-
Notifications
You must be signed in to change notification settings - Fork 3.7k
cli: Add coverage for HostFw + WireGuard + Native #43374
Copy link
Copy link
Closed
Labels
area/CIContinuous Integration testing issue or flakeContinuous Integration testing issue or flakearea/encryptionImpacts encryption support such as IPSec, WireGuard, or kTLS.Impacts encryption support such as IPSec, WireGuard, or kTLS.area/host-firewallImpacts the host firewall or the host endpoint.Impacts the host firewall or the host endpoint.feature/wireguardRelates to Cilium's Wireguard featureRelates to Cilium's Wireguard featurekind/enhancementThis would improve or streamline existing functionality.This would improve or streamline existing functionality.
Description
#38077 we moved from attaching bpf_host to cilium_wg0@ingress to a dedicated bpf_wireguard program. Unfortunately, we did not catch that we broke HostFw ingress path: pod-destined packets were correctly running their policies, while host-related packets (eg., with node encryption) were left to the stack w/o running HostFw first.
#42892 re-established HostFw by routing host-related packets to cilium_net@egress / cilium_host@ingress, where policies are checked.
The reason why we did not catch this before is because we're not testing NativeRouting+WireGuard+HostFw in CI. The closest one is wireguard-4, but it runs TunnelMode.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area/CIContinuous Integration testing issue or flakeContinuous Integration testing issue or flakearea/encryptionImpacts encryption support such as IPSec, WireGuard, or kTLS.Impacts encryption support such as IPSec, WireGuard, or kTLS.area/host-firewallImpacts the host firewall or the host endpoint.Impacts the host firewall or the host endpoint.feature/wireguardRelates to Cilium's Wireguard featureRelates to Cilium's Wireguard featurekind/enhancementThis would improve or streamline existing functionality.This would improve or streamline existing functionality.