Use runtime/default as default seccomp profile for unprivileged PodSecurityPolicy

This commit is contained in:
Zhen Wang 2018-05-15 09:39:37 -07:00
parent bd0d093701
commit 6351e25203
4 changed files with 8 additions and 8 deletions

View File

@ -4,8 +4,8 @@ metadata:
name: gce.event-exporter name: gce.event-exporter
annotations: annotations:
kubernetes.io/description: 'Policy used by the event-exporter addon.' kubernetes.io/description: 'Policy used by the event-exporter addon.'
# TODO: event-exporter should run with the default seccomp profile seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'runtime/default,docker/default'
# 'runtime/default' is already the default, but must be filled in on the # 'runtime/default' is already the default, but must be filled in on the
# pod to pass admission. # pod to pass admission.
apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'

View File

@ -4,8 +4,8 @@ metadata:
name: gce.fluentd-gcp name: gce.fluentd-gcp
annotations: annotations:
kubernetes.io/description: 'Policy used by the fluentd-gcp addon.' kubernetes.io/description: 'Policy used by the fluentd-gcp addon.'
# TODO: fluentd-gcp should run with the default seccomp profile seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'runtime/default,docker/default'
# 'runtime/default' is already the default, but must be filled in on the # 'runtime/default' is already the default, but must be filled in on the
# pod to pass admission. # pod to pass admission.
apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'

View File

@ -5,8 +5,8 @@ metadata:
annotations: annotations:
kubernetes.io/description: 'Policy used by the persistent-volume-binder kubernetes.io/description: 'Policy used by the persistent-volume-binder
(a.k.a. persistentvolume-controller) to run recycler pods.' (a.k.a. persistentvolume-controller) to run recycler pods.'
# TODO: This should use the default seccomp profile. seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'runtime/default,docker/default'
labels: labels:
kubernetes.io/cluster-service: 'true' kubernetes.io/cluster-service: 'true'
addonmanager.kubernetes.io/mode: Reconcile addonmanager.kubernetes.io/mode: Reconcile

View File

@ -7,8 +7,8 @@ metadata:
privilege necessary to run non-privileged kube-system pods. This policy is privilege necessary to run non-privileged kube-system pods. This policy is
not intended for use outside of kube-system, and may include further not intended for use outside of kube-system, and may include further
restrictions in the future.' restrictions in the future.'
# TODO: Addons should use the default seccomp profile. seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'runtime/default,docker/default'
# 'runtime/default' is already the default, but must be filled in on the # 'runtime/default' is already the default, but must be filled in on the
# pod to pass admission. # pod to pass admission.
apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'