@@ -102,6 +102,46 @@ var (
102
102
prefix_knp1_t1_i0D = toprefix ("DPI0|namespace-1/knp.default.policy-1.1.1.1" )
103
103
ruleID_knp1_t1_i0D = NewRuleID ("default" , "knp.default.policy-1.1.1.1" , "namespace-1" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
104
104
105
+ // K8s AdminNetworkPolicy kanp.adminnetworkpolicy.policy-1.1
106
+ kanp1_t1_1i0e_key = model.PolicyKey {
107
+ Tier : "adminnetworkpolicy" ,
108
+ Name : "kanp.adminnetworkpolicy.policy-1.1.1.1" ,
109
+ }
110
+ kanp1_t1_1i0e = & model.Policy {
111
+ InboundRules : []model.Rule {
112
+ {Action : "deny" },
113
+ },
114
+ }
115
+ prefix_kanp1_t1_i0D = toprefix ("DPI0|kanp.adminnetworkpolicy.policy-1.1.1.1" )
116
+ ruleID_kanp1_t1_i0D = NewRuleID (
117
+ "adminnetworkpolicy" ,
118
+ "kanp.adminnetworkpolicy.policy-1.1.1.1" ,
119
+ "" ,
120
+ 0 ,
121
+ rules .RuleDirIngress ,
122
+ rules .RuleActionDeny ,
123
+ )
124
+
125
+ // K8s BaselineAdminNetworkPolicy kbanp.baselineadminnetworkpolicy.policy-1.1
126
+ kbanp1_t1_1i0e_key = model.PolicyKey {
127
+ Tier : "baselineadminnetworkpolicy" ,
128
+ Name : "kbanp.baselineadminnetworkpolicy.policy-1.1.1.1" ,
129
+ }
130
+ kbanp1_t1_1i0e = & model.Policy {
131
+ InboundRules : []model.Rule {
132
+ {Action : "deny" },
133
+ },
134
+ }
135
+ prefix_kbanp1_t1_i0D = toprefix ("DPI0|kbanp.baselineadminnetworkpolicy.policy-1.1.1.1" )
136
+ ruleID_kbanp1_t1_i0D = NewRuleID (
137
+ "baselineadminnetworkpolicy" ,
138
+ "kbanp.baselineadminnetworkpolicy.policy-1.1.1.1" ,
139
+ "" ,
140
+ 0 ,
141
+ rules .RuleDirIngress ,
142
+ rules .RuleActionDeny ,
143
+ )
144
+
105
145
// Profile profile-1
106
146
pr1_1i1e_key = model.ProfileRulesKey {
107
147
ProfileKey : model.ProfileKey {Name : "profile-1" },
@@ -120,14 +160,22 @@ var (
120
160
ruleID_prof_e0D = NewRuleID ("" , "profile-1" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
121
161
122
162
// Tier no-matches
123
- prefix_nomatch_t1_i = toprefix ("DPI|tier-1" )
124
- ruleID_nomatch_t1_i = NewRuleID ("tier-1" , "" , "" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
125
- prefix_nomatch_t1_e = toprefix ("DPE|tier-1" )
126
- ruleID_nomatch_t1_e = NewRuleID ("tier-1" , "" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
127
- prefix_nomatch_td_i = toprefix ("DPI|default" )
128
- ruleID_nomatch_td_i = NewRuleID ("default" , "" , "" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
129
- prefix_nomatch_td_e = toprefix ("DPE|default" )
130
- ruleID_nomatch_td_e = NewRuleID ("default" , "" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
163
+ prefix_nomatch_t1_i = toprefix ("DPI|tier-1" )
164
+ ruleID_nomatch_t1_i = NewRuleID ("tier-1" , "" , "" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
165
+ prefix_nomatch_t1_e = toprefix ("DPE|tier-1" )
166
+ ruleID_nomatch_t1_e = NewRuleID ("tier-1" , "" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
167
+ prefix_nomatch_td_i = toprefix ("DPI|default" )
168
+ ruleID_nomatch_td_i = NewRuleID ("default" , "" , "" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
169
+ prefix_nomatch_td_e = toprefix ("DPE|default" )
170
+ ruleID_nomatch_td_e = NewRuleID ("default" , "" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
171
+ prefix_nomatch_tanp_i = toprefix ("DPI|adminnetworkpolicy" )
172
+ ruleID_nomatch_tanp_i = NewRuleID ("adminnetworkpolicy" , "" , "" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
173
+ prefix_nomatch_tanp_e = toprefix ("DPE|adminnetworkpolicy" )
174
+ ruleID_nomatch_tanp_e = NewRuleID ("adminnetworkpolicy" , "" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
175
+ prefix_nomatch_tbanp_i = toprefix ("DPI|baselineadminnetworkpolicy" )
176
+ ruleID_nomatch_tbanp_i = NewRuleID ("baselineadminnetworkpolicy" , "" , "" , 0 , rules .RuleDirIngress , rules .RuleActionDeny )
177
+ prefix_nomatch_tbanp_e = toprefix ("DPE|baselineadminnetworkpolicy" )
178
+ ruleID_nomatch_tbanp_e = NewRuleID ("baselineadminnetworkpolicy" , "" , "" , 0 , rules .RuleDirEgress , rules .RuleActionDeny )
131
179
132
180
// Profile no-matches
133
181
prefix_nomatch_prof_i = toprefix ("DRI" )
@@ -181,6 +229,12 @@ var _ = Describe("PolicyLookupsCache tests", func() {
181
229
Entry ("KNP1 (1i0e) no match default ingress" , knp1_t1_1i0e_key , knp1_t1_1i0e , prefix_nomatch_td_i , ruleID_nomatch_td_i ),
182
230
Entry ("KNP1 (1i0e) no match default egress" , knp1_t1_1i0e_key , knp1_t1_1i0e , prefix_nomatch_td_e , ruleID_nomatch_td_e ),
183
231
Entry ("KNP1 (1i0e) i0" , knp1_t1_1i0e_key , knp1_t1_1i0e , prefix_knp1_t1_i0D , ruleID_knp1_t1_i0D ),
232
+ Entry ("KANP1 (1i0e) no match default ingress" , kanp1_t1_1i0e_key , kanp1_t1_1i0e , prefix_nomatch_tanp_i , ruleID_nomatch_tanp_i ),
233
+ Entry ("KANP1 (1i0e) no match default egress" , kanp1_t1_1i0e_key , kanp1_t1_1i0e , prefix_nomatch_tanp_e , ruleID_nomatch_tanp_e ),
234
+ Entry ("KANP1 (1i0e) i0" , kanp1_t1_1i0e_key , kanp1_t1_1i0e , prefix_kanp1_t1_i0D , ruleID_kanp1_t1_i0D ),
235
+ Entry ("KBANP1 (1i0e) no match default ingress" , kbanp1_t1_1i0e_key , kbanp1_t1_1i0e , prefix_nomatch_tbanp_i , ruleID_nomatch_tbanp_i ),
236
+ Entry ("KBANP1 (1i0e) no match default egress" , kbanp1_t1_1i0e_key , kbanp1_t1_1i0e , prefix_nomatch_tbanp_e , ruleID_nomatch_tbanp_e ),
237
+ Entry ("KBANP1 (1i0e) i0" , kbanp1_t1_1i0e_key , kbanp1_t1_1i0e , prefix_kbanp1_t1_i0D , ruleID_kbanp1_t1_i0D ),
184
238
)
185
239
186
240
DescribeTable (
0 commit comments