@@ -224,6 +224,35 @@ var _ = Describe("SecurityPolicy", func() {
224224 })
225225 })
226226
227+ When ("create monitor mode security policies" , func () {
228+ var nginxPolicy , serverPolicy , dbPolicy * securityv1alpha1.SecurityPolicy
229+
230+ BeforeEach (func () {
231+ nginxPolicy = newPolicy ("nginx-policy" , constants .Tier2 , securityv1alpha1 .DefaultRuleDrop , nginxSelector )
232+ nginxPolicy .Spec .SecurityPolicyEnforcementMode = securityv1alpha1 .MonitorMode
233+ addIngressRule (nginxPolicy , "TCP" , nginxPort ) // allow all connection with nginx port
234+ addEngressRule (nginxPolicy , "TCP" , serverPort , serverSelector )
235+
236+ serverPolicy = newPolicy ("server-policy" , constants .Tier2 , securityv1alpha1 .DefaultRuleDrop , serverSelector )
237+ serverPolicy .Spec .SecurityPolicyEnforcementMode = securityv1alpha1 .MonitorMode
238+ addIngressRule (serverPolicy , "TCP" , serverPort , nginxSelector )
239+ addEngressRule (serverPolicy , "TCP" , dbPort , dbSelector )
240+
241+ dbPolicy = newPolicy ("db-policy" , constants .Tier2 , securityv1alpha1 .DefaultRuleDrop , dbSelector )
242+ dbPolicy .Spec .SecurityPolicyEnforcementMode = securityv1alpha1 .MonitorMode
243+ addIngressRule (dbPolicy , "TCP" , dbPort , dbSelector , serverSelector )
244+ addEngressRule (dbPolicy , "TCP" , dbPort , dbSelector )
245+
246+ Expect (e2eEnv .SetupObjects (ctx , nginxPolicy , serverPolicy , dbPolicy )).Should (Succeed ())
247+ })
248+
249+ It ("should allow all packets" , func () {
250+ assertReachable ([]* model.Endpoint {nginx , client , server01 , server02 , db01 , db02 },
251+ []* model.Endpoint {nginx , client , server01 , server02 , db01 , db02 }, "TCP" , true )
252+ })
253+
254+ })
255+
227256 When ("limits icmp packets between components" , func () {
228257 var icmpAllowPolicy , icmpDropPolicy * securityv1alpha1.SecurityPolicy
229258
0 commit comments