-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove PodSecurityPolicy admission plugin #109798
Conversation
psputil "k8s.io/kubernetes/pkg/security/podsecuritypolicy/util" | ||
) | ||
|
||
const ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
these were hoisted from k8s.io/kubernetes/pkg/security/podsecuritypolicy/seccomp to allow deleting that package
@@ -332,6 +339,44 @@ func validatePodSecurityPolicyVolumes(fldPath *field.Path, volumes []policy.FSTy | |||
return allErrs | |||
} | |||
|
|||
// getAllFSTypesAsSet returns all actual volume types, regardless | |||
// of feature gates. The special policy.All pseudo type is not included. | |||
func getAllFSTypesAsSet() sets.String { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this was hoisted from k8s.io/kubernetes/pkg/security/podsecuritypolicy/util to allow deleting that package
type SysctlsStrategy interface { | ||
// Validate ensures that the specified values fall within the range of the strategy. | ||
Validate(pod *api.Pod) field.ErrorList | ||
// SafeSysctlAllowlist returns the allowlist of safe sysctls and safe sysctl patterns (ending in *). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this was hoisted from k8s.io/kubernetes/pkg/security/podsecuritypolicy/sysctl to allow deleting that package
/triage accepted |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: enj, liggitt The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
heh, yeah, test-cmd got me in the 1.25 removals. /lgtm |
/hold cancel |
seccompDefaultProfileAnnotationKey = "seccomp.security.alpha.kubernetes.io/defaultProfileName" | ||
// AllowedProfilesAnnotationKey specifies the allowed seccomp profiles. | ||
seccompAllowedProfilesAnnotationKey = "seccomp.security.alpha.kubernetes.io/allowedProfileNames" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These are being removed too, right? As part of #109819
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This API code is staying unchanged for 1.25 and will be removed in 1.26. The other PR is on my radar to review as well
What type of PR is this?
/kind cleanup
/kind deprecation
What this PR does / why we need it:
Removes the PodSecurityPolicy admission plugin
Which issue(s) this PR fixes:
xref kubernetes/enhancements#5
Does this PR introduce a user-facing change?
/sig auth security
/cc @deads2k @enj @ritazh @mikedanese