Skip to content

Commit

Permalink
:sparkling: adding comment one the scaffolds to warn users about the …
Browse files Browse the repository at this point in the history
…seccomp spec field usage
  • Loading branch information
Camila Macedo committed Jun 13, 2022
1 parent eea565c commit f942dc8
Show file tree
Hide file tree
Showing 8 changed files with 56 additions and 12 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -72,8 +72,14 @@ spec:
spec:
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
# TODO(user): For common cases that do not require escalating privileges
# it is recommended to ensure that all your Pods/Containers are restrictive.
# More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
# Please uncomment the following code if you are NOT looking
# for to built projects which must work on old Kubernetes versions < 1.19 or
# on vendors versions which are NOT supporting this field by default (i.e. Openshift < 4.11 ).
# seccompProfile:
# type: RuntimeDefault
containers:
- command:
- /manager
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,10 @@ spec:
spec:
securityContext:
runAsNonRoot: true
# Note: Do no use the seccompProfile if you are looking for
# to support old Kubernetes versions < 1.19 or distribute
# your solutions on vendors versions which are not supporting
# it like Openshift versions < 4.11.
seccompProfile:
type: RuntimeDefault
containers:
Expand Down
10 changes: 8 additions & 2 deletions testdata/project-v3-addon/config/manager/manager.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,14 @@ spec:
spec:
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
# TODO(user): For common cases that do not require escalating privileges
# it is recommended to ensure that all your Pods/Containers are restrictive.
# More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
# Please uncomment the following code if you are NOT looking
# for to built projects which must work on old Kubernetes versions < 1.19 or
# on vendors versions which are NOT supporting this field by default (i.e. Openshift < 4.11 ).
# seccompProfile:
# type: RuntimeDefault
containers:
- command:
- /manager
Expand Down
10 changes: 8 additions & 2 deletions testdata/project-v3-config/config/manager/manager.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,14 @@ spec:
spec:
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
# TODO(user): For common cases that do not require escalating privileges
# it is recommended to ensure that all your Pods/Containers are restrictive.
# More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
# Please uncomment the following code if you are NOT looking
# for to built projects which must work on old Kubernetes versions < 1.19 or
# on vendors versions which are NOT supporting this field by default (i.e. Openshift < 4.11 ).
# seccompProfile:
# type: RuntimeDefault
containers:
- command:
- /manager
Expand Down
10 changes: 8 additions & 2 deletions testdata/project-v3-multigroup/config/manager/manager.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,14 @@ spec:
spec:
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
# TODO(user): For common cases that do not require escalating privileges
# it is recommended to ensure that all your Pods/Containers are restrictive.
# More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
# Please uncomment the following code if you are NOT looking
# for to built projects which must work on old Kubernetes versions < 1.19 or
# on vendors versions which are NOT supporting this field by default (i.e. Openshift < 4.11 ).
# seccompProfile:
# type: RuntimeDefault
containers:
- command:
- /manager
Expand Down
10 changes: 8 additions & 2 deletions testdata/project-v3-v1beta1/config/manager/manager.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,14 @@ spec:
spec:
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
# TODO(user): For common cases that do not require escalating privileges
# it is recommended to ensure that all your Pods/Containers are restrictive.
# More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
# Please uncomment the following code if you are NOT looking
# for to built projects which must work on old Kubernetes versions < 1.19 or
# on vendors versions which are NOT supporting this field by default (i.e. Openshift < 4.11 ).
# seccompProfile:
# type: RuntimeDefault
containers:
- command:
- /manager
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,10 @@ spec:
spec:
securityContext:
runAsNonRoot: true
# Note: Do no use the seccompProfile if you are looking for
# to support old Kubernetes versions < 1.19 or distribute
# your solutions on vendors versions which are not supporting
# it like Openshift versions < 4.11.
seccompProfile:
type: RuntimeDefault
containers:
Expand Down
10 changes: 8 additions & 2 deletions testdata/project-v3/config/manager/manager.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,14 @@ spec:
spec:
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
# TODO(user): For common cases that do not require escalating privileges
# it is recommended to ensure that all your Pods/Containers are restrictive.
# More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
# Please uncomment the following code if you are NOT looking
# for to built projects which must work on old Kubernetes versions < 1.19 or
# on vendors versions which are NOT supporting this field by default (i.e. Openshift < 4.11 ).
# seccompProfile:
# type: RuntimeDefault
containers:
- command:
- /manager
Expand Down

0 comments on commit f942dc8

Please sign in to comment.