Skip to content

Conversation

@abhijith-darshan
Copy link
Contributor

Add optional network policies for secrets-injector webhook

@Nuckal777
Copy link
Contributor

Did you had a chance to test this? It might be the vault connection also needs to be allowed. Also, egress traffic should likely be constrained as well.

@abhijith-darshan
Copy link
Contributor Author

abhijith-darshan commented Oct 1, 2025

Did you had a chance to test this? It might be the vault connection also needs to be allowed. Also, egress traffic should likely be constrained as well.

Yes this was tested in one of the gh clusters ✅

Will bring this to @uwe-mayer and open another PR for egress rules 👍

Signed-off-by: abhijith-darshan <abhijith.darshan@hotmail.com>

(chore): adds network-policy default values

Signed-off-by: abhijith-darshan <abhijith.darshan@hotmail.com>

(chore): bump chart version

Signed-off-by: abhijith-darshan <abhijith.darshan@hotmail.com>

(chore): set ingress rules to empty

Signed-off-by: abhijith-darshan <abhijith.darshan@hotmail.com>

(chore): render policy rules with toYaml

Signed-off-by: abhijith-darshan <abhijith.darshan@hotmail.com>

(chore): bump chart version to 1.1.20

Signed-off-by: abhijith-darshan <abhijith.darshan@hotmail.com>
Copy link
Contributor

@uwe-mayer uwe-mayer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@Nuckal777 We will try this out on our GH QA cluster again. Only then we will update the secrets-injector pluginDefinition.
Egress rules will come in a separate PR, agree?

@Nuckal777
Copy link
Contributor

From reading the manifest the communication path to the vault instance should be blocked, because only the connection to the apiserver is enabled. In case the communication works, it would good to understand why.

@abhijith-darshan
Copy link
Contributor Author

From reading the manifest the communication path to the vault instance should be blocked, because only the connection to the apiserver is enabled. In case the communication works, it would good to understand why.

Only Ingress is denied by default not egress.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants