-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
genpolicy-msft: remove settings patch for env #159
Conversation
cc @3u13r: Depending on how the demodir images are built, they may stop working with this change. There are two workarounds:
Please let me know which way you'd prefer. |
87b0c25
to
1c9092e
Compare
I split this PR: the added PATH vars now go into #156 to unblock that, while the settings change stays here - potentially blocked until we fix the demo images. |
Which |
Yes, emojovoto - I meant the images for |
Turns out none of them do, as they are all produced with buildkit. |
The genpolicy-settings.json allow overriding the permissible set of environment variables, and come with a generic list of env vars suitable for the AKS environment. We want to have a dev setting that allows debugging (e.g. pod network settings like iptables), but that is otherwise as close to the upstream as possible. Environment variable allowlists are generated by genpolicy, and should thus not need blanket exemptions, even in dev setups. Thus, we remove the blanket allowlist and work around the limitations in our deployment yaml.
1c9092e
to
ac8d9d4
Compare
With the changes from #156 this is now good to go, ptal. |
The genpolicy-settings.json allow overriding the permissible set of
environment variables, and come with a generic list of env vars suitable
for the AKS environment.
We want to have a dev setting that allows debugging (e.g. pod network
settings like iptables), but that is otherwise as close to the upstream
as possible. Environment variable allowlists are generated by genpolicy,
and should thus not need blanket exemptions, even in dev setups. Thus,
we remove the blanket allowlist and work around the limitations in our
deployment yaml.