mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-01 15:58:37 +00:00
Merge pull request #124117 from aojea/netpol
allow to use kube-network-policies on CI
This commit is contained in:
commit
37ca0377d5
8
cluster/addons/kube-network-policies/OWNERS
Normal file
8
cluster/addons/kube-network-policies/OWNERS
Normal file
@ -0,0 +1,8 @@
|
||||
# See the OWNERS docs at https://go.k8s.io/owners
|
||||
|
||||
approvers:
|
||||
- aojea
|
||||
- danwinship
|
||||
reviewers:
|
||||
- aojea
|
||||
- danwinship
|
@ -0,0 +1,49 @@
|
||||
kind: ClusterRole
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
metadata:
|
||||
name: system:network-policies
|
||||
namespace: kube-system
|
||||
labels:
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources:
|
||||
- pods
|
||||
- nodes
|
||||
- namespaces
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
# Watch for changes to Kubernetes NetworkPolicies.
|
||||
- apiGroups: ["networking.k8s.io"]
|
||||
resources:
|
||||
- networkpolicies
|
||||
verbs:
|
||||
- watch
|
||||
- list
|
||||
---
|
||||
kind: ClusterRoleBinding
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
metadata:
|
||||
name: kube-network-policies
|
||||
labels:
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: system:network-policies
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: kube-network-policies
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: kube-network-policies
|
||||
namespace: kube-system
|
||||
labels:
|
||||
k8s-app: kube-network-policies
|
||||
kubernetes.io/cluster-service: "true"
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
@ -0,0 +1,54 @@
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: DaemonSet
|
||||
metadata:
|
||||
name: kube-network-policies
|
||||
namespace: kube-system
|
||||
labels:
|
||||
tier: node
|
||||
app: kube-network-policies
|
||||
k8s-app: kube-network-policies
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: kube-network-policies
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
tier: node
|
||||
app: kube-network-policies
|
||||
k8s-app: kube-network-policies
|
||||
spec:
|
||||
hostNetwork: true
|
||||
tolerations:
|
||||
- operator: Exists
|
||||
effect: NoSchedule
|
||||
serviceAccountName: kube-network-policies
|
||||
containers:
|
||||
- name: kube-network-policies
|
||||
image: registry.k8s.io/networking/kube-network-policies:v0.1.0
|
||||
command:
|
||||
- /bin/sh
|
||||
- -c
|
||||
- /bin/netpol -v 4 1>>/var/log/kube-network-policies.log 2>&1
|
||||
resources:
|
||||
requests:
|
||||
cpu: "100m"
|
||||
memory: "50Mi"
|
||||
securityContext:
|
||||
privileged: true
|
||||
volumeMounts:
|
||||
- mountPath: /var/log
|
||||
name: varlog
|
||||
readOnly: false
|
||||
- mountPath: /lib/modules
|
||||
name: lib-modules
|
||||
readOnly: true
|
||||
volumes:
|
||||
- name: varlog
|
||||
hostPath:
|
||||
path: /var/log
|
||||
- name: lib-modules
|
||||
hostPath:
|
||||
path: /lib/modules
|
@ -2984,6 +2984,9 @@ EOF
|
||||
local -r ds_file="${dst_dir}/calico-policy-controller/calico-node-daemonset.yaml"
|
||||
sed -i -e "s@__CALICO_CNI_DIR__@/home/kubernetes/bin@g" "${ds_file}"
|
||||
fi
|
||||
if [[ "${NETWORK_POLICY_PROVIDER:-}" == "kube-network-policies" ]]; then
|
||||
setup-addon-manifests "addons" "kube-network-policies"
|
||||
fi
|
||||
if [[ "${ENABLE_DEFAULT_STORAGE_CLASS:-}" == "true" ]]; then
|
||||
setup-addon-manifests "addons" "storage-class/gce"
|
||||
fi
|
||||
@ -3249,8 +3252,8 @@ function setup-containerd {
|
||||
}
|
||||
EOF
|
||||
if [[ "${KUBERNETES_MASTER:-}" != "true" ]]; then
|
||||
if [[ "${NETWORK_POLICY_PROVIDER:-"none"}" != "none" || "${ENABLE_NETD:-}" == "true" ]]; then
|
||||
# Use Kubernetes cni daemonset on node if network policy provider is specified
|
||||
if [[ "${NETWORK_POLICY_PROVIDER:-"none"}" == "calico" || "${ENABLE_NETD:-}" == "true" ]]; then
|
||||
# Use Kubernetes cni daemonset on node if network policy provider calico is specified
|
||||
# or netd is enabled.
|
||||
cni_template_path=""
|
||||
fi
|
||||
|
@ -42,7 +42,7 @@ readonly node_ssh_supported_providers="gce gke aws"
|
||||
readonly gcloud_supported_providers="gce gke"
|
||||
|
||||
readonly master_logfiles="kube-apiserver.log kube-apiserver-audit.log kube-scheduler.log kube-controller-manager.log cloud-controller-manager.log etcd.log etcd-events.log glbc.log cluster-autoscaler.log kube-addon-manager.log konnectivity-server.log fluentd.log kubelet.cov"
|
||||
readonly node_logfiles="kube-proxy.log containers/konnectivity-agent-*.log fluentd.log node-problem-detector.log kubelet.cov"
|
||||
readonly node_logfiles="kube-proxy.log containers/konnectivity-agent-*.log fluentd.log node-problem-detector.log kubelet.cov kube-network-policies.log"
|
||||
readonly node_systemd_services="node-problem-detector"
|
||||
readonly hollow_node_logfiles="kubelet-hollow-node-*.log kubeproxy-hollow-node-*.log npd-hollow-node-*.log"
|
||||
readonly aws_logfiles="cloud-init-output.log"
|
||||
|
Loading…
Reference in New Issue
Block a user