@@ -33,7 +33,7 @@ class TestBuildEgressSidecarContainer:
3333
3434 def test_builds_container_with_basic_config (self ):
3535 """Test that container is built with correct basic configuration."""
36- egress_image = "opensandbox/egress:v1.0.2 "
36+ egress_image = "opensandbox/egress:v1.0.3 "
3737 network_policy = NetworkPolicy (
3838 default_action = "deny" ,
3939 egress = [
@@ -50,7 +50,7 @@ def test_builds_container_with_basic_config(self):
5050
5151 def test_contains_egress_rules_environment_variable (self ):
5252 """Test that container includes OPENSANDBOX_EGRESS_RULES environment variable."""
53- egress_image = "opensandbox/egress:v1.0.2 "
53+ egress_image = "opensandbox/egress:v1.0.3 "
5454 network_policy = NetworkPolicy (
5555 default_action = "deny" ,
5656 egress = [NetworkRule (action = "allow" , target = "example.com" )],
@@ -65,7 +65,7 @@ def test_contains_egress_rules_environment_variable(self):
6565
6666 def test_serializes_network_policy_correctly (self ):
6767 """Test that network policy is correctly serialized to JSON."""
68- egress_image = "opensandbox/egress:v1.0.2 "
68+ egress_image = "opensandbox/egress:v1.0.3 "
6969 network_policy = NetworkPolicy (
7070 default_action = "deny" ,
7171 egress = [
@@ -92,7 +92,7 @@ def test_serializes_network_policy_correctly(self):
9292
9393 def test_handles_empty_egress_rules (self ):
9494 """Test that empty egress rules are handled correctly."""
95- egress_image = "opensandbox/egress:v1.0.2 "
95+ egress_image = "opensandbox/egress:v1.0.3 "
9696 network_policy = NetworkPolicy (
9797 default_action = "allow" ,
9898 egress = [],
@@ -108,7 +108,7 @@ def test_handles_empty_egress_rules(self):
108108
109109 def test_handles_missing_default_action (self ):
110110 """Test that missing default_action is handled (exclude_none=True)."""
111- egress_image = "opensandbox/egress:v1.0.2 "
111+ egress_image = "opensandbox/egress:v1.0.3 "
112112 network_policy = NetworkPolicy (
113113 egress = [NetworkRule (action = "allow" , target = "example.com" )],
114114 )
@@ -124,7 +124,7 @@ def test_handles_missing_default_action(self):
124124
125125 def test_security_context_has_net_admin_capability (self ):
126126 """Test that security context includes NET_ADMIN capability."""
127- egress_image = "opensandbox/egress:v1.0.2 "
127+ egress_image = "opensandbox/egress:v1.0.3 "
128128 network_policy = NetworkPolicy (
129129 default_action = "deny" ,
130130 egress = [],
@@ -139,7 +139,7 @@ def test_security_context_has_net_admin_capability(self):
139139
140140 def test_container_spec_is_valid_kubernetes_format (self ):
141141 """Test that returned container spec is in valid Kubernetes format."""
142- egress_image = "opensandbox/egress:v1.0.2 "
142+ egress_image = "opensandbox/egress:v1.0.3 "
143143 network_policy = NetworkPolicy (
144144 default_action = "deny" ,
145145 egress = [NetworkRule (action = "allow" , target = "example.com" )],
@@ -161,7 +161,7 @@ def test_container_spec_is_valid_kubernetes_format(self):
161161
162162 def test_handles_wildcard_domains (self ):
163163 """Test that wildcard domains in egress rules are handled correctly."""
164- egress_image = "opensandbox/egress:v1.0.2 "
164+ egress_image = "opensandbox/egress:v1.0.3 "
165165 network_policy = NetworkPolicy (
166166 default_action = "deny" ,
167167 egress = [
@@ -251,7 +251,7 @@ def test_adds_egress_sidecar_container(self):
251251 default_action = "deny" ,
252252 egress = [NetworkRule (action = "allow" , target = "example.com" )],
253253 )
254- egress_image = "opensandbox/egress:v1.0.2 "
254+ egress_image = "opensandbox/egress:v1.0.3 "
255255
256256 apply_egress_to_spec (
257257 pod_spec = pod_spec ,
@@ -272,7 +272,7 @@ def test_adds_ipv6_disable_sysctls(self):
272272 default_action = "deny" ,
273273 egress = [NetworkRule (action = "allow" , target = "example.com" )],
274274 )
275- egress_image = "opensandbox/egress:v1.0.2 "
275+ egress_image = "opensandbox/egress:v1.0.3 "
276276
277277 apply_egress_to_spec (
278278 pod_spec = pod_spec ,
@@ -303,7 +303,7 @@ def test_extends_existing_sysctls(self):
303303 default_action = "deny" ,
304304 egress = [NetworkRule (action = "allow" , target = "example.com" )],
305305 )
306- egress_image = "opensandbox/egress:v1.0.2 "
306+ egress_image = "opensandbox/egress:v1.0.3 "
307307
308308 apply_egress_to_spec (
309309 pod_spec = pod_spec ,
@@ -337,7 +337,7 @@ def test_no_op_when_no_network_policy(self):
337337 pod_spec = pod_spec ,
338338 containers = containers ,
339339 network_policy = None ,
340- egress_image = "opensandbox/egress:v1.0.2 " ,
340+ egress_image = "opensandbox/egress:v1.0.3 " ,
341341 )
342342
343343 assert len (containers ) == 0
0 commit comments