File tree Expand file tree Collapse file tree 16 files changed +120
-64
lines changed
pkg/plugins/common/kustomize
v1/scaffolds/internal/templates/config
v2/scaffolds/internal/templates/config
project-v3-multigroup/config
project-v3-v1beta1/config
project-v3-with-kustomize-v2/config Expand file tree Collapse file tree 16 files changed +120
-64
lines changed Original file line number Diff line number Diff line change 57
57
- name: kube-rbac-proxy
58
58
securityContext:
59
59
allowPrivilegeEscalation: false
60
- capabilities:
61
- drop:
62
- - ALL
60
+ # TODO(user): uncomment for common cases that do not require escalating privileges
61
+ # capabilities:
62
+ # drop:
63
+ # - "ALL"
63
64
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.11.0
64
65
args:
65
66
- "--secure-listen-address=0.0.0.0:8443"
Original file line number Diff line number Diff line change 72
72
spec:
73
73
securityContext:
74
74
runAsNonRoot: true
75
- seccompProfile:
76
- type: RuntimeDefault
75
+ # TODO(user): For common cases that do not require escalating privileges
76
+ # it is recommended to ensure that all your Pods/Containers are restrictive.
77
+ # More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
78
+ # Please uncomment the following code if your project does NOT have to work on old Kubernetes
79
+ # versions < 1.19 or on vendors versions which do NOT support this field by default (i.e. Openshift < 4.11 ).
80
+ # seccompProfile:
81
+ # type: RuntimeDefault
77
82
containers:
78
83
- command:
79
84
- /manager
85
90
name: manager
86
91
securityContext:
87
92
allowPrivilegeEscalation: false
88
- capabilities:
89
- drop:
90
- - ALL
93
+ # TODO(user): uncomment for common cases that do not require escalating privileges
94
+ # capabilities:
95
+ # drop:
96
+ # - "ALL"
91
97
livenessProbe:
92
98
httpGet:
93
99
path: /healthz
Original file line number Diff line number Diff line change 57
57
- name: kube-rbac-proxy
58
58
securityContext:
59
59
allowPrivilegeEscalation: false
60
- capabilities:
61
- drop:
62
- - ALL
60
+ # TODO(user): uncomment for common cases that do not require escalating privileges
61
+ # capabilities:
62
+ # drop:
63
+ # - "ALL"
63
64
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.11.0
64
65
args:
65
66
- "--secure-listen-address=0.0.0.0:8443"
Original file line number Diff line number Diff line change 72
72
spec:
73
73
securityContext:
74
74
runAsNonRoot: true
75
- seccompProfile:
76
- type: RuntimeDefault
75
+ # TODO(user): For common cases that do not require escalating privileges
76
+ # it is recommended to ensure that all your Pods/Containers are restrictive.
77
+ # More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
78
+ # Please uncomment the following code if your project does NOT have to work on old Kubernetes
79
+ # versions < 1.19 or on vendors versions which do NOT support this field by default (i.e. Openshift < 4.11 ).
80
+ # seccompProfile:
81
+ # type: RuntimeDefault
77
82
containers:
78
83
- command:
79
84
- /manager
85
90
name: manager
86
91
securityContext:
87
92
allowPrivilegeEscalation: false
88
- capabilities:
89
- drop:
90
- - ALL
93
+ # TODO(user): uncomment for common cases that do not require escalating privileges
94
+ # capabilities:
95
+ # drop:
96
+ # - "ALL"
91
97
livenessProbe:
92
98
httpGet:
93
99
path: /healthz
Original file line number Diff line number Diff line change 12
12
- name : kube-rbac-proxy
13
13
securityContext :
14
14
allowPrivilegeEscalation : false
15
- capabilities :
16
- drop :
17
- - ALL
15
+ # TODO(user): uncomment for common cases that do not require escalating privileges
16
+ # capabilities:
17
+ # drop:
18
+ # - "ALL"
18
19
image : gcr.io/kubebuilder/kube-rbac-proxy:v0.11.0
19
20
args :
20
21
- " --secure-listen-address=0.0.0.0:8443"
Original file line number Diff line number Diff line change 26
26
spec :
27
27
securityContext :
28
28
runAsNonRoot : true
29
- seccompProfile :
30
- type : RuntimeDefault
29
+ # TODO(user): For common cases that do not require escalating privileges
30
+ # it is recommended to ensure that all your Pods/Containers are restrictive.
31
+ # More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
32
+ # Please uncomment the following code if your project does NOT have to work on old Kubernetes
33
+ # versions < 1.19 or on vendors versions which do NOT support this field by default (i.e. Openshift < 4.11 ).
34
+ # seccompProfile:
35
+ # type: RuntimeDefault
31
36
containers :
32
37
- command :
33
38
- /manager
37
42
name : manager
38
43
securityContext :
39
44
allowPrivilegeEscalation : false
40
- capabilities :
41
- drop :
42
- - ALL
45
+ # TODO(user): uncomment for common cases that do not require escalating privileges
46
+ # capabilities:
47
+ # drop:
48
+ # - "ALL"
43
49
livenessProbe :
44
50
httpGet :
45
51
path : /healthz
Original file line number Diff line number Diff line change 12
12
- name : kube-rbac-proxy
13
13
securityContext :
14
14
allowPrivilegeEscalation : false
15
- capabilities :
16
- drop :
17
- - ALL
15
+ # TODO(user): uncomment for common cases that do not require escalating privileges
16
+ # capabilities:
17
+ # drop:
18
+ # - "ALL"
18
19
image : gcr.io/kubebuilder/kube-rbac-proxy:v0.11.0
19
20
args :
20
21
- " --secure-listen-address=0.0.0.0:8443"
Original file line number Diff line number Diff line change @@ -26,18 +26,24 @@ spec:
26
26
spec :
27
27
securityContext :
28
28
runAsNonRoot : true
29
- seccompProfile :
30
- type : RuntimeDefault
29
+ # TODO(user): For common cases that do not require escalating privileges
30
+ # it is recommended to ensure that all your Pods/Containers are restrictive.
31
+ # More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
32
+ # Please uncomment the following code if your project does NOT have to work on old Kubernetes
33
+ # versions < 1.19 or on vendors versions which do NOT support this field by default (i.e. Openshift < 4.11 ).
34
+ # seccompProfile:
35
+ # type: RuntimeDefault
31
36
containers :
32
37
- command :
33
38
- /manager
34
39
image : controller:latest
35
40
name : manager
36
41
securityContext :
37
42
allowPrivilegeEscalation : false
38
- capabilities :
39
- drop :
40
- - ALL
43
+ # TODO(user): uncomment for common cases that do not require escalating privileges
44
+ # capabilities:
45
+ # drop:
46
+ # - "ALL"
41
47
livenessProbe :
42
48
httpGet :
43
49
path : /healthz
Original file line number Diff line number Diff line change 12
12
- name : kube-rbac-proxy
13
13
securityContext :
14
14
allowPrivilegeEscalation : false
15
- capabilities :
16
- drop :
17
- - ALL
15
+ # TODO(user): uncomment for common cases that do not require escalating privileges
16
+ # capabilities:
17
+ # drop:
18
+ # - "ALL"
18
19
image : gcr.io/kubebuilder/kube-rbac-proxy:v0.11.0
19
20
args :
20
21
- " --secure-listen-address=0.0.0.0:8443"
Original file line number Diff line number Diff line change 26
26
spec :
27
27
securityContext :
28
28
runAsNonRoot : true
29
- seccompProfile :
30
- type : RuntimeDefault
29
+ # TODO(user): For common cases that do not require escalating privileges
30
+ # it is recommended to ensure that all your Pods/Containers are restrictive.
31
+ # More info: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
32
+ # Please uncomment the following code if your project does NOT have to work on old Kubernetes
33
+ # versions < 1.19 or on vendors versions which do NOT support this field by default (i.e. Openshift < 4.11 ).
34
+ # seccompProfile:
35
+ # type: RuntimeDefault
31
36
containers :
32
37
- command :
33
38
- /manager
37
42
name : manager
38
43
securityContext :
39
44
allowPrivilegeEscalation : false
40
- capabilities :
41
- drop :
42
- - ALL
45
+ # TODO(user): uncomment for common cases that do not require escalating privileges
46
+ # capabilities:
47
+ # drop:
48
+ # - "ALL"
43
49
livenessProbe :
44
50
httpGet :
45
51
path : /healthz
You can’t perform that action at this time.
0 commit comments