File tree Expand file tree Collapse file tree 4 files changed +20
-1
lines changed
helm/wrongsecrets-ctf-party/templates/wrongsecrets-balancer Expand file tree Collapse file tree 4 files changed +20
-1
lines changed Original file line number Diff line number Diff line change @@ -42,6 +42,10 @@ echo "do helm eks application"
42
42
helm repo add eks https://aws.github.io/eks-charts
43
43
helm repo update
44
44
45
+ LOAD_BALANCER_CONTROLLER_ROLE_ARN=" $( terraform output -raw load_balancer_controller_role_arn) "
46
+ kubectl create serviceaccount -n kube-system aws-load-balancer-controller
47
+ kubectl annotate serviceaccount -n kube-system --overwrite aws-load-balancer-controller eks.amazonaws.com/role-arn=${LOAD_BALANCER_CONTROLLER_ROLE_ARN}
48
+
45
49
echo " upgrade alb controller with helm"
46
50
helm upgrade -i aws-load-balancer-controller \
47
51
eks/aws-load-balancer-controller \
Original file line number Diff line number Diff line change @@ -3,5 +3,6 @@ kind: Namespace
3
3
metadata :
4
4
name : default
5
5
labels :
6
- pod-security.kubernetes.io/enforce : restricted
6
+ pod-security.kubernetes.io/audit : restricted
7
+ # pod-security.kubernetes.io/enforce: baseline
7
8
kubernetes.io/metadata.name : default
Original file line number Diff line number Diff line change @@ -54,6 +54,16 @@ output "cluster_autoscaler_role_arn" {
54
54
value = module. cluster_autoscaler_irsa_role . iam_role_arn
55
55
}
56
56
57
+ output "load_balancer_controller_role" {
58
+ description = " Load balancer controller role"
59
+ value = module. load_balancer_controller_irsa_role . iam_role_name
60
+ }
61
+
62
+ output "load_balancer_controller_role_arn" {
63
+ description = " Load balancer controller role arn"
64
+ value = module. load_balancer_controller_irsa_role . iam_role_arn
65
+ }
66
+
57
67
output "state_bucket_name" {
58
68
description = " Terraform s3 state bucket name"
59
69
value = split (" :" , var. state_bucket_arn )[length (split (" :" , var. state_bucket_arn )) - 1 ]
Original file line number Diff line number Diff line change 23
23
runAsUser : 1000
24
24
runAsGroup : 3000
25
25
fsGroup : 2000
26
+ seccompProfile :
27
+ type : RuntimeDefault
26
28
serviceAccountName : wrongsecrets-balancer
27
29
containers :
28
30
- name : {{ .Chart.Name }}
96
98
add :
97
99
- CAP_NET_ADMIN
98
100
- CAP_NET_BIND_SERVICE
101
+ seccompProfile :
102
+ type : RuntimeDefault
99
103
volumeMounts :
100
104
- name : config-volume
101
105
mountPath : /home/app/config/
You can’t perform that action at this time.
0 commit comments