-
Notifications
You must be signed in to change notification settings - Fork 39
Changes to implement option #2 for the port matching #342
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
✅ Deploy Preview for kubernetes-sigs-network-policy-api ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: bowei The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
I am going to update this to match the NPEP. |
kubernetes-sigs#297 protocols: tcp: - destinationPort: number: 8080 - destinationPort: range: start: 8080 end: 9090 udp: - destinationPort: number: 8080 - destinationPort: number: 9090 destinationNamedPort: - name: http - name: monitoring
|
/hold |
|
@bowei: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
We noticed in the last meeting that this is kind of weird: the It seems like it would be better to have |
|
Agreed that OR'ing across nested lists in structs is not most straightforward: Specifically: Will be <proto1, match1> OR <proto1, match2> OR <proto2, match1> OR <proto2, match2>... Whereas just saying "OR across this list of items": seems more understandable. (This option was covered in the big thread on Nadia's NPEP...) |
| // Subject field. | ||
| type BaselineAdminNetworkPolicyIngressRule struct { | ||
| // Name is an identifier for this rule, that may be no more than 100 characters | ||
| // Name is an identifier for this rule, that may be no more than 100 charactersp |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
typo?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good catch
| // DestinationNamedPort selects a destination port on a pod based on the Container.Port | ||
| // name. | ||
| // | ||
| // This cannot be used this in a rule with Nodes or Networks peers, as they |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it possible for this to be validated via CEL, or are implementations expected to validate this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, I will add CEL.
|
/close shifting to option 3: |
|
@bowei: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Example: