You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
(e2e) fix default-deny-all in list of allowed policies for test (#2039)
Follow up to (2034)[#2034]
When there is a dual namespace deployment, the default-deny-all policy
is duplicated in both namespaces.
This PR updates the list of `allowedPolicies` to include both policies
if a dual namespace deployment is detected.
// No IngressRules means deny all ingress if PolicyTypeIngress is present
63
+
// No EgressRules means deny all egress if PolicyTypeEgress is present
64
+
denyAllIngressJustification: "Denies all ingress traffic to pods selected by this policy by default, unless explicitly allowed by other policy rules, ensuring a baseline secure posture.",
65
+
denyAllEgressJustification: "Denies all egress traffic from pods selected by this policy by default, unless explicitly allowed by other policy rules, minimizing potential exfiltration paths.",
// No IngressRules means deny all ingress if PolicyTypeIngress is present
113
-
// No EgressRules means deny all egress if PolicyTypeEgress is present
114
-
denyAllIngressJustification: "Denies all ingress traffic to pods selected by this policy by default, unless explicitly allowed by other policy rules, ensuring a baseline secure posture.",
115
-
denyAllEgressJustification: "Denies all egress traffic from pods selected by this policy by default, unless explicitly allowed by other policy rules, minimizing potential exfiltration paths.",
0 commit comments