-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ANP conformance tests for .Spec.Ingress
and .Spec.Egress
fields
#99
Add ANP conformance tests for .Spec.Ingress
and .Spec.Egress
fields
#99
Conversation
✅ Deploy Preview for kubernetes-sigs-network-policy-api ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
/hold |
.Spec.Ingress
and .Spec.Egress
fields.Spec.Ingress
and .Spec.Egress
fields
fe40898
to
f29d48b
Compare
f29d48b
to
70c4bfe
Compare
.Spec.Ingress
and .Spec.Egress
fields.Spec.Ingress
and .Spec.Egress
fields
conformance/tests/admin-network-policy-core-ingress-tcp-rules.yaml
Outdated
Show resolved
Hide resolved
This commit tests .Spec.Ingress specifically. We test deny, allow and pass actions. We test TCP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Ingress specifically. We test deny, allow and pass actions. We test SCTP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Ingress specifically. We test deny, allow and pass actions. We test UDP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Egress specifically. We test deny, allow and pass actions. We test TCP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Egress specifically. We test deny, allow and pass actions. We test UDP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
This commit tests .Spec.Egress specifically. We test deny, allow and pass actions. We test SCTP protocol with and without port combination. TODO: In future add test for port range and named ports. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
70c4bfe
to
23e4bc0
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: astoycos, tssurya The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold cancel |
This PR adds conformance for ingress rules and egress rules with 3 actions deny/allow/pass across all 3 protocols udp/sctp/tcp with and without ports.
A new suite of tests will be added for mix of both ingress & egress rules called gressRules with mix of protocols in a new PR.
Depends on #98
Sample Output: