Skip to content

Commit 9b14c2c

Browse files
MxNxPxrjferguson21
andauthoredAug 1, 2024··
fix: address network policy generation inter-namespace bug (#564)
## Description A bug exists when combining `remoteNamespace` and `remoteSelector` in a single network.allow policy. The generated network policy results in two separate peers. ## Related Issue Fixes #528 ## Type of change - [x] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-breaking change which adds functionality) - [ ] Other (security config, docs update, etc) ## Checklist before merging - [] Test, docs, adr added or updated as needed - [ ] [Contributor Guide Steps](https://github.com/defenseunicorns/uds-template-capability/blob/main/CONTRIBUTING.md)(https://github.com/defenseunicorns/uds-template-capability/blob/main/CONTRIBUTING.md#submitting-a-pull-request) followed --------- Co-authored-by: Rob Ferguson <rjferguson21@gmail.com>
1 parent 235702e commit 9b14c2c

File tree

2 files changed

+166
-52
lines changed

2 files changed

+166
-52
lines changed
 
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
import { describe, expect, it } from "@jest/globals";
2+
import { kind } from "pepr";
3+
import { Direction } from "../../crd";
4+
import { generate } from "./generate";
5+
6+
describe("network policy generate", () => {
7+
it("should generate correct network policy", async () => {
8+
const policy = generate("test", {
9+
description: "test",
10+
direction: Direction.Ingress,
11+
selector: { app: "test" },
12+
remoteNamespace: "foo",
13+
remoteSelector: { app: "foo" },
14+
});
15+
16+
expect(policy.metadata?.name).toEqual("Ingress-test");
17+
expect(policy.spec).toEqual({
18+
ingress: [
19+
{
20+
from: [
21+
{
22+
namespaceSelector: {
23+
matchLabels: {
24+
"kubernetes.io/metadata.name": "foo",
25+
},
26+
},
27+
podSelector: {
28+
matchLabels: {
29+
app: "foo",
30+
},
31+
},
32+
},
33+
],
34+
ports: [],
35+
},
36+
],
37+
podSelector: { matchLabels: { app: "test" } },
38+
policyTypes: ["Ingress"],
39+
} as kind.NetworkPolicy["spec"]);
40+
});
41+
});
42+
43+
describe("network policy generate", () => {
44+
it("should generate correct network policy for just remoteNamespace", async () => {
45+
const policy = generate("test", {
46+
description: "test",
47+
direction: Direction.Ingress,
48+
selector: { app: "test" },
49+
remoteNamespace: "foo",
50+
});
51+
52+
expect(policy.metadata?.name).toEqual("Ingress-test");
53+
expect(policy.spec).toEqual({
54+
ingress: [
55+
{
56+
from: [
57+
{
58+
namespaceSelector: {
59+
matchLabels: {
60+
"kubernetes.io/metadata.name": "foo",
61+
},
62+
},
63+
},
64+
],
65+
ports: [],
66+
},
67+
],
68+
podSelector: { matchLabels: { app: "test" } },
69+
policyTypes: ["Ingress"],
70+
} as kind.NetworkPolicy["spec"]);
71+
});
72+
});
73+
74+
describe("network policy generate", () => {
75+
it("should generate correct network policy for empty string and wildcard remoteNamespace", async () => {
76+
const policy = generate("test", {
77+
description: "test",
78+
direction: Direction.Egress,
79+
selector: { app: "test" },
80+
remoteNamespace: "",
81+
});
82+
83+
expect(policy.metadata?.name).toEqual("Egress-test");
84+
expect(policy.spec).toEqual({
85+
egress: [
86+
{
87+
ports: [],
88+
to: [{ namespaceSelector: {} }],
89+
},
90+
],
91+
podSelector: { matchLabels: { app: "test" } },
92+
policyTypes: ["Egress"],
93+
} as kind.NetworkPolicy["spec"]);
94+
});
95+
96+
const policyWildcard = generate("test", {
97+
description: "test",
98+
direction: Direction.Egress,
99+
selector: { app: "test" },
100+
remoteNamespace: "*",
101+
});
102+
103+
expect(policyWildcard.spec).toEqual({
104+
egress: [
105+
{
106+
ports: [],
107+
to: [{ namespaceSelector: {} }],
108+
},
109+
],
110+
podSelector: { matchLabels: { app: "test" } },
111+
policyTypes: ["Egress"],
112+
} as kind.NetworkPolicy["spec"]);
113+
});

‎src/pepr/operator/controllers/network/generate.ts

+53-52
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
import { V1LabelSelector, V1NetworkPolicyPeer, V1NetworkPolicyPort } from "@kubernetes/client-node";
1+
import { V1NetworkPolicyPeer, V1NetworkPolicyPort } from "@kubernetes/client-node";
22
import { kind } from "pepr";
33

44
import { Allow, RemoteGenerated } from "../../crd";
@@ -7,6 +7,56 @@ import { cloudMetadata } from "./generators/cloudMetadata";
77
import { intraNamespace } from "./generators/intraNamespace";
88
import { kubeAPI } from "./generators/kubeAPI";
99

10+
function isWildcardNamespace(namespace: string) {
11+
return namespace === "" || namespace === "*";
12+
}
13+
14+
function getPeers(policy: Allow): V1NetworkPolicyPeer[] {
15+
let peers: V1NetworkPolicyPeer[] = [];
16+
17+
if (policy.remoteGenerated) {
18+
switch (policy.remoteGenerated) {
19+
case RemoteGenerated.KubeAPI:
20+
peers = kubeAPI();
21+
break;
22+
23+
case RemoteGenerated.CloudMetadata:
24+
peers = cloudMetadata;
25+
break;
26+
27+
case RemoteGenerated.IntraNamespace:
28+
peers = [intraNamespace];
29+
break;
30+
31+
case RemoteGenerated.Anywhere:
32+
peers = [anywhere];
33+
break;
34+
}
35+
} else if (policy.remoteNamespace !== undefined || policy.remoteSelector !== undefined) {
36+
const peer: V1NetworkPolicyPeer = {};
37+
38+
if (policy.remoteNamespace !== undefined) {
39+
if (isWildcardNamespace(policy.remoteNamespace)) {
40+
peer.namespaceSelector = {};
41+
} else {
42+
peer.namespaceSelector = {
43+
matchLabels: { "kubernetes.io/metadata.name": policy.remoteNamespace },
44+
};
45+
}
46+
}
47+
48+
if (policy.remoteSelector !== undefined) {
49+
peer.podSelector = {
50+
matchLabels: policy.remoteSelector,
51+
};
52+
}
53+
54+
peers.push(peer);
55+
}
56+
57+
return peers;
58+
}
59+
1060
export function generate(namespace: string, policy: Allow): kind.NetworkPolicy {
1161
// Generate a unique name for the NetworkPolicy
1262
const name = generateName(policy);
@@ -35,57 +85,8 @@ export function generate(namespace: string, policy: Allow): kind.NetworkPolicy {
3585
};
3686
}
3787

38-
// Create the remote (peer) to match against
39-
let peers: V1NetworkPolicyPeer[] = [];
40-
41-
// Add the remoteNamespace if they exist
42-
if (policy.remoteNamespace !== undefined) {
43-
const namespaceSelector: V1LabelSelector = {};
44-
45-
// Add the remoteNamespace to the namespaceSelector if it exists and is not "*", otherwise match all namespaces
46-
if (policy.remoteNamespace !== "" && policy.remoteNamespace !== "*") {
47-
namespaceSelector.matchLabels = {
48-
"kubernetes.io/metadata.name": policy.remoteNamespace,
49-
};
50-
}
51-
52-
// Add the remoteNamespace to the peers
53-
peers.push({ namespaceSelector });
54-
}
55-
56-
// Add the remoteSelector if they exist
57-
if (policy.remoteSelector) {
58-
peers.push({
59-
podSelector: {
60-
matchLabels: policy.remoteSelector,
61-
},
62-
});
63-
}
64-
65-
// Check if remoteGenerated is set
66-
if (policy.remoteGenerated) {
67-
// Add the remoteGenerated label
68-
generated.metadata!.labels!["uds/generated"] = policy.remoteGenerated;
69-
70-
// Check if remoteGenerated is set
71-
switch (policy.remoteGenerated) {
72-
case RemoteGenerated.KubeAPI:
73-
peers = kubeAPI();
74-
break;
75-
76-
case RemoteGenerated.CloudMetadata:
77-
peers = cloudMetadata;
78-
break;
79-
80-
case RemoteGenerated.IntraNamespace:
81-
peers.push(intraNamespace);
82-
break;
83-
84-
case RemoteGenerated.Anywhere:
85-
peers = [anywhere];
86-
break;
87-
}
88-
}
88+
// Create the network policy peers
89+
const peers: V1NetworkPolicyPeer[] = getPeers(policy);
8990

9091
// Define the ports to allow from the ports property
9192
const ports: V1NetworkPolicyPort[] = (policy.ports ?? []).map(port => ({ port }));

0 commit comments

Comments
 (0)
Please sign in to comment.