Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PROD-934] Rip out all support for PodSecurityPolicies #257

Merged
merged 6 commits into from
Mar 12, 2024

Conversation

okotsopoulos
Copy link
Contributor

@okotsopoulos okotsopoulos commented Mar 6, 2024

https://broadworkbench.atlassian.net/browse/PROD-934

Following successful repair of TDR Dev, Staging and Prod to disable PodSecurityPolicies for compatibility with GKE 1.25+, we'd like to fully remove PodSecurityPolicies from our Helm charts. I broke up this PR into commits for each chart.

This should be a "no-op" for those environments since we've disabled PSPs via terra-helmfile values for them, and successfully deployed / synced.

Follow-on actions:

@okotsopoulos okotsopoulos marked this pull request as ready for review March 6, 2024 18:37
@okotsopoulos okotsopoulos requested a review from snf2ye March 6, 2024 18:37
Comment on lines 46 to 47
rbac:
# Specifies whether a psp should be created
create: false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we pull the rbac.create field too?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can't, per #249:

The old rbac enabled flag wrapped both both pod security policy associated resources and also tdr's permission to talk to the k8s api. This separates them so that we can disable pod security policy without breaking tdrs ability to talk to k8s.

A rename is likely in order, but I would prefer to handle that separately if so.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

gah bummer

@okotsopoulos okotsopoulos marked this pull request as draft March 12, 2024 18:42
This was bumped too high when resolving a merge conflict.
@okotsopoulos okotsopoulos marked this pull request as ready for review March 12, 2024 18:44
Copy link
Contributor

@jack-r-warren jack-r-warren left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

Copy link
Contributor

@nmalfroy nmalfroy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this should work!

@okotsopoulos okotsopoulos merged commit 4736f04 into master Mar 12, 2024
1 check passed
@okotsopoulos okotsopoulos deleted the okotsopo-PROD-934-no-more-podsecuritypolicies branch March 12, 2024 19:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants