Skip to content

Conversation

ozamosi
Copy link
Contributor

@ozamosi ozamosi commented Sep 23, 2022

I was browsing logs and came across warnings about pod security, which is new in 1.25. We clearly didn't pass the default restricted policy.

After putting the policy into place, I don't believe there's anything we do that isn't allowed by this policy, so let's run it with security turned on from now on.

To test that we pass this pod security policy, try setting kubectl label namespace <namespace> pod-security.kubernetes.io/enforce=restricted against the namespace where weave-gitops is running. Before this PR, that would make weave-gitops be rejected.

To test that these pod restrictions work, you shouldn't need to do anything - they're always enabled, so if it ever works, it should work both with and without pod security policy enforcement.

@ozamosi ozamosi requested a review from a team September 23, 2022 14:50
@ozamosi ozamosi added the type/enhancement New feature or request label Sep 23, 2022
Copy link
Contributor

@joshri joshri left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As we have tested this together, it is obviously flawless and there is absolutely no way anything will go wrong. BIG approve. <|:^)

I was browsing logs and came across warnings about pod security, which
is new in 1.25. We clearly didn't pass the default `restricted` policy.

After putting the policy into place, I don't believe there's anything
we do that isn't allowed by this policy, so let's run it with security
turned on from now on.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type/enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants