-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add BANP conformance tests for .Spec.Ingress and .Spec.Egress fields #109
Add BANP conformance tests for .Spec.Ingress and .Spec.Egress fields #109
Conversation
This commit tests .Spec.Egress specifically. We test deny, allow and pass actions. We test TCP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Egress specifically. We test deny, allow and pass actions. We test SCTP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Egress specifically. We test deny, allow and pass actions. We test UDP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Ingress specifically. We test deny, allow and pass actions. We test TCP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Ingress specifically. We test deny, allow and pass actions. We test SCTP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Ingress specifically. We test deny, allow and pass actions. We test UDP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
✅ Deploy Preview for kubernetes-sigs-network-policy-api ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One question otherwise looks good
conformance/tests/baseline-admin-network-policy-core-egress-sctp-rules_base.yaml
Outdated
Show resolved
Hide resolved
This commit simply moves the base yamls from the test folder into the base folder under sub directories that can be easily maintained. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
/lgtm |
Thanks @tssurya! |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: astoycos, tssurya The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This is same as done in #99 but for BANP.
Since we don't have BANP Pass action, we don't need that for the tests here.
Sample output as run on OVN-K cluster: