-
Epic
-
Resolution: Done
-
Blocker
-
None
-
Pod Security Admission
-
False
-
False
-
Yellow
-
To Do
-
Impediment
-
0% To Do, 0% In Progress, 100% Done
-
Summary (PM+lead)
https://issues.redhat.com/browse/AUTH-2 revealed that, in prinicipal, Pod Security Admission is possible to integrate into OpenShift while retaining SCC functionality.
This epic is about the concrete steps to enable Pod Security Admission by default in OpenShift
Motivation (PM+lead)
Goals (lead)
- Enable Pod Security Admission in "restricted" policy level by default
- Migrate existing core workloads to comply to the "restricted" pod security policy level
Non-Goals (lead)
- Other OpenShift workloads must be migrated by the individual responsible teams.
Deliverables
Proposal (lead)
Enhancement - https://github.com/openshift/enhancements/pull/1010
User Stories (PM)
Dependencies (internal and external, lead)
Previous Work (lead)
Open questions (lead)
- ...
Done Checklist
- CI - CI is running, tests are automated and merged.
- Release Enablement <link to Feature Enablement Presentation>
- DEV - Upstream code and tests merged: <link to meaningful PR or GitHub Issue>
- DEV - Upstream documentation merged: <link to meaningful PR or GitHub Issue>
- DEV - Downstream build attached to advisory: <link to errata>
- QE - Test plans in Polarion: <link or reference to Polarion>
- QE - Automated tests merged: <link or reference to automated tests>
- DOC - Downstream documentation merged: <link to meaningful PR>
There are no Sub-Tasks for this issue.