Skip to content

Instantly share code, notes, and snippets.

@trozet
Created January 25, 2022 20:01
Show Gist options
  • Save trozet/62b69e66f34936bb4c34c017dd6d902c to your computer and use it in GitHub Desktop.
Save trozet/62b69e66f34936bb4c34c017dd6d902c to your computer and use it in GitHub Desktop.
• Failure [1.335 seconds]
OVN NetworkPolicy Operations
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:683
on startup
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:723
reconciles an existing gress networkPolicy with a pod selector in its own namespace [It]
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:882
Timed out after 1.001s.
Expected
<[]libovsdb.TestData | len:11, cap:16>: [
<*nbdb.PortGroup | 0xc011792000>{
UUID: "623bfc71-92ce-4cdc-a279-4ee58ec17e01",
ACLs: [
"8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]",
"64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]",
],
ExternalIDs: {
"name": "a6953372168492035427_ingressDefaultDeny",
},
Name: "a6953372168492035427_ingressDefaultDeny",
Ports: [""],
},
<*nbdb.PortGroup | 0xc011792180>{
UUID: "74b69d83-bd3e-4992-a22b-d7c5706c9b0e",
ACLs: [
"baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]",
"2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]",
],
ExternalIDs: {
"name": "a6953372168492035427_egressDefaultDeny",
},
Name: "a6953372168492035427_egressDefaultDeny",
Ports: [""],
},
<*nbdb.PortGroup | 0xc011792240>{
UUID: "5b314f66-886a-4fa8-8f30-0b04d8954c88",
ACLs: [
"f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]",
"06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]",
],
ExternalIDs: {
"name": "namespace1_networkpolicy1",
},
Name: "a14195333570786048679",
Ports: [""],
},
<*nbdb.LogicalSwitch | 0xc01177a380>{
UUID: "79e4c7d9-8923-4493-b923-46c4de1818a3 [u2596996173]",
ACLs: nil,
Copp: nil,
DNSRecords: nil,
ExternalIDs: nil,
ForwardingGroups: nil,
LoadBalancer: nil,
LoadBalancerGroup: nil,
Name: "node1",
OtherConfig: nil,
Ports: [
"45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]",
],
QOSRules: nil,
},
<*nbdb.ACL | 0xc011753e80>{
UUID: "2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]",
Action: "allow",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Egress",
},
Label: 0,
Log: false,
Match: "inport == @a6953372168492035427_egressDefaultDeny && arp",
Meter: "acl-logging",
Name: "namespace1_ARPallowPolicy",
Priority: 1001,
Severity: "info",
},
<*nbdb.ACL | 0xc011753f00>{
UUID: "06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]",
Action: "allow-related",
Direction: "to-lport",
ExternalIDs: {
"Egress_num": "0",
"l4Match": "None",
"ipblock_cidr": "false",
"namespace": "namespace1",
"policy": "networkpolicy1",
"policy_type": "Egress",
},
Label: 0,
Log: false,
Match: "ip4.dst == {$a17928043879887565554} && inport == @a14195333570786048679",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1_0",
Priority: 1001,
Severity: "info",
},
<*nbdb.ACL | 0xc011753f80>{
UUID: "f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]",
Action: "allow-related",
Direction: "to-lport",
ExternalIDs: {
"l4Match": "None",
"ipblock_cidr": "false",
"namespace": "namespace1",
"policy": "networkpolicy1",
"policy_type": "Ingress",
"Ingress_num": "0",
},
Label: 0,
Log: false,
Match: "ip4.src == {$a3128014386057836746} && outport == @a14195333570786048679",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1_0",
Priority: 1001,
Severity: "info",
},
<*nbdb.ACL | 0xc011798000>{
UUID: "64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]",
Action: "allow",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Ingress",
},
Label: 0,
Log: false,
Match: "outport == @a6953372168492035427_ingressDefaultDeny && arp",
Meter: "acl-logging",
Name: "namespace1_ARPallowPolicy",
Priority: 1001,
Severity: "info",
},
<*nbdb.ACL | 0xc011798080>{
UUID: "8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]",
Action: "drop",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Ingress",
},
Label: 0,
Log: false,
Match: "outport == @a6953372168492035427_ingressDefaultDeny",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1",
Priority: 1000,
Severity: "info",
},
<*nbdb.ACL | 0xc011798100>{
UUID: "baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]",
Action: "drop",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Egress",
},
Label: 0,
Log: false,
Match: "inport == @a6953372168492035427_egressDefaultDeny",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1",
Priority: 1000,
Severity: "info",
},
<*nbdb.LogicalSwitchPort | 0xc011737d40>{
UUID: "45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]",
Addresses: [
"0a:58:0a:80:01:03 10.128.1.3",
],
Dhcpv4Options: nil,
Dhcpv6Options: nil,
DynamicAddresses: nil,
Enabled: nil,
ExternalIDs: {
"pod": "true",
"namespace": "namespace1",
},
HaChassisGroup: nil,
Name: "namespace1_myPod",
Options: {
"iface-id-ver": "myPod",
"requested-chassis": "node1",
},
ParentName: nil,
PortSecurity: [
"0a:58:0a:80:01:03 10.128.1.3",
],
Tag: nil,
TagRequest: nil,
Type: "",
Up: nil,
},
]
to consist of
<[]*libovsdb.testDataMatcher | len:11, cap:11>: [
{
expected: <*nbdb.ACL | 0xc011753b00>{
UUID: "f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]",
Action: "allow-related",
Direction: "to-lport",
ExternalIDs: {
"ipblock_cidr": "false",
"namespace": "namespace1",
"policy": "networkpolicy1",
"policy_type": "Ingress",
"Ingress_num": "0",
"l4Match": "None",
},
Label: 0,
Log: false,
Match: "ip4.src == {$a3128014386057836746} && outport == @a14195333570786048679",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1_0",
Priority: 1001,
Severity: "info",
},
ignoreUUID: false,
},
{
expected: <*nbdb.ACL | 0xc011753b80>{
UUID: "06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]",
Action: "allow-related",
Direction: "to-lport",
ExternalIDs: {
"Egress_num": "0",
"l4Match": "None",
"ipblock_cidr": "false",
"namespace": "namespace1",
"policy": "networkpolicy1",
"policy_type": "Egress",
},
Label: 0,
Log: false,
Match: "ip4.dst == {$a17928043879887565554} && inport == @a14195333570786048679",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1_0",
Priority: 1001,
Severity: "info",
},
ignoreUUID: false,
},
{
expected: <*nbdb.PortGroup | 0xc01177faa0>{
UUID: "u2596996166",
ACLs: ["u2596996164", "u2596996165"],
ExternalIDs: {
"name": "namespace1_networkpolicy1",
},
Name: "a14195333570786048679",
Ports: ["u2596996163"],
},
ignoreUUID: false,
},
{
expected: <*nbdb.ACL | 0xc011753c00>{
UUID: "baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]",
Action: "drop",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Egress",
},
Label: 0,
Log: false,
Match: "inport == @a6953372168492035427_egressDefaultDeny",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1",
Priority: 1000,
Severity: "info",
},
ignoreUUID: false,
},
{
expected: <*nbdb.ACL | 0xc011753c80>{
UUID: "2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]",
Action: "allow",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Egress",
},
Label: 0,
Log: false,
Match: "inport == @a6953372168492035427_egressDefaultDeny && arp",
Meter: "acl-logging",
Name: "namespace1_ARPallowPolicy",
Priority: 1001,
Severity: "info",
},
ignoreUUID: false,
},
{
expected: <*nbdb.ACL | 0xc011753d00>{
UUID: "8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]",
Action: "drop",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Ingress",
},
Label: 0,
Log: false,
Match: "outport == @a6953372168492035427_ingressDefaultDeny",
Meter: "acl-logging",
Name: "namespace1_networkpolicy1",
Priority: 1000,
Severity: "info",
},
ignoreUUID: false,
},
{
expected: <*nbdb.ACL | 0xc011753d80>{
UUID: "64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]",
Action: "allow",
Direction: "to-lport",
ExternalIDs: {
"default-deny-policy-type": "Ingress",
},
Label: 0,
Log: false,
Match: "outport == @a6953372168492035427_ingressDefaultDeny && arp",
Meter: "acl-logging",
Name: "namespace1_ARPallowPolicy",
Priority: 1001,
Severity: "info",
},
ignoreUUID: false,
},
{
expected: <*nbdb.PortGroup | 0xc01177fce0>{
UUID: "u2596996171",
ACLs: ["u2596996167", "u2596996168"],
ExternalIDs: {
"name": "a6953372168492035427_egressDefaultDeny",
},
Name: "a6953372168492035427_egressDefaultDeny",
Ports: ["u2596996163"],
},
ignoreUUID: false,
},
{
expected: <*nbdb.PortGroup | 0xc01177fda0>{
UUID: "u2596996172",
ACLs: ["u2596996169", "u2596996170"],
ExternalIDs: {
"name": "a6953372168492035427_ingressDefaultDeny",
},
Name: "a6953372168492035427_ingressDefaultDeny",
Ports: ["u2596996163"],
},
ignoreUUID: false,
},
{
expected: <*nbdb.LogicalSwitchPort | 0xc011737bc0>{
UUID: "45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]",
Addresses: [
"0a:58:0a:80:01:03 10.128.1.3",
],
Dhcpv4Options: nil,
Dhcpv6Options: nil,
DynamicAddresses: nil,
Enabled: nil,
ExternalIDs: {
"pod": "true",
"namespace": "namespace1",
},
HaChassisGroup: nil,
Name: "namespace1_myPod",
Options: {
"requested-chassis": "node1",
"iface-id-ver": "myPod",
},
ParentName: nil,
PortSecurity: [
"0a:58:0a:80:01:03 10.128.1.3",
],
Tag: nil,
TagRequest: nil,
Type: "",
Up: nil,
},
ignoreUUID: false,
},
{
expected: <*nbdb.LogicalSwitch | 0xc01177a2a0>{
UUID: "79e4c7d9-8923-4493-b923-46c4de1818a3 [u2596996173]",
ACLs: nil,
Copp: nil,
DNSRecords: nil,
ExternalIDs: nil,
ForwardingGroups: nil,
LoadBalancer: nil,
LoadBalancerGroup: nil,
Name: "node1",
OtherConfig: nil,
Ports: [
"45f9a415-2a6d-4069-a18a-3747c0989a52 [u2596996163]",
],
QOSRules: nil,
},
ignoreUUID: false,
},
]
the missing elements were
<[]*libovsdb.testDataMatcher | len:3, cap:3>: [
{
expected: <*nbdb.PortGroup | 0xc01177faa0>{
UUID: "u2596996166",
ACLs: ["u2596996164", "u2596996165"],
ExternalIDs: {
"name": "namespace1_networkpolicy1",
},
Name: "a14195333570786048679",
Ports: ["u2596996163"],
},
ignoreUUID: false,
},
{
expected: <*nbdb.PortGroup | 0xc01177fce0>{
UUID: "u2596996171",
ACLs: ["u2596996167", "u2596996168"],
ExternalIDs: {
"name": "a6953372168492035427_egressDefaultDeny",
},
Name: "a6953372168492035427_egressDefaultDeny",
Ports: ["u2596996163"],
},
ignoreUUID: false,
},
{
expected: <*nbdb.PortGroup | 0xc01177fda0>{
UUID: "u2596996172",
ACLs: ["u2596996169", "u2596996170"],
ExternalIDs: {
"name": "a6953372168492035427_ingressDefaultDeny",
},
Name: "a6953372168492035427_ingressDefaultDeny",
Ports: ["u2596996163"],
},
ignoreUUID: false,
},
]
the extra elements were
<[]*nbdb.PortGroup | len:3, cap:3>: [
{
UUID: "623bfc71-92ce-4cdc-a279-4ee58ec17e01",
ACLs: [
"8f28fa5c-945f-44ee-b4d1-01fd00c2fce8 [u2596996169]",
"64dd84ae-f4d2-4af8-b568-d2b0af220ab0 [u2596996170]",
],
ExternalIDs: {
"name": "a6953372168492035427_ingressDefaultDeny",
},
Name: "a6953372168492035427_ingressDefaultDeny",
Ports: [""],
},
{
UUID: "74b69d83-bd3e-4992-a22b-d7c5706c9b0e",
ACLs: [
"baab9c23-10aa-45f1-b6c4-740dd103b2f4 [u2596996167]",
"2e2efaa3-f49c-4232-a7a5-023c78e61fec [u2596996168]",
],
ExternalIDs: {
"name": "a6953372168492035427_egressDefaultDeny",
},
Name: "a6953372168492035427_egressDefaultDeny",
Ports: [""],
},
{
UUID: "5b314f66-886a-4fa8-8f30-0b04d8954c88",
ACLs: [
"f619e9ad-720e-4b2b-8bf4-39b48ff0fd26 [u2596996164]",
"06afea64-895b-40c0-8341-6a7316babd1a [u2596996165]",
],
ExternalIDs: {
"name": "namespace1_networkpolicy1",
},
Name: "a14195333570786048679",
Ports: [""],
},
]
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:961
------------------------------
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
Summarizing 1 Failure:
[Fail] OVN NetworkPolicy Operations on startup [It] reconciles an existing gress networkPolicy with a pod selector in its own namespace
/home/trozet/go/src/github.com/ovn-org/ovn-kubernetes/go-controller/pkg/ovn/policy_test.go:961
Ran 1 of 130 Specs in 1.336 seconds
FAIL! -- 0 Passed | 1 Failed | 0 Pending | 129 Skipped
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment