Merge pull request #93095 from pjbgf/migrate-seccomp-usage-to-ga

Update yaml files to use seccomp GA syntax
This commit is contained in:
Kubernetes Prow Robot 2020-08-28 12:35:49 -07:00 committed by GitHub
commit b440ecc315
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
21 changed files with 68 additions and 49 deletions

View File

@ -17,9 +17,10 @@ spec:
labels:
k8s-app: glbc
name: glbc
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
containers:
- name: default-http-backend
# Any image is permissible as long as:

View File

@ -261,9 +261,10 @@ spec:
metadata:
labels:
k8s-app: dashboard-metrics-scraper
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
containers:
- name: dashboard-metrics-scraper
image: kubernetesui/metrics-scraper:v1.0.4

View File

@ -75,11 +75,11 @@ spec:
metadata:
labels:
k8s-app: kube-dns-autoscaler
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
priorityClassName: system-cluster-critical
securityContext:
seccompProfile:
type: RuntimeDefault
supplementalGroups: [ 65534 ]
fsGroup: 65534
nodeSelector:

View File

@ -108,9 +108,10 @@ spec:
metadata:
labels:
k8s-app: kube-dns
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-cluster-critical
serviceAccountName: coredns
affinity:

View File

@ -108,9 +108,10 @@ spec:
metadata:
labels:
k8s-app: kube-dns
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-cluster-critical
serviceAccountName: coredns
affinity:

View File

@ -108,9 +108,10 @@ spec:
metadata:
labels:
k8s-app: kube-dns
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-cluster-critical
serviceAccountName: coredns
affinity:

View File

@ -82,12 +82,13 @@ spec:
labels:
k8s-app: kube-dns
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
prometheus.io/port: "10054"
prometheus.io/scrape: "true"
spec:
priorityClassName: system-cluster-critical
securityContext:
seccompProfile:
type: RuntimeDefault
supplementalGroups: [ 65534 ]
fsGroup: 65534
affinity:

View File

@ -82,12 +82,13 @@ spec:
labels:
k8s-app: kube-dns
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
prometheus.io/port: "10054"
prometheus.io/scrape: "true"
spec:
priorityClassName: system-cluster-critical
securityContext:
seccompProfile:
type: RuntimeDefault
supplementalGroups: [ 65534 ]
fsGroup: 65534
affinity:

View File

@ -82,12 +82,13 @@ spec:
labels:
k8s-app: kube-dns
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'runtime/default'
prometheus.io/port: "10054"
prometheus.io/scrape: "true"
spec:
priorityClassName: system-cluster-critical
securityContext:
seccompProfile:
type: RuntimeDefault
supplementalGroups: [ 65534 ]
fsGroup: 65534
affinity:

View File

@ -61,12 +61,10 @@ spec:
labels:
k8s-app: fluentd-es
version: v3.0.2
# This annotation ensures that fluentd does not get evicted if the node
# supports critical pod annotation based priority scheme.
# Note that this does not guarantee admission on the nodes (#40573).
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-node-critical
serviceAccountName: fluentd-es
containers:

View File

@ -15,9 +15,10 @@ spec:
metadata:
labels:
k8s-app: kibana-logging
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
containers:
- name: kibana-logging
image: docker.elastic.co/kibana/kibana-oss:7.2.0

View File

@ -24,9 +24,10 @@ spec:
metadata:
labels:
app: metadata-agent
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
serviceAccountName: metadata-agent
priorityClassName: system-node-critical
nodeSelector:
@ -88,9 +89,10 @@ spec:
metadata:
labels:
app: metadata-agent-cluster-level
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
serviceAccountName: metadata-agent
priorityClassName: system-cluster-critical
nodeSelector:

View File

@ -41,9 +41,10 @@ spec:
labels:
k8s-app: metrics-server
version: v0.3.6
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-cluster-critical
serviceAccountName: metrics-server
nodeSelector:

View File

@ -7,12 +7,14 @@
"labels": {
"tier": "cluster-management",
"component": "cluster-autoscaler"
},
"annotations": {
"seccomp.security.alpha.kubernetes.io/pod": "docker/default"
}
},
"spec": {
"securityContext": {
"seccompProfile": {
"type": "RuntimeDefault"
}
},
"hostNetwork": true,
"containers": [
{

View File

@ -3,12 +3,14 @@
"kind": "Pod",
"metadata": {
"name":"etcd-server{{ suffix }}",
"namespace": "kube-system",
"annotations": {
"seccomp.security.alpha.kubernetes.io/pod": "docker/default"
}
"namespace": "kube-system"
},
"spec":{
"securityContext": {
"seccompProfile": {
"type": "RuntimeDefault"
}
},
"priorityClassName": "system-node-critical",
"priority": 2000001000,
"hostNetwork": true,

View File

@ -5,11 +5,13 @@ metadata:
namespace: kube-system
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ''
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
labels:
k8s-app: gcp-lb-controller
kubernetes.io/name: "GLBC"
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-node-critical
priority: 2000001000
terminationGracePeriodSeconds: 600

View File

@ -3,10 +3,11 @@ kind: Pod
metadata:
name: konnectivity-server
namespace: kube-system
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
component: konnectivity-server
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
priorityClassName: system-node-critical
priority: 2000001000
hostNetwork: true

View File

@ -3,12 +3,12 @@ kind: Pod
metadata:
name: kube-addon-manager
namespace: kube-system
annotations:
seccomp.security.alpha.kubernetes.io/pod: 'docker/default'
labels:
component: kube-addon-manager
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
runAsUser: {{runAsUser}}
runAsGroup: {{runAsGroup}}
priorityClassName: system-node-critical

View File

@ -4,15 +4,17 @@
"metadata": {
"name":"kube-apiserver",
"namespace": "kube-system",
"annotations": {
"seccomp.security.alpha.kubernetes.io/pod": "docker/default"
},
"labels": {
"tier": "control-plane",
"component": "kube-apiserver"
}
},
"spec":{
"securityContext": {
"seccompProfile": {
"type": "RuntimeDefault"
}
},
"priorityClassName": "system-node-critical",
"priority": 2000001000,
"hostNetwork": true,

View File

@ -4,9 +4,6 @@
"metadata": {
"name":"kube-controller-manager",
"namespace": "kube-system",
"annotations": {
"seccomp.security.alpha.kubernetes.io/pod": "docker/default"
},
"labels": {
"tier": "control-plane",
"component": "kube-controller-manager"
@ -14,6 +11,9 @@
},
"spec":{
"securityContext": {
"seccompProfile": {
"type": "RuntimeDefault"
},
"runAsUser": {{runAsUser}},
"runAsGroup": {{runAsGroup}}
},

View File

@ -4,9 +4,6 @@
"metadata": {
"name":"kube-scheduler",
"namespace": "kube-system",
"annotations": {
"seccomp.security.alpha.kubernetes.io/pod": "docker/default"
},
"labels": {
"tier": "control-plane",
"component": "kube-scheduler"
@ -14,6 +11,9 @@
},
"spec":{
"securityContext": {
"seccompProfile": {
"type": "RuntimeDefault"
},
"runAsUser": {{runAsUser}},
"runAsGroup": {{runAsGroup}}
},