From 3ab522ce8bca01735ad83702d84824d094b0f261 Mon Sep 17 00:00:00 2001 From: OZGCloud <ozgcloud@mgm-tp.com> Date: Mon, 16 Sep 2024 14:30:00 +0200 Subject: [PATCH] OZG-6708 remove ingress rule to antragsraum-server --- src/main/helm/templates/network_policy.yaml | 7 ------- src/test/helm/network_policy_test.yaml | 21 --------------------- 2 files changed, 28 deletions(-) diff --git a/src/main/helm/templates/network_policy.yaml b/src/main/helm/templates/network_policy.yaml index cb275e46a..7ddc1051d 100644 --- a/src/main/helm/templates/network_policy.yaml +++ b/src/main/helm/templates/network_policy.yaml @@ -56,13 +56,6 @@ spec: - protocol: TCP port: 8081 {{- if ((.Values.ozgcloud).antragraum).enabled }} - - from: - - namespaceSelector: - matchLabels: - kubernetes.io/metadata.name: {{ required "ozgcloud.antragraum.namespace must be set if antragraum is enabled" ((.Values.ozgcloud).antragraum).namespace }} - podSelector: - matchLabels: - component: antragsraum-server - from: - namespaceSelector: matchLabels: diff --git a/src/test/helm/network_policy_test.yaml b/src/test/helm/network_policy_test.yaml index 2f70d4431..62fc42a55 100644 --- a/src/test/helm/network_policy_test.yaml +++ b/src/test/helm/network_policy_test.yaml @@ -140,27 +140,6 @@ tests: matchLabels: name: test-monitoring - - - it: should add ingress rule for antragraum if antragraum is enabled - set: - networkPolicy: - dnsServerNamespace: test-dns-namespace - ozgcloud: - antragraum: - enabled: true - namespace: antragraum02 - antragsraumProxyNamespace: antragraum-proxy - asserts: - - contains: - path: spec.ingress - content: - from: - - namespaceSelector: - matchLabels: - kubernetes.io/metadata.name: antragraum02 - podSelector: - matchLabels: - component: antragsraum-server - it: should add ingress rule for antragraum-proxy if antragraum is enabled set: networkPolicy: -- GitLab