@@ -3,7 +3,6 @@ package linter
3
3
import (
4
4
"fmt"
5
5
collections "github.com/mattfenwick/collections/pkg"
6
- "github.com/mattfenwick/collections/pkg/builtins"
7
6
"github.com/mattfenwick/collections/pkg/slices"
8
7
"github.com/mattfenwick/cyclonus/pkg/matcher"
9
8
"github.com/mattfenwick/cyclonus/pkg/utils"
@@ -24,16 +23,17 @@ warnings:
24
23
type Check string
25
24
26
25
const (
27
- // omitting the namespace will create the policy in the default namespace
26
+ // CheckSourceMissingNamespace omitting the namespace will create the policy in the default namespace
28
27
CheckSourceMissingNamespace Check = "CheckSourceMissingNamespace"
29
- // omitting the protocol from a NetworkPolicyPort will default to TCP
28
+ // CheckSourcePortMissingProtocol omitting the protocol from a NetworkPolicyPort will default to TCP
30
29
CheckSourcePortMissingProtocol Check = "CheckSourcePortMissingProtocol"
31
- // omitting the types can sometimes be automatically handled; but it's better to explicitly list them
30
+ // CheckSourceMissingPolicyTypes omitting the types can sometimes be automatically handled; but it's better to explicitly list them
32
31
CheckSourceMissingPolicyTypes Check = "CheckSourceMissingPolicyTypes"
33
- // if the policy has ingress/egress rules, then the corresponding type should be present
32
+ // CheckSourceMissingPolicyTypeIngress if the policy has ingress rules, then that type should be present
34
33
CheckSourceMissingPolicyTypeIngress Check = "CheckSourceMissingPolicyTypeIngress"
35
- CheckSourceMissingPolicyTypeEgress Check = "CheckSourceMissingPolicyTypeEgress"
36
- // duplicate names
34
+ // CheckSourceMissingPolicyTypeEgress if the policy has egress rules, then that type should be present
35
+ CheckSourceMissingPolicyTypeEgress Check = "CheckSourceMissingPolicyTypeEgress"
36
+ // CheckSourceDuplicatePolicyName duplicate names of source network policies
37
37
CheckSourceDuplicatePolicyName Check = "CheckSourceDuplicatePolicyName"
38
38
39
39
CheckDNSBlockedOnTCP Check = "CheckDNSBlockedOnTCP"
@@ -46,11 +46,6 @@ const (
46
46
// TODO add check that rule is unnecessary b/c another rule exactly supersedes it
47
47
)
48
48
49
- func (a Check ) Equal (b Check ) bool {
50
- // TODO why is this necessary? why can't we use existing String implementation?
51
- return a == b
52
- }
53
-
54
49
type Warning interface {
55
50
OriginIsSource () bool
56
51
GetCheck () Check
@@ -83,7 +78,7 @@ func NetpolKey(netpol *networkingv1.NetworkPolicy) string {
83
78
return fmt .Sprintf ("%s/%s" , netpol .Namespace , netpol .Name )
84
79
}
85
80
86
- func sortOn (w Warning ) []string {
81
+ func sortKey (w Warning ) []string {
87
82
origin := "1"
88
83
if w .OriginIsSource () {
89
84
origin = "0"
@@ -110,7 +105,7 @@ func (r *resolvedWarning) GetTarget() string {
110
105
}
111
106
112
107
func (r * resolvedWarning ) GetSourcePolicies () string {
113
- target := slices .SortBy ( builtins . CompareOrdered [ string ], slices .Map (NetpolKey , r .Target .SourceRules ))
108
+ target := slices .Sort ( slices .Map (NetpolKey , r .Target .SourceRules ))
114
109
return strings .Join (target , "\n " )
115
110
}
116
111
@@ -122,7 +117,7 @@ func WarningsTable(warnings []Warning) string {
122
117
table .SetReflowDuringAutoWrap (false )
123
118
table .SetAutoWrapText (false )
124
119
125
- sortedWarnings := slices .SortOnBy (sortOn , slices.CompareSlice [string ](builtins . CompareOrdered [ string ] ), warnings )
120
+ sortedWarnings := slices .SortOnBy (sortKey , slices .CompareSlicePairwise [string ](), warnings )
126
121
for _ , w := range sortedWarnings {
127
122
origin := "Source"
128
123
if ! w .OriginIsSource () {
@@ -135,7 +130,7 @@ func WarningsTable(warnings []Warning) string {
135
130
return str .String ()
136
131
}
137
132
138
- func Lint (kubePolicies []* networkingv1.NetworkPolicy , skip * collections.Set [Check ]) []Warning {
133
+ func Lint (kubePolicies []* networkingv1.NetworkPolicy , skip * collections.Set [Check , Check ]) []Warning {
139
134
policies := matcher .BuildNetworkPolicies (false , kubePolicies )
140
135
warnings := append (LintSourcePolicies (kubePolicies ), LintResolvedPolicies (policies )... )
141
136
0 commit comments