Skip to content

Conversation

@openshift-service-mesh-bot
Copy link

@openshift-service-mesh-bot openshift-service-mesh-bot commented Nov 21, 2025

Generated by Automator - 2025-12-05T05:03:33+00:00

zirain and others added 5 commits November 20, 2025 04:14
* add release-note for warmup aggression change

* Update releasenotes/notes/align-warmup-aggression.yaml

Co-authored-by: Faseela K <[email protected]>

---------

Co-authored-by: Faseela K <[email protected]>
…8292)

* prevent httproute status conflict with multi-revisions

Signed-off-by: Lucas Copi <[email protected]>

* add tagwatcher for status to all route types

Signed-off-by: Lucas Copi <[email protected]>

* add integration test and release note

Signed-off-by: Lucas Copi <[email protected]>

* lint

Signed-off-by: Lucas Copi <[email protected]>

* create new revision checker

Signed-off-by: Lucas Copi <[email protected]>

* check match revision in register status, not in the status collection handler

Signed-off-by: Lucas Copi <[email protected]>

* lint

Signed-off-by: Lucas Copi <[email protected]>

* fix goroutine leak

Signed-off-by: Lucas Copi <[email protected]>

---------

Signed-off-by: Lucas Copi <[email protected]>
…ntry (#58242)

* tests: add integration tests for BackendTLSPolicy applied to ServiceEntry

Signed-off-by: Jacek Ewertowski <[email protected]>

* Add a test case for BackendTLSPolicy with HTTPRoute

Signed-off-by: Jacek Ewertowski <[email protected]>

---------

Signed-off-by: Jacek Ewertowski <[email protected]>
howardjohn and others added 8 commits November 20, 2025 21:21
https://storage.googleapis.com/istio-prow/logs/integ-assertion_istio_postsubmit/1991626385549955072/artifacts/ambient-1000a77ac823425cb81d309/_suite_context/istio-state-882031679/primary-0/istiod-66599dbf4b-knz5h_discovery.previous.log

I believe this is because waypoint has different config from gateways

```
	if (cb.sidecarProxy() || cb.proxyType == model.Waypoint) && isAutoProtocol {
		// Use downstream protocol. If the incoming traffic use HTTP 1.1, the
		// upstream cluster will use HTTP 1.1, if incoming traffic use HTTP2,
		// the upstream cluster will use HTTP2.
		cb.setUseDownstreamProtocol(cluster)
	}
```

so we need to take this into account
* bump go-control-plane

* bump
@openshift-service-mesh-bot openshift-service-mesh-bot force-pushed the none-master-merge_upstream_istio_master-6253864e branch from 47dd415 to 4227de3 Compare November 24, 2025 05:09
fraenkel and others added 4 commits November 24, 2025 05:00
* Add timeout and headers support to Zipkin tracing provider

This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* Add timeout and headers support to Zipkin tracing provider

This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* This change adds two new optional fields to the ZipkinTracingProvider
in MeshConfig:

- `timeout`: Configures the HTTP request timeout when sending spans
  to the Zipkin collector, providing better control over trace export
  reliability and preventing indefinite waits.

- `headers`: Allows including custom HTTP headers in requests to the
  Zipkin collector for authentication, authorization, and custom
  metadata use cases. Headers support both direct values and
  environment variable references for secure credential management.

Implementation details:
- When timeout or headers are configured, Istio uses Envoy's modern
  HttpService configuration with full URI support
- When neither is configured, Istio uses legacy Envoy fields for
  backward compatibility
- Added comprehensive test coverage for all configuration modes
- Updated API documentation with usage examples

* Fixing the linitng issues

* Making the http service available to all proxies from 1.29
* Fix kubelet detection on MicroK8s with nftables backend

When Ambient mode is used with the nftables backend, this
PR fixes kubelet UID detection so that it works in MicroK8s,
where kubelet runs inside the unified “kubelite” daemon
rather than as a standalone process.

Fixes: istio/istio#58185
Signed-off-by: Sridhar Gaddam <[email protected]>

* Add release notes

Signed-off-by: Sridhar Gaddam <[email protected]>

---------

Signed-off-by: Sridhar Gaddam <[email protected]>
@openshift-service-mesh-bot openshift-service-mesh-bot force-pushed the none-master-merge_upstream_istio_master-6253864e branch from 4227de3 to 67a0c0e Compare November 25, 2025 05:05
@openshift-ci openshift-ci bot added size/XXL and removed size/L labels Nov 25, 2025
dgn and others added 6 commits November 25, 2025 05:45
* Update GIE CRDs to include support for >1 targetPorts

I planned on updating to v1.1.0 but ran into dependency issues. Now
pointing to the commit that loosened restrictions on number of
targetPorts.

* Add support for multiple targetPorts in InferencePool

This adds support for multiple targetPorts in an InferencePool by adding
all targetPorts to the shadow service, and then making sure that only a
single cluster is created for the dummy port (54321), allowing the EPP
to loadbalance across all endpoints.

* Add release note

* Add integration test and EPP mock

Co-Authored-By: Claude <[email protected]>

---------

Co-authored-by: Claude <[email protected]>
* Fix racy test

Signed-off-by: Keith Mattix II <[email protected]>

* Address comments

Signed-off-by: Keith Mattix II <[email protected]>

---------

Signed-off-by: Keith Mattix II <[email protected]>
This breaks things like a PEM cert in a configmap
* impl formatter custom tag

* e2e and release notes

* update

* encode query param

* update query

* update test
MaxBab and others added 6 commits December 1, 2025 04:45
Starting from Openshift 4.19 (1.32), GW API comes pre-installed
and should not be deployed.
But GatewayAPIInferenceExtension should be deployed on Openshift
in any condition.

Adding condition to make sure GatewayAPIInferenceExtension CRDs are
being deployed during the test execution.

Signed-off-by: Maxim Babushkin <[email protected]>
… have multiple IPs (#58398)

* nds: fix missing nametable entries for pods with multiple IP families

* add note

* update note

* use namespacedname type

* use local map instead of output map when checking if remote is skippable
@openshift-service-mesh-bot openshift-service-mesh-bot force-pushed the none-master-merge_upstream_istio_master-6253864e branch from c82455e to a9e2da3 Compare December 2, 2025 05:05
@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-pilot

@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

Two ambient tests were added and are using an experimental GW API, which could not be installed in OCP 4.19 and above.
Added those tests to be skipped.
openshift/release#72020

@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-sail-pilot

1 similar comment
@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-sail-pilot

@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-sail-ambient

@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-ambient

1 similar comment
@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-ambient

* krt: aggregate Join events for conflicting keys

* fix race in test

* fmt

* fix goroutine leak in backend policies and add handler cleanup

* better respect unchecked overlap flag

* typo

* relnote
@MaxBab
Copy link
Contributor

MaxBab commented Dec 2, 2025

/test istio-integration-ambient

When an existing Istio Ambient deployment using the iptables backend
is upgraded to the nftables backend, IstioCNI shouldn’t switch to
nftables silently. Doing so leaves stale iptables rules/IPsets on the
host. If this happens along with reconcileIptablesOnStartup setting,
the pod network namespaces end up with both nftables rules and the
old iptables rules.

In both cases, the stale iptables rules can cause issues until the node
is rebooted. This PR updates the IstioCNI initialization code to detect
any iptables artifacts on the host. If it finds them, it overrides the
nftables setting, keeps using the iptables backend, and logs a message
telling users to reboot the node to complete the migration. This allows
safe upgrades with no pod disruption in Ambient mode. After a reboot,
the old iptables artifacts are cleared and pods come up with clean
namespaces, completing the migration automatically.

Fixes: istio/istio#58353

Signed-off-by: Sridhar Gaddam <[email protected]>
@openshift-service-mesh-bot openshift-service-mesh-bot force-pushed the none-master-merge_upstream_istio_master-6253864e branch from a9e2da3 to 0ae1b0e Compare December 3, 2025 05:06
* fix proxy version check for built-in formatters

Signed-off-by: Rama Chavali <[email protected]>

* remove proxy version

Signed-off-by: Rama Chavali <[email protected]>

* lint

Signed-off-by: Rama Chavali <[email protected]>

---------

Signed-off-by: Rama Chavali <[email protected]>
@openshift-service-mesh-bot openshift-service-mesh-bot force-pushed the none-master-merge_upstream_istio_master-6253864e branch from 0ae1b0e to ee8517d Compare December 4, 2025 05:04
my-git9 and others added 4 commits December 4, 2025 05:40
It appears that TestServerSideLB is flaky in multi-network setup.
I think there are two contributing factors for that:

1. With two clusters we have twice as many backends to hit, so the same
   10 attempts may not always be enough
2. Specifically when waypoints are involved, we may be affected by
   istio/istio#58039, though after running the
   test locally, it does not seem critical.

Aside from that, I also cleaned up some of the skips that were added
when we just started running ambient integration tests in multi-cluster
environment.

As things stand now there are just three known reasons why we should skip
a test in ambient multi-cluster:

1. When in test workload behind a sidecar proxy tries to talk to a
   workload behind ztunnel (but not other way around) - the fix for that
   is tracked in istio/istio#57878, but given
   that interoperability between ambient and sidecar is not officially
   supported, it's ok to skip those tests.
2. We skip TestServiceDynamicEnroll because it's flaky in general and
   running it in single cluster mode as well as in multi-cluster mode just
   increases the chances of hitting a flake for somewhat unclear benefits
   at the moment; there is a ticket open to fix the test -
   istio/istio#58228.
3. We skip TestTrafficSplit at the moment because it relies on
   subsetting and we lose that information when we cross network
   boundary; it's debatable if we want to support this feature at all in
   multi-cluster, but for now we track it in
   istio/istio#58140.

All other tests should be running and passing in ambient multi-cluster
mode.

Fixes #58020
Fixes #58080
Fixes #56228

Signed-off-by: Mikhail Krinkin <[email protected]>
* Add missing permission for watching remote configmaps

Signed-off-by: Jacek Ewertowski <[email protected]>

* Implement watching remote trust domain

Signed-off-by: Jacek Ewertowski <[email protected]>

* Add a release note

Signed-off-by: Jacek Ewertowski <[email protected]>

* Implement restricted mesh watcher

Signed-off-by: Jacek Ewertowski <[email protected]>

* Make TestWatcher an impl of RestrictedConfigWatcher

Signed-off-by: Jacek Ewertowski <[email protected]>

---------

Signed-off-by: Jacek Ewertowski <[email protected]>
@MaxBab
Copy link
Contributor

MaxBab commented Dec 4, 2025

The test failure in telemetry test suite more complicated.
In the recent change, an existing test has been modified t oexecute a new feature, supported from istio 1.29 and above.
But version detection is not working properly.

I've created the following fix, but still need to work on it.
istio/istio#58494

istio-testing and others added 3 commits December 4, 2025 16:30
* upstream/master: (54 commits)
  update min k8s version (#58485)
  Automator: update ztunnel@master in istio/istio@master (#58480)
  pilot: watch meshConfig in remote clusters (#58455)
  Fix ambient multi-cluster integration tests (#58466)
  Automator: update common-files@master in istio/istio@master (#58495)
  improve the istioctl waypoint status describe and example (#58482)
  fix proxy version check for built-in formatters (#58469)
  Support safe migration from iptables to nftables in Ambient (#58354)
  krt: aggregate Join events for conflicting keys (#58324)
  Automator: update proxy@master in istio/istio@master (#58458)
  addons: Bump addons version (#58443)
  add indication for the requests count (#58454)
  `istioctl`: Display proxy cert serial numbers with trailing zeros (#58449)
  nds: fix missing IP addresses in headless nametable entries when pods have multiple IPs (#58398)
  Adapt TestInferencePoolMultipleTargetPorts test to Openshift (#58448)
  Add istiod_remote_cluster_sync_status metric (#58384)
  Automator: update proxy@master in istio/istio@master (#58446)
  Automator: update istio/client-go@master dependency in istio/istio@master (#58421)
  Automator: update proxy@master in istio/istio@master (#58439)
  Automator: update proxy@master in istio/istio@master (#58437)
  ...
@openshift-service-mesh-bot openshift-service-mesh-bot force-pushed the none-master-merge_upstream_istio_master-6253864e branch from ee8517d to b98e155 Compare December 5, 2025 05:03
@openshift-ci
Copy link

openshift-ci bot commented Dec 5, 2025

@openshift-service-mesh-bot: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/istio-integration-pilot b98e155 link true /test istio-integration-pilot
ci/prow/istio-integration-sail-telemetry b98e155 link true /test istio-integration-sail-telemetry
ci/prow/istio-integration-sail-pilot b98e155 link true /test istio-integration-sail-pilot
ci/prow/istio-integration-sail-ambient b98e155 link true /test istio-integration-sail-ambient

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.