-
Notifications
You must be signed in to change notification settings - Fork 3.4k
cli/connectivity: Test strict mode encryption #35231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
fa92920
to
067d687
Compare
/ci-e2e-upgrade |
067d687
to
9c5fdbf
Compare
/ci-e2e-upgrade |
9c5fdbf
to
4a16751
Compare
/ci-e2e-upgrade |
4a16751
to
f6ba790
Compare
/ci-e2e-upgrade |
767fe87
to
77c91a1
Compare
/test |
77c91a1
to
9b8377e
Compare
/test |
a5584e8
to
afcd9e7
Compare
If ExecInPod() returns non-nil error, cli should wrap it with stderr which could provide valuable information. Signed-off-by: gray <gray.liang@isovalent.com>
afcd9e7
to
ef6f7b6
Compare
/test |
Strict mode wireguard drops plain-text egress packets as long as their dest addresses fall into strict mode cidr. This commit adds encryption-strict-mode test to cover this scenario by extending pod-to-pod test suite. To trigger the strict-mode-drop, connectivity executes cilium-dbg cilium-agent pods to delete all "echo" pods' entries from ipcache map, executes curl from "client" pods to remote "echo" pods, expects packet drops due to "Traffic is unencrypted". As suggested by Sebastian Wicki, encryption-strict-mode test is marked as unsafe because poking around in IPCache might not be something we want users to run in real clusters. Signed-off-by: gray <gray.liang@isovalent.com>
This commit enables encryption-strict-mode when wireguard is used with native routing. Signed-off-by: gray <gray.liang@isovalent.com>
ef6f7b6
to
739fbb6
Compare
/test |
As future item, would be nice to check if this allows us to remove the ginkgo test. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I see you switched to a different approach deleting the IPCache entry, simplifying things even further. Awesome work!
/ci-gateway-api |
A cilium-cli test already exists to verify that there are no unencrypted leaks in WireGuard strict mode, thus it is safe to remove the now redundant Ginkgo test. Related: cilium#35231 Signed-off-by: Fabio Falzoi <fabio.falzoi@isovalent.com>
A cilium-cli test already exists to verify that there are no unencrypted leaks in WireGuard strict mode, thus it is safe to remove the now redundant Ginkgo one. Related: cilium#35231 Signed-off-by: Fabio Falzoi <fabio.falzoi@isovalent.com>
A cilium-cli test already exists to verify that there are no unencrypted leaks in WireGuard strict mode, thus it is safe to remove the now redundant Ginkgo one. Related: #35231 Signed-off-by: Fabio Falzoi <fabio.falzoi@isovalent.com>
Add
strict-mode-encryption
in connectivity test for ci-e2e-upgrade.