Skip to content

Commit

Permalink
connectivity: Add echo-ingress-l7-via-hostport-with-encryption
Browse files Browse the repository at this point in the history
This is to cover the fixed issue cilium/cilium#32899.

Signed-off-by: gray <[email protected]>
  • Loading branch information
jschwinger233 committed Jul 12, 2024
1 parent 8a36a6d commit b0afd71
Showing 1 changed file with 16 additions and 0 deletions.
16 changes: 16 additions & 0 deletions connectivity/builder/echo_ingress_l7.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,4 +40,20 @@ func (t echoIngressL7) build(ct *check.ConnectivityTest, _ map[string]string) {
WithCiliumPolicy(echoIngressL7HTTPPolicyYAML). // L7 allow policy with HTTP introspection
WithScenarios(tests.PodToPodWithEndpoints()).
WithExpectations(expectation)

newTest("echo-ingress-l7-via-hostport-with-encryption", ct).
WithCondition(func() bool { return !ct.Params().SingleNode }).
WithFeatureRequirements(
features.RequireEnabled(features.L7Proxy),
// Once https://github.com/cilium/cilium/issues/33168 is fixed, we
// can enable for IPsec too.
features.RequireMode(features.EncryptionPod, "wireguard"),
// Otherwise pod->hostport traffic will be policy
// denied on the ingress of dest node when
// routing=vxlan + kpr=1 + bpf_masq=1
features.RequireEnabled(features.EncryptionNode),
).
WithCiliumPolicy(echoIngressL7HTTPPolicyYAML). // L7 allow policy with HTTP introspection
WithScenarios(tests.PodToHostPort()).
WithExpectations(expectation)
}

0 comments on commit b0afd71

Please sign in to comment.