236 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			236 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Ruby
		
	
	
	
# frozen_string_literal: true
 | 
						|
 | 
						|
require 'spec_helper'
 | 
						|
 | 
						|
RSpec.describe Gitlab::Kubernetes::NetworkPolicy do
 | 
						|
  let(:policy) do
 | 
						|
    described_class.new(
 | 
						|
      name: name,
 | 
						|
      namespace: namespace,
 | 
						|
      selector: selector,
 | 
						|
      ingress: ingress,
 | 
						|
      labels: labels
 | 
						|
    )
 | 
						|
  end
 | 
						|
 | 
						|
  let(:resource) do
 | 
						|
    ::Kubeclient::Resource.new(
 | 
						|
      kind: Gitlab::Kubernetes::NetworkPolicy::KIND,
 | 
						|
      metadata: { name: name, namespace: namespace },
 | 
						|
      spec: { podSelector: pod_selector, policyTypes: %w(Ingress), ingress: ingress, egress: nil }
 | 
						|
    )
 | 
						|
  end
 | 
						|
 | 
						|
  let(:selector) { pod_selector }
 | 
						|
  let(:labels) { nil }
 | 
						|
  let(:name) { 'example-name' }
 | 
						|
  let(:namespace) { 'example-namespace' }
 | 
						|
  let(:pod_selector) { { matchLabels: { role: 'db' } } }
 | 
						|
 | 
						|
  let(:ingress) do
 | 
						|
    [
 | 
						|
      {
 | 
						|
        from: [
 | 
						|
          { namespaceSelector: { matchLabels: { project: 'myproject' } } }
 | 
						|
        ]
 | 
						|
      }
 | 
						|
    ]
 | 
						|
  end
 | 
						|
 | 
						|
  let(:egress) do
 | 
						|
    [
 | 
						|
      {
 | 
						|
        ports: [{ port: 5978 }]
 | 
						|
      }
 | 
						|
    ]
 | 
						|
  end
 | 
						|
 | 
						|
  include_examples 'network policy common specs'
 | 
						|
 | 
						|
  describe '.from_yaml' do
 | 
						|
    let(:manifest) do
 | 
						|
      <<~POLICY
 | 
						|
        apiVersion: networking.k8s.io/v1
 | 
						|
        kind: NetworkPolicy
 | 
						|
        metadata:
 | 
						|
          name: example-name
 | 
						|
          namespace: example-namespace
 | 
						|
        spec:
 | 
						|
          podSelector:
 | 
						|
            matchLabels:
 | 
						|
              role: db
 | 
						|
          policyTypes:
 | 
						|
          - Ingress
 | 
						|
          ingress:
 | 
						|
          - from:
 | 
						|
            - namespaceSelector:
 | 
						|
                matchLabels:
 | 
						|
                  project: myproject
 | 
						|
      POLICY
 | 
						|
    end
 | 
						|
 | 
						|
    subject { Gitlab::Kubernetes::NetworkPolicy.from_yaml(manifest)&.generate }
 | 
						|
 | 
						|
    it { is_expected.to eq(resource) }
 | 
						|
 | 
						|
    context 'with nil manifest' do
 | 
						|
      let(:manifest) { nil }
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with invalid manifest' do
 | 
						|
      let(:manifest) { "\tfoo: bar" }
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with manifest without metadata' do
 | 
						|
      let(:manifest) do
 | 
						|
        <<~POLICY
 | 
						|
        apiVersion: networking.k8s.io/v1
 | 
						|
        kind: NetworkPolicy
 | 
						|
        spec:
 | 
						|
          podSelector:
 | 
						|
            matchLabels:
 | 
						|
              role: db
 | 
						|
          policyTypes:
 | 
						|
          - Ingress
 | 
						|
          ingress:
 | 
						|
          - from:
 | 
						|
            - namespaceSelector:
 | 
						|
                matchLabels:
 | 
						|
                  project: myproject
 | 
						|
        POLICY
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with manifest without spec' do
 | 
						|
      let(:manifest) do
 | 
						|
        <<~POLICY
 | 
						|
        apiVersion: networking.k8s.io/v1
 | 
						|
        kind: NetworkPolicy
 | 
						|
        metadata:
 | 
						|
          name: example-name
 | 
						|
          namespace: example-namespace
 | 
						|
        POLICY
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with disallowed class' do
 | 
						|
      let(:manifest) do
 | 
						|
        <<~POLICY
