Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Catch invalid conversion of k8s 1.7 policies #152

Merged
merged 3 commits into from
Sep 24, 2017

Conversation

caseydavenport
Copy link
Member

@caseydavenport caseydavenport commented Sep 24, 2017

Description

We're not handling policies received from k8s 1.7 properly at the moment. Namely, those policies don't have a polciyTypes field which means libcalico defaults them to Ingress/Egress.

The k8s backend really should be catching this and including Ingress since k8s 1.7 networkpolicies only affect ingress.

This is just a UT, the fix is in libcalico I think.

This PR also includes some cleaning up of the Context/It/By decorator usage.

CC @tmjd I think this is the failure you're hitting and what's causing the e2e failures.

Todos

  • Tests
  • Documentation
  • Release note

Release Note

None required

@caseydavenport
Copy link
Member Author

This should be the correct fix: projectcalico/libcalico-go#531

Copy link
Contributor

@bcreane bcreane left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes this looks correct once the libcalico-go conversion change goes in.

@caseydavenport
Copy link
Member Author

Ok, updated to latest libcalico and tests appear to be passing

@caseydavenport caseydavenport merged commit 11e89e1 into projectcalico:master Sep 24, 2017
@caseydavenport caseydavenport deleted the uts branch September 24, 2017 19:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants