portieris-armada-app/helm-charts/upstream/portieris-helm/files/0001-Add-permissive-cluster-policy-by-default.patch
Tae Park e30c59ad79 Update for automatic increment chart versions
Updating portieris for auto chart version incrementation. Restructuring
debian packaging, and separating portieris-certs into a new package.

Test Plan:
PASS	Validate each chart builds from a clean build env
PASS	Validate application tarball is created correctly
PASS	Validate chart version increments by 1 for each change
PASS	Validate application cycle (upload/apply/remove/delete) for
AIO-SX

Story: 2010929
Task: 50225

Change-Id: I8e6ce77b779f6c7ef4d4bad60f77e13cba53d867
Signed-off-by: Tae Park <tae.park@windriver.com>
2024-06-03 15:08:09 -04:00

38 lines
1.2 KiB
Diff

From 0eff41601723e51d975af4e4663dc788bb067f0a Mon Sep 17 00:00:00 2001
From: Jerry Sun <jerry.sun@windriver.com>
Date: Mon, 16 Jan 2023 11:35:58 -0500
Subject: [PATCH 1/1] Add permissive cluster policy by default
The default permissive policy is only added if the policy set is
set to IKS. In the non IKS case, no default cluster image policy
is created. This means all pod deployment is denied in all
namespaces that don't have any imagepolicies. This patch applies
the default permissive cluster image policy to not interfere with
platform functionality when Portieris is applied.
Signed-off-by: Jerry Sun <jerry.sun@windriver.com>
---
helm/portieris/templates/policies.yaml | 2 --
1 file changed, 2 deletions(-)
diff --git a/helm/portieris/templates/policies.yaml b/helm/portieris/templates/policies.yaml
index 6e67ffc..ed8c84f 100644
--- a/helm/portieris/templates/policies.yaml
+++ b/helm/portieris/templates/policies.yaml
@@ -65,7 +65,6 @@ spec:
---
{{ end }}
-{{- if (eq .Values.PolicySet "IKS") }}
apiVersion: portieris.cloud.ibm.com/v1
kind: ClusterImagePolicy
metadata:
@@ -77,4 +76,3 @@ spec:
repositories:
{{- .Values.clusterPolicy.allowedRepositories | toYaml | nindent 4 }}
---
-{{ end }}
--
2.34.1