It allows running both security and ims testcases vs clusters
where PodSecurityConfiguration enforces "restricted" [1].
[1] https://kubernetes.io/docs/tasks/configure-pod-container/enforce-standards-admission-controller/
Change-Id: I9eb420cbb695ec8fb002f25cfd3c96ab50118fcc
Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>
         """
         api_response = self.corev1.create_namespace(
             client.V1Namespace(metadata=client.V1ObjectMeta(
-                generate_name=self.ns_generate_name)))
+                generate_name=self.ns_generate_name,
+                labels={"pod-security.kubernetes.io/enforce": "baseline"})))
         self.namespace = api_response.metadata.name
         self.__logger.debug("create_namespace: %s", api_response)
         self.zone = f'{self.namespace}.svc.cluster.local'
 
         assert self.job_name
         api_response = self.corev1.create_namespace(
             client.V1Namespace(metadata=client.V1ObjectMeta(
-                generate_name=self.ns_generate_name)))
+                generate_name=self.ns_generate_name,
+                labels={"pod-security.kubernetes.io/enforce": "baseline"})))
         self.namespace = api_response.metadata.name
         self.__logger.debug("create_namespace: %s", api_response)
         with open(pkg_resources.resource_filename(