Skip to content

Commit 57cd310

Browse files
authored
Merge pull request #9071 from zalando-incubator/disable-admission-protection
Disable resource protection via admission-controller in legacy clusters
2 parents 8dfd52e + a5df712 commit 57cd310

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

cluster/config-defaults.yaml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -695,10 +695,15 @@ teapot_admission_controller_configmap_deletion_protection_factories_enabled: "tr
695695
# enable the rolebinding admission-controller webhook which validates rolebindings and clusterrolebindings
696696
teapot_admission_controller_enable_rolebinding_webhook: "true"
697697

698-
# enable the generic deny-all admission webhook which rejects all requests it receives
698+
{{ if eq .Cluster.Provider "zalando-eks" }}
699+
# enable the resource protection admission webhook which prevents users from accessing system resources
699700
teapot_admission_controller_enable_write_protection_webhook: "true"
700-
# configure the behaviour of the deny-all admission webhook, `true` blocks everything, `false` allows everything
701+
# configure the behaviour of the resource protection admission webhook, `true` blocks everything, `false` allows everything
701702
teapot_admission_controller_prevent_write_operations: "true"
703+
{{ else }}
704+
teapot_admission_controller_enable_write_protection_webhook: "false"
705+
teapot_admission_controller_prevent_write_operations: "false"
706+
{{ end }}
702707

703708
# Enable and configure Pod Security Policy rules implemented in admission-controller.
704709
teapot_admission_controller_pod_security_policy_enabled: "true"

0 commit comments

Comments
 (0)