Skip to content

Commit f16d851

Browse files
sigvblurpy
andauthored
Use the "runtime default" seccomp profile (#3629)
seccomp profiles allow sandboxing processes, in particular to restrict allowed syscalls from applications to the kernel. Kubernetes default in current release is Unconfined seccomp profile, which is essentially privileged. It is preferred for security purposes to restrict this. KEP-2413 proposes that RuntimeDefault will become the new default for Kubernetes. With Kubernetes v1.25, this is in Beta, and available with `SeccompDefault` feature gate and `--seccomp-default` CLI flag. `nginx-ingress` should switch to this new default, in order to ensure compatibility down the line, as well as enable enhanced security on older Kubernetes versions. Co-authored-by: Christian Ihle <[email protected]>
1 parent 388b730 commit f16d851

File tree

6 files changed

+12
-0
lines changed

6 files changed

+12
-0
lines changed

deployments/daemon-set/nginx-ingress.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ spec:
2020
serviceAccountName: nginx-ingress
2121
automountServiceAccountToken: true
2222
securityContext:
23+
seccompProfile:
24+
type: RuntimeDefault
2325
sysctls:
2426
- name: "net.ipv4.ip_unprivileged_port_start"
2527
value: "0"

deployments/daemon-set/nginx-plus-ingress.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ spec:
2020
serviceAccountName: nginx-ingress
2121
automountServiceAccountToken: true
2222
securityContext:
23+
seccompProfile:
24+
type: RuntimeDefault
2325
sysctls:
2426
- name: "net.ipv4.ip_unprivileged_port_start"
2527
value: "0"

deployments/deployment/nginx-ingress.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ spec:
2121
serviceAccountName: nginx-ingress
2222
automountServiceAccountToken: true
2323
securityContext:
24+
seccompProfile:
25+
type: RuntimeDefault
2426
sysctls:
2527
- name: "net.ipv4.ip_unprivileged_port_start"
2628
value: "0"

deployments/deployment/nginx-plus-ingress.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ spec:
2121
serviceAccountName: nginx-ingress
2222
automountServiceAccountToken: true
2323
securityContext:
24+
seccompProfile:
25+
type: RuntimeDefault
2426
sysctls:
2527
- name: "net.ipv4.ip_unprivileged_port_start"
2628
value: "0"

deployments/helm-chart/templates/controller-daemonset.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ spec:
4444
serviceAccountName: {{ include "nginx-ingress.serviceAccountName" . }}
4545
automountServiceAccountToken: true
4646
securityContext:
47+
seccompProfile:
48+
type: RuntimeDefault
4749
sysctls:
4850
- name: "net.ipv4.ip_unprivileged_port_start"
4951
value: "0"

deployments/helm-chart/templates/controller-deployment.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@ spec:
7777
serviceAccountName: {{ include "nginx-ingress.serviceAccountName" . }}
7878
automountServiceAccountToken: true
7979
securityContext:
80+
seccompProfile:
81+
type: RuntimeDefault
8082
sysctls:
8183
- name: "net.ipv4.ip_unprivileged_port_start"
8284
value: "0"

0 commit comments

Comments
 (0)