sandbox connected and streaming
This commit is contained in:
@@ -1,29 +1,29 @@
|
||||
# Network policies for agent isolation
|
||||
# Agents can only communicate with specific services, not with each other
|
||||
# Network policies for sandbox isolation
|
||||
# Sandboxes can only communicate with specific services, not with each other
|
||||
# or with the Kubernetes API
|
||||
---
|
||||
# Default deny all ingress and egress in agents namespace
|
||||
# Default deny all ingress and egress in sandboxes namespace
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
name: default-deny-all
|
||||
namespace: dexorder-agents
|
||||
namespace: dexorder-sandboxes
|
||||
spec:
|
||||
podSelector: {}
|
||||
policyTypes:
|
||||
- Ingress
|
||||
- Egress
|
||||
---
|
||||
# Allow agents to receive connections from gateway (MCP)
|
||||
# Allow sandboxes to receive connections from gateway (MCP)
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
name: allow-gateway-ingress
|
||||
namespace: dexorder-agents
|
||||
namespace: dexorder-sandboxes
|
||||
spec:
|
||||
podSelector:
|
||||
matchLabels:
|
||||
dexorder.io/component: agent
|
||||
dexorder.io/component: sandbox
|
||||
policyTypes:
|
||||
- Ingress
|
||||
ingress:
|
||||
@@ -37,16 +37,16 @@ spec:
|
||||
- protocol: TCP
|
||||
port: 5555 # ZeroMQ control channel
|
||||
---
|
||||
# Allow agents to connect to required services
|
||||
# Allow sandboxes to connect to required services
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
name: allow-agent-egress
|
||||
namespace: dexorder-agents
|
||||
name: allow-sandbox-egress
|
||||
namespace: dexorder-sandboxes
|
||||
spec:
|
||||
podSelector:
|
||||
matchLabels:
|
||||
dexorder.io/component: agent
|
||||
dexorder.io/component: sandbox
|
||||
policyTypes:
|
||||
- Egress
|
||||
egress:
|
||||
@@ -93,11 +93,11 @@ spec:
|
||||
- protocol: TCP
|
||||
port: 443
|
||||
---
|
||||
# Default namespace: allow ingress from agents to gateway
|
||||
# Default namespace: allow ingress from sandboxes to gateway
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
name: allow-agent-callbacks
|
||||
name: allow-sandbox-callbacks
|
||||
spec:
|
||||
podSelector:
|
||||
matchLabels:
|
||||
@@ -108,7 +108,7 @@ spec:
|
||||
- from:
|
||||
- namespaceSelector:
|
||||
matchLabels:
|
||||
dexorder.io/type: agents
|
||||
dexorder.io/type: sandboxes
|
||||
ports:
|
||||
- protocol: TCP
|
||||
port: 3000
|
||||
|
||||
Reference in New Issue
Block a user