-
Notifications
You must be signed in to change notification settings - Fork 3.4k
[ci] isolate wireguard n2n tests #36556
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Add a Requirement which matches if a particular mode for a feature is NOT a provided string. This is useful when you want a test to run for all modes of a feature accept a subset. Signed-off-by: Louis DeLosSantos <louis.delos@isovalent.com>
Update the constraints over running the node-to-node encryption tests. Now, these node-to-node tests will run only when Wireguard is enabled or when no encryption is set at all. The latter reason is in place to ensure we run sanity checks on the TCPDump filters used when encryption is enabled. This ensures we haven't broken leak detection as a whole. Signed-off-by: Louis DeLosSantos <louis.delos@isovalent.com>
/test |
/test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Alternatively, we can use WithCondition()
to implement complicated boolean operations:
https://github.com/cilium/cilium/blob/v1.17.0-pre.3/cilium-cli/connectivity/builder/echo_ingress_l7.go#L47
@jschwinger233 I see! Maybe it's nice to have a short hand for "NOT". This was originally suggested. I don't feel too strongly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for taking care of this!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ldelossa Nice work!
The node-to-node encryption tests do not provide any benefits for IPsec since IPsec does not support this.
Currently, the node-to-node encryption tests run for IPsec.
I did some digging and chatting with folks and its a mixed bag one whether this was intentional or not.
As we begin to move to VinE traffic with IPsec it simplifies things to no longer run node-to-node for IPsec, reducing the configuration matrix necessary to perform the correct tests.
The node-to-node tests still run when no encryption mode is set at all.
This acts as a sanity check to ensure the TCPDump filters correctly capture expected traffic.