mirror of
https://github.com/gitpod-io/gitpod.git
synced 2025-12-08 17:36:30 +00:00
* Ensure the spread of pods on different nodes * Replace string ClusterFirst * Replace Always string in DNSPolicy * Fix registry-facade affinity * Fix ws-proxy affinity * Address feedback * Update golden files
109 lines
3.1 KiB
Go
109 lines
3.1 KiB
Go
// Copyright (c) 2021 Gitpod GmbH. All rights reserved.
|
|
// Licensed under the GNU Affero General Public License (AGPL).
|
|
// See License.AGPL.txt in the project root for license information.
|
|
|
|
package workspace
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/gitpod-io/gitpod/installer/pkg/common"
|
|
agentsmith "github.com/gitpod-io/gitpod/installer/pkg/components/agent-smith"
|
|
"github.com/gitpod-io/gitpod/installer/pkg/components/proxy"
|
|
wsdaemon "github.com/gitpod-io/gitpod/installer/pkg/components/ws-daemon"
|
|
networkingv1 "k8s.io/api/networking/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
)
|
|
|
|
func networkpolicy(ctx *common.RenderContext) ([]runtime.Object, error) {
|
|
labels := common.DefaultLabels(Component)
|
|
|
|
podSelectorLabels := map[string]string{
|
|
"app": "gitpod",
|
|
"component": Component,
|
|
"gitpod.io/networkpolicy": "default",
|
|
}
|
|
|
|
return []runtime.Object{&networkingv1.NetworkPolicy{
|
|
TypeMeta: common.TypeMetaNetworkPolicy,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: fmt.Sprintf("%s-default", Component),
|
|
Namespace: ctx.Namespace,
|
|
Labels: labels,
|
|
},
|
|
Spec: networkingv1.NetworkPolicySpec{
|
|
PodSelector: metav1.LabelSelector{MatchLabels: podSelectorLabels},
|
|
PolicyTypes: []networkingv1.PolicyType{"Ingress", "Egress"},
|
|
Ingress: []networkingv1.NetworkPolicyIngressRule{
|
|
{
|
|
From: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
PodSelector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(proxy.Component)},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
From: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
PodSelector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(common.WSProxyComponent)},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
From: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
PodSelector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(agentsmith.Component)},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
From: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
PodSelector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(wsdaemon.Component)},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Ports: []networkingv1.NetworkPolicyPort{
|
|
{
|
|
Protocol: common.TCPProtocol,
|
|
Port: &intstr.IntOrString{IntVal: 23000},
|
|
},
|
|
},
|
|
From: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
NamespaceSelector: &metav1.LabelSelector{MatchLabels: map[string]string{
|
|
"chart": common.MonitoringChart,
|
|
}},
|
|
PodSelector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(common.ServerComponent)},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
Egress: []networkingv1.NetworkPolicyEgressRule{
|
|
{
|
|
To: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
IPBlock: &networkingv1.IPBlock{
|
|
CIDR: "0.0.0.0/0",
|
|
// Google Compute engine special, reserved VM metadata IP
|
|
Except: []string{"169.254.169.254/32"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
To: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
PodSelector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(proxy.Component)},
|
|
},
|
|
},
|
|
},
|
|
common.AllowKubeDnsEgressRule(),
|
|
},
|
|
},
|
|
}}, nil
|
|
}
|