Skip to content

Commit 0390fc7

Browse files
committed
make lint output sort more stable
1 parent 1fa0e2a commit 0390fc7

File tree

3 files changed

+94
-40
lines changed

3 files changed

+94
-40
lines changed

go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ go 1.18
55
require (
66
github.com/go-resty/resty/v2 v2.5.0
77
github.com/jstemmer/go-junit-report v0.9.1
8-
github.com/mattfenwick/collections v0.0.5
8+
github.com/mattfenwick/collections v0.0.8
99
github.com/olekukonko/tablewriter v0.0.4
1010
github.com/onsi/ginkgo v1.14.0
1111
github.com/onsi/gomega v1.19.0

go.sum

+2-2
Original file line numberDiff line numberDiff line change
@@ -241,8 +241,8 @@ github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN
241241
github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
242242
github.com/mailru/easyjson v0.7.6 h1:8yTIVnZgCoiM1TgqoeTl+LfU5Jg6/xL3QhGQnimLYnA=
243243
github.com/mailru/easyjson v0.7.6/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
244-
github.com/mattfenwick/collections v0.0.5 h1:R1ipSypule4CiFCuwpaSBg0MfGDFIfTJbPo4nC9Fv8s=
245-
github.com/mattfenwick/collections v0.0.5/go.mod h1:6JmZGWNsbA4g6OzJQGAOTalNWMPghEOl1q4abMZAJSQ=
244+
github.com/mattfenwick/collections v0.0.8 h1:9U+ZYBdZZIS7sC42bSV0nymyTzFjsLKNuQedUi6jiV8=
245+
github.com/mattfenwick/collections v0.0.8/go.mod h1:6JmZGWNsbA4g6OzJQGAOTalNWMPghEOl1q4abMZAJSQ=
246246
github.com/mattn/go-runewidth v0.0.7 h1:Ei8KR0497xHyKJPAv59M1dkC+rOZCMBJ+t3fZ+twI54=
247247
github.com/mattn/go-runewidth v0.0.7/go.mod h1:H031xJmbD/WCDINGzjvQ9THkh0rPKHF+m2gUSrubnMI=
248248
github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=

pkg/linter/checks.go

+91-37
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package linter
33
import (
44
"fmt"
55
collections "github.com/mattfenwick/collections/pkg"
6+
"github.com/mattfenwick/collections/pkg/builtins"
67
"github.com/mattfenwick/cyclonus/pkg/matcher"
78
"github.com/mattfenwick/cyclonus/pkg/utils"
89
"github.com/olekukonko/tablewriter"
@@ -41,81 +42,134 @@ const (
4142
CheckTargetAllIngressAllowed Check = "CheckTargetAllIngressAllowed"
4243
CheckTargetAllEgressAllowed Check = "CheckTargetAllEgressAllowed"
4344

44-
// TODO add check that rule is unnecessary b/c another rule exactly supercedes it
45+
// TODO add check that rule is unnecessary b/c another rule exactly supersedes it
4546
)
4647

4748
func (a Check) Equal(b Check) bool {
4849
// TODO why is this necessary? why can't we use existing String implementation?
4950
return a == b
5051
}
5152

52-
type Warning struct {
53+
type Warning interface {
54+
OriginIsSource() bool
55+
GetCheck() Check
56+
GetTarget() string
57+
GetSourcePolicies() string
58+
}
59+
60+
type sourceWarning struct {
5361
Check Check
54-
Target *matcher.Target
5562
SourcePolicy *networkingv1.NetworkPolicy
5663
}
5764

58-
func WarningsTable(warnings []*Warning) string {
65+
func (s *sourceWarning) OriginIsSource() bool {
66+
return true
67+
}
68+
69+
func (s *sourceWarning) GetCheck() Check {
70+
return s.Check
71+
}
72+
73+
func (s *sourceWarning) GetTarget() string {
74+
return ""
75+
}
76+
77+
func (s *sourceWarning) GetSourcePolicies() string {
78+
return NetpolKey(s.SourcePolicy)
79+
}
80+
81+
func NetpolKey(netpol *networkingv1.NetworkPolicy) string {
82+
return fmt.Sprintf("%s/%s", netpol.Namespace, netpol.Name)
83+
}
84+
85+
func sortBy(w Warning) collections.SliceOrd[collections.String] {
86+
origin := "1"
87+
if w.OriginIsSource() {
88+
origin = "0"
89+
}
90+
return collections.MapSlice(
91+
collections.WrapString,
92+
[]string{origin, string(w.GetCheck()), w.GetTarget(), w.GetSourcePolicies()})
93+
}
94+
95+
type resolvedWarning struct {
96+
Check Check
97+
Target *matcher.Target
98+
originPolicies string
99+
}
100+
101+
func (r *resolvedWarning) OriginIsSource() bool {
102+
return false
103+
}
104+
105+
func (r *resolvedWarning) GetCheck() Check {
106+
return r.Check
107+
}
108+
109+
func (r *resolvedWarning) GetTarget() string {
110+
return fmt.Sprintf("namespace: %s\n\npod selector:\n%s", r.Target.Namespace, utils.YamlString(r.Target.PodSelector))
111+
}
112+
113+
func (r *resolvedWarning) GetSourcePolicies() string {
114+
target := builtins.Sort(collections.MapSlice(NetpolKey, r.Target.SourceRules))
115+
return strings.Join(target, "\n")
116+
}
117+
118+
func WarningsTable(warnings []Warning) string {
59119
str := &strings.Builder{}
60120
table := tablewriter.NewWriter(str)
61121
table.SetHeader([]string{"Source/Resolved", "Type", "Target", "Source Policies"})
62122
table.SetRowLine(true)
63123
table.SetReflowDuringAutoWrap(false)
64124
table.SetAutoWrapText(false)
65125

66-
for _, warning := range warnings {
67-
if warning.SourcePolicy != nil {
68-
p := warning.SourcePolicy
69-
table.Append([]string{"Source", string(warning.Check), "", p.Namespace + "/" + p.Name})
70-
} else {
71-
t := warning.Target
72-
var source []string
73-
for _, policy := range t.SourceRules {
74-
source = append(source, policy.Namespace+"/"+policy.Name)
75-
}
76-
target := fmt.Sprintf("namespace: %s\n\npod selector:\n%s", t.Namespace, utils.YamlString(t.PodSelector))
77-
table.Append([]string{"Resolved", string(warning.Check), target, strings.Join(source, "\n")})
126+
sortedWarnings := collections.SortOn[Warning, collections.SliceOrd[collections.String]](warnings, sortBy)
127+
for _, w := range sortedWarnings {
128+
origin := "Source"
129+
if !w.OriginIsSource() {
130+
origin = "Resolved"
78131
}
132+
table.Append([]string{origin, string(w.GetCheck()), w.GetTarget(), w.GetSourcePolicies()})
79133
}
80134

81135
table.Render()
82136
return str.String()
83137
}
84138

85-
func Lint(kubePolicies []*networkingv1.NetworkPolicy, skip *collections.Set[Check]) []*Warning {
139+
func Lint(kubePolicies []*networkingv1.NetworkPolicy, skip *collections.Set[Check]) []Warning {
86140
policies := matcher.BuildNetworkPolicies(false, kubePolicies)
87141
warnings := append(LintSourcePolicies(kubePolicies), LintResolvedPolicies(policies)...)
88142

89143
// TODO do some stuff with comparing simplified to non-simplified policies
90144

91-
var filtered []*Warning
145+
var filtered []Warning
92146
for _, warning := range warnings {
93-
if !skip.Contains(warning.Check) {
147+
if !skip.Contains(warning.GetCheck()) {
94148
filtered = append(filtered, warning)
95149
}
96150
}
97151
return filtered
98152
}
99153

100-
func LintSourcePolicies(kubePolicies []*networkingv1.NetworkPolicy) []*Warning {
101-
var ws []*Warning
154+
func LintSourcePolicies(kubePolicies []*networkingv1.NetworkPolicy) []Warning {
155+
var ws []Warning
102156
names := map[string]map[string]bool{}
103157
for _, policy := range kubePolicies {
104158
ns, name := policy.Namespace, policy.Name
105159
if _, ok := names[ns]; !ok {
106160
names[ns] = map[string]bool{}
107161
}
108162
if names[ns][name] {
109-
ws = append(ws, &Warning{Check: CheckSourceDuplicatePolicyName, SourcePolicy: policy})
163+
ws = append(ws, &sourceWarning{Check: CheckSourceDuplicatePolicyName, SourcePolicy: policy})
110164
}
111165
names[ns][name] = true
112166

113167
if ns == "" {
114-
ws = append(ws, &Warning{Check: CheckSourceMissingNamespace, SourcePolicy: policy})
168+
ws = append(ws, &sourceWarning{Check: CheckSourceMissingNamespace, SourcePolicy: policy})
115169
}
116170

117171
if len(policy.Spec.PolicyTypes) == 0 {
118-
ws = append(ws, &Warning{Check: CheckSourceMissingPolicyTypes, SourcePolicy: policy})
172+
ws = append(ws, &sourceWarning{Check: CheckSourceMissingPolicyTypes, SourcePolicy: policy})
119173
}
120174

121175
ingress, egress := false, false
@@ -128,10 +182,10 @@ func LintSourcePolicies(kubePolicies []*networkingv1.NetworkPolicy) []*Warning {
128182
}
129183
}
130184
if len(policy.Spec.Ingress) > 0 && !ingress {
131-
ws = append(ws, &Warning{Check: CheckSourceMissingPolicyTypeIngress, SourcePolicy: policy})
185+
ws = append(ws, &sourceWarning{Check: CheckSourceMissingPolicyTypeIngress, SourcePolicy: policy})
132186
}
133187
if len(policy.Spec.Egress) > 0 && !egress {
134-
ws = append(ws, &Warning{Check: CheckSourceMissingPolicyTypeEgress, SourcePolicy: policy})
188+
ws = append(ws, &sourceWarning{Check: CheckSourceMissingPolicyTypeEgress, SourcePolicy: policy})
135189
}
136190

137191
for _, ingressRule := range policy.Spec.Ingress {
@@ -144,43 +198,43 @@ func LintSourcePolicies(kubePolicies []*networkingv1.NetworkPolicy) []*Warning {
144198
return ws
145199
}
146200

147-
func LintNetworkPolicyPorts(policy *networkingv1.NetworkPolicy, ports []networkingv1.NetworkPolicyPort) []*Warning {
148-
var ws []*Warning
201+
func LintNetworkPolicyPorts(policy *networkingv1.NetworkPolicy, ports []networkingv1.NetworkPolicyPort) []Warning {
202+
var ws []Warning
149203
for _, port := range ports {
150204
if port.Protocol == nil {
151-
ws = append(ws, &Warning{Check: CheckSourcePortMissingProtocol, SourcePolicy: policy})
205+
ws = append(ws, &sourceWarning{Check: CheckSourcePortMissingProtocol, SourcePolicy: policy})
152206
}
153207
}
154208
return ws
155209
}
156210

157-
func LintResolvedPolicies(policies *matcher.Policy) []*Warning {
158-
var ws []*Warning
211+
func LintResolvedPolicies(policies *matcher.Policy) []Warning {
212+
var ws []Warning
159213
for _, egress := range policies.Egress {
160214
if !egress.Allows(&matcher.TrafficPeer{Internal: nil, IP: "8.8.8.8"}, 53, "", v1.ProtocolTCP) {
161-
ws = append(ws, &Warning{Check: CheckDNSBlockedOnTCP, Target: egress})
215+
ws = append(ws, &resolvedWarning{Check: CheckDNSBlockedOnTCP, Target: egress})
162216
}
163217
if !egress.Allows(&matcher.TrafficPeer{Internal: nil, IP: "8.8.8.8"}, 53, "", v1.ProtocolUDP) {
164-
ws = append(ws, &Warning{Check: CheckDNSBlockedOnUDP, Target: egress})
218+
ws = append(ws, &resolvedWarning{Check: CheckDNSBlockedOnUDP, Target: egress})
165219
}
166220

167221
if len(egress.Peers) == 0 {
168-
ws = append(ws, &Warning{Check: CheckTargetAllEgressBlocked, Target: egress})
222+
ws = append(ws, &resolvedWarning{Check: CheckTargetAllEgressBlocked, Target: egress})
169223
}
170224
for _, peer := range egress.Peers {
171225
if _, ok := peer.(*matcher.PortsForAllPeersMatcher); ok {
172-
ws = append(ws, &Warning{Check: CheckTargetAllEgressAllowed, Target: egress})
226+
ws = append(ws, &resolvedWarning{Check: CheckTargetAllEgressAllowed, Target: egress})
173227
}
174228
}
175229
}
176230

177231
for _, ingress := range policies.Ingress {
178232
if len(ingress.Peers) == 0 {
179-
ws = append(ws, &Warning{Check: CheckTargetAllIngressBlocked, Target: ingress})
233+
ws = append(ws, &resolvedWarning{Check: CheckTargetAllIngressBlocked, Target: ingress})
180234
}
181235
for _, peer := range ingress.Peers {
182236
if _, ok := peer.(*matcher.PortsForAllPeersMatcher); ok {
183-
ws = append(ws, &Warning{Check: CheckTargetAllIngressAllowed, Target: ingress})
237+
ws = append(ws, &resolvedWarning{Check: CheckTargetAllIngressAllowed, Target: ingress})
184238
}
185239
}
186240

0 commit comments

Comments
 (0)