48e77cd8bb
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by: Bogdan Dobrelya <bogdando@mail.ru>
68 lines
2.4 KiB
Django/Jinja
68 lines
2.4 KiB
Django/Jinja
apiVersion: extensions/v1beta1
|
|
kind: ReplicaSet
|
|
metadata:
|
|
name: calico-policy-controller
|
|
namespace: {{ system_namespace }}
|
|
labels:
|
|
k8s-app: calico-policy
|
|
kubernetes.io/cluster-service: "true"
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
kubernetes.io/cluster-service: "true"
|
|
k8s-app: calico-policy
|
|
template:
|
|
metadata:
|
|
name: calico-policy-controller
|
|
namespace: {{system_namespace}}
|
|
labels:
|
|
kubernetes.io/cluster-service: "true"
|
|
k8s-app: calico-policy
|
|
spec:
|
|
hostNetwork: true
|
|
containers:
|
|
- name: calico-policy-controller
|
|
image: {{ calico_policy_image_repo }}:{{ calico_policy_image_tag }}
|
|
imagePullPolicy: {{ k8s_image_pull_policy }}
|
|
securityContext:
|
|
capabilities:
|
|
drop:
|
|
{% for c in apps_drop_cap %}
|
|
- {{ c.upper() }}
|
|
{% endfor %}
|
|
resources:
|
|
limits:
|
|
cpu: {{ calico_policy_controller_cpu_limit }}
|
|
memory: {{ calico_policy_controller_memory_limit }}
|
|
requests:
|
|
cpu: {{ calico_policy_controller_cpu_requests }}
|
|
memory: {{ calico_policy_controller_memory_requests }}
|
|
env:
|
|
- name: ETCD_ENDPOINTS
|
|
value: "{{ etcd_access_endpoint }}"
|
|
- name: ETCD_CA_CERT_FILE
|
|
value: "{{ calico_cert_dir }}/ca_cert.crt"
|
|
- name: ETCD_CERT_FILE
|
|
value: "{{ calico_cert_dir }}/cert.crt"
|
|
- name: ETCD_KEY_FILE
|
|
value: "{{ calico_cert_dir }}/key.pem"
|
|
# Location of the Kubernetes API - this shouldn't need to be
|
|
# changed so long as it is used in conjunction with
|
|
# CONFIGURE_ETC_HOSTS="true".
|
|
- name: K8S_API
|
|
value: "https://kubernetes.default:443"
|
|
# Configure /etc/hosts within the container to resolve
|
|
# the kubernetes.default Service to the correct clusterIP
|
|
# using the environment provided by the kubelet.
|
|
# This removes the need for KubeDNS to resolve the Service.
|
|
- name: CONFIGURE_ETC_HOSTS
|
|
value: "true"
|
|
volumeMounts:
|
|
- mountPath: {{ calico_cert_dir }}
|
|
name: etcd-certs
|
|
readOnly: true
|
|
volumes:
|
|
- hostPath:
|
|
path: {{ calico_cert_dir }}
|
|
name: etcd-certs
|