Skip to content

Conversation

@jmrodri
Copy link
Contributor

@jmrodri jmrodri commented Oct 5, 2018

If there are other services in the target namespace talking to each other with no network policy, during APB deployments we automatically create one that blocks the other services. This change looks to see if there are any network policies on the target namespace. If there are none, we forgo creating the network policy, assuming things are open and the transient namespace should be able to talk to the target with no issues. If there are existing network policies, then we will add ours to give the transient namespace access to the target. There is still the chance that our network policy could still affect things depending on the variety of existing network policies in place, too many to verify.

@coveralls
Copy link

coveralls commented Oct 5, 2018

Coverage Status

Coverage decreased (-0.4%) to 64.05% when pulling 873e204 on jmrodri:network-policy into 8f581fb on automationbroker:master.

update test to reflect new createsandbox rules
Copy link
Contributor

@shawn-hurley shawn-hurley left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good to me I don't see any problems

VISACK

If you want a second pair of eyes on testing let me know and I can spin up my dev env for this again

@jmrodri jmrodri added the 0.2.x label Oct 18, 2018
apbRole: "edit",
},
{
name: "Test Create Sandbox with ns in target with net policy",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🎉

@jmrodri jmrodri merged commit dcb2c74 into automationbroker:master Oct 19, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants