-
Notifications
You must be signed in to change notification settings - Fork 243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update the publicDNSQueryURI in DNS Check to https://quay.io #4477
base: main
Are you sure you want to change the base?
Conversation
Skipping CI for Draft Pull Request. |
pkg/crc/services/dns/dns.go
Outdated
@@ -119,7 +119,7 @@ func CheckCRCPublicDNSReachable(serviceConfig services.ServicePostStartConfig) ( | |||
// try without using proxy | |||
proxyConfig = &httpproxy.ProxyConfig{} | |||
} | |||
curlArgs := []string{"--head", publicDNSQueryURI} | |||
curlArgs := []string{"--head", publicDNSQueryURI, "-L"} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Follow is good, but I think it is better to do
curl -sSL
-S
: This option is used in conjunction with -s
(silent). It stands for "show error." When used with -s
, it will still suppress the progress meter but will show error messages if the request fails. This could be beneficial for logging and debugging purposes since it reduces noise. It might even be possible to return the actual error as user-facing information. WDYT?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for the review - I updated the PR to use the https://quay.io
as I feel it's simpler to just update the URL.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
97ee5fc#r1853762839 => Perhaps the error message can be helpful to the user.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's a DNS check, not a what's showing at the website check. Why is this needed?
is not an error.
|
|
@kaovilai yes but checking at https://quay.io instead of http://quay.io returns |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would prefer the test actually be a dns query as the name implies...
❯ dig quay.io +short
54.243.17.128
54.85.81.91
3.219.175.113
54.210.148.48
52.54.136.228
52.55.96.46
~
❯ dig non-exist.quay.io +short
and check for non-empty output.
but this is a step in the right direction. just saying it's not solving an error.
@kaovilai: changing LGTM is restricted to collaborators In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: kaovilai The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@vyasgun: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@praveenkumar you are right -- it is not directly related to the issue except that as mentioned in the description, it was seen in the logs of this issue and prompted some discussion and I was looking into it. This is not even an error but just adding |
This used to be tested this way, but this does not work when an http proxy is involved. This was changed in 52279b3eaf7c7b , details can be found in the commit log. We could also have two different code paths for proxy/non-proxy, not sure this was discussed/considered at the time of this PR. |
Relates to: Issue #4218 (error code
301
was seen in this issue)Solution/Idea
Change the publicDNSQueryURI to
https
to prevent301 Moved Permanently
during DNS check.The alternate is to add
-sSL
flags to the curl command during the check for a quiet follow to any redirects.