-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
48ceb56
commit 4686e3e
Showing
4 changed files
with
122 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
54 changes: 54 additions & 0 deletions
54
test_outputs/connlist/anp_and_banp_using_networks_and_nodes_test_explain_output.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN ns1/pod1[Deployment] => 104.154.164.160-104.154.164.160: | ||
|
||
No Connections due to the following policies//rules: | ||
EGRESS DIRECTION (DENIED) | ||
1) [ANP] egress-peer-1//Egress rule deny-egress (Deny) | ||
INGRESS DIRECTION (ALLOWED) due to the assumed default for IPblock (Allow all) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN ns1/pod1[Deployment] => 104.154.164.170-104.154.164.170: | ||
|
||
All Connections due to the following policies//rules: | ||
EGRESS DIRECTION (ALLOWED) | ||
1) [ANP] egress-peer-1//Egress rule allow-egress (Allow) | ||
INGRESS DIRECTION (ALLOWED) due to the assumed default for IPblock (Allow all) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN ns1/pod1[Deployment] => ns2/pod1[Deployment]: | ||
|
||
No Connections due to the following policies//rules: | ||
EGRESS DIRECTION (DENIED) | ||
1) [ANP] egress-peer-1//Egress rule deny-egress (Deny) | ||
INGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN ns1/pod1[Deployment] => ns3/pod1[Deployment]: | ||
|
||
All Connections due to the following policies//rules: | ||
EGRESS DIRECTION (ALLOWED) | ||
1) [ANP] egress-peer-1//Egress rule allow-egress (Allow) | ||
INGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
The following nodes are connected due to the system default or the assumed default for IPblock (Allow all): | ||
0.0.0.0-255.255.255.255 => ns1/pod1[Deployment] | ||
0.0.0.0-255.255.255.255 => ns2/pod1[Deployment] | ||
0.0.0.0-255.255.255.255 => ns3/pod1[Deployment] | ||
ns1/pod1[Deployment] => 0.0.0.0-104.154.164.159 | ||
ns1/pod1[Deployment] => 104.154.164.161-104.154.164.169 | ||
ns1/pod1[Deployment] => 104.154.164.171-255.255.255.255 | ||
ns2/pod1[Deployment] => 0.0.0.0-104.154.164.159 | ||
ns2/pod1[Deployment] => 104.154.164.160-104.154.164.160 | ||
ns2/pod1[Deployment] => 104.154.164.161-104.154.164.169 | ||
ns2/pod1[Deployment] => 104.154.164.170-104.154.164.170 | ||
ns2/pod1[Deployment] => 104.154.164.171-255.255.255.255 | ||
ns2/pod1[Deployment] => ns1/pod1[Deployment] | ||
ns2/pod1[Deployment] => ns3/pod1[Deployment] | ||
ns3/pod1[Deployment] => 0.0.0.0-104.154.164.159 | ||
ns3/pod1[Deployment] => 104.154.164.160-104.154.164.160 | ||
ns3/pod1[Deployment] => 104.154.164.161-104.154.164.169 | ||
ns3/pod1[Deployment] => 104.154.164.170-104.154.164.170 | ||
ns3/pod1[Deployment] => 104.154.164.171-255.255.255.255 | ||
ns3/pod1[Deployment] => ns1/pod1[Deployment] | ||
ns3/pod1[Deployment] => ns2/pod1[Deployment] |
35 changes: 35 additions & 0 deletions
35
test_outputs/connlist/anp_banp_test_with_named_port_matched_explain_output.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN network-policy-conformance-gryffindor/harry-potter[StatefulSet] => network-policy-conformance-slytherin/draco-malfoy[StatefulSet]: | ||
|
||
No Connections due to the following policies//rules: | ||
EGRESS DIRECTION (DENIED) | ||
1) [ANP] pass-example//Egress rule pass-all-egress-to-slytherin (Pass) | ||
2) [BANP] default//Egress rule deny-all-egress-to-slytherin (Deny) | ||
INGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN network-policy-conformance-slytherin/draco-malfoy[StatefulSet] => network-policy-conformance-gryffindor/harry-potter[StatefulSet]: | ||
|
||
ALLOWED TCP:[80] due to the following policies//rules: | ||
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
INGRESS DIRECTION (ALLOWED) | ||
1) [ANP] pass-example//Ingress rule allow-ingress-from-slytherin-on-named-port (Allow) | ||
|
||
DENIED TCP:[1-79,81-65535] due to the following policies//rules: | ||
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
INGRESS DIRECTION (DENIED) | ||
1) [ANP] pass-example//Ingress rule pass-all-ingress-from-slytherin (Pass) | ||
2) [BANP] default//Ingress rule deny-all-ingress-from-slytherin (Deny) | ||
|
||
DENIED {SCTP,UDP}:[ALL PORTS] due to the following policies//rules: | ||
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
INGRESS DIRECTION (DENIED) | ||
1) [ANP] pass-example//Ingress rule pass-all-ingress-from-slytherin (Pass) | ||
2) [BANP] default//Ingress rule deny-all-ingress-from-slytherin (Deny) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
The following nodes are connected due to the system default or the assumed default for IPblock (Allow all): | ||
0.0.0.0-255.255.255.255 => network-policy-conformance-gryffindor/harry-potter[StatefulSet] | ||
0.0.0.0-255.255.255.255 => network-policy-conformance-slytherin/draco-malfoy[StatefulSet] | ||
network-policy-conformance-gryffindor/harry-potter[StatefulSet] => 0.0.0.0-255.255.255.255 | ||
network-policy-conformance-slytherin/draco-malfoy[StatefulSet] => 0.0.0.0-255.255.255.255 |
24 changes: 24 additions & 0 deletions
24
test_outputs/connlist/anp_banp_test_with_named_port_unmatched_explain_output.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN network-policy-conformance-gryffindor/harry-potter[StatefulSet] => network-policy-conformance-slytherin/draco-malfoy[StatefulSet]: | ||
|
||
No Connections due to the following policies//rules: | ||
EGRESS DIRECTION (DENIED) | ||
1) [ANP] pass-example//Egress rule pass-all-egress-to-slytherin (Pass) | ||
2) [BANP] default//Egress rule deny-all-egress-to-slytherin (Deny) | ||
INGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
CONNECTIONS BETWEEN network-policy-conformance-slytherin/draco-malfoy[StatefulSet] => network-policy-conformance-gryffindor/harry-potter[StatefulSet]: | ||
|
||
No Connections due to the following policies//rules: | ||
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all) | ||
INGRESS DIRECTION (DENIED) | ||
1) [ANP] pass-example//Ingress rule pass-all-ingress-from-slytherin (Pass) | ||
2) [BANP] default//Ingress rule deny-all-ingress-from-slytherin (Deny) | ||
|
||
---------------------------------------------------------------------------------------------------------------------------------------------------------------- | ||
The following nodes are connected due to the system default or the assumed default for IPblock (Allow all): | ||
0.0.0.0-255.255.255.255 => network-policy-conformance-gryffindor/harry-potter[StatefulSet] | ||
0.0.0.0-255.255.255.255 => network-policy-conformance-slytherin/draco-malfoy[StatefulSet] | ||
network-policy-conformance-gryffindor/harry-potter[StatefulSet] => 0.0.0.0-255.255.255.255 | ||
network-policy-conformance-slytherin/draco-malfoy[StatefulSet] => 0.0.0.0-255.255.255.255 |