@@ -34,7 +34,8 @@ const createNameSpaceForTeam = async (team) => {
34
34
} ,
35
35
labels : {
36
36
name : `t-${ team } ` ,
37
- 'pod-security.kubernetes.io/enforce' : 'restricted' ,
37
+ 'pod-security.kubernetes.io/audit' : 'restricted' ,
38
+ 'pod-security.kubernetes.io/enforce' : 'baseline' ,
38
39
} ,
39
40
} ;
40
41
k8sCoreApi . createNamespace ( namedNameSpace ) . catch ( ( error ) => {
@@ -1073,11 +1074,11 @@ const createDesktopDeploymentForTeam = async ({ team, passcodeHash }) => {
1073
1074
} ,
1074
1075
spec : {
1075
1076
serviceAccountName : 'webtop-sa' ,
1076
- securityContext : {
1077
- runAsUser : 1000 ,
1078
- runAsGroup : 1000 ,
1079
- fsGroup : 1000 ,
1080
- } ,
1077
+ // securityContext: {
1078
+ // runAsUser: 1000,
1079
+ // runAsGroup: 1000,
1080
+ // fsGroup: 1000,
1081
+ // },
1081
1082
containers : [
1082
1083
{
1083
1084
name : 'virtualdesktop' ,
@@ -1098,10 +1099,10 @@ const createDesktopDeploymentForTeam = async ({ team, passcodeHash }) => {
1098
1099
} ,
1099
1100
// resources: get('virtualdesktop.resources'),
1100
1101
securityContext : {
1101
- allowPrivilegeEscalation : false ,
1102
- readOnlyRootFilesystem : true ,
1103
- runAsNonRoot : true ,
1104
- capabilities : { drop : [ 'ALL' ] } ,
1102
+ allowPrivilegeEscalation : true ,
1103
+ readOnlyRootFilesystem : false ,
1104
+ runAsNonRoot : false ,
1105
+ capabilities : { drop : [ 'ALL' ] , add : [ 'CAP_SETGID' , 'CAP_SETUID' , 'CAP_CHOWN' ] } ,
1105
1106
seccompProfile : { type : 'RuntimeDefault' } ,
1106
1107
} ,
1107
1108
env : [ ...get ( 'virtualdesktop.env' , [ ] ) ] ,
@@ -1140,7 +1141,7 @@ const createDesktopDeploymentForTeam = async ({ team, passcodeHash }) => {
1140
1141
{
1141
1142
emptyDir : {
1142
1143
medium : 'Memory' ,
1143
- sizeLimit : '128Mi ' ,
1144
+ sizeLimit : '200Mi ' ,
1144
1145
} ,
1145
1146
name : 'config-fs' ,
1146
1147
} ,
0 commit comments