Commit Graph

72 Commits

Author SHA1 Message Date
Quan Tian
5dd9184945 Fix SCTP default-deny test
The test is about SCTP and the accessed service only forwarded SCTP
traffic to the server Pod but the client Pod used TCP protocol, so the
test traffic never reached the server Pod and the test NetworkPolicy
was never enforced, which lead to test success even if the default-deny
policy was implemented wrongly. In some cases it may got failure result
if there was an external server having same IP as the cluster IP and
listening to TCP 80 port.

Signed-off-by: Quan Tian <qtian@vmware.com>
2022-06-06 13:14:07 +08:00
Kubernetes Prow Robot
f161dde085 Merge pull request #109977 from JohnTitor/remove-poddelete-use
Remove the use of derecated `PodDeleteTimeout` const
2022-05-27 06:21:08 -07:00
Quan Tian
b792f7392f Correct errors in the netpol test suite
It was confusing to see message saying "unable to update pod" when it
was actually trying to create a Pod.

Signed-off-by: Quan Tian <qtian@vmware.com>
2022-05-12 10:48:51 +08:00
Yuki Okushi
6bc6a671ae Remove the use of derecated PodDeleteTimeout const 2022-05-12 01:58:23 +09:00
Sergiusz Urbaniak
1495c9f2cd test/e2e/*: default existing tests to privileged pod security policy
This is to ensure that all existing tests don't break when defaulting
the pod security policy to restricted in the e2e test framework.
2022-04-05 08:41:12 +02:00
Ricardo Katz
42a1201082 Implementation on Network Policy Status (#107963)
* Implement status subresource in NetworkPolicy

* add NetworkPolicyStatus generated files

* Fix comments in netpol status review
2022-03-29 01:52:48 -07:00
Sergiusz Urbaniak
373c08e0c7 test/e2e/framework: configure pod security admission level for e2e tests 2022-03-28 15:42:10 +02:00
hxie
56382ddf16 Increase number of workers to 3 for Windows
Number of workers was set to be 1 because prallel probing on Windows is
flakier, network policy tests may get stuck, this symptom disappears on
the newest kubernetes, network poicy tests run very well with 3 workers.
2022-01-25 21:32:21 -08:00
hxie
ac0f2e48ad Support UDP test for netwpol on windows 2022-01-18 17:02:18 -08:00
Cristian Boarna
bcb7b938a6 feat(netpol tests): added netpol probeConnectivity args improvement 2021-12-21 12:32:09 +02:00
Davanum Srinivas
9405e9b55e Check in OWNERS modified by update-yamlfmt.sh
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
2021-12-09 21:31:26 -05:00
Ahmed Aghadi
93d858c46e Improve checks for test/e2e/network and test/e2e/network/netpol (#106655) 2021-12-07 22:07:56 -08:00
Tim Hockin
11a25bfeb6 De-share the Handler struct in core API (#105979)
* De-share the Handler struct in core API

An upcoming PR adds a handler that only applies on one of these paths.
Having fields that don't work seems bad.

This never should have been shared.  Lifecycle hooks are like a "write"
while probes are more like a "read". HTTPGet and TCPSocket don't really
make sense as lifecycle hooks (but I can't take that back). When we add
gRPC, it is EXPLICITLY a health check (defined by gRPC) not an arbitrary
RPC - so a probe makes sense but a hook does not.

In the future I can also see adding lifecycle hooks that don't make
sense as probes.  E.g. 'sleep' is a common lifecycle request. The only
option is `exec`, which requires having a sleep binary in your image.

* Run update scripts
2021-10-29 13:15:11 -07:00
ishangupta-ds
4353365aa9 updated errors pkg to fmt for test/e2e/network/netopol test_helper
Signed-off-by: ishangupta-ds <ishangupta.ds@gmail.com>
2021-09-26 10:50:38 +05:30
Antonio Ojea
0cd75e8fec run hack/update-netparse-cve.sh 2021-08-20 10:42:09 +02:00
Rajas Kakodkar
e36a14730b reducing the number of containers created based on the ports used 2021-08-12 23:36:28 +05:30
Kubernetes Prow Robot
d77af28a35 Merge pull request #104086 from jayunit100/patch-27
(experimental) Calibrate networkpolicy test aggressiveness
2021-08-12 06:09:48 -07:00
jay vyas
145cec925a reduce the number of containers created by 66%
Co-authored-by: jay vyas <jvyas@vmware.com>
Co-authored-by: rajas kakodkar <rkakodkar@vmware.com>
2021-08-12 02:08:00 +05:30
Dan Winship
72223406ac Remove stray DNS port references in NetPol tests
The tests no longer use DNS, so we shouldn't be adding DNS-related
exceptions to the policies that are being tested.
2021-08-02 10:31:59 -04:00
jay vyas
59c0523bca Using ServiceIPs instead of DNS names in the NetworkPolicy Probes + adding Interface decoupling (#102354)
* Squashed commit of the following:

commit 7f774dcb54b511a3956aed0fac5c803f145e383a
Author: Jay Vyas (jayunit100) <jvyas@vmware.com>
Date:   Fri Jun 18 10:58:16 2021 +0000

    fix commit message

commit 0ac09650742f02004dbb227310057ea3760c4da9
Author: jay vyas <jvyas@vmware.com>
Date:   Thu Jun 17 07:50:33 2021 -0400

    Update test/e2e/network/netpol/kubemanager.go

    Co-authored-by: Antonio Ojea <antonio.ojea.garcia@gmail.com>

commit 6a8bf0a6a2690dac56fec2bdcdce929311c513ca
Author: jay vyas <jvyas@vmware.com>
Date:   Sun Jun 13 08:17:25 2021 -0400

    Implement Service polling for network policy suite to remove reliance on CoreDNS when verifying network policys

    Update test/e2e/network/netpol/probe.go

    Co-authored-by: Antonio Ojea <antonio.ojea.garcia@gmail.com>

    Add deafultNS to use service probe

commit b9c17a48327aab35a855540c2294a51137aa4a48
Author: Matthew Fenwick <mfenwick100@gmail.com>
Date:   Thu May 27 07:30:59 2021 -0400

    address code review comments for networkpolicy decoupling from dns

commit e23ef6ff0d189cf2ed80dbafed9881d68402cb56
Author: jay vyas <jvyas@vmware.com>
Date:   Wed May 26 13:30:21 2021 -0400

    NetworkPolicy decoupling from DNS

gofmt

remove old function

* model refactor

* minor

* dropped getK8sModel func

* dropped modelMap, added global model in BeforeEach and subsequent changes

Co-authored-by: Rajas Kakodkar <rajaskakodkar16@gmail.com>
2021-07-19 23:09:32 -07:00
Rajas Kakodkar
266ffa8526 bug fix in sctp test 2021-06-27 21:53:41 +05:30
Shiming Zhang
674802147c update to remove github.com/pkg/errors 2021-06-23 22:56:48 +08:00
Andrew Sy Kim
9e694a45f9 test/e2e/network: mark tests in test/e2e/network/netpol/network_legacy.go with NetworkPolicyLegacy
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-06-16 19:44:27 -04:00
Kubernetes Prow Robot
4ebf4a08c0 Merge pull request #100447 from JornShen/add_netpol_immutable_label_for_ns
add e2e test for default label selector for NS in netpol
2021-06-14 09:49:04 -07:00
jornshen
f22b07d8b4 add e2e test for immutable label selector in netpol 2021-06-08 09:52:12 +08:00
Dan Winship
211e974722 Clarify and split up the "not actually SCTP" SCTP NetworkPolicy test
These tests *do* apply to plugins that don't support SCTP.
2021-06-02 09:10:25 -04:00
Dan Winship
4b0d0d6fc7 Fix spurious Feature tags on some NetworkPolicy tests
The "[Feature:SCTP]" tag was needed on "should not allow access by TCP
when a policy specifies only SCTP" back when SCTP was alpha, because
it wasn't possible to create a policy that even mentioned SCTP without
enabling the feature gate. This no longer applies, and the tag was
removed from the original copy of network_policy.go, but accidentally
got left behind in the netpol/ version.

Likewise, the newly-added "should not allow access by TCP when a
policy specifies only UDP" got tagged "[Feature:UDP]", but this was
never necessary, and is inconsistent with other UDP tests anyway.

Similarly, we need "[Feature:SCTPConnectivity]" on tests that make
SCTP connections, because that functionality is not available in all
clusters, but "[Feature:UDPConnectivity]" is unnecessary and
inconsistent.
2021-06-02 09:10:25 -04:00
Kubernetes Prow Robot
29e5e4df4b Merge pull request #99777 from JornShen/add_e2e_api_validate_endport
add API e2e test for port ranges of netpolices
2021-05-26 19:34:23 -07:00
jornshen
90e215dfd2 add api e2e test for port ranges of netpolices 2021-05-26 20:00:11 +08:00
jay vyas
8651fcb25a Implement a windows Netpol NewModel 2021-05-25 21:08:29 -04:00
Peri Thompson
69019a03d3 Add netpol tests for windows
Co-authored-by: Jay Vyas <jvyas@vmware.com>
2021-05-24 13:28:04 -04:00
Kubernetes Prow Robot
e824c59913 Merge pull request #99696 from JornShen/refactor_netpol_policies
refactor netpol/policies.go
2021-04-14 15:17:07 -07:00
Kubernetes Prow Robot
c51450609f Merge pull request #100839 from jayunit100/patch-25
add network-policy label automatically
2021-04-10 19:03:47 -07:00
Kubernetes Prow Robot
fded3d71e5 Merge pull request #100676 from squeed/netpol-v6-test
test/e2e: handle ipv6 addresses in netpol tests
2021-04-09 05:19:53 -07:00
jay vyas
cd58735777 add network-policy label automatically 2021-04-05 09:36:15 -07:00
Niekvdplas
fec272a7b2 Fixed several spelling mistakes 2021-03-30 23:02:09 +02:00
Casey Callendrello
1efd456bcf test/e2e: handle ipv6 addresses in netpol tests
The tests, as written, don't correctly join ip and port for v6
addresses.

use net.JoinHostPort to handle this case.
2021-03-30 16:41:06 +02:00
jornshen
cd2af69ef9 refector netpol/policies.go 2021-03-05 19:21:36 +08:00
Benjamin Elder
56e092e382 hack/update-bazel.sh 2021-02-28 15:17:29 -08:00
Kubernetes Prow Robot
c410910c1f Merge pull request #99512 from knabben/add-netpol-ports
Adding specific protocol network policy test
2021-02-28 07:36:39 -08:00
wojtekt
749922fa46 Cleanup SIGDescribe in test/e2e/network 2021-02-27 20:29:27 +01:00
Amim Knabben
20263a07a6 Added protocol specific netpol 2021-02-26 18:11:45 -05:00
Kubernetes Prow Robot
319ff51c21 Merge pull request #97701 from knabben/allow-traffic-or
Testing multiple pods using label selector
2021-02-19 03:14:26 -08:00
Kubernetes Prow Robot
b710c1043a Merge pull request #98389 from knabben/allow-traffic-other-ns
Allow ingress from pods on another namespace
2021-02-18 19:04:24 -08:00
Amim Knabben
a41fb30d88 Adding UDP network policies tests 2021-02-13 19:01:38 -05:00
Amim Knabben
0fc096e3aa Allow ingress from pods in all namespaces 2021-02-10 21:03:54 -05:00
Kubernetes Prow Robot
8a8caf317b Merge pull request #97616 from knabben/netpol-2a-allow
Netpol E2E test should allow traffic to an application
2021-02-10 16:56:16 -08:00
Amim Knabben
61f02b85d7 Testing multiple pods using label selector 2021-02-10 16:00:02 -05:00
Amim Knabben
96a7b2a102 Deny ingress on other namespaces 2021-02-09 10:15:59 -05:00
Amim Knabben
189edf1e73 Default deny all egress from pods in the namespace 2021-02-07 11:55:50 -05:00