Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-11393

API usage document for route.spec.tls.insecureEdgeTerminationPolicy shows incorrect values in RHOCP 4

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done-Errata
    • Icon: Normal Normal
    • 4.14.0
    • 4.10.z
    • Networking / router
    • None
    • Moderate
    • No
    • 2
    • Sprint 234, Sprint 235, Sprint 236, Sprint 237
    • 4
    • Rejected
    • False
    • Hide

      None

      Show
      None
    • Hide
      * Previously, `oc explain route.spec.tls.insecureEdgeTerminationPolicy` documented the incorrect possible options that could be confusing some users. With this release, the API documentation has been updated so that it shows the correct possible options for `insecureEdgeTerminationPolicy`. This is an API documentation fix only. (link:https://issues.redhat.com/browse/OCPBUGS-11393[*OCPBUGS-11393*])
      Show
      * Previously, `oc explain route.spec.tls.insecureEdgeTerminationPolicy` documented the incorrect possible options that could be confusing some users. With this release, the API documentation has been updated so that it shows the correct possible options for `insecureEdgeTerminationPolicy`. This is an API documentation fix only. (link: https://issues.redhat.com/browse/OCPBUGS-11393 [* OCPBUGS-11393 *])
    • Bug Fix
    • Done

      Description of problem:

      Command `$ oc explain route.spec.tls.insecureEdgeTerminationPolicy` shows different values than the actual values.

      Version-Release number of selected component (if applicable):

      4.10.z

      How reproducible:

      100%

      Steps to Reproduce:

      1. $ oc explain route.spec.tls.insecureEdgeTerminationPolicy
      KIND:     Route
      VERSION:  route.openshift.io/v1FIELD:    insecureEdgeTerminationPolicy <string>DESCRIPTION:
           insecureEdgeTerminationPolicy indicates the desired behavior for insecure
           connections to a route. While each router may make its own decisions on
           which ports to expose, this is normally port 80.     
          
           * Allow - traffic is sent to the server on the insecure port (default)
           * Disable - no traffic is allowed on the insecure port.
           * Redirect - clients are redirected to the secure port.
      
      2. Set the option to 'Disable' in any secure route :
         $ oc edit route <route-name>
           spec:
             host: hello.example.com
             port:
               targetPort: https
             tls:
               insecureEdgeTerminationPolicy: Disable
      
      3. After editing the route and setting `insecureEdgeTerminationPolicy: Disable` , it gives error :
      Danger alert:An error occurred
      Error "Invalid value: "Disable": invalid value for InsecureEdgeTerminationPolicy option, acceptable values are None, Allow, Redirect, or empty" for field "spec.tls.insecureEdgeTerminationPolicy".

      Actual results:

      Based on the API Usage information, the Disable value for insecureEdgeTerminationPolicy field is not acceptable.

      Expected results:

      The `oc explain route.spec.tls.insecureEdgeTerminationPolicy` must show the correct values.

      Additional info:

       

              gspence@redhat.com Grant Spence
              rhn-support-sdharma Suruchi Dharma
              Shudi Li Shudi Li
              Votes:
              0 Vote for this issue
              Watchers:
              8 Start watching this issue

                Created:
                Updated:
                Resolved: