Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

connectivity: include k8s-app=coredns matchLabels #698

Merged
merged 1 commit into from
Feb 2, 2022

Conversation

samcday
Copy link
Contributor

@samcday samcday commented Feb 1, 2022

A few policy tests explicitly allow egress to CoreDNS, using an ancient
label selector that can't necessarily be relied on. Interestingly, some
of the tests (such as client-egress-to-fqdns-one-one-one-one), already had
network policies that included a label selector for k8s-app=coredns
in addition to k8s-app=kube-dns, but not all.

resolves #697

@samcday samcday requested a review from a team as a code owner February 1, 2022 07:22
@maintainer-s-little-helper
Copy link

Commit 8d7ddd4 does not contain "Signed-off-by".

Please follow instructions provided in https://docs.cilium.io/en/stable/contributing/development/contributing_guide/#developer-s-certificate-of-origin

Copy link
Contributor

@michi-covalent michi-covalent left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚢

@tklauser
Copy link
Member

tklauser commented Feb 1, 2022

@samcday can you please add a Signed-off-by line to the commit message? See https://docs.cilium.io/en/stable/contributing/development/contributing_guide/#developer-s-certificate-of-origin for details.

A few policy tests explicitly allow egress to CoreDNS, using an ancient
label selector that can't necessarily be relied on. Interestingly, some
of the tests (such as client-egress-to-fqdns-one-one-one-one), already had
network policies that included a label selector for k8s-app=coredns
in addition to k8s-app=kube-dns, but not all.

Signed-off-by: Sam Day <[email protected]>
@samcday samcday force-pushed the k8s-app-can-be-coredns-too branch from 8d7ddd4 to 4cc839f Compare February 1, 2022 21:09
@samcday samcday temporarily deployed to ci February 1, 2022 21:09 Inactive
@samcday
Copy link
Contributor Author

samcday commented Feb 1, 2022

Oops, sorry, pushed with a proper sign-off.

Copy link
Member

@tklauser tklauser left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

@tklauser tklauser merged commit 784a58a into cilium:master Feb 2, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

client-egress-to-entities-world (and others) NetworkPolicy DNS selector label making assumptions
3 participants