| /* |
| Copyright 2017 The Kubernetes Authors. |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| */ |
| |
| package fuzzer |
| |
| import ( |
| fuzz "github.com/google/gofuzz" |
| runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer" |
| "k8s.io/kubernetes/pkg/apis/networking" |
| ) |
| |
| // Funcs returns the fuzzer functions for the networking api group. |
| var Funcs = func(codecs runtimeserializer.CodecFactory) []interface{} { |
| return []interface{}{ |
| func(np *networking.NetworkPolicyPeer, c fuzz.Continue) { |
| c.FuzzNoCustom(np) // fuzz self without calling this function again |
| // TODO: Implement a fuzzer to generate valid keys, values and operators for |
| // selector requirements. |
| if np.IPBlock != nil { |
| np.IPBlock = &networking.IPBlock{ |
| CIDR: "192.168.1.0/24", |
| Except: []string{"192.168.1.1/24", "192.168.1.2/24"}, |
| } |
| } |
| }, |
| func(np *networking.NetworkPolicy, c fuzz.Continue) { |
| c.FuzzNoCustom(np) // fuzz self without calling this function again |
| // TODO: Implement a fuzzer to generate valid keys, values and operators for |
| // selector requirements. |
| if len(np.Spec.PolicyTypes) == 0 { |
| np.Spec.PolicyTypes = []networking.PolicyType{networking.PolicyTypeIngress} |
| } |
| }, |
| } |
| } |