fix(authz): restore prometheus sso fallback allow for monitoring namespace
General MR
Summary
When Monitoring is deployed with Istio enabled and authservice is used for SSO, Big Bang still creates effective Istio authorization enforcement even when package-level generated authorization policies are otherwise disabled.
When:
istio.enabled: true
sso.enabled: true
istio.authorizationPolicies.enabled: false
there are still authorization policies being deployed by authservice, namely jwt-authz
authservice still deploys the root-namespace jwt-authz AuthorizationPolicy, and Monitoring labels Prometheus / Alertmanager with the authservice selector used by that policy.
Prior to the bb-common migration, Monitoring also rendered a Prometheus-specific allow policy for same-namespace traffic. That behavior was lost, which caused Grafana to receive RBAC: access denied when querying Prometheus in the SSO, non-hardened path.
Relevant logs/screenshots
Linked Issue
Upgrade Notices
This fixes a bug discovered in the upgrade from 3.19 to 3.20 when hardened is not being used but sso is.
Why wasn't this caught by our ui testing?
All our UI tests run assuming hardened is enabled. This behavior is only observed in unhardened setups

