Skip to content

Commit 2f37cdb

Browse files
authored
Merge pull request #133 from mattfenwick/parse-netpol-list
add ability to parse network policy list from file
2 parents 205c201 + 72df7bf commit 2f37cdb

File tree

6 files changed

+128
-21
lines changed

6 files changed

+128
-21
lines changed
+47
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
apiVersion: v1
2+
kind: List
3+
items:
4+
- apiVersion: networking.k8s.io/v1
5+
kind: NetworkPolicy
6+
metadata:
7+
name: pol1
8+
namespace: ns-y
9+
spec:
10+
egress:
11+
- {}
12+
ingress:
13+
- from:
14+
- podSelector: {}
15+
podSelector: {}
16+
policyTypes:
17+
- Ingress
18+
- Egress
19+
- apiVersion: networking.k8s.io/v1
20+
kind: NetworkPolicy
21+
metadata:
22+
name: pol2
23+
namespace: ns-y
24+
spec:
25+
ingress:
26+
- from:
27+
- namespaceSelector: {}
28+
ports:
29+
- port: 8080
30+
protocol: TCP
31+
podSelector: {}
32+
policyTypes:
33+
- Ingress
34+
- apiVersion: networking.k8s.io/v1
35+
kind: NetworkPolicy
36+
metadata:
37+
name: pol3
38+
namespace: ns-y
39+
spec:
40+
ingress:
41+
- from:
42+
- namespaceSelector: {}
43+
podSelector:
44+
matchLabels:
45+
app: qrs
46+
policyTypes:
47+
- Ingress

pkg/cli/analyze.go

+10-3
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,12 @@ package cli
22

33
import (
44
"fmt"
5+
"strings"
6+
57
"github.com/mattfenwick/collections/pkg/set"
68
"github.com/mattfenwick/cyclonus/pkg/connectivity/probe"
79
"github.com/mattfenwick/cyclonus/pkg/generator"
810
"github.com/mattfenwick/cyclonus/pkg/linter"
9-
"strings"
1011

1112
"github.com/mattfenwick/cyclonus/pkg/kube"
1213
"github.com/mattfenwick/cyclonus/pkg/kube/netpol"
@@ -102,12 +103,18 @@ func RunAnalyzeCommand(args *AnalyzeArgs) {
102103
kubeNamespaces = nsList.Items
103104
namespaces = []string{v1.NamespaceAll}
104105
}
105-
kubePolicies, err = readPoliciesFromKube(kubeClient, namespaces)
106+
kubePolicies, err = kube.ReadNetworkPoliciesFromKube(kubeClient, namespaces)
107+
if err != nil {
108+
logrus.Errorf("unable to read network policies from kube, ns '%s': %+v", namespaces, err)
109+
}
106110
kubePods, err = kube.GetPodsInNamespaces(kubeClient, namespaces)
111+
if err != nil {
112+
logrus.Errorf("unable to read pods from kube, ns '%s': %+v", namespaces, err)
113+
}
107114
}
108115
// 2. read policies from file
109116
if args.PolicyPath != "" {
110-
policiesFromPath, err := readPoliciesFromPath(args.PolicyPath)
117+
policiesFromPath, err := kube.ReadNetworkPoliciesFromPath(args.PolicyPath)
111118
utils.DoOrDie(err)
112119
kubePolicies = append(kubePolicies, policiesFromPath...)
113120
}

pkg/cli/utils.go pkg/kube/read.go

+27-17
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
1-
package cli
1+
package kube
22

33
import (
4-
"github.com/mattfenwick/cyclonus/pkg/kube"
4+
"os"
5+
"path/filepath"
6+
7+
"github.com/mattfenwick/collections/pkg/builtin"
8+
"github.com/mattfenwick/collections/pkg/slice"
59
"github.com/mattfenwick/cyclonus/pkg/utils"
610
"github.com/pkg/errors"
711
log "github.com/sirupsen/logrus"
812
networkingv1 "k8s.io/api/networking/v1"
9-
"os"
10-
"path/filepath"
1113
)
1214

13-
func readPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, error) {
15+
func ReadNetworkPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, error) {
1416
var allPolicies []*networkingv1.NetworkPolicy
1517
err := filepath.Walk(policyPath, func(path string, info os.FileInfo, err error) error {
1618
if err != nil {
@@ -26,15 +28,27 @@ func readPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, err
2628
return err
2729
}
2830

29-
// try parsing a list first
30-
policies, err := utils.ParseYaml[[]*networkingv1.NetworkPolicy](bytes)
31+
// TODO try parsing plain yaml list (that is: not a NetworkPolicyList)
32+
// policies, err := utils.ParseYaml[[]*networkingv1.NetworkPolicy](bytes)
33+
34+
// TODO try parsing multiple policies separated by '---' lines
35+
// policies, err := yaml.ParseMany[networkingv1.NetworkPolicy](bytes)
36+
// if err == nil {
37+
// log.Debugf("parsed %d policies from %s", len(policies), path)
38+
// allPolicies = append(allPolicies, refNetpolList(policies)...)
39+
// return nil
40+
// }
41+
// log.Errorf("unable to parse multiple policies separated by '---' lines: %+v", err)
42+
43+
// try parsing a NetworkPolicyList
44+
policyList, err := utils.ParseYamlStrict[networkingv1.NetworkPolicyList](bytes)
3145
if err == nil {
32-
log.Debugf("parsed %d policies from %s", len(*policies), path)
33-
allPolicies = append(allPolicies, *policies...)
46+
allPolicies = append(allPolicies, refNetpolList(policyList.Items)...)
3447
return nil
3548
}
3649

37-
log.Debugf("failed to parse list from %s, falling back to parsing single policy", path)
50+
log.Debugf("unable to parse list of policies: %+v", err)
51+
3852
policy, err := utils.ParseYamlStrict[networkingv1.NetworkPolicy](bytes)
3953
if err != nil {
4054
return errors.WithMessagef(err, "unable to parse single policy from yaml at %s", path)
@@ -56,18 +70,14 @@ func readPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, err
5670
return allPolicies, nil
5771
}
5872

59-
func readPoliciesFromKube(kubeClient *kube.Kubernetes, namespaces []string) ([]*networkingv1.NetworkPolicy, error) {
60-
netpols, err := kube.GetNetworkPoliciesInNamespaces(kubeClient, namespaces)
73+
func ReadNetworkPoliciesFromKube(kubeClient *Kubernetes, namespaces []string) ([]*networkingv1.NetworkPolicy, error) {
74+
netpols, err := GetNetworkPoliciesInNamespaces(kubeClient, namespaces)
6175
if err != nil {
6276
return nil, err
6377
}
6478
return refNetpolList(netpols), nil
6579
}
6680

6781
func refNetpolList(refs []networkingv1.NetworkPolicy) []*networkingv1.NetworkPolicy {
68-
policies := make([]*networkingv1.NetworkPolicy, len(refs))
69-
for i := 0; i < len(refs); i++ {
70-
policies[i] = &refs[i]
71-
}
72-
return policies
82+
return slice.Map(builtin.Reference[networkingv1.NetworkPolicy], refs)
7383
}

pkg/kube/read_tests.go

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
package kube
2+
3+
import (
4+
. "github.com/onsi/ginkgo/v2"
5+
. "github.com/onsi/gomega"
6+
)
7+
8+
func RunReadNetworkPolicyTests() {
9+
Describe("ReadNetworkPolicies", func() {
10+
It("Should read a single policy from a single file", func() {
11+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/features/portrange1.yaml")
12+
Expect(err).To(BeNil())
13+
Expect(len(policies)).To(Equal(1))
14+
})
15+
It("Should read a list of policies from a single file", func() {
16+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/yaml-syntax/yaml-list.yaml")
17+
Expect(err).To(BeNil())
18+
Expect(len(policies)).To(Equal(3))
19+
})
20+
21+
// TODO test case to read multiple policies from plain yaml list
22+
23+
// TODO
24+
// It("Should read multiple policies separated by '---' lines from a single file", func() {
25+
// policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/yaml-syntax/triple-dash-separated.yaml")
26+
// Expect(err).To(BeNil())
27+
// Expect(len(policies)).To(Equal(3))
28+
// })
29+
30+
It("Should read multiple policies from all files in a directory", func() {
31+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/simple-example")
32+
Expect(err).To(BeNil())
33+
Expect(len(policies)).To(Equal(7))
34+
35+
policies, err = ReadNetworkPoliciesFromPath("../../networkpolicies/")
36+
Expect(err).To(BeNil())
37+
Expect(len(policies)).To(Equal(14))
38+
})
39+
40+
// TODO test to show what happens for duplicate names
41+
})
42+
}

pkg/kube/suite_test.go

+1
Original file line numberDiff line numberDiff line change
@@ -11,5 +11,6 @@ func TestModel(t *testing.T) {
1111
RegisterFailHandler(Fail)
1212
RunIPAddressTests()
1313
RunLabelSelectorTests()
14+
RunReadNetworkPolicyTests()
1415
RunSpecs(t, "network policy matcher suite")
1516
}

pkg/matcher/simplifier_tests.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ func RunSimplifierTests() {
123123
}
124124
port99OnUdp := &PortProtocolMatcher{
125125
Port: &port99,
126-
Protocol: v1.ProtocolSCTP, // TODO should this be udp?
126+
Protocol: v1.ProtocolUDP,
127127
}
128128

129129
allMatcher := &AllPortMatcher{}

0 commit comments

Comments
 (0)