mirror of
https://github.com/vmware-tanzu/pinniped.git
synced 2026-01-08 15:21:55 +00:00
Make Pinniped compatible with Kube clusters which have enabled PSAs
Where possible, use securityContext settings which will work with the most restrictive Pod Security Admission policy level (as of Kube 1.25). Where privileged containers are needed, use the namespace-level annotation to allow them. Also adjust some integration tests to make similar changes to allow the integration tests to pass on test clusters which use restricted PSAs.
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
#! Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||
#! Copyright 2020-2022 the Pinniped contributors. All Rights Reserved.
|
||||
#! SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
---
|
||||
@@ -6,3 +6,8 @@ apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: tools
|
||||
labels:
|
||||
# When deploying onto a cluster which has PSAs enabled by default for namespaces,
|
||||
# effectively disable them for this namespace. This namespace is only for integration
|
||||
# testing helper tools, and should never be deployed in production installs.
|
||||
pod-security.kubernetes.io/enforce: privileged
|
||||
|
||||
Reference in New Issue
Block a user