kubernetes-sigs / network-policy-api

This repo addresses further work involving Kubernetes network security beyond the initial NetworkPolicy resource
Apache License 2.0
51 stars 29 forks source link

Add conformance for `Gress` rules #112

Closed tssurya closed 1 year ago

tssurya commented 1 year ago

So far we have been adding modular testing for "ingress" and "egress" rules separately over TCP/UDP/SCTP test suites. What happens when we have a mix of them all in the same CRD? Let's ensure we have coverage for that for both BANP & ANP.

netlify[bot] commented 1 year ago

Deploy Preview for kubernetes-sigs-network-policy-api ready!

Name Link
Latest commit 3d592baea779402b78c1ea699ce492d9eb32471d
Latest deploy log https://app.netlify.com/sites/kubernetes-sigs-network-policy-api/deploys/649c18f252d1600007d3472f
Deploy Preview https://deploy-preview-112--kubernetes-sigs-network-policy-api.netlify.app
Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

astoycos commented 1 year ago

Is this ready to go @tssurya?

tssurya commented 1 year ago

@astoycos : yes this is ready to be merged!

astoycos commented 1 year ago

/lgtm /approve

Thanks!

k8s-ci-robot commented 1 year ago

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: astoycos, tssurya

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files: - ~~[OWNERS](https://github.com/kubernetes-sigs/network-policy-api/blob/master/OWNERS)~~ [astoycos] Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment