Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NetworkPolicy validation improvements #39769

Merged

Conversation

danwinship
Copy link
Contributor

I noticed while implementing NetworkPolicy that I we weren't validating the "Ports" field at all.

The docs are actually completely silent about what a string-valued Port field is supposed to mean. I had guessed it meant to call net.LookupPort() on it (ie, map it from /etc/services) but in every other case where we have an IntOrString-valued Port field in an API struct, it refers to a named ContainerPort. But that would be extremely awkward to implement in this case; a policy specifying a named port could end up mapping to a different numeric port on every container in the namespace... Do other people actually implement string-valued ports that way? Or, for that matter, implement string-valued ports at all? (Related: I hadn't noticed until now that you can leave the Port value unspecified, allowing you to say "allow to all UDP ports, but no TCP ports" or "allow to all TCP ports, but no UDP ports". That seems like something that ended up in the spec just because it was possible, not because it was actually useful...)

@kubernetes/sig-network-misc

@k8s-reviewable
Copy link

This change is Reviewable

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jan 11, 2017
@k8s-github-robot k8s-github-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. release-note-label-needed labels Jan 11, 2017
allErrs = append(allErrs, field.Invalid(portPath.Child("port"), port.Port.IntVal, msg))
}
} else {
if _, err := net.LookupPort(strings.ToLower(protocol), port.Port.StrVal); err != nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

String portnames actually mean to look up that named port on Pod. Yes, it means ports could vary across different pods.

@danwinship danwinship force-pushed the networkpolicy-validation branch from 737b129 to 97d8ae0 Compare January 12, 2017 14:40
@danwinship
Copy link
Contributor Author

String portnames actually mean to look up that named port on Pod. Yes, it means ports could vary across different pods.

Lovely. As far as I can tell, none of Calico, Romana, or Weave implement this so I guess I don't have to feel bad if I don't either...

@lavalamp
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 20, 2017
@k8s-github-robot k8s-github-robot added the do-not-merge DEPRECATED. Indicates that a PR should not merge. Label can only be manually applied/removed. label Jan 20, 2017
@k8s-ci-robot
Copy link
Contributor

Jenkins Bazel Build failed for commit 97d8ae016126633767d7f34e661559b371fd75a5. Full PR test history. cc @danwinship

The magic incantation to run this job again is @k8s-bot bazel test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@danwinship
Copy link
Contributor Author

Can someone add "release-note-none"?

Paths were wrong for most errors.
Field name was wrong for namespaceSelector.
Protocol must be "TCP", "UDP", or nil.
Integer-valued port must be 1-65535.
String-valued port must be a syntactically valid ContainerPort name.
@danwinship danwinship force-pushed the networkpolicy-validation branch from 97d8ae0 to 1f6735c Compare January 20, 2017 14:26
@danwinship
Copy link
Contributor Author

(pushed fix for s/api.ObjectMeta/metav1.ObjectMeta/ in master)

@k8s-github-robot k8s-github-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 20, 2017
@k8s-ci-robot
Copy link
Contributor

Jenkins GCI GKE smoke e2e failed for commit 1f6735c. Full PR test history. cc @danwinship

The magic incantation to run this job again is @k8s-bot gci gke e2e test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot
Copy link
Contributor

Jenkins GKE smoke e2e failed for commit 1f6735c. Full PR test history. cc @danwinship

The magic incantation to run this job again is @k8s-bot cvm gke e2e test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@danwinship
Copy link
Contributor Author

(flakes apparently due to infrastructure issues)
@k8s-bot gci gke e2e test this
@k8s-bot cvm gke e2e test this

@lavalamp
Copy link
Member

/lgtm
/approve

@grodrigues3 @apelisse What do you think about making the bot look at people already on the thread instead of spamming a new person? E.g. it would have made more sense for the bot to bug me than Clayton. Or maybe this isn't a concern in steady state?

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 24, 2017
@apelisse
Copy link
Member

@grodrigues3 is working on improving the algorithm right now, that's a good suggestion, though it might not be easy at first. Also please note that we have this bug open kubernetes/test-infra#1672 preventing you from doing /lgtm and /approve in the same comment for now (I'm working on it as we speak)

@k8s-github-robot k8s-github-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 25, 2017
@k8s-github-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

The following people have approved this PR: lavalamp

Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@eparis
Copy link
Contributor

eparis commented Jan 27, 2017

/release-note-none

@k8s-ci-robot
Copy link
Contributor

@eparis: you can only set release notes if you are the author or an assignee.

In response to this comment:

/release-note-none

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@eparis eparis added the release-note-none Denotes a PR that doesn't merit a release note. label Jan 27, 2017
@eparis eparis removed release-note-label-needed do-not-merge DEPRECATED. Indicates that a PR should not merge. Label can only be manually applied/removed. labels Jan 27, 2017
@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-github-robot
Copy link

Automatic merge from submit-queue (batch tested with PRs 40497, 39769, 40554, 40569, 40597)

@k8s-github-robot k8s-github-robot merged commit c776d09 into kubernetes:master Jan 28, 2017
@danwinship danwinship deleted the networkpolicy-validation branch January 30, 2017 13:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants