It allows running both security and ims testcases vs clusters
where PodSecurityConfiguration enforces "restricted" [1].
[1] https://kubernetes.io/docs/tasks/configure-pod-container/enforce-standards-admission-controller/
Change-Id: I9eb420cbb695ec8fb002f25cfd3c96ab50118fcc
Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>
(cherry picked from commit
553d57ffd4ff9c3c4f319454a4d190ac7aa4cc76)
"""
api_response = self.corev1.create_namespace(
client.V1Namespace(metadata=client.V1ObjectMeta(
- generate_name=self.ns_generate_name)))
+ generate_name=self.ns_generate_name,
+ labels={"pod-security.kubernetes.io/enforce": "baseline"})))
self.namespace = api_response.metadata.name
self.__logger.debug("create_namespace: %s", api_response)
self.zone = f'{self.namespace}.svc.cluster.local'
assert self.job_name
api_response = self.corev1.create_namespace(
client.V1Namespace(metadata=client.V1ObjectMeta(
- generate_name=self.ns_generate_name)))
+ generate_name=self.ns_generate_name,
+ labels={"pod-security.kubernetes.io/enforce": "baseline"})))
self.namespace = api_response.metadata.name
self.__logger.debug("create_namespace: %s", api_response)
with open(pkg_resources.resource_filename(