Skip to content

Commit 6c5b07a

Browse files
orishoshanzohar7ch
andauthored
When creating an external traffic network policy, now only use a single existing Otterize network policy to determine the pod selector used by the external traffic network policy as all of the different pod selectors are equivalent (#575)
Co-authored-by: zohar7ch <zohar.s@otterize.com>
1 parent c231e02 commit 6c5b07a

File tree

4 files changed

+80
-78
lines changed

4 files changed

+80
-78
lines changed

src/operator/controllers/intents_reconcilers/external_traffic_network_policy/external_traffic_network_policy_test.go renamed to src/operator/controllers/external_traffic/external_traffic_network_policy_test.go

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
package external_traffic_network_policy
1+
package external_traffic
22

33
import (
44
"context"
@@ -11,7 +11,6 @@ import (
1111
otterizev2alpha1 "github.com/otterize/intents-operator/src/operator/api/v2alpha1"
1212
otterizev2beta1 "github.com/otterize/intents-operator/src/operator/api/v2beta1"
1313
"github.com/otterize/intents-operator/src/operator/controllers"
14-
"github.com/otterize/intents-operator/src/operator/controllers/external_traffic"
1514
"github.com/otterize/intents-operator/src/operator/controllers/intents_reconcilers"
1615
mocks "github.com/otterize/intents-operator/src/operator/controllers/intents_reconcilers/mocks"
1716
"github.com/otterize/intents-operator/src/operator/controllers/intents_reconcilers/networkpolicy"
@@ -47,8 +46,8 @@ import (
4746

4847
type ExternalNetworkPolicyReconcilerTestSuite struct {
4948
testbase.ControllerManagerTestSuiteBase
50-
IngressReconciler *external_traffic.IngressReconciler
51-
endpointReconciler external_traffic.EndpointsReconciler
49+
IngressReconciler *IngressReconciler
50+
endpointReconciler EndpointsReconciler
5251
EffectivePolicyIntentsReconciler *intents_reconcilers.ServiceEffectivePolicyIntentsReconciler
5352
podWatcher *pod_reconcilers.PodWatcher
5453
defaultDenyReconciler *protected_service_reconcilers.DefaultDenyReconciler
@@ -58,9 +57,9 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) SetupSuite() {
5857
logrus.Info("Setting up test suite")
5958
s.TestEnv = &envtest.Environment{Scheme: clientgoscheme.Scheme}
6059
var err error
61-
s.TestEnv.CRDDirectoryPaths = []string{filepath.Join("..", "..", "..", "config", "crd")}
60+
s.TestEnv.CRDDirectoryPaths = []string{filepath.Join("..", "..", "config", "crd")}
6261
s.TestEnv.WebhookInstallOptions = envtest.WebhookInstallOptions{
63-
Paths: []string{filepath.Join("..", "..", "..", "config", "webhook")},
62+
Paths: []string{filepath.Join("..", "..", "config", "webhook")},
6463
LocalServingHost: "localhost",
6564
}
6665
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
@@ -96,7 +95,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) SetupTest() {
9695
testName := s.T().Name()
9796
isShadowMode := strings.Contains(testName, "ShadowMode")
9897
defaultActive := !isShadowMode
99-
netpolHandler := external_traffic.NewNetworkPolicyHandler(s.Mgr.GetClient(), s.TestEnv.Scheme, automate_third_party_network_policy.IfBlockedByOtterize, make([]serviceidentity.ServiceIdentity, 0), false)
98+
netpolHandler := NewNetworkPolicyHandler(s.Mgr.GetClient(), s.TestEnv.Scheme, automate_third_party_network_policy.IfBlockedByOtterize, make([]serviceidentity.ServiceIdentity, 0), false)
10099
s.defaultDenyReconciler = protected_service_reconcilers.NewDefaultDenyReconciler(s.Mgr.GetClient(), true)
101100
netpolReconciler := networkpolicy.NewReconciler(s.Mgr.GetClient(), s.TestEnv.Scheme, netpolHandler, []string{}, goset.NewSet[string](), true, defaultActive, false, []networkpolicy.IngressRuleBuilder{builders.NewIngressNetpolBuilder(), builders.NewPortNetworkPolicyReconciler(s.Mgr.GetClient())}, nil)
102101
serviceIdResolver := serviceidresolver.NewResolver(s.Mgr.GetClient())
@@ -105,12 +104,12 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) SetupTest() {
105104
s.Require().NoError((&controllers.IntentsReconciler{}).InitIntentsServerIndices(s.Mgr))
106105
s.EffectivePolicyIntentsReconciler.InjectRecorder(recorder)
107106

108-
s.endpointReconciler = external_traffic.NewEndpointsReconciler(s.Mgr.GetClient(), netpolHandler)
107+
s.endpointReconciler = NewEndpointsReconciler(s.Mgr.GetClient(), netpolHandler)
109108
s.endpointReconciler.InjectRecorder(recorder)
110109
err := s.endpointReconciler.InitIngressReferencedServicesIndex(s.Mgr)
111110
s.Require().NoError(err)
112111

