@@ -3,6 +3,7 @@ package linter
3
3
import (
4
4
"fmt"
5
5
collections "github.com/mattfenwick/collections/pkg"
6
+ "github.com/mattfenwick/collections/pkg/builtins"
6
7
"github.com/mattfenwick/cyclonus/pkg/matcher"
7
8
"github.com/mattfenwick/cyclonus/pkg/utils"
8
9
"github.com/olekukonko/tablewriter"
@@ -41,81 +42,134 @@ const (
41
42
CheckTargetAllIngressAllowed Check = "CheckTargetAllIngressAllowed"
42
43
CheckTargetAllEgressAllowed Check = "CheckTargetAllEgressAllowed"
43
44
44
- // TODO add check that rule is unnecessary b/c another rule exactly supercedes it
45
+ // TODO add check that rule is unnecessary b/c another rule exactly supersedes it
45
46
)
46
47
47
48
func (a Check ) Equal (b Check ) bool {
48
49
// TODO why is this necessary? why can't we use existing String implementation?
49
50
return a == b
50
51
}
51
52
52
- type Warning struct {
53
+ type Warning interface {
54
+ OriginIsSource () bool
55
+ GetCheck () Check
56
+ GetTarget () string
57
+ GetSourcePolicies () string
58
+ }
59
+
60
+ type sourceWarning struct {
53
61
Check Check
54
- Target * matcher.Target
55
62
SourcePolicy * networkingv1.NetworkPolicy
56
63
}
57
64
58
- func WarningsTable (warnings []* Warning ) string {
65
+ func (s * sourceWarning ) OriginIsSource () bool {
66
+ return true
67
+ }
68
+
69
+ func (s * sourceWarning ) GetCheck () Check {
70
+ return s .Check
71
+ }
72
+
73
+ func (s * sourceWarning ) GetTarget () string {
74
+ return ""
75
+ }
76
+
77
+ func (s * sourceWarning ) GetSourcePolicies () string {
78
+ return NetpolKey (s .SourcePolicy )
79
+ }
80
+
81
+ func NetpolKey (netpol * networkingv1.NetworkPolicy ) string {
82
+ return fmt .Sprintf ("%s/%s" , netpol .Namespace , netpol .Name )
83
+ }
84
+
85
+ func sortBy (w Warning ) collections.SliceOrd [collections.String ] {
86
+ origin := "1"
87
+ if w .OriginIsSource () {
88
+ origin = "0"
89
+ }
90
+ return collections .MapSlice (
91
+ collections .WrapString ,
92
+ []string {origin , string (w .GetCheck ()), w .GetTarget (), w .GetSourcePolicies ()})
93
+ }
94
+
95
+ type resolvedWarning struct {
96
+ Check Check
97
+ Target * matcher.Target
98
+ originPolicies string
99
+ }
100
+
101
+ func (r * resolvedWarning ) OriginIsSource () bool {
102
+ return false
103
+ }
104
+
105
+ func (r * resolvedWarning ) GetCheck () Check {
106
+ return r .Check
107
+ }
108
+
109
+ func (r * resolvedWarning ) GetTarget () string {
110
+ return fmt .Sprintf ("namespace: %s\n \n pod selector:\n %s" , r .Target .Namespace , utils .YamlString (r .Target .PodSelector ))
111
+ }
112
+
113
+ func (r * resolvedWarning ) GetSourcePolicies () string {
114
+ target := builtins .Sort (collections .MapSlice (NetpolKey , r .Target .SourceRules ))
115
+ return strings .Join (target , "\n " )
116
+ }
117
+
118
+ func WarningsTable (warnings []Warning ) string {
59
119
str := & strings.Builder {}
60
120
table := tablewriter .NewWriter (str )
61
121
table .SetHeader ([]string {"Source/Resolved" , "Type" , "Target" , "Source Policies" })
62
122
table .SetRowLine (true )
63
123
table .SetReflowDuringAutoWrap (false )
64
124
table .SetAutoWrapText (false )
65
125
66
- for _ , warning := range warnings {
67
- if warning .SourcePolicy != nil {
68
- p := warning .SourcePolicy
69
- table .Append ([]string {"Source" , string (warning .Check ), "" , p .Namespace + "/" + p .Name })
70
- } else {
71
- t := warning .Target
72
- var source []string
73
- for _ , policy := range t .SourceRules {
74
- source = append (source , policy .Namespace + "/" + policy .Name )
75
- }
76
- target := fmt .Sprintf ("namespace: %s\n \n pod selector:\n %s" , t .Namespace , utils .YamlString (t .PodSelector ))
77
- table .Append ([]string {"Resolved" , string (warning .Check ), target , strings .Join (source , "\n " )})
126
+ sortedWarnings := collections .SortOn [Warning , collections.SliceOrd [collections.String ]](warnings , sortBy )
127
+ for _ , w := range sortedWarnings {
128
+ origin := "Source"
129
+ if ! w .OriginIsSource () {
130
+ origin = "Resolved"
78
131
}
132
+ table .Append ([]string {origin , string (w .GetCheck ()), w .GetTarget (), w .GetSourcePolicies ()})
79
133
}
80
134
81
135
table .Render ()
82
136
return str .String ()
83
137
}
84
138
85
- func Lint (kubePolicies []* networkingv1.NetworkPolicy , skip * collections.Set [Check ]) []* Warning {
139
+ func Lint (kubePolicies []* networkingv1.NetworkPolicy , skip * collections.Set [Check ]) []Warning {
86
140
policies := matcher .BuildNetworkPolicies (false , kubePolicies )
87
141
warnings := append (LintSourcePolicies (kubePolicies ), LintResolvedPolicies (policies )... )
88
142
89
143
// TODO do some stuff with comparing simplified to non-simplified policies
90
144
91
- var filtered []* Warning
145
+ var filtered []Warning
92
146
for _ , warning := range warnings {
93
- if ! skip .Contains (warning .Check ) {
147
+ if ! skip .Contains (warning .GetCheck () ) {
94
148
filtered = append (filtered , warning )
95
149
}
96
150
}
97
151
return filtered
98
152
}
99
153
100
- func LintSourcePolicies (kubePolicies []* networkingv1.NetworkPolicy ) []* Warning {
101
- var ws []* Warning
154
+ func LintSourcePolicies (kubePolicies []* networkingv1.NetworkPolicy ) []Warning {
155
+ var ws []Warning
102
156
names := map [string ]map [string ]bool {}
103
157
for _ , policy := range kubePolicies {
104
158
ns , name := policy .Namespace , policy .Name
105
159
if _ , ok := names [ns ]; ! ok {
106
160
names [ns ] = map [string ]bool {}
107
161
}
108
162
if names [ns ][name ] {
109
- ws = append (ws , & Warning {Check : CheckSourceDuplicatePolicyName , SourcePolicy : policy })
163
+ ws = append (ws , & sourceWarning {Check : CheckSourceDuplicatePolicyName , SourcePolicy : policy })
110
164
}
111
165
names [ns ][name ] = true
112
166
113
167
if ns == "" {
114
- ws = append (ws , & Warning {Check : CheckSourceMissingNamespace , SourcePolicy : policy })
168
+ ws = append (ws , & sourceWarning {Check : CheckSourceMissingNamespace , SourcePolicy : policy })
115
169
}
116
170
117
171
if len (policy .Spec .PolicyTypes ) == 0 {
118
- ws = append (ws , & Warning {Check : CheckSourceMissingPolicyTypes , SourcePolicy : policy })
172
+ ws = append (ws , & sourceWarning {Check : CheckSourceMissingPolicyTypes , SourcePolicy : policy })
119
173
}
120
174
121
175
ingress , egress := false , false
@@ -128,10 +182,10 @@ func LintSourcePolicies(kubePolicies []*networkingv1.NetworkPolicy) []*Warning {
128
182
}
129
183
}
130
184
if len (policy .Spec .Ingress ) > 0 && ! ingress {
131
- ws = append (ws , & Warning {Check : CheckSourceMissingPolicyTypeIngress , SourcePolicy : policy })
185
+ ws = append (ws , & sourceWarning {Check : CheckSourceMissingPolicyTypeIngress , SourcePolicy : policy })
132
186
}
133
187
if len (policy .Spec .Egress ) > 0 && ! egress {
134
- ws = append (ws , & Warning {Check : CheckSourceMissingPolicyTypeEgress , SourcePolicy : policy })
188
+ ws = append (ws , & sourceWarning {Check : CheckSourceMissingPolicyTypeEgress , SourcePolicy : policy })
135
189
}
136
190
137
191
for _ , ingressRule := range policy .Spec .Ingress {
@@ -144,43 +198,43 @@ func LintSourcePolicies(kubePolicies []*networkingv1.NetworkPolicy) []*Warning {
144
198
return ws
145
199
}
146
200
147
- func LintNetworkPolicyPorts (policy * networkingv1.NetworkPolicy , ports []networkingv1.NetworkPolicyPort ) []* Warning {
148
- var ws []* Warning
201
+ func LintNetworkPolicyPorts (policy * networkingv1.NetworkPolicy , ports []networkingv1.NetworkPolicyPort ) []Warning {
202
+ var ws []Warning
149
203
for _ , port := range ports {
150
204
if port .Protocol == nil {
151
- ws = append (ws , & Warning {Check : CheckSourcePortMissingProtocol , SourcePolicy : policy })
205
+ ws = append (ws , & sourceWarning {Check : CheckSourcePortMissingProtocol , SourcePolicy : policy })
152
206
}
153
207
}
154
208
return ws
155
209
}
156
210
157
- func LintResolvedPolicies (policies * matcher.Policy ) []* Warning {
158
- var ws []* Warning
211
+ func LintResolvedPolicies (policies * matcher.Policy ) []Warning {
212
+ var ws []Warning
159
213
for _ , egress := range policies .Egress {
160
214
if ! egress .Allows (& matcher.TrafficPeer {Internal : nil , IP : "8.8.8.8" }, 53 , "" , v1 .ProtocolTCP ) {
161
- ws = append (ws , & Warning {Check : CheckDNSBlockedOnTCP , Target : egress })
215
+ ws = append (ws , & resolvedWarning {Check : CheckDNSBlockedOnTCP , Target : egress })
162
216
}
163
217
if ! egress .Allows (& matcher.TrafficPeer {Internal : nil , IP : "8.8.8.8" }, 53 , "" , v1 .ProtocolUDP ) {
164
- ws = append (ws , & Warning {Check : CheckDNSBlockedOnUDP , Target : egress })
218
+ ws = append (ws , & resolvedWarning {Check : CheckDNSBlockedOnUDP , Target : egress })
165
219
}
166
220
167
221
if len (egress .Peers ) == 0 {
168
- ws = append (ws , & Warning {Check : CheckTargetAllEgressBlocked , Target : egress })
222
+ ws = append (ws , & resolvedWarning {Check : CheckTargetAllEgressBlocked , Target : egress })
169
223
}
170
224
for _ , peer := range egress .Peers {
171
225
if _ , ok := peer .(* matcher.PortsForAllPeersMatcher ); ok {
172
- ws = append (ws , & Warning {Check : CheckTargetAllEgressAllowed , Target : egress })
226
+ ws = append (ws , & resolvedWarning {Check : CheckTargetAllEgressAllowed , Target : egress })
173
227
}
174
228
}
175
229
}
176
230
177
231
for _ , ingress := range policies .Ingress {
178
232
if len (ingress .Peers ) == 0 {
179
- ws = append (ws , & Warning {Check : CheckTargetAllIngressBlocked , Target : ingress })
233
+ ws = append (ws , & resolvedWarning {Check : CheckTargetAllIngressBlocked , Target : ingress })
180
234
}
181
235
for _ , peer := range ingress .Peers {
182
236
if _ , ok := peer .(* matcher.PortsForAllPeersMatcher ); ok {
183
- ws = append (ws , & Warning {Check : CheckTargetAllIngressAllowed , Target : ingress })
237
+ ws = append (ws , & resolvedWarning {Check : CheckTargetAllIngressAllowed , Target : ingress })
184
238
}
185
239
}
186
240
0 commit comments