 | 
						|
        apiVersion: networking.k8s.io/v1
 | 
						|
        kind: NetworkPolicy
 | 
						|
        metadata:
 | 
						|
          name: example-name
 | 
						|
          namespace: example-namespace
 | 
						|
          creationTimestamp: 2020-04-14T00:08:30Z
 | 
						|
        spec:
 | 
						|
          podSelector:
 | 
						|
            matchLabels:
 | 
						|
              role: db
 | 
						|
          policyTypes:
 | 
						|
          - Ingress
 | 
						|
          ingress:
 | 
						|
          - from:
 | 
						|
            - namespaceSelector:
 | 
						|
                matchLabels:
 | 
						|
                  project: myproject
 | 
						|
        POLICY
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '.from_resource' do
 | 
						|
    let(:resource) do
 | 
						|
      ::Kubeclient::Resource.new(
 | 
						|
        metadata: {
 | 
						|
          name: name, namespace: namespace, creationTimestamp: '2020-04-14T00:08:30Z',
 | 
						|
          labels: { app: 'foo' }, resourceVersion: '4990'
 | 
						|
        },
 | 
						|
        spec: { podSelector: pod_selector, policyTypes: %w(Ingress), ingress: ingress, egress: nil }
 | 
						|
      )
 | 
						|
    end
 | 
						|
 | 
						|
    let(:generated_resource) do
 | 
						|
      ::Kubeclient::Resource.new(
 | 
						|
        kind: Gitlab::Kubernetes::NetworkPolicy::KIND,
 | 
						|
        metadata: { name: name, namespace: namespace, labels: { app: 'foo' } },
 | 
						|
        spec: { podSelector: pod_selector, policyTypes: %w(Ingress), ingress: ingress, egress: nil }
 | 
						|
      )
 | 
						|
    end
 | 
						|
 | 
						|
    subject { Gitlab::Kubernetes::NetworkPolicy.from_resource(resource)&.generate }
 | 
						|
 | 
						|
    it { is_expected.to eq(generated_resource) }
 | 
						|
 | 
						|
    context 'with nil resource' do
 | 
						|
      let(:resource) { nil }
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with resource without metadata' do
 | 
						|
      let(:resource) do
 | 
						|
        ::Kubeclient::Resource.new(
 | 
						|
          spec: { podSelector: pod_selector, policyTypes: %w(Ingress), ingress: ingress, egress: nil }
 | 
						|
        )
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with resource without spec' do
 | 
						|
      let(:resource) do
 | 
						|
        ::Kubeclient::Resource.new(
 | 
						|
          metadata: { name: name, namespace: namespace, uid: '128cf288-7de4-11ea-aceb-42010a800089', resourceVersion: '4990' }
 | 
						|
        )
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to be_nil }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with environment_ids' do
 | 
						|
      subject { Gitlab::Kubernetes::NetworkPolicy.from_resource(resource, [1, 2, 3]) }
 | 
						|
 | 
						|
      it 'includes environment_ids in as_json result' do
 | 
						|
        expect(subject.as_json).to include(environment_ids: [1, 2, 3])
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#resource' do
 | 
						|
    subject { policy.resource }
 | 
						|
 | 
						|
    let(:resource) do
 | 
						|
      {
 | 
						|
        kind: Gitlab::Kubernetes::NetworkPolicy::KIND,
 | 
						|
        metadata: { name: name, namespace: namespace },
 | 
						|
        spec: { podSelector: pod_selector, policyTypes: %w(Ingress), ingress: ingress, egress: nil }
 | 
						|
      }
 | 
						|
    end
 | 
						|
 | 
						|
    it { is_expected.to eq(resource) }
 | 
						|
 | 
						|
    context 'with labels' do
 | 
						|
      let(:labels) { { app: 'foo' } }
 | 
						|
      let(:resource) do
 | 
						|
        {
 | 
						|
          kind: Gitlab::Kubernetes::NetworkPolicy::KIND,
 | 
						|
          metadata: { name: name, namespace: namespace, labels: { app: 'foo' } },
 | 
						|
          spec: { podSelector: pod_selector, policyTypes: %w(Ingress), ingress: ingress, egress: nil }
 | 
						|
        }
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to eq(resource) }
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |