Created
January 25, 2022 20:01
-
-
Save trozet/62b69e66f34936bb4c34c017dd6d902c to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
• Failure [1.335 seconds] | |
OVN NetworkPolicy Operations | |
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:683 | |
on startup | |
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:723 | |
reconciles an existing gress networkPolicy with a pod selector in its own namespace [It] | |
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:882 | |
Timed out after 1.001s. | |
Expected | |
<[]libovsdb.TestData | len:11, cap:16>: [ | |
<*nbdb.PortGroup | 0xc011792000>{ | |
UUID: "623bfc71-92ce-4cdc-a279-4ee58ec17e01", | |
ACLs: [ | |
"8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]", | |
"64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]", | |
], | |
ExternalIDs: { | |
"name": "a6953372168492035427_ingressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_ingressDefaultDeny", | |
Ports: [""], | |
}, | |
<*nbdb.PortGroup | 0xc011792180>{ | |
UUID: "74b69d83-bd3e-4992-a22b-d7c5706c9b0e", | |
ACLs: [ | |
"baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]", | |
"2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]", | |
], | |
ExternalIDs: { | |
"name": "a6953372168492035427_egressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_egressDefaultDeny", | |
Ports: [""], | |
}, | |
<*nbdb.PortGroup | 0xc011792240>{ | |
UUID: "5b314f66-886a-4fa8-8f30-0b04d8954c88", | |
ACLs: [ | |
"f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]", | |
"06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]", | |
], | |
ExternalIDs: { | |
"name": "namespace1_networkpolicy1", | |
}, | |
Name: "a14195333570786048679", | |
Ports: [""], | |
}, | |
<*nbdb.LogicalSwitch | 0xc01177a380>{ | |
UUID: "79e4c7d9-8923-4493-b923-46c4de1818a3 [u2596996173]", | |
ACLs: nil, | |
Copp: nil, | |
DNSRecords: nil, | |
ExternalIDs: nil, | |
ForwardingGroups: nil, | |
LoadBalancer: nil, | |
LoadBalancerGroup: nil, | |
Name: "node1", | |
OtherConfig: nil, | |
Ports: [ | |
"45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]", | |
], | |
QOSRules: nil, | |
}, | |
<*nbdb.ACL | 0xc011753e80>{ | |
UUID: "2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]", | |
Action: "allow", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Egress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "inport == @a6953372168492035427_egressDefaultDeny && arp", | |
Meter: "acl-logging", | |
Name: "namespace1_ARPallowPolicy", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
<*nbdb.ACL | 0xc011753f00>{ | |
UUID: "06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]", | |
Action: "allow-related", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"Egress_num": "0", | |
"l4Match": "None", | |
"ipblock_cidr": "false", | |
"namespace": "namespace1", | |
"policy": "networkpolicy1", | |
"policy_type": "Egress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "ip4.dst == {$a17928043879887565554} && inport == @a14195333570786048679", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1_0", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
<*nbdb.ACL | 0xc011753f80>{ | |
UUID: "f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]", | |
Action: "allow-related", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"l4Match": "None", | |
"ipblock_cidr": "false", | |
"namespace": "namespace1", | |
"policy": "networkpolicy1", | |
"policy_type": "Ingress", | |
"Ingress_num": "0", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "ip4.src == {$a3128014386057836746} && outport == @a14195333570786048679", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1_0", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
<*nbdb.ACL | 0xc011798000>{ | |
UUID: "64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]", | |
Action: "allow", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Ingress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "outport == @a6953372168492035427_ingressDefaultDeny && arp", | |
Meter: "acl-logging", | |
Name: "namespace1_ARPallowPolicy", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
<*nbdb.ACL | 0xc011798080>{ | |
UUID: "8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]", | |
Action: "drop", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Ingress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "outport == @a6953372168492035427_ingressDefaultDeny", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1", | |
Priority: 1000, | |
Severity: "info", | |
}, | |
<*nbdb.ACL | 0xc011798100>{ | |
UUID: "baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]", | |
Action: "drop", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Egress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "inport == @a6953372168492035427_egressDefaultDeny", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1", | |
Priority: 1000, | |
Severity: "info", | |
}, | |
<*nbdb.LogicalSwitchPort | 0xc011737d40>{ | |
UUID: "45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]", | |
Addresses: [ | |
"0a:58:0a:80:01:03 10.128.1.3", | |
], | |
Dhcpv4Options: nil, | |
Dhcpv6Options: nil, | |
DynamicAddresses: nil, | |
Enabled: nil, | |
ExternalIDs: { | |
"pod": "true", | |
"namespace": "namespace1", | |
}, | |
HaChassisGroup: nil, | |
Name: "namespace1_myPod", | |
Options: { | |
"iface-id-ver": "myPod", | |
"requested-chassis": "node1", | |
}, | |
ParentName: nil, | |
PortSecurity: [ | |
"0a:58:0a:80:01:03 10.128.1.3", | |
], | |
Tag: nil, | |
TagRequest: nil, | |
Type: "", | |
Up: nil, | |
}, | |
] | |
to consist of | |
<[]*libovsdb.testDataMatcher | len:11, cap:11>: [ | |
{ | |
expected: <*nbdb.ACL | 0xc011753b00>{ | |
UUID: "f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]", | |
Action: "allow-related", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"ipblock_cidr": "false", | |
"namespace": "namespace1", | |
"policy": "networkpolicy1", | |
"policy_type": "Ingress", | |
"Ingress_num": "0", | |
"l4Match": "None", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "ip4.src == {$a3128014386057836746} && outport == @a14195333570786048679", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1_0", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.ACL | 0xc011753b80>{ | |
UUID: "06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]", | |
Action: "allow-related", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"Egress_num": "0", | |
"l4Match": "None", | |
"ipblock_cidr": "false", | |
"namespace": "namespace1", | |
"policy": "networkpolicy1", | |
"policy_type": "Egress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "ip4.dst == {$a17928043879887565554} && inport == @a14195333570786048679", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1_0", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.PortGroup | 0xc01177faa0>{ | |
UUID: "u2596996166", | |
ACLs: ["u2596996164", "u2596996165"], | |
ExternalIDs: { | |
"name": "namespace1_networkpolicy1", | |
}, | |
Name: "a14195333570786048679", | |
Ports: ["u2596996163"], | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.ACL | 0xc011753c00>{ | |
UUID: "baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]", | |
Action: "drop", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Egress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "inport == @a6953372168492035427_egressDefaultDeny", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1", | |
Priority: 1000, | |
Severity: "info", | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.ACL | 0xc011753c80>{ | |
UUID: "2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]", | |
Action: "allow", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Egress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "inport == @a6953372168492035427_egressDefaultDeny && arp", | |
Meter: "acl-logging", | |
Name: "namespace1_ARPallowPolicy", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.ACL | 0xc011753d00>{ | |
UUID: "8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]", | |
Action: "drop", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Ingress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "outport == @a6953372168492035427_ingressDefaultDeny", | |
Meter: "acl-logging", | |
Name: "namespace1_networkpolicy1", | |
Priority: 1000, | |
Severity: "info", | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.ACL | 0xc011753d80>{ | |
UUID: "64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]", | |
Action: "allow", | |
Direction: "to-lport", | |
ExternalIDs: { | |
"default-deny-policy-type": "Ingress", | |
}, | |
Label: 0, | |
Log: false, | |
Match: "outport == @a6953372168492035427_ingressDefaultDeny && arp", | |
Meter: "acl-logging", | |
Name: "namespace1_ARPallowPolicy", | |
Priority: 1001, | |
Severity: "info", | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.PortGroup | 0xc01177fce0>{ | |
UUID: "u2596996171", | |
ACLs: ["u2596996167", "u2596996168"], | |
ExternalIDs: { | |
"name": "a6953372168492035427_egressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_egressDefaultDeny", | |
Ports: ["u2596996163"], | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.PortGroup | 0xc01177fda0>{ | |
UUID: "u2596996172", | |
ACLs: ["u2596996169", "u2596996170"], | |
ExternalIDs: { | |
"name": "a6953372168492035427_ingressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_ingressDefaultDeny", | |
Ports: ["u2596996163"], | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.LogicalSwitchPort | 0xc011737bc0>{ | |
UUID: "45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]", | |
Addresses: [ | |
"0a:58:0a:80:01:03 10.128.1.3", | |
], | |
Dhcpv4Options: nil, | |
Dhcpv6Options: nil, | |
DynamicAddresses: nil, | |
Enabled: nil, | |
ExternalIDs: { | |
"pod": "true", | |
"namespace": "namespace1", | |
}, | |
HaChassisGroup: nil, | |
Name: "namespace1_myPod", | |
Options: { | |
"requested-chassis": "node1", | |
"iface-id-ver": "myPod", | |
}, | |
ParentName: nil, | |
PortSecurity: [ | |
"0a:58:0a:80:01:03 10.128.1.3", | |
], | |
Tag: nil, | |
TagRequest: nil, | |
Type: "", | |
Up: nil, | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.LogicalSwitch | 0xc01177a2a0>{ | |
UUID: "79e4c7d9-8923-4493-b923-46c4de1818a3 [u2596996173]", | |
ACLs: nil, | |
Copp: nil, | |
DNSRecords: nil, | |
ExternalIDs: nil, | |
ForwardingGroups: nil, | |
LoadBalancer: nil, | |
LoadBalancerGroup: nil, | |
Name: "node1", | |
OtherConfig: nil, | |
Ports: [ | |
"45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]", | |
], | |
QOSRules: nil, | |
}, | |
ignoreUUID: false, | |
}, | |
] | |
the missing elements were | |
<[]*libovsdb.testDataMatcher | len:3, cap:3>: [ | |
{ | |
expected: <*nbdb.PortGroup | 0xc01177faa0>{ | |
UUID: "u2596996166", | |
ACLs: ["u2596996164", "u2596996165"], | |
ExternalIDs: { | |
"name": "namespace1_networkpolicy1", | |
}, | |
Name: "a14195333570786048679", | |
Ports: ["u2596996163"], | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.PortGroup | 0xc01177fce0>{ | |
UUID: "u2596996171", | |
ACLs: ["u2596996167", "u2596996168"], | |
ExternalIDs: { | |
"name": "a6953372168492035427_egressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_egressDefaultDeny", | |
Ports: ["u2596996163"], | |
}, | |
ignoreUUID: false, | |
}, | |
{ | |
expected: <*nbdb.PortGroup | 0xc01177fda0>{ | |
UUID: "u2596996172", | |
ACLs: ["u2596996169", "u2596996170"], | |
ExternalIDs: { | |
"name": "a6953372168492035427_ingressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_ingressDefaultDeny", | |
Ports: ["u2596996163"], | |
}, | |
ignoreUUID: false, | |
}, | |
] | |
the extra elements were | |
<[]*nbdb.PortGroup | len:3, cap:3>: [ | |
{ | |
UUID: "623bfc71-92ce-4cdc-a279-4ee58ec17e01", | |
ACLs: [ | |
"8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]", | |
"64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]", | |
], | |
ExternalIDs: { | |
"name": "a6953372168492035427_ingressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_ingressDefaultDeny", | |
Ports: [""], | |
}, | |
{ | |
UUID: "74b69d83-bd3e-4992-a22b-d7c5706c9b0e", | |
ACLs: [ | |
"baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]", | |
"2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]", | |
], | |
ExternalIDs: { | |
"name": "a6953372168492035427_egressDefaultDeny", | |
}, | |
Name: "a6953372168492035427_egressDefaultDeny", | |
Ports: [""], | |
}, | |
{ | |
UUID: "5b314f66-886a-4fa8-8f30-0b04d8954c88", | |
ACLs: [ | |
"f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]", | |
"06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]", | |
], | |
ExternalIDs: { | |
"name": "namespace1_networkpolicy1", | |
}, | |
Name: "a14195333570786048679", | |
Ports: [""], | |
}, | |
] | |
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:961 | |
------------------------------ | |
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS | |
Summarizing 1 Failure: | |
[Fail] OVN NetworkPolicy Operations on startup [It] reconciles an existing gress networkPolicy with a pod selector in its own namespace | |
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:961 | |
Ran 1 of 130 Specs in 1.336 seconds | |
FAIL! -- 0 Passed | 1 Failed | 0 Pending | 129 Skipped |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment