Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tighten and flesh out networkpolicies #1670

Merged
merged 2 commits into from
May 16, 2020

Conversation

consideRatio
Copy link
Member

@consideRatio consideRatio commented May 15, 2020

If someone wanted to restrict the egress, they would previously need quite a bit of exceptions. With this setup, I hope to make them function even though the Helm chart user removes denies all not explicitly allowed egress by removing the explicit allowance of 0.0.0.0/0 (all IPv4 egress).


UPDATE

This PR introduced a breaking change. All traffic towards the proxy pod, for example through the proxy-public service, must now be from pods labelled with hub.jupyter.org/network-access-proxy-http: "true" or from pods in a namespace labelled with hub.jupyter.org/network-access-proxy-http: "true".

That this wasn't already the case, is considered a bug fix.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant