-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PROD-934] Rip out all support for PodSecurityPolicies #257
[PROD-934] Rip out all support for PodSecurityPolicies #257
Conversation
rbac: | ||
# Specifies whether a psp should be created | ||
create: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we pull the rbac.create field too?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can't, per #249:
The old rbac enabled flag wrapped both both pod security policy associated resources and also tdr's permission to talk to the k8s api. This separates them so that we can disable pod security policy without breaking tdrs ability to talk to k8s.
A rename is likely in order, but I would prefer to handle that separately if so.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
gah bummer
This was bumped too high when resolving a merge conflict.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this should work!
https://broadworkbench.atlassian.net/browse/PROD-934
Following successful repair of TDR Dev, Staging and Prod to disable PodSecurityPolicies for compatibility with GKE 1.25+, we'd like to fully remove PodSecurityPolicies from our Helm charts. I broke up this PR into commits for each chart.
This should be a "no-op" for those environments since we've disabled PSPs via terra-helmfile values for them, and successfully deployed / synced.
Follow-on actions: