Skip to content

Commit c37d703

Browse files
committed
make fmt
1 parent 1c6ac3a commit c37d703

File tree

6 files changed

+41
-20
lines changed

6 files changed

+41
-20
lines changed

pkg/cli/analyze.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,8 @@ func Lint(kubePolicies []*networkingv1.NetworkPolicy) {
166166
}
167167

168168
// QueryTargetPod matches targets; targets exist in only a single namespace and can't be matched by namespace
169-
// label, therefore we match by exact namespace and by pod labels.
169+
//
170+
// label, therefore we match by exact namespace and by pod labels.
170171
type QueryTargetPod struct {
171172
Namespace string
172173
Labels map[string]string

pkg/generator/testcase.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,8 @@ func ParseProbeMode(mode string) (ProbeMode, error) {
135135
}
136136

137137
// ProbeConfig: exactly one field must be non-null (or, in AllAvailable's case, non-false). This
138-
// models a discriminated union (sum type).
138+
//
139+
// models a discriminated union (sum type).
139140
type ProbeConfig struct {
140141
AllAvailable bool
141142
PortProtocol *PortProtocol

pkg/generator/testcasegenerator.go

+1
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ Test cases:
3535
1 policy with both ingress and egress
3636
2 policies with both ingress and egress
3737
*/
38+
3839
type TestCaseGenerator struct {
3940
PodIP string
4041
AllowDNS bool

pkg/kube/labelselector.go

+4-3
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,10 @@ import (
1111

1212
// IsNameMatch follows the kube pattern of "empty string means matches All"
1313
// It will return:
14-
// if matcher is empty: true
15-
// if objectName and matcher are the same: true
16-
// otherwise false
14+
//
15+
// if matcher is empty: true
16+
// if objectName and matcher are the same: true
17+
// otherwise false
1718
func IsNameMatch(objectName string, matcher string) bool {
1819
if matcher == "" {
1920
return true

pkg/kube/netpol/policies.go

+29-13
Original file line numberDiff line numberDiff line change
@@ -27,19 +27,19 @@ func LabelString(labels map[string]string) string {
2727
return strings.Join(chunks, "-")
2828
}
2929

30-
// https://github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/01-deny-all-traffic-to-an-application.md
31-
/*
32-
kind: NetworkPolicy
33-
apiVersion: networking.k8s.io/v1
34-
metadata:
35-
name: web-deny-all
36-
spec:
37-
podSelector:
38-
matchLabels:
39-
app: web
40-
ingress: []
41-
*/
30+
// AllowNothingTo is from https://github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/01-deny-all-traffic-to-an-application.md
4231
func AllowNothingTo(namespace string, toLabels map[string]string) *networkingv1.NetworkPolicy {
32+
/*
33+
kind: NetworkPolicy
34+
apiVersion: networking.k8s.io/v1
35+
metadata:
36+
name: web-deny-all
37+
spec:
38+
podSelector:
39+
matchLabels:
40+
app: web
41+
ingress: []
42+
*/
4343
return &networkingv1.NetworkPolicy{
4444
ObjectMeta: metav1.ObjectMeta{
4545
Name: fmt.Sprintf("allow-nothing-to-%s", LabelString(toLabels)),
@@ -52,7 +52,7 @@ func AllowNothingTo(namespace string, toLabels map[string]string) *networkingv1.
5252
}
5353
}
5454

