Allow to exclude inbound and outbound traffic when using tproxy via annotations #506
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Changes proposed in this PR:
This PR depends on hashicorp/consul#10134
We allow the exclusion of the following:
How I've tested this PR:
I tested it manually. Here are the steps I followed
Install the helm chart on kind:
I've used the following to test these annotations:
8080
on the static-server deployment80
so we can reach google.com from the static-client deploymentFirst, I deployed without annotations to check that I can't reach any of the above.
static-server.yaml
:static-client.yaml
:Tried to reach the static server over pod IP and port 8080 from another pod:
Tried to reach google.com (on port 80) and consul API using the host IP from the static-client pod:
Redeployed static-server and static-client with as follows:
Ran the commands again:
Note the new pod IP of the static-server.
How I expect reviewers to test this PR:
Checklist: