@@ -57,15 +57,24 @@ var (
57
57
//go:embed manifests/client-egress-l7-http.yaml
58
58
clientEgressL7HTTPPolicyYAML string
59
59
60
+ //go:embed manifests/client-egress-l7-http-port-range.yaml
61
+ clientEgressL7HTTPPolicyPortRangeYAML string
62
+
60
63
//go:embed manifests/client-egress-l7-http-named-port.yaml
61
64
clientEgressL7HTTPNamedPortPolicyYAML string
62
65
63
66
//go:embed manifests/client-egress-l7-tls.yaml
64
67
clientEgressL7TLSPolicyYAML string
65
68
69
+ //go:embed manifests/client-egress-l7-tls-port-range.yaml
70
+ clientEgressL7TLSPolicyPortRangeYAML string
71
+
66
72
//go:embed manifests/client-egress-l7-http-matchheader-secret.yaml
67
73
clientEgressL7HTTPMatchheaderSecretYAML string
68
74
75
+ //go:embed manifests/client-egress-l7-http-matchheader-secret-port-range.yaml
76
+ clientEgressL7HTTPMatchheaderSecretPortRangeYAML string
77
+
69
78
//go:embed manifests/echo-ingress-from-cidr.yaml
70
79
echoIngressFromCIDRYAML string
71
80
)
@@ -259,17 +268,20 @@ func finalTests(ct *check.ConnectivityTest) error {
259
268
260
269
func renderTemplates (param check.Parameters ) (map [string ]string , error ) {
261
270
templates := map [string ]string {
262
- "clientEgressToCIDRExternalPolicyYAML" : clientEgressToCIDRExternalPolicyYAML ,
263
- "clientEgressToCIDRExternalPolicyKNPYAML" : clientEgressToCIDRExternalPolicyKNPYAML ,
264
- "clientEgressToCIDRNodeKNPYAML" : clientEgressToCIDRNodeKNPYAML ,
265
- "clientEgressToCIDRExternalDenyPolicyYAML" : clientEgressToCIDRExternalDenyPolicyYAML ,
266
- "clientEgressL7HTTPPolicyYAML" : clientEgressL7HTTPPolicyYAML ,
267
- "clientEgressL7HTTPNamedPortPolicyYAML" : clientEgressL7HTTPNamedPortPolicyYAML ,
268
- "clientEgressToFQDNsPolicyYAML" : clientEgressToFQDNsPolicyYAML ,
269
- "clientEgressL7TLSPolicyYAML" : clientEgressL7TLSPolicyYAML ,
270
- "clientEgressL7HTTPMatchheaderSecretYAML" : clientEgressL7HTTPMatchheaderSecretYAML ,
271
- "echoIngressFromCIDRYAML" : echoIngressFromCIDRYAML ,
272
- "denyCIDRPolicyYAML" : denyCIDRPolicyYAML ,
271
+ "clientEgressToCIDRExternalPolicyYAML" : clientEgressToCIDRExternalPolicyYAML ,
272
+ "clientEgressToCIDRExternalPolicyKNPYAML" : clientEgressToCIDRExternalPolicyKNPYAML ,
273
+ "clientEgressToCIDRNodeKNPYAML" : clientEgressToCIDRNodeKNPYAML ,
274
+ "clientEgressToCIDRExternalDenyPolicyYAML" : clientEgressToCIDRExternalDenyPolicyYAML ,
275
+ "clientEgressL7HTTPPolicyYAML" : clientEgressL7HTTPPolicyYAML ,
276
+ "clientEgressL7HTTPPolicyPortRangeYAML" : clientEgressL7HTTPPolicyPortRangeYAML ,
277
+ "clientEgressL7HTTPNamedPortPolicyYAML" : clientEgressL7HTTPNamedPortPolicyYAML ,
278
+ "clientEgressToFQDNsPolicyYAML" : clientEgressToFQDNsPolicyYAML ,
279
+ "clientEgressL7TLSPolicyYAML" : clientEgressL7TLSPolicyYAML ,
280
+ "clientEgressL7TLSPolicyPortRangeYAML" : clientEgressL7TLSPolicyPortRangeYAML ,
281
+ "clientEgressL7HTTPMatchheaderSecretYAML" : clientEgressL7HTTPMatchheaderSecretYAML ,
282
+ "clientEgressL7HTTPMatchheaderSecretPortRangeYAML" : clientEgressL7HTTPMatchheaderSecretPortRangeYAML ,
283
+ "echoIngressFromCIDRYAML" : echoIngressFromCIDRYAML ,
284
+ "denyCIDRPolicyYAML" : denyCIDRPolicyYAML ,
273
285
}
274
286
if param .K8sLocalHostTest {
275
287
templates ["clientEgressToCIDRCPHostPolicyYAML" ] = clientEgressToCIDRCPHostPolicyYAML
0 commit comments