55-
// Same as above, but with empty slice instead of nil slice
55+
// AllowNothingToEmptyIngress is the same as AllowNothingTo, but with empty slice instead of nil slice
5656
func AllowNothingToEmptyIngress(namespace string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
5757
return &networkingv1.NetworkPolicy{
5858
ObjectMeta: metav1.ObjectMeta{
@@ -86,6 +86,7 @@ spec:
8686
matchLabels:
8787
app: bookstore
8888
*/
89+
8990
func AllowFromTo(namespace string, fromLabels map[string]string, toLabels map[string]string) *networkingv1.NetworkPolicy {
9091
return &networkingv1.NetworkPolicy{
9192
ObjectMeta: metav1.ObjectMeta{
@@ -122,6 +123,7 @@ spec:
122123
ingress:
123124
- {}
124125
*/
126+
125127
func AllowAllTo(namespace string, toLabels map[string]string) *networkingv1.NetworkPolicy {
126128
return &networkingv1.NetworkPolicy{
127129
ObjectMeta: metav1.ObjectMeta{
@@ -151,6 +153,7 @@ spec:
151153
podSelector: {}
152154
ingress: []
153155
*/
156+
154157
func AllowNothingToAnything(namespace string) *networkingv1.NetworkPolicy {
155158
return &networkingv1.NetworkPolicy{
156159
ObjectMeta: metav1.ObjectMeta{
@@ -179,6 +182,7 @@ spec:
179182
- from:
180183
- podSelector: {}
181184
*/
185+
182186
func AllowAllWithinNamespace(namespace string) *networkingv1.NetworkPolicy {
183187
return &networkingv1.NetworkPolicy{
184188
ObjectMeta: metav1.ObjectMeta{
@@ -218,6 +222,7 @@ spec:
218222
- from:
219223
- namespaceSelector: {}
220224
*/
225+
221226
func AllowAllTo_Version2(namespace string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
222227
return &networkingv1.NetworkPolicy{
223228
ObjectMeta: metav1.ObjectMeta{
@@ -255,6 +260,7 @@ spec:
255260
ingress:
256261
- from:
257262
*/
263+
258264
func AllowAllTo_Version3(namespace string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
259265
return &networkingv1.NetworkPolicy{
260266
ObjectMeta: metav1.ObjectMeta{
@@ -309,6 +315,7 @@ spec:
309315
matchLabels:
310316
purpose: production
311317
*/
318+
312319
func AllowFromNamespaceTo(namespace string, namespaceLabels map[string]string, toLabels map[string]string) *networkingv1.NetworkPolicy {
313320
return &networkingv1.NetworkPolicy{
314321
ObjectMeta: metav1.ObjectMeta{
@@ -353,6 +360,7 @@ spec:
353360
matchLabels:
354361
type: monitoring
355362
*/
363+
356364
func AllowFromDifferentNamespaceWithLabelsTo(namespace string, fromLabels, namespaceLabels, toLabels map[string]string) *networkingv1.NetworkPolicy {
357365
return &networkingv1.NetworkPolicy{
358366
ObjectMeta: metav1.ObjectMeta{
@@ -391,6 +399,7 @@ spec:
391399
ingress:
392400
- from: []
393401
*/
402+
394403
func AllowFromAnywhere(namespace string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
395404
return &networkingv1.NetworkPolicy{
396405
ObjectMeta: metav1.ObjectMeta{
@@ -429,6 +438,7 @@ spec:
429438
matchLabels:
430439
role: monitoring
431440
*/
441+
432442
func AllowSpecificPortTo(namespace string, fromLabels, targetLabels map[string]string, targetPort int) *networkingv1.NetworkPolicy {
433443
portRef := intstr.FromInt(targetPort)
434444
return &networkingv1.NetworkPolicy{
@@ -485,6 +495,7 @@ spec:
485495
app: inventory
486496
role: web
487497
*/
498+
488499
func AllowFromMultipleTo(namespace string, fromLabels []map[string]string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
489500
var froms []networkingv1.NetworkPolicyPeer
490501
for _, labels := range fromLabels {
@@ -523,6 +534,7 @@ spec:
523534
- Egress
524535
egress: []
525536
*/
537+
526538
func AllowNoEgressFromLabels(namespace string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
527539
return &networkingv1.NetworkPolicy{
528540
ObjectMeta: metav1.ObjectMeta{
@@ -558,6 +570,7 @@ spec:
558570
- port: 53
559571
protocol: TCP
560572
*/
573+
561574
func AllowEgressOnPort(namespace string, targetLabels map[string]string, port int) *networkingv1.NetworkPolicy {
562575
tcp := v1.ProtocolTCP
563576
udp := v1.ProtocolUDP
@@ -597,6 +610,7 @@ spec:
597610
podSelector: {}
598611
egress: []
599612
*/
613+
600614
func AllowNoEgressFromNamespace(namespace string) *networkingv1.NetworkPolicy {
601615
return &networkingv1.NetworkPolicy{
602616
ObjectMeta: metav1.ObjectMeta{
@@ -632,6 +646,7 @@ spec:
632646
to:
633647
- namespaceSelector: {}
634648
*/
649+
635650
func AllowEgressToAllNamespacesOnPort(namespace string, targetLabels map[string]string, port int) *networkingv1.NetworkPolicy {
636651
tcp := v1.ProtocolTCP
637652
udp := v1.ProtocolUDP
@@ -676,6 +691,7 @@ spec:
676691
- Egress
677692
- Ingress
678693
*/
694+
679695
func AllowNoIngressNorEgress(namespace string, targetLabels map[string]string) *networkingv1.NetworkPolicy {
680696
return &networkingv1.NetworkPolicy{
681697
ObjectMeta: metav1.ObjectMeta{

pkg/kube/service.go

+3-2
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,9 @@ import "fmt"
44

55
// QualifiedServiceAddress returns the address that can be used to hit a service from
66
// any namespace in the cluster
7-
//func QualifiedServiceAddress(serviceName string, namespace string, dnsDomain string) string {
8-
// return fmt.Sprintf("%s.%s.svc.%s", serviceName, namespace, dnsDomain)
7+
//
8+
// func QualifiedServiceAddress(serviceName string, namespace string, dnsDomain string) string {
9+
// return fmt.Sprintf("%s.%s.svc.%s", serviceName, namespace, dnsDomain)
910
func QualifiedServiceAddress(serviceName string, namespace string) string {
1011
return fmt.Sprintf("%s.%s.svc.cluster.local", serviceName, namespace)
1112
}

0 commit comments

Comments
 (0)