cert-manager-webhook-example/deploy/cert-manager-ibm-cis-webhook/templates/networkpolicies.yaml

67 lines
1.5 KiB
YAML

{{- if .Values.networkPolicies.enabled }}
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: {{ include "cert-manager-ibm-cis-webhook.fullname" . }}-allow-dns
spec:
podSelector:
matchLabels:
app.kubernetes.io/name: {{ include "cert-manager-ibm-cis-webhook.name" . }}
policyTypes:
- Egress
egress:
- to:
- namespaceSelector: {}
podSelector:
matchLabels:
k8s-app.kubernetes.io/name: kube-dns
ports:
- protocol: UDP
port: 53
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: {{ include "cert-manager-ibm-cis-webhook.fullname" . }}-allow-ingress
spec:
podSelector:
matchLabels:
app.kubernetes.io/name: {{ include "cert-manager-ibm-cis-webhook.name" . }}
policyTypes:
- Ingress
ingress:
- from:
- podSelector: {}
- namespaceSelector: {}
ports:
- protocol: TCP
port: {{ .Values.containerPort }}
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-egress-to-k8s-api
spec:
podSelector:
matchLabels:
app.kubernetes.io/name: {{ include "cert-manager-ibm-cis-webhook.name" . }}
policyTypes:
- Egress
egress:
- {}
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-egress-to-cis
spec:
podSelector:
matchLabels:
app.kubernetes.io/name: {{ include "cert-manager-ibm-cis-webhook.name" . }}
policyTypes:
- Egress
egress:
- ports:
- port: 443
{{- end }}