48e77cd8bb
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by: Bogdan Dobrelya <bogdando@mail.ru>
22 lines
748 B
YAML
22 lines
748 B
YAML
---
|
|
- name: Master | get kube user ID
|
|
shell: /usr/bin/id -u {{ kubelet_user }} || echo 0
|
|
register: kube_uid
|
|
|
|
- name: Master | get kube group ID
|
|
shell: /usr/bin/getent group {{ kubelet_group }} | cut -d':' -f3 || echo 0
|
|
register: kube_gid
|
|
|
|
- name: Master | get kube cert group ID
|
|
shell: /usr/bin/getent group {{ kube_cert_group }} | cut -d':' -f3 || echo 0
|
|
register: kube_cert_gid
|
|
|
|
- name: Master | get etcd cert group ID
|
|
shell: /usr/bin/getent group {{ etcd_cert_group }} | cut -d':' -f3 || echo 0
|
|
register: etcd_cert_gid
|
|
|
|
- set_fact:
|
|
kubelet_user_id: "{{ kube_uid.stdout }}"
|
|
kubelet_group_id: "{{ kube_gid.stdout }}"
|
|
kube_cert_group_id: "{{ kube_cert_gid.stdout }}"
|
|
etcd_cert_group_id: "{{ etcd_cert_gid.stdout }}"
|