@@ -28,7 +28,9 @@ func clientEgressTlsSniTest(ct *check.ConnectivityTest, templates map[string]str
2828 WithFeatureRequirements (features .RequireEnabled (features .L7Proxy )).
2929 WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
3030 WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
31- WithScenarios (tests .PodToWorld (ct .Params ().ExternalTargetIPv6Capable )).
31+ // TODO: Reenable IPv6 for this test once the kernel with the bugfix is released:
32+ // https://patchwork.kernel.org/project/netdevbpf/patch/[email protected] / 33+ WithScenarios (tests .PodToWorld (false )).
3234 WithExpectations (func (a * check.Action ) (egress , ingress check.Result ) {
3335 if a .Destination ().Port () == 443 {
3436 return check .ResultOK , check .ResultNone
@@ -40,9 +42,11 @@ func clientEgressTlsSniTest(ct *check.ConnectivityTest, templates map[string]str
4042 newTest (fmt .Sprintf ("%s-denied" , testName ), ct ).
4143 WithCiliumVersion ("!1.14.15 !1.14.16 !1.15.9 !1.15.10 !1.16.2 !1.16.3" ).
4244 WithFeatureRequirements (features .RequireEnabled (features .L7Proxy )).
43- WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
44- WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
45- WithScenarios (tests .PodToWorld (ct .Params ().ExternalTargetIPv6Capable )). // External Target is not allowed
45+ WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
46+ WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
47+ // TODO: Reenable IPv6 for this test once the kernel with the bugfix is released:
48+ // https://patchwork.kernel.org/project/netdevbpf/patch/[email protected] / 49+ WithScenarios (tests .PodToWorld (false )). // External Target is not allowed
4650 WithExpectations (func (a * check.Action ) (egress , ingress check.Result ) {
4751 if a .Destination ().Port () == 443 {
4852 // SSL error as another external target (e.g. cilium.io) SNI is not allowed
@@ -57,7 +61,9 @@ func clientEgressTlsSniTest(ct *check.ConnectivityTest, templates map[string]str
5761 WithFeatureRequirements (features .RequireEnabled (features .L7Proxy )).
5862 WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
5963 WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
60- WithScenarios (tests .PodToWorld (ct .Params ().ExternalTargetIPv6Capable )).
64+ // TODO: Reenable IPv6 for this test once the kernel with the bugfix is released:
65+ // https://patchwork.kernel.org/project/netdevbpf/patch/[email protected] / 66+ WithScenarios (tests .PodToWorld (false )).
6167 WithExpectations (func (a * check.Action ) (egress , ingress check.Result ) {
6268 if a .Destination ().Port () == 443 {
6369 return check .ResultOK , check .ResultNone
@@ -71,7 +77,9 @@ func clientEgressTlsSniTest(ct *check.ConnectivityTest, templates map[string]str
7177 WithFeatureRequirements (features .RequireEnabled (features .L7Proxy )).
7278 WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
7379 WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
74- WithScenarios (tests .PodToWorld2 (ct .Params ().ExternalTargetIPv6Capable )).
80+ // TODO: Reenable IPv6 for this test once the kernel with the bugfix is released:
81+ // https://patchwork.kernel.org/project/netdevbpf/patch/[email protected] / 82+ WithScenarios (tests .PodToWorld2 (false )).
7583 WithExpectations (func (a * check.Action ) (egress , ingress check.Result ) {
7684 if a .Destination ().Port () == 443 {
7785 // SSL error as another external target (e.g. cilium.io) SNI is not allowed
@@ -89,7 +97,9 @@ func clientEgressTlsSniTest(ct *check.ConnectivityTest, templates map[string]str
8997 WithFeatureRequirements (features .RequireEnabled (features .L7Proxy )).
9098 WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
9199 WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
92- WithScenarios (tests .PodToWorld (ct .Params ().ExternalTargetIPv6Capable )).
100+ // TODO: Reenable IPv6 for this test once the kernel with the bugfix is released:
101+ // https://patchwork.kernel.org/project/netdevbpf/patch/[email protected] / 102+ WithScenarios (tests .PodToWorld (false )).
93103 WithExpectations (func (a * check.Action ) (egress , ingress check.Result ) {
94104 if a .Destination ().Port () == 443 {
95105 return check .ResultOK , check .ResultNone
@@ -103,7 +113,9 @@ func clientEgressTlsSniTest(ct *check.ConnectivityTest, templates map[string]str
103113 WithFeatureRequirements (features .RequireEnabled (features .L7Proxy )).
104114 WithCiliumPolicy (yamlFile ). // L7 allow policy TLS SNI enforcement for external target
105115 WithCiliumPolicy (templates ["clientEgressOnlyDNSPolicyYAML" ]). // DNS resolution only
106- WithScenarios (tests .PodToWorld2 (ct .Params ().ExternalTargetIPv6Capable )).
116+ // TODO: Reenable IPv6 for this test once the kernel with the bugfix is released:
117+ // https://patchwork.kernel.org/project/netdevbpf/patch/[email protected] / 118+ WithScenarios (tests .PodToWorld2 (false )).
107119 WithExpectations (func (a * check.Action ) (egress , ingress check.Result ) {
108120 if a .Destination ().Port () == 443 {
109121 // SSL error as another external target (e.g. cilium.io) SNI is not allowed
0 commit comments