Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adapt NetworkPolicys according to recent refactorings #581

Merged
merged 12 commits into from
Mar 14, 2023
Merged
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,11 @@ spec:
prometheus.io/port: "{{ .Values.metricsPort }}"
{{- end }}
labels:
networking.gardener.cloud/to-runtime-apiserver: allowed
networking.gardener.cloud/to-dns: allowed
networking.gardener.cloud/to-public-networks: allowed
networking.gardener.cloud/to-private-networks: allowed
networking.resources.gardener.cloud/to-all-shoots-kube-apiserver-tcp-443: allowed
shaoyongfeng marked this conversation as resolved.
Show resolved Hide resolved
{{ include "labels" . | indent 8 }}
spec:
priorityClassName: gardener-system-900
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,13 @@ kind: Service
metadata:
name: {{ include "name" . }}
namespace: {{ .Release.Namespace }}
{{- if .Values.ignoreResources }}
annotations:
networking.resources.gardener.cloud/from-world-to-ports: '[{"protocol":"TCP","port":{{ .Values.webhookConfig.serverPort }}}]'
networking.resources.gardener.cloud/from-policy-pod-label-selector: all-seed-scrape-targets
networking.resources.gardener.cloud/from-policy-allowed-ports: '[{"port":{{ .Values.metricsPort }},"protocol":"TCP"}]'
networking.resources.gardener.cloud/namespace-selectors: '[{"matchLabels":{"kubernetes.io/metadata.name":"garden"}}]'
networking.resources.gardener.cloud/pod-label-selector-namespace-alias: extensions
{{- if .Values.ignoreResources }}
shaoyongfeng marked this conversation as resolved.
Show resolved Hide resolved
resources.gardener.cloud/ignore: "true"
{{- end }}
labels:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,9 +28,8 @@ spec:
networking.gardener.cloud/to-dns: allowed
networking.gardener.cloud/to-public-networks: allowed
networking.gardener.cloud/to-private-networks: allowed
networking.gardener.cloud/to-seed-apiserver: allowed
networking.gardener.cloud/to-shoot-apiserver: allowed
networking.gardener.cloud/from-prometheus: allowed
networking.gardener.cloud/to-runtime-apiserver: allowed
networking.resources.gardener.cloud/to-kube-apiserver-tcp-443: allowed
{{- if .Values.podLabels }}
{{ toYaml .Values.podLabels | indent 8 }}
{{- end }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@ metadata:
labels:
app: kubernetes
role: machine-controller-manager
annotations:
networking.resources.gardener.cloud/from-policy-pod-label-selector: all-scrape-targets
networking.resources.gardener.cloud/from-policy-allowed-ports: '[{"port":{{ .Values.metricsPort }},"protocol":"TCP"}]'
spec:
type: ClusterIP
clusterIP: None
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@ metadata:
labels:
app: kubernetes
role: cloud-controller-manager
annotations:
networking.resources.gardener.cloud/from-policy-pod-label-selector: all-scrape-targets
networking.resources.gardener.cloud/from-policy-allowed-ports: '[{"port":"10258","protocol":"TCP"}]'
spec:
type: ClusterIP
clusterIP: None
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,9 +27,8 @@ spec:
role: cloud-controller-manager
networking.gardener.cloud/to-dns: allowed
networking.gardener.cloud/to-public-networks: allowed
networking.gardener.cloud/to-shoot-apiserver: allowed
networking.gardener.cloud/to-alicloud-networks: allowed
networking.gardener.cloud/from-prometheus: allowed
networking.resources.gardener.cloud/to-kube-apiserver-tcp-443: allowed
{{- if .Values.podLabels }}
{{ toYaml .Values.podLabels | indent 8 }}
{{- end }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,8 @@ spec:
role: csi-plugin-controller
networking.gardener.cloud/to-dns: allowed
networking.gardener.cloud/to-public-networks: allowed
networking.gardener.cloud/to-shoot-apiserver: allowed
networking.gardener.cloud/to-alicloud-networks: allowed
networking.resources.gardener.cloud/to-kube-apiserver-tcp-443: allowed
spec:
automountServiceAccountToken: false
priorityClassName: gardener-system-300
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ spec:
app: csi-snapshot-controller
role: controller
networking.gardener.cloud/to-dns: allowed
networking.gardener.cloud/to-shoot-apiserver: allowed
networking.resources.gardener.cloud/to-kube-apiserver-tcp-443: allowed
spec:
automountServiceAccountToken: false
priorityClassName: gardener-system-200
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,6 @@ spec:
{{- end }}
labels:
app: snapshot-validation
networking.gardener.cloud/from-shoot-apiserver: allowed
shaoyongfeng marked this conversation as resolved.
Show resolved Hide resolved
spec:
priorityClassName: gardener-system-200
containers:
Expand Down

This file was deleted.

1 change: 1 addition & 0 deletions cmd/gardener-extension-provider-alicloud/app/app.go
Original file line number Diff line number Diff line change
Expand Up @@ -238,6 +238,7 @@ func NewControllerManagerCommand(ctx context.Context) *cobra.Command {
return fmt.Errorf("could not add webhooks to manager: %w", err)
}
alicloudcontrolplane.DefaultAddOptions.ShootWebhookConfig = atomicShootWebhookConfig
alicloudcontrolplane.DefaultAddOptions.WebhookServerNamespace = webhookOptions.Server.Namespace

if err := controllerSwitches.Completed().AddToManager(mgr); err != nil {
return fmt.Errorf("could not add controllers to manager: %w", err)
Expand Down
Loading