UNCLASSIFIED - NO CUI

Skip to content
Snippets Groups Projects

Disable keycloak helm test until working on rke2

Merged Branden Cobb requested to merge BrandenCobb-master-patch-66080 into master
Compare and
3 files
+ 107
110
Compare changes
  • Side-by-side
  • Inline
Files
3
+ 95
107
hostname: bigbang.dev
flux:
timeout: 30m
interval: 1m
rollback:
cleanupOnFail: false
@@ -182,62 +183,97 @@ gatekeeper:
cpu: 100m
memory: 256Mi
limits: {}
violations:
allowedCapabilities:
parameters:
excludedResources:
# Allows k3d load balancer containers to not drop capabilities
- istio-system/lb-port-.*
allowedDockerRegistries:
parameters:
excludedResources:
# Allows k3d load balancer containers to pull from public repos
- istio-system/lb-port-.*
allowedSecCompProfiles:
parameters:
excludedResources:
# Allows k3d load balancer containers to have an undefined defined seccomp
- istio-system/lb-port-.*
allowedUsers:
parameters:
excludedResources:
# Allows k3d load balancer containers to run as any user/group
- istio-system/lb-port-.*
containerRatio:
parameters:
excludedResources:
# Allows k3d load balancer containers to have undefined limits/requests
- istio-system/lb-port-.*
hostNetworking:
parameters:
excludedResources:
# Allows k3d load balancer containers to mount host ports
- istio-system/lb-port-.*
noBigContainers:
parameters:
excludedResources:
# Allows k3d load balancer containers to have undefined limits/requests
- istio-system/lb-port-.*
noPrivilegedEscalation:
parameters:
excludedResources:
# Allows k3d load balancer containers to have undefined security context
- istio-system/lb-port-.*
readOnlyRoot:
parameters:
excludedResources:
# Allows k3d load balancer containers to mount filesystems read/write
- istio-system/lb-port-.*
requiredLabels:
parameters:
excludedResources:
# Allows k3d load balancer pods to not have required labels
- istio-system/svclb-.*
requiredProbes:
parameters:
excludedResources:
# Allows k3d load balancer containers to not have readiness/liveness probes
- istio-system/lb-port-.*
violations:
allowedAppArmorProfiles:
enabled: false
enforcementAction: dryrun
allowedCapabilities:
enabled: false
enforcementAction: dryrun
allowedDockerRegistries:
enabled: false
enforcementAction: deny
allowedFlexVolumes:
enabled: false
enforcementAction: deny
allowedHostFilesystem:
enabled: false
enforcementAction: deny
allowedIPs:
enabled: false
enforcementAction: deny
allowedProcMount:
enabled: false
enforcementAction: deny
allowedSecCompProfiles:
enabled: false
enforcementAction: dryrun
allowedUsers:
enabled: false
enforcementAction: dryrun
bannedImageTags:
enabled: false
enforcementAction: deny
blockNodePort:
enabled: false
enforcementAction: dryrun
containerRatio:
enabled: false
enforcementAction: dryrun
hostNetworking:
enabled: false
enforcementAction: deny
httpsOnly:
enabled: false
enforcementAction: deny
imageDigest:
enabled: false
enforcementAction: dryrun
namespacesHaveIstio:
enabled: false
enforcementAction: dryrun
noBigContainers:
enabled: false
enforcementAction: dryrun
noHostNamespace:
enabled: false
enforcementAction: deny
noPrivilegedContainers:
enabled: false
enforcementAction: deny
noDefaultServiceAccount:
enabled: false
enforcementAction: dryrun
noPrivilegedEscalation:
enabled: false
enforcementAction: dryrun
noSysctls:
enabled: false
enforcementAction: deny
podsHaveIstio:
enabled: false
enforcementAction: dryrun
readOnlyRoot:
enabled: false
enforcementAction: dryrun
requiredLabels:
enabled: false
enforcementAction: dryrun
requiredProbes:
enabled: false
enforcementAction: dryrun
restrictedTaint:
enabled: false
enforcementAction: deny
selinuxPolicy:
enabled: false
enforcementAction: deny
uniqueIngressHost:
enabled: false
enforcementAction: deny
volumeTypes:
enabled: false
enforcementAction: deny
bbtests:
# TODO: Test will need to be refactored at BB level to properly run since we can't turn everything to deny
# https://repo1.dso.mil/platform-one/big-bang/apps/core/policy/-/issues/133
@@ -354,7 +390,7 @@ addons:
sso:
enabled: false
flux:
timeout: 20m
timeout: 30m
values:
global:
rails:
@@ -865,7 +901,7 @@ addons:
keycloak:
enabled: false
ingress:
gateway: "public"
gateway: "passthrough"
values:
replicas: 1
resources:
@@ -881,52 +917,4 @@ addons:
cypress_url: "https://keycloak.bigbang.dev"
cypress_username: "admin"
cypress_password: "password"
# Custom dev secret configuration
secrets:
env:
stringData:
CUSTOM_REGISTRATION_CONFIG: /opt/jboss/keycloak/customreg.yaml
KEYCLOAK_IMPORT: /opt/jboss/keycloak/realm.json
X509_CA_BUNDLE: /etc/x509/https/cas.pem
certauthority:
stringData:
cas.pem: '{{ .Files.Get "resources/dev/dod_cas.pem" }}'
customreg:
stringData:
customreg.yaml: '{{ .Files.Get "resources/dev/baby-yoda.yaml" }}'
realm:
stringData:
realm.json: '{{ .Files.Get "resources/dev/baby-yoda.json" }}'
extraVolumes: |-
- name: certauthority
secret:
secretName: {{ include "keycloak.fullname" . }}-certauthority
- name: customreg
secret:
secretName: {{ include "keycloak.fullname" . }}-customreg
- name: realm
secret:
secretName: {{ include "keycloak.fullname" . }}-realm
extraVolumeMounts: |-
- name: certauthority
mountPath: /etc/x509/https/cas.pem
subPath: cas.pem
readOnly: true
- name: customreg
mountPath: /opt/jboss/keycloak/customreg.yaml
subPath: customreg.yaml
readOnly: true
- name: realm
mountPath: /opt/jboss/keycloak/realm.json
subPath: realm.json
readOnly: true
extraVolumeMountsBigBang:
- name: tlscert
mountPath: /etc/x509/https/tls.crt
subPath: tls.crt
readOnly: true
- name: tlskey
mountPath: /etc/x509/https/tls.key
subPath: tls.key
readOnly: true
Loading