File tree 3 files changed +113
-0
lines changed
conformance/reports/v1.2.1/kgateway
3 files changed +113
-0
lines changed Original file line number Diff line number Diff line change
1
+ # kgateway
2
+
3
+ ## Table of contents
4
+
5
+ | API channel | Implementation version | Mode | Report |
6
+ | --------------| -------------------------------------------------------------------------------| ---------| -----------------------------------------------------------|
7
+ | experimental | [ v2.0.0] ( https://github.com/kgateway-dev/kgateway/releases/tag/v2.0.0 ) | default | [ Link] ( ./v2.0.0-report.yaml ) |
8
+
9
+ ## Reproduce
10
+
11
+ > Note: [ this is a mirror of the steps outlined in the conformance GHA workflow] ( https://github.com/kgateway-dev/kgateway/blob/v2.0.0/.github/actions/kube-gateway-api-conformance-tests/action.yaml ) .
12
+
13
+ ### Prerequisites
14
+
15
+ In order to properly run the conformance tests, you need to have [ KinD] ( https://github.com/kubernetes-sigs/kind )
16
+ and [ Helm] ( https://github.com/helm/helm ) available in your environment.
17
+ To run the conformance tests suite we will first create a KinD cluster, use Helm to deploy kgateway and finally
18
+ run the conformance tests.
19
+
20
+ ### Steps
21
+
22
+ 1 . Clone the kgateway repository and checkout the release:
23
+
24
+ ``` sh
25
+ git clone https://github.com/kgateway-dev/kgateway.git
26
+ cd kgateway
27
+ export VERSION=" v2.0.0"
28
+ git checkout tags/$VERSION -b $VERSION
29
+ ```
30
+
31
+ 2 . Create the KinD cluster with [ MetalLB] ( https://metallb.io/ ) :
32
+
33
+ ``` sh
34
+ SKIP_DOCKER=true CONFORMANCE=true ci/kind/setup-kind.sh
35
+ ```
36
+
37
+ 3 . Deploy kgateway Helm charts:
38
+ ``` sh
39
+ helm upgrade -i --create-namespace --namespace kgateway-system --version $VERSION kgateway-crds oci://cr.kgateway.dev/kgateway-dev/charts/kgateway-crds
40
+
41
+ helm upgrade -i --namespace kgateway-system --version $VERSION kgateway oci://cr.kgateway.dev/kgateway-dev/charts/kgateway
42
+ ```
43
+
44
+ 4 . Run the conformance tests
45
+
46
+ ``` sh
47
+ make conformance
48
+ ```
49
+
50
+ 5 . View and verify the conformance report: ` cat _test/conformance/$VERSION-report.yaml `
Original file line number Diff line number Diff line change
1
+ apiVersion : gateway.networking.k8s.io/v1
2
+ date : " 2025-04-02T15:58:12Z"
3
+ gatewayAPIChannel : experimental
4
+ gatewayAPIVersion : v1.2.1
5
+ implementation :
6
+ contact :
7
+ - github.com/kgateway-dev/kgateway/issues/new/choose
8
+ organization : kgateway-dev
9
+ project : kgateway
10
+ url : github.com/kgateway-dev/kgateway
11
+ version : v2.0.0
12
+ kind : ConformanceReport
13
+ mode : default
14
+ profiles :
15
+ - core :
16
+ result : success
17
+ statistics :
18
+ Failed : 0
19
+ Passed : 33
20
+ Skipped : 0
21
+ extended :
22
+ result : success
23
+ statistics :
24
+ Failed : 0
25
+ Passed : 10
26
+ Skipped : 0
27
+ supportedFeatures :
28
+ - HTTPRouteBackendProtocolH2C
29
+ - HTTPRouteHostRewrite
30
+ - HTTPRouteMethodMatching
31
+ - HTTPRoutePathRedirect
32
+ - HTTPRoutePathRewrite
33
+ - HTTPRoutePortRedirect
34
+ - HTTPRouteQueryParamMatching
35
+ - HTTPRouteRequestMirror
36
+ - HTTPRouteResponseHeaderModification
37
+ - HTTPRouteSchemeRedirect
38
+ unsupportedFeatures :
39
+ - GatewayHTTPListenerIsolation
40
+ - GatewayInfrastructurePropagation
41
+ - GatewayPort8080
42
+ - GatewayStaticAddresses
43
+ - HTTPRouteBackendProtocolWebSocket
44
+ - HTTPRouteBackendRequestHeaderModification
45
+ - HTTPRouteBackendTimeout
46
+ - HTTPRouteDestinationPortMatching
47
+ - HTTPRouteParentRefPort
48
+ - HTTPRouteRequestMultipleMirrors
49
+ - HTTPRouteRequestTimeout
50
+ name : GATEWAY-HTTP
51
+ summary : Core tests succeeded. Extended tests succeeded.
Original file line number Diff line number Diff line change @@ -32,6 +32,7 @@ cover, and documentation to help users get started.
32
32
- [ HAProxy Kubernetes Ingress Controller] [ 32 ] (GA)
33
33
- [ HashiCorp Consul] [ 8 ]
34
34
- [ Istio] [ 9 ] (GA)
35
+ - [ kgateway] [ 37 ]
35
36
- [ Kong Ingress Controller] [ 10 ] (GA)
36
37
- [ Kong Gateway Operator] [ 35 ] (GA)
37
38
- [ Kuma] [ 11 ] (GA)
@@ -93,6 +94,7 @@ cover, and documentation to help users get started.
93
94
[ 34 ] :#airlock-microgateway
94
95
[ 35 ] :#kong-gateway-operator
95
96
[ 36 ] :#loxilb
97
+ [ 37 ] :#kgateway
96
98
97
99
98
100
[ gamma ] :/concepts/gamma/
@@ -359,6 +361,16 @@ Check out the [Gateway API task][istio-2] for more information about the Gateway
359
361
[ istio-1 ] :https://istio.io/latest/docs/tasks/traffic-management/ingress/
360
362
[ istio-2 ] :https://istio.io/latest/docs/tasks/traffic-management/ingress/gateway-api/
361
363
364
+ ### kgateway
365
+ [ ![ Conformance] ( https://img.shields.io/badge/Gateway%20API%20Partial%20Conformance%20v1.2.1-kgateway-orange )] ( https://github.com/kubernetes-sigs/gateway-api/blob/main/conformance/reports/v1.2.1/kgateway )
366
+
367
+ [ kgateway] is a feature-rich, Kubernetes-native ingress controller and next-generation API gateway.
368
+ It is focused on maintaining an great HTTP experience, a wealth of features and great interoperability with service mesh such as Istio.
369
+ This focus means that you can easily configure a set of Envoy instances that are reasonably distributed in a performant way.
370
+
371
+ [ kgateway ] :https://kgateway.dev/docs
372
+
373
+
362
374
### Kong Kubernetes Ingress Controller
363
375
364
376
[ ![ Conformance] ( https://img.shields.io/badge/Gateway%20API%20Conformance%20v1.2.1-Kong%20Ingress%20Controller-green )] ( https://github.com/kubernetes-sigs/gateway-api/blob/main/conformance/reports/v1.2.1/kong-kubernetes-ingress-controller )
You can’t perform that action at this time.
0 commit comments