This document contains manual test steps for PR openbao#2863.
All required files are attached in this gist.
1. Create test certificates.
cat <<EOF >certs.yaml
subject: cn=server-caThis document contains manual test steps for PR openbao#2863.
All required files are attached in this gist.
1. Create test certificates.
cat <<EOF >certs.yaml
subject: cn=server-caReproduction steps for https://github.com/orgs/openbao/discussions/2721
The Puppet server CA fails to preserve the encoding of the CA certificate subject name when issuing new certificates.
The issuer field in issued certificates is always re-encoded as a UTF8String.
When Go crypto builds a chain to a trust anchor, it compares the raw bytes of a certificate's issuer to the subject of its issuing certificate. Because the CA re-encodes this field, validation fails due to mismatching DNs.
This document contains manually executed test scenarios related to PR projectcontour/contour#6906
To collect gRPC debugs, you can use https://github.com/tsaarni/grpc-json-sniffer.
patch -p1 < grpc-sniffer.patch.| Fetching OIDC discovery endpoint from https://kubernetes.default.svc/.well-known/openid-configuration... | |
| Fetching public keys from https://172.20.0.3:6443/openid/v1/jwks... | |
| Validating the default service account token in the pod... | |
| Token is valid! | |
| Claims: { | |
| "aud": [ | |
| "https://kubernetes.default.svc.cluster.local" | |
| ], | |
| "exp": 1749207355, | |
| "iat": 1717671355, |
| apiVersion: apps/v1 | |
| kind: Deployment | |
| metadata: | |
| name: echoserver | |
| spec: | |
| selector: | |
| matchLabels: | |
| app: echoserver | |
| template: | |
| metadata: |
This tutorial is a step-by-step guide to making a small code change to Contour. It shows how to run Contour locally on your laptop and have it control Envoy(s) running in a Kind cluster. It allows for a very fast feedback cycle and easy debugging.
Create a Kind cluster, for example by running:
This document describes manual test procedure for PR projectcontour/contour#4772
The test is executed by using k6. Additionally, it uses InfluxDB to record the performance test results and Grafana to visualize them.
Spin up influxdb and grafana using docker-compose:
| #!/bin/env python3 | |
| # | |
| # This script can be used as a server when you need to test the handling of | |
| # TCP connection establishment timeouts of your client. | |
| # | |
| # The protocol can be HTTP, HTTPS or just about anything else, since connection | |
| # will never be established. It will hang in TCP handshake. | |
| # | |
| import socket |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/ratelimit/ratelimit.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/core/health_check.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/cluster/outlier_detection.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/admin/v2alpha/tap.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/rds.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/listener/udp_listener_config.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/cluster/filter.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/admin/v2alpha/server_info.proto | |
| proto_print /tmp/tmpoyvg8bdx/b/envoy/api/v2/listener/quic_config.proto | |
| Please apply following patch to directory './api' |