternal fails:

	{
		Qname: "*._not-udp-or-tcp.svc1.testns.example.com.", Rcode: dns.RcodeSuccess,
	},

However, the same test fails if I check out the v1.8.7 tag (the last upstream version that supported wildcard lookups) and fix TestExternal there. I believe that this test case was always incorrect: The test case has a query for a wildcard with no match, so it should expect an error response.

Additionally, I tried the following two test cases:

	{
		Qname: "any._tcp.svc1.testns.example.com.", Rcode: dns.RcodeSuccess,
		Msg: []msg.Service{
			{Host: "1.2.3.4", Port: 80, TTL: 5, Key: "/c/org/example/testns/svc1"},
		},
	},
	{
		Qname: "_any._tcp.svc1.testns.example.com.", Rcode: dns.RcodeSuccess,
		Msg: []msg.Service{
			{Host: "1.2.3.4", Port: 80, TTL: 5, Key: "/c/org/example/testns/svc1"},
		},
	},

These test cases both pass on v1.8.7 with TestExternal fixed and on coredns#5657, so I believe there has always been a bug in the wildcard logic (that is, both "any" and "_any" are treated as wildcards), and this PR maintains bug-for-bug compatibility.

Let's get this PR merged and let it soak.

If upstream accepts coredns#5657 and someone asks for us to fix the bug in openshift/coredns, then we can treat it as a bug like any other and fix it with a carry patch for coredns#5657.

/lgtm
/approve

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label Sep 30, 2022
@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Sep 30, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Miciah

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci Bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 30, 2022
@Miciah
Copy link
Copy Markdown

Miciah commented Sep 30, 2022

e2e-aws-upgrade failed with the following failure:

[sig-arch] events should not repeat pathologically
{  1 events happened too frequently  event happened 27 times, something is wrong: ns/openshift-console-operator pod/console-operator-55ff985f74-zbf64 node/ip-10-0-155-208.ec2.internal - reason/ProbeError Readiness probe error: Get "https://10.130.0.35:8443/readyz": dial tcp 10.130.0.35:8443: connect: connection refused body:  }

The closest match for this failure that I found is BZ#1990419 [sig-arch] events should not repeat pathologically - event happened more than 20 times, something is wrong: ns/openshift-console pod/console-XXX node/XXX - reason/Unhealthy Readiness probe failed, which was closed due to insufficient data. Let's see if the same failure re-occurs.

/test e2e-aws-upgrade

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Oct 1, 2022

@gcs278: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-robot openshift-merge-robot merged commit c791eb6 into openshift:master Oct 1, 2022
@openshift-ci-robot
Copy link
Copy Markdown

@gcs278: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-1731 has been moved to the MODIFIED state.

Details

In response to this:

Rebased to CoreDNS 1.10.0 so that we use the Kubernetes 1.25 packages.

I made this PR using the same process as #73, #52, #60, and #70:

  1. git remote update
  2. git checkout v1.10.0
  3. git checkout -b merge-1.10.0-tmp
  4. git checkout origin/master
  5. echo 'merge coredns/coredns v1.10.0' | git commit-tree 'merge-1.10.0-tmp^{tree}' -p HEAD -p merge-1.10.0-tmp -F -
    ead3b6507d7bd2fc3e67b79d8ff0dff296396bac
  6. git branch merge-1.10.0 ead3b6507d7bd2fc3e67b79d8ff0dff296396bac
  7. git checkout merge-1.10.0
  8. git rev-list --reverse --no-merges 555dd549ee36ba7f626cf8c53707c74af318ec09..origin/master | git cherry-pick --stdin
    Note: 555dd549ee36ba7f626cf8c53707c74af318ec09 is the merge commit from the last merge Bug 2090827: Merge 1.9.2 #73
  9. My merge commit from the above process was commit ead3b65.

Before the rebase, we had the following commits:

% git --no-pager log --oneline --no-merges 555dd549ee36ba7f626cf8c53707c74af318ec09..origin/master
ad24eacf6 Updating coredns images to be consistent with ART Reconciling with https://github.com/openshift/ocp-build-data/tree/2e5eba0108299087402c119ba0dc979a0a6c0bd1/images/coredns.yml
349db7a33 UPSTREAM: <carry>: openshift: Revert "Revert "add wildcard warnings (#5030)" (#5167)"
461cbbf60 UPSTREAM: <carry>: openshift: Revert "remove wildcard query functionality (#5019)"
7a41d2b87 UPSTREAM: <carry>: openshift: Disable dependabot
1d2d4f767 UPSTREAM: <carry>: openshift: Vendor required modules
3dc197d15 UPSTREAM: <carry>: openshift: .gitignore: Properly ignore coredns binary
9176cd5bf UPSTREAM: <carry>: openshift: Make coredns exclusion more specific
488cc73b1 UPSTREAM: <carry>: openshift: Add a `make test` target
b648be195 UPSTREAM: <carry>: openshift: Add product build config
1e6995352 UPSTREAM: <carry>: openshift: Add OWNERS
% 

I edited the "Vendor required modules" commit by running go mod vendor and go mod tidy and ammend commit 1d2d4f767 UPSTREAM: <carry>: openshift: Vendor required modules.

I squashed/merged the following commit into the existing "Add product build config" commit:

ad24eacf6 Updating coredns images to be consistent with ART Reconciling with https://github.com/openshift/ocp-build-data/tree/2e5eba0108299087402c119ba0dc979a0a6c0bd1/images/coredns.ym

Git merge conflicts for 461cbbf60 UPSTREAM: <carry>: openshift: Revert "remove wildcard query functionality (#5019)":
plugin/kubernetes/kubernetes.go

  • Line 630: matchPortAndProtocol function comment update, but matchPortAndProtocol function has been removed so I ignored the updates (see PR Delta)

plugin/kubernetes/external.go

  • Line 52: changes to variables declaration conflicted because they added endpoint as a string. I merged by taking upstream variable declarations, but added port = "*" and protocol = "*" assignment below for reversion (see PR Delta)
  • Line 114 & 134: Refactoring moved calls to matchPortAndProtocol and added it in an additional location for resolving headless services (see PR delta)
    • I'm assuming we want wildcard support for headless and that wildcard support is remove via matchPortAndProtocol, but we don't have that function anyways so just using the match function.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@gcs278 gcs278 mentioned this pull request Feb 15, 2023
@gcs278 gcs278 mentioned this pull request Aug 8, 2023
@gcs278 gcs278 mentioned this pull request May 9, 2024
jjkiely pushed a commit to Kuadrant/coredns that referenced this pull request Sep 24, 2025
bentito pushed a commit to bentito/coredns that referenced this pull request Nov 21, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged. qe-approved Signifies that QE has signed off on this PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.