Skip to content

Commit

Permalink
Merge branch 'main' into func-layer-doc
Browse files Browse the repository at this point in the history
  • Loading branch information
mjnagel authored Oct 10, 2024
2 parents 210b70b + 5df0737 commit d6a8d8e
Show file tree
Hide file tree
Showing 3 changed files with 12 additions and 5 deletions.
5 changes: 2 additions & 3 deletions src/keycloak/chart/templates/uds-package.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,13 +26,12 @@ spec:
app: pepr-uds-core-watcher
port: 8080

# Temp workaround for any cluster pod
# todo: remove this once cluster pods is a remote generated target
- description: "Keycloak backchannel access"
direction: Ingress
selector:
app.kubernetes.io/name: keycloak
remoteGenerated: Anywhere
# Allow access from anything in cluster using an empty namespace selector
remoteNamespace: "*"
port: 8080

# Keycloak OCSP to check certs cannot guarantee a static IP
Expand Down
4 changes: 2 additions & 2 deletions src/pepr/operator/controllers/network/generate.ts
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ import { V1NetworkPolicyPeer, V1NetworkPolicyPort } from "@kubernetes/client-nod
import { kind } from "pepr";

import { Allow, RemoteGenerated } from "../../crd";
import { anywhere } from "./generators/anywhere";
import { anywhere, anywhereInCluster } from "./generators/anywhere";
import { cloudMetadata } from "./generators/cloudMetadata";
import { intraNamespace } from "./generators/intraNamespace";
import { kubeAPI } from "./generators/kubeAPI";
Expand Down Expand Up @@ -31,7 +31,7 @@ function getPeers(policy: Allow): V1NetworkPolicyPeer[] {
break;

case RemoteGenerated.Anywhere:
peers = [anywhere];
peers = [anywhere, anywhereInCluster];
break;
}
} else if (policy.remoteNamespace !== undefined || policy.remoteSelector !== undefined) {
Expand Down
8 changes: 8 additions & 0 deletions src/pepr/operator/controllers/network/generators/anywhere.ts
Original file line number Diff line number Diff line change
Expand Up @@ -9,3 +9,11 @@ export const anywhere: V1NetworkPolicyPeer = {
except: [META_IP],
},
};

/** Matches any endpoint in cluster
* This is primarily to support Cilium where IP based policies do not match/allow anything in-cluster
* Ref: https://github.com/defenseunicorns/uds-core/issues/871 and https://github.com/cilium/cilium/blob/v1.16.2/Documentation/network/kubernetes/policy.rst#networkpolicy
*/
export const anywhereInCluster: V1NetworkPolicyPeer = {
namespaceSelector: {},
};

0 comments on commit d6a8d8e

Please sign in to comment.