Skip to content

Conversation

@fedepaol
Copy link
Member

@fedepaol fedepaol commented Aug 29, 2022

Pod security policy is now not supported anymore, so we remove it.
Note: it's currently not possible to bump the CI up to validate against 1.25 as a 1.25 is not available on kind yet.
I tested it running minikube and checking if the pods get up properly.

Fixes #1401 #1565

Pod security policy is removed from 1.25, and 1.23 supports pod security
admission, so we are definetely migrating away from psp.

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
Psp is removed in 1.25, and from 1.23 pod security admission is
officially supported, so we can safely remove psp.

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
Instead of deploying on the default namespace, we create the
metallb-system namespace and deploy there.

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
Now inv dev-env deploys on metallb-system with helm too, so we must
instruct the tests about it.

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
When using servicemonitors, we must grant prometheus access to services
and endpoints too. This wasn't failing CI because when deploying
prometheus, it's granted permissions against the default namespace. It
started to fail when we deployed metallb on a different ns.

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
Copy link
Member

@oribon oribon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Deployment manifest contains the deprecated PodSecurityPolicy

2 participants