Skip to content

Commit 24b304b

Browse files
author
Ryan Lymburner
authored
Merge branch 'main' into dependabot/go_modules/golang.org/x/net-0.38.0
2 parents 0d16e53 + 603fbfb commit 24b304b

21 files changed

+229
-166
lines changed

.github/workflows/validate-merge-queue-e2e-test.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ jobs:
3737
cache-dependency-path: test/go.sum
3838
- name: Set up Docker Buildx
3939
uses: docker/setup-buildx-action@v3
40+
with:
41+
version: latest
4042
- name: Setup AWS credentials
4143
uses: aws-actions/configure-aws-credentials@v4
4244
with:
@@ -57,6 +59,8 @@ jobs:
5759
script: |
5860
core.exportVariable('ACTIONS_CACHE_URL', process.env['ACTIONS_CACHE_URL'])
5961
core.exportVariable('ACTIONS_RUNTIME_TOKEN', process.env['ACTIONS_RUNTIME_TOKEN'])
62+
core.exportVariable('ACTIONS_RESULTS_URL', process.env['ACTIONS_RESULTS_URL'])
63+
core.exportVariable('ACTIONS_CACHE_SERVICE_V2', process.env['ACTIONS_CACHE_SERVICE_V2'])
6064
- name: Build and push image
6165
run: |
6266
SKIP_BUILD_CHART=true scripts/release-controller.sh

.github/workflows/validate-pull-request-presubmit.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ jobs:
1818
with:
1919
go-version: ${{ env.GO_VERSION }}
2020
check-latest: true
21-
- uses: actions/cache@v3
21+
- uses: actions/cache@v4
2222
with:
2323
path: |
2424
~/.cache/go-build

.golangci.yaml

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,32 @@
1-
# https://golangci-lint.run/usage/configuration
1+
version: "2"
22
linters:
33
disable:
4-
- errcheck
4+
- errcheck
5+
exclusions:
6+
generated: lax
7+
presets:
8+
- comments
9+
- common-false-positives
10+
- legacy
11+
- std-error-handling
12+
paths:
13+
- third_party$
14+
- builtin$
15+
- examples$
16+
rules:
17+
- linters:
18+
- staticcheck
19+
text: "ST1012:"
20+
- linters:
21+
- staticcheck
22+
text: "QF1003:"
23+
- linters:
24+
- staticcheck
25+
text: "QF1001:"
26+
formatters:
27+
exclusions:
28+
generated: lax
29+
paths:
30+
- third_party$
31+
- builtin$
32+
- examples$

docs/concepts/overview.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,14 @@ With VPC Lattice you can also avoid some of these common problems:
6565
- **Sidecar management**: Changes to sidecars might require those sidecars to be reconfigured or rebooted.
6666
While this might not be a big issue for a handful of sidecars, it can be disruptive if you have thousands of pods, each with its own sidecar.
6767

68+
## Limitations
69+
70+
For those already familiar with the reference implementation of [Kubernetes Gateway API](https://gateway-api.sigs.k8s.io/), the API generally serves two purposes: enabling routing for both North-South (Ingress) and also East-West (Mesh) traffic.
71+
72+
The AWS Gateway API Controller is currently focused only on East-West (Mesh) traffic through VPC Lattice.
73+
74+
Many users will expect North-South (Ingress) ALB/NLB-type features. This is available (still using the v1 Ingress spec) from the [AWS Load Balancer Controller](https://github.com/kubernetes-sigs/aws-load-balancer-controller)
75+
6876
## Relationship between VPC Lattice and Kubernetes
6977

7078
As a Kubernetes user, you can have a very Kubernetes-native experience using the VPC Lattice APIs.

docs/guides/deploy.md

Lines changed: 135 additions & 131 deletions
Large diffs are not rendered by default.

pkg/controllers/accesslogpolicy_controller.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ func (r *accessLogPolicyReconciler) targetRefExists(ctx context.Context, alp *an
247247
grpcRoute := &gwv1.GRPCRoute{}
248248
err = r.client.Get(ctx, targetRefNamespacedName, grpcRoute)
249249
default:
250-
return false, fmt.Errorf("Access Log Policy targetRef is for unsupported Kind: %s", alp.Spec.TargetRef.Kind)
250+
return false, fmt.Errorf("access Log Policy targetRef is for unsupported Kind: %s", alp.Spec.TargetRef.Kind)
251251
}
252252

253253
if err != nil && !errors.IsNotFound(err) {
@@ -294,10 +294,10 @@ func (r *accessLogPolicyReconciler) updateAccessLogPolicyAnnotations(
294294
for _, als := range accessLogSubscriptions {
295295
if als.Spec.EventType != core.DeleteEvent {
296296
oldAlp := alp.DeepCopy()
297-
if alp.ObjectMeta.Annotations == nil {
298-
alp.ObjectMeta.Annotations = make(map[string]string)
297+
if alp.Annotations == nil {
298+
alp.Annotations = make(map[string]string)
299299
}
300-
alp.ObjectMeta.Annotations[anv1alpha1.AccessLogSubscriptionAnnotationKey] = als.Status.Arn
300+
alp.Annotations[anv1alpha1.AccessLogSubscriptionAnnotationKey] = als.Status.Arn
301301
if err := r.client.Patch(ctx, alp, client.MergeFrom(oldAlp)); err != nil {
302302
r.eventRecorder.Event(alp, corev1.EventTypeWarning, k8s.FailedReconcileEvent,
303303
"Failed to update annotation due to "+err.Error())

pkg/controllers/serviceexport_controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ func (r *serviceExportReconciler) reconcile(ctx context.Context, req ctrl.Reques
121121
return client.IgnoreNotFound(err)
122122
}
123123

124-
if srvExport.ObjectMeta.Annotations["application-networking.k8s.aws/federation"] != "amazon-vpc-lattice" {
124+
if srvExport.Annotations["application-networking.k8s.aws/federation"] != "amazon-vpc-lattice" {
125125
return nil
126126
}
127127
r.log.Debugf(ctx, "Found matching service export %s-%s", srvExport.Name, srvExport.Namespace)

pkg/deploy/lattice/listener_manager.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ func (d *defaultListenerManager) create(ctx context.Context, latticeSvcId string
109109
resp, err := d.cloud.Lattice().CreateListenerWithContext(ctx, &listenerInput)
110110
if err != nil {
111111
return model.ListenerStatus{},
112-
fmt.Errorf("Failed CreateListener %s due to %s", aws.StringValue(listenerInput.Name), err)
112+
fmt.Errorf("failed CreateListener %s due to %s", aws.StringValue(listenerInput.Name), err)
113113
}
114114
d.log.Infof(ctx, "Success CreateListener %s, %s", aws.StringValue(resp.Name), aws.StringValue(resp.Id))
115115

@@ -280,7 +280,7 @@ func (d *defaultListenerManager) Delete(ctx context.Context, modelListener *mode
280280
d.log.Debugf(ctx, "Listener already deleted")
281281
return nil
282282
}
283-
return fmt.Errorf("Failed DeleteListener %s, %s due to %s", modelListener.Status.Id, modelListener.Status.ServiceId, err)
283+
return fmt.Errorf("failed DeleteListener %s, %s due to %s", modelListener.Status.Id, modelListener.Status.ServiceId, err)
284284
}
285285

286286
d.log.Infof(ctx, "Success DeleteListener %s, %s", modelListener.Status.Id, modelListener.Status.ServiceId)

pkg/deploy/lattice/rule_synthesizer.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ func (r *ruleSynthesizer) createOrUpdateRules(ctx context.Context, rule *model.R
8787
}
8888
status, err := r.ruleManager.Upsert(ctx, rule, stackListener, stackSvc)
8989
if err != nil {
90-
return fmt.Errorf("Failed RuleManager.Upsert due to %s", err)
90+
return fmt.Errorf("failed RuleManager.Upsert due to %s", err)
9191
}
9292
rule.Status = &status
9393

pkg/deploy/lattice/target_group_manager.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ func (s *defaultTargetGroupManager) create(ctx context.Context, modelTg *model.T
103103
resp, err := lattice.CreateTargetGroupWithContext(ctx, &createInput)
104104
if err != nil {
105105
return model.TargetGroupStatus{},
106-
fmt.Errorf("Failed CreateTargetGroup %s due to %s", latticeTgName, err)
106+
fmt.Errorf("failed CreateTargetGroup %s due to %s", latticeTgName, err)
107107
}
108108
s.log.Infof(ctx, "Success CreateTargetGroup %s", latticeTgName)
109109

0 commit comments

Comments
 (0)