Skip to content

Commit eab19b5

Browse files
committed
add read test cases
1 parent ecfd100 commit eab19b5

File tree

6 files changed

+140
-14
lines changed

6 files changed

+140
-14
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
apiVersion: networking.k8s.io/v1
2+
kind: NetworkPolicy
3+
metadata:
4+
name: pol4
5+
namespace: ns-y
6+
spec:
7+
egress:
8+
- {}
9+
ingress:
10+
- from:
11+
- podSelector: {}
12+
podSelector: {}
13+
policyTypes:
14+
- Ingress
15+
- Egress
16+
---
17+
apiVersion: networking.k8s.io/v1
18+
kind: NetworkPolicy
19+
metadata:
20+
name: pol5
21+
namespace: ns-y
22+
spec:
23+
ingress:
24+
- from:
25+
- namespaceSelector: {}
26+
ports:
27+
- port: 8080
28+
protocol: TCP
29+
podSelector: {}
30+
policyTypes:
31+
- Ingress
32+
---
33+
apiVersion: networking.k8s.io/v1
34+
kind: NetworkPolicy
35+
metadata:
36+
name: pol6
37+
namespace: ns-y
38+
spec:
39+
ingress:
40+
- from:
41+
- namespaceSelector: {}
42+
podSelector:
43+
matchLabels:
44+
app: qrs
45+
policyTypes:
46+
- Ingress
+46
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
apiVersion: v1
2+
items:
3+
- apiVersion: networking.k8s.io/v1
4+
kind: NetworkPolicy
5+
metadata:
6+
name: pol1
7+
namespace: ns-y
8+
spec:
9+
egress:
10+
- {}
11+
ingress:
12+
- from:
13+
- podSelector: {}
14+
podSelector: {}
15+
policyTypes:
16+
- Ingress
17+
- Egress
18+
- apiVersion: networking.k8s.io/v1
19+
kind: NetworkPolicy
20+
metadata:
21+
name: pol2
22+
namespace: ns-y
23+
spec:
24+
ingress:
25+
- from:
26+
- namespaceSelector: {}
27+
ports:
28+
- port: 8080
29+
protocol: TCP
30+
podSelector: {}
31+
policyTypes:
32+
- Ingress
33+
- apiVersion: networking.k8s.io/v1
34+
kind: NetworkPolicy
35+
metadata:
36+
name: pol3
37+
namespace: ns-y
38+
spec:
39+
ingress:
40+
- from:
41+
- namespaceSelector: {}
42+
podSelector:
43+
matchLabels:
44+
app: qrs
45+
policyTypes:
46+
- Ingress

pkg/cli/analyze.go

+10-3
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,12 @@ package cli
22

33
import (
44
"fmt"
5+
"strings"
6+
57
"github.com/mattfenwick/collections/pkg/set"
68
"github.com/mattfenwick/cyclonus/pkg/connectivity/probe"
79
"github.com/mattfenwick/cyclonus/pkg/generator"
810
"github.com/mattfenwick/cyclonus/pkg/linter"
9-
"strings"
1011

1112
"github.com/mattfenwick/cyclonus/pkg/kube"
1213
"github.com/mattfenwick/cyclonus/pkg/kube/netpol"
@@ -102,12 +103,18 @@ func RunAnalyzeCommand(args *AnalyzeArgs) {
102103
kubeNamespaces = nsList.Items
103104
namespaces = []string{v1.NamespaceAll}
104105
}
105-
kubePolicies, err = readPoliciesFromKube(kubeClient, namespaces)
106+
kubePolicies, err = kube.ReadNetworkPoliciesFromKube(kubeClient, namespaces)
107+
if err != nil {
108+
logrus.Errorf("unable to read network policies from kube, ns '%s': %+v", namespaces, err)
109+
}
106110
kubePods, err = kube.GetPodsInNamespaces(kubeClient, namespaces)
111+
if err != nil {
112+
logrus.Errorf("unable to read pods from kube, ns '%s': %+v", namespaces, err)
113+
}
107114
}
108115
// 2. read policies from file
109116
if args.PolicyPath != "" {
110-
policiesFromPath, err := readPoliciesFromPath(args.PolicyPath)
117+
policiesFromPath, err := kube.ReadNetworkPoliciesFromPath(args.PolicyPath)
111118
utils.DoOrDie(err)
112119
kubePolicies = append(kubePolicies, policiesFromPath...)
113120
}

pkg/cli/utils.go pkg/kube/read.go

+6-11
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,18 @@
1-
package cli
1+
package kube
22

33
import (
44
"os"
55
"path/filepath"
66

77
"github.com/mattfenwick/collections/pkg/builtin"
88
"github.com/mattfenwick/collections/pkg/slice"
9-
"github.com/mattfenwick/cyclonus/pkg/kube"
109
"github.com/mattfenwick/cyclonus/pkg/utils"
1110
"github.com/pkg/errors"
1211
log "github.com/sirupsen/logrus"
1312
networkingv1 "k8s.io/api/networking/v1"
1413
)
1514

16-
func readPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, error) {
15+
func ReadNetworkPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, error) {
1716
var allPolicies []*networkingv1.NetworkPolicy
1817
err := filepath.Walk(policyPath, func(path string, info os.FileInfo, err error) error {
1918
if err != nil {
@@ -42,7 +41,7 @@ func readPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, err
4241
// try parsing a list
4342
policyList, err := utils.ParseYamlStrict[networkingv1.NetworkPolicyList](bytes)
4443
if err == nil {
45-
allPolicies = append(allPolicies, slice.Map(builtin.Reference[networkingv1.NetworkPolicy], policyList.Items)...)
44+
allPolicies = append(allPolicies, refNetpolList(policyList.Items)...)
4645
return nil
4746
}
4847

@@ -69,18 +68,14 @@ func readPoliciesFromPath(policyPath string) ([]*networkingv1.NetworkPolicy, err
6968
return allPolicies, nil
7069
}
7170

72-
func readPoliciesFromKube(kubeClient *kube.Kubernetes, namespaces []string) ([]*networkingv1.NetworkPolicy, error) {
73-
netpols, err := kube.GetNetworkPoliciesInNamespaces(kubeClient, namespaces)
71+
func ReadNetworkPoliciesFromKube(kubeClient *Kubernetes, namespaces []string) ([]*networkingv1.NetworkPolicy, error) {
72+
netpols, err := GetNetworkPoliciesInNamespaces(kubeClient, namespaces)
7473
if err != nil {
7574
return nil, err
7675
}
7776
return refNetpolList(netpols), nil
7877
}
7978

8079
func refNetpolList(refs []networkingv1.NetworkPolicy) []*networkingv1.NetworkPolicy {
81-
policies := make([]*networkingv1.NetworkPolicy, len(refs))
82-
for i := 0; i < len(refs); i++ {
83-
policies[i] = &refs[i]
84-
}
85-
return policies
80+
return slice.Map(builtin.Reference[networkingv1.NetworkPolicy], refs)
8681
}

pkg/kube/read_tests.go

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
package kube
2+
3+
import (
4+
. "github.com/onsi/ginkgo/v2"
5+
. "github.com/onsi/gomega"
6+
)
7+
8+
func RunReadNetworkPolicyTests() {
9+
Describe("ReadNetworkPolicies", func() {
10+
It("Should read a single policy from a single file", func() {
11+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/features/portrange1.yaml")
12+
Expect(err).To(BeNil())
13+
Expect(len(policies)).To(Equal(1))
14+
})
15+
It("Should read a list of policies from a single file", func() {
16+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/yaml-syntax/yaml-list.yaml")
17+
Expect(err).To(BeNil())
18+
Expect(len(policies)).To(Equal(3))
19+
})
20+
It("Should read multiple policies separated by '---' lines from a single file", func() {
21+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/yaml-syntax/triple-dash-separated.yaml")
22+
Expect(err).To(BeNil())
23+
Expect(len(policies)).To(Equal(3))
24+
})
25+
It("Should read multiple policies from all files in a directory", func() {
26+
policies, err := ReadNetworkPoliciesFromPath("../../networkpolicies/yaml-syntax")
27+
Expect(err).To(BeNil())
28+
Expect(len(policies)).To(Equal(6))
29+
})
30+
})
31+
}

pkg/kube/suite_test.go

+1
Original file line numberDiff line numberDiff line change
@@ -11,5 +11,6 @@ func TestModel(t *testing.T) {
1111
RegisterFailHandler(Fail)
1212
RunIPAddressTests()
1313
RunLabelSelectorTests()
14+
RunReadNetworkPolicyTests()
1415
RunSpecs(t, "network policy matcher suite")
1516
}

0 commit comments

Comments
 (0)