113-
s.IngressReconciler = external_traffic.NewIngressReconciler(s.Mgr.GetClient(), netpolHandler)
112+
s.IngressReconciler = NewIngressReconciler(s.Mgr.GetClient(), netpolHandler)
114113
s.IngressReconciler.InjectRecorder(recorder)
115114
s.Require().NoError(err)
116115

@@ -159,7 +158,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForIng
159158
s.Require().NoError(err)
160159

161160
// make sure the ingress network policy doesn't exist yet
162-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, serviceName)
161+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, serviceName)
163162
s.WaitUntilCondition(func(assert *assert.Assertions) {
164163
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
165164
assert.True(errors.IsNotFound(err))
@@ -212,7 +211,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForIng
212211
})
213212

214213
// make sure the ingress network policy doesn't exist yet
215-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, serviceName)
214+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, serviceName)
216215
s.WaitUntilCondition(func(assert *assert.Assertions) {
217216
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
218217
assert.True(errors.IsNotFound(err))
@@ -268,7 +267,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForIng
268267
})
269268

270269
// make sure the ingress network policy doesn't exist yet
271-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, serviceName)
270+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, serviceName)
272271
s.WaitUntilCondition(func(assert *assert.Assertions) {
273272
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
274273
assert.True(errors.IsNotFound(err))
@@ -343,7 +342,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestIngressProtectedService_S
343342
s.Require().NoError(err)
344343

345344
// make sure the ingress network policy doesn't exist yet
346-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, serviceName)
345+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, serviceName)
347346
s.WaitUntilCondition(func(assert *assert.Assertions) {
348347
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
349348
assert.True(errors.IsNotFound(err))
@@ -425,7 +424,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestIngressWithIntentsProtect
425424
s.Require().NoError(err)
426425

427426
// make sure the ingress network policy doesn't exist yet
428-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, serviceName)
427+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, serviceName)
429428
s.WaitUntilCondition(func(assert *assert.Assertions) {
430429
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
431430
assert.True(errors.IsNotFound(err))
@@ -485,7 +484,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForLoa
485484

486485
// make sure the load balancer network policy doesn't exist yet
487486
loadBalancerServiceName := serviceName + "-lb"
488-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, loadBalancerServiceName)
487+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, loadBalancerServiceName)
489488

490489
s.WaitUntilCondition(func(assert *assert.Assertions) {
491490
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
@@ -547,7 +546,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForLoa
547546

548547
// make sure the load balancer network policy doesn't exist yet
549548
loadBalancerServiceName := serviceName + "-lb"
550-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, loadBalancerServiceName)
549+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, loadBalancerServiceName)
551550
s.WaitUntilCondition(func(assert *assert.Assertions) {
552551
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, netpol)
553552
assert.True(errors.IsNotFound(err))
@@ -659,7 +658,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForLoa
659658

660659
// make sure the load balancer network policy doesn't exist yet
661660
loadBalancerServiceName := serviceName + "-lb"
662-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, loadBalancerServiceName)
661+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, loadBalancerServiceName)
663662
s.WaitUntilCondition(func(assert *assert.Assertions) {
664663
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
665664
assert.True(errors.IsNotFound(err))
@@ -753,7 +752,7 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestNetworkPolicyCreateForNod
753752

754753
// make sure the load balancer network policy doesn't exist yet
755754
nodePortServiceName := serviceName + "-np"
756-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, nodePortServiceName)
755+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, nodePortServiceName)
757756

758757
s.WaitUntilCondition(func(assert *assert.Assertions) {
759758
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
@@ -813,16 +812,16 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) TestEndpointsReconcilerNetwor
813812

814813
// make sure the load balancer network policy doesn't exist yet
815814
nodePortServiceName := serviceName + "-np"
816-
externalNetworkPolicyName := fmt.Sprintf(external_traffic.OtterizeExternalNetworkPolicyNameTemplate, nodePortServiceName)
815+
externalNetworkPolicyName := fmt.Sprintf(OtterizeExternalNetworkPolicyNameTemplate, nodePortServiceName)
817816
s.WaitUntilCondition(func(assert *assert.Assertions) {
818817
err = s.Mgr.GetClient().Get(context.Background(), types.NamespacedName{Namespace: s.TestNamespace, Name: externalNetworkPolicyName}, np)
819818
assert.True(errors.IsNotFound(err))
820819
})
821820

822821
s.AddNodePortService(nodePortServiceName, podIps, podLabels)
823822

824-
netpolHandler := external_traffic.NewNetworkPolicyHandler(s.Mgr.GetClient(), s.TestEnv.Scheme, automate_third_party_network_policy.Off, make([]serviceidentity.ServiceIdentity, 0), false)
825-
endpointReconcilerWithEnforcementDisabled := external_traffic.NewEndpointsReconciler(s.Mgr.GetClient(), netpolHandler)
823+
netpolHandler := NewNetworkPolicyHandler(s.Mgr.GetClient(), s.TestEnv.Scheme, automate_third_party_network_policy.Off, make([]serviceidentity.ServiceIdentity, 0), false)
824+
endpointReconcilerWithEnforcementDisabled := NewEndpointsReconciler(s.Mgr.GetClient(), netpolHandler)
826825
recorder := record.NewFakeRecorder(10)
827826
endpointReconcilerWithEnforcementDisabled.InjectRecorder(recorder)
828827

0 commit comments

Comments
 (0)