Add default-deny-ingress NetworkPolicy for basketball-api namespace #268
Labels
No labels
domain:backend
domain:devops
domain:frontend
status:approved
status:in-progress
status:needs-fix
status:qa
type:bug
type:devops
type:feature
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
forgejo_admin/pal-e-platform#268
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Type
Bug fix / security hardening
Lineage
Investigation of forgejo_admin/basketball-api#343 (Stripe webhooks unreachable)
Repo
forgejo_admin/pal-e-platform
Context
Investigation of forgejo_admin/basketball-api#343 revealed the basketball-api namespace is the only service namespace missing a default-deny-ingress NetworkPolicy. Every other namespace (monitoring, forgejo, woodpecker, harbor, minio, keycloak, postgres, ollama, staging) has one. This is a security gap — all ingress to basketball-api pods is currently unrestricted.
User Story
As a platform operator, I need the basketball-api namespace to have the same default-deny-ingress NetworkPolicy as every other service namespace, so that ingress traffic is explicitly allowed only from tailscale (funnel proxy) and monitoring (Prometheus scraping).
File Targets
terraform/network-policies.tf— addnetpol_basketball_apiresourceAcceptance Criteria
tofu validatepassestofu planshows only the new NetworkPolicy resourceTest Expectations
kubectl get networkpolicy -n basketball-apireturnsdefault-deny-ingressConstraints
Checklist
tofu fmtruntofu validatepassestofu plan -lock=falseoutput included in PRRelated