Skip to content

Fix namespace-lister NetworkPolicy ingress rule #7039

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 22, 2025

Conversation

ralphbean
Copy link
Member

I'm pretty sure this is a typo.

If two entries appear in a list like this, they are "OR"'d together, like "any pod matching the namespace selectors" or "any pods matching the podselector [in this namespace]", which is not what we want.

Things are currently working, because the namespaceselector permits any pod in the matched namespaces, which includes the single target pod we wanted to permit.

By making this into a list of one rule, we'll permit only the matched pod in only the matched namespace to speak to this target pod.

I'm pretty sure this is a typo.

If two entries appear in a list like this, they are "OR"'d together,
like "any pod matching the namespace selectors" or "any pods matching
the podselector [in this namespace]", which is not what we want.

Things are currently working, because the namespaceselector permits
*any* pod in the matched namespaces, which includes the single target
pod we wanted to permit.

By making this into a list of one rule, we'll permit only the matched
pod in only the matched namespace to speak to this target pod.
@ralphbean ralphbean requested a review from filariow July 7, 2025 21:18
@openshift-ci openshift-ci bot requested a review from sadlerap July 7, 2025 21:18
@openshift-ci openshift-ci bot added the approved label Jul 7, 2025
Copy link
Contributor

@sadlerap sadlerap left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, though @filariow should also review.

Thanks for the fix!

Copy link
Member

@filariow filariow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Copy link

openshift-ci bot commented Jul 22, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: filariow, ralphbean, sadlerap

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

filariow added a commit to filariow/infra-deployments that referenced this pull request Jul 22, 2025
promoting redhat-appstudio#7039 to production

Signed-off-by: Francesco Ilario <[email protected]>
@openshift-merge-bot openshift-merge-bot bot merged commit 15b25be into main Jul 22, 2025
7 checks passed
@filariow filariow deleted the ns-lister-typofix branch July 22, 2025 08:54
rhtap-qe-bots pushed a commit to redhat-appstudio-qe/infra-deployments that referenced this pull request Jul 22, 2025
promoting redhat-appstudio#7039 to production

Signed-off-by: Francesco Ilario <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants