@@ -35,7 +35,7 @@ const createNameSpaceForTeam = async (team) => {
35
35
labels : {
36
36
name : `t-${ team } ` ,
37
37
'pod-security.kubernetes.io/audit' : 'restricted' ,
38
- // 'pod-security.kubernetes.io/enforce': 'baseline',
38
+ 'pod-security.kubernetes.io/enforce' : 'baseline' ,
39
39
} ,
40
40
} ;
41
41
k8sCoreApi . createNamespace ( namedNameSpace ) . catch ( ( error ) => {
@@ -128,7 +128,6 @@ const createK8sDeploymentForTeam = async ({ team, passcodeHash }) => {
128
128
name : 'wrongsecrets' ,
129
129
image : `jeroenwillemsen/wrongsecrets:${ wrongSecretsContainterTag } ` ,
130
130
imagePullPolicy : get ( 'wrongsecrets.imagePullPolicy' ) ,
131
- // resources: get('wrongsecrets.resources'),
132
131
securityContext : {
133
132
allowPrivilegeEscalation : false ,
134
133
readOnlyRootFilesystem : true ,
@@ -1097,13 +1096,10 @@ const createDesktopDeploymentForTeam = async ({ team, passcodeHash }) => {
1097
1096
'ephemeral-storage' : '8Gi' ,
1098
1097
} ,
1099
1098
} ,
1100
- // // resources: get('virtualdesktop.resources'),
1101
1099
securityContext : {
1102
- allowPrivilegeEscalation : true ,
1100
+ allowPrivilegeEscalation : true , //S6 will capture any weird things
1103
1101
readOnlyRootFilesystem : false ,
1104
1102
runAsNonRoot : false ,
1105
- // capabilities: { drop: ['ALL'], add:['CAP_SETGID','CAP_SETUID','CAP_CHOWN'] },
1106
- seccompProfile : { type : 'RuntimeDefault' } ,
1107
1103
} ,
1108
1104
env : [
1109
1105
{
@@ -1151,7 +1147,7 @@ const createDesktopDeploymentForTeam = async ({ team, passcodeHash }) => {
1151
1147
{
1152
1148
emptyDir : {
1153
1149
medium : 'Memory' ,
1154
- sizeLimit : '200Mi ' ,
1150
+ sizeLimit : '160Mi ' ,
1155
1151
} ,
1156
1152
name : 'config-fs' ,
1157
1153
} ,
0 commit comments