Allow to configure service network policy for apiserver-webhook

The patch introduces network policy configuration similar
to openstack-helm services. It allows users to configure
policies depending on the environment.

* Network policies are disabled by default.
* When enabled default policies allow all ingress and
  egress traffic (i.e. policy set to {}), this may be
  changed in future patch-sets.

Change-Id: I3c6457f4abc9accf39cd9320208899200a43f828
This commit is contained in:
Evgeny L 2019-11-08 00:03:43 +00:00
parent ee21b6aee7
commit 0ed774a7cf
2 changed files with 26 additions and 0 deletions

View File

@ -0,0 +1,18 @@
# Copyright 2017-2018 The Openstack-Helm Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
{{- if .Values.manifests.network_policy -}}
{{- $netpol_opts := dict "envAll" . "name" "application" "label" "kubernetes-keystone-webhook" -}}
{{ $netpol_opts | include "helm-toolkit.manifests.kubernetes_network_policy" }}
{{- end -}}

View File

@ -194,6 +194,13 @@ endpoints:
client:
default: 2379
network_policy:
kubernetes-keystone-webhook:
ingress:
- {}
egress:
- {}
pod:
mounts:
kubernetes_apiserver:
@ -384,3 +391,4 @@ manifests:
secret_keystone: true
secret_tls: true
service: true
network_policy: false