Enable Node authorizer and NodeRestriction admission in kubemark
This commit is contained in:
parent
810efa6689
commit
1d9855474d
@ -81,7 +81,7 @@ fi
|
|||||||
ENABLE_GARBAGE_COLLECTOR=${ENABLE_GARBAGE_COLLECTOR:-true}
|
ENABLE_GARBAGE_COLLECTOR=${ENABLE_GARBAGE_COLLECTOR:-true}
|
||||||
USE_REAL_PROXIER=${USE_REAL_PROXIER:-true} # for hollow-proxy
|
USE_REAL_PROXIER=${USE_REAL_PROXIER:-true} # for hollow-proxy
|
||||||
|
|
||||||
CUSTOM_ADMISSION_PLUGINS="${CUSTOM_ADMISSION_PLUGINS:-Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PodPreset,DefaultTolerationSeconds,ResourceQuota}"
|
CUSTOM_ADMISSION_PLUGINS="${CUSTOM_ADMISSION_PLUGINS:-Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PodPreset,DefaultTolerationSeconds,NodeRestriction,ResourceQuota}"
|
||||||
|
|
||||||
KUBELET_TEST_ARGS="--max-pods=100 $TEST_CLUSTER_LOG_LEVEL ${TEST_CLUSTER_API_CONTENT_TYPE}"
|
KUBELET_TEST_ARGS="--max-pods=100 $TEST_CLUSTER_LOG_LEVEL ${TEST_CLUSTER_API_CONTENT_TYPE}"
|
||||||
APISERVER_TEST_ARGS="--runtime-config=extensions/v1beta1 ${API_SERVER_TEST_LOG_LEVEL} ${TEST_CLUSTER_STORAGE_MEDIA_TYPE} ${TEST_CLUSTER_MAX_REQUESTS_INFLIGHT} ${TEST_CLUSTER_DELETE_COLLECTION_WORKERS} --enable-garbage-collector=${ENABLE_GARBAGE_COLLECTOR}"
|
APISERVER_TEST_ARGS="--runtime-config=extensions/v1beta1 ${API_SERVER_TEST_LOG_LEVEL} ${TEST_CLUSTER_STORAGE_MEDIA_TYPE} ${TEST_CLUSTER_MAX_REQUESTS_INFLIGHT} ${TEST_CLUSTER_DELETE_COLLECTION_WORKERS} --enable-garbage-collector=${ENABLE_GARBAGE_COLLECTOR}"
|
||||||
|
@ -0,0 +1,18 @@
|
|||||||
|
# The Kubemark environment currently gives all kubelets a single shared credential.
|
||||||
|
#
|
||||||
|
# TODO: give each kubelet a credential in the system:nodes group with username system:node:<nodeName>,
|
||||||
|
# to exercise the Node authorizer and admission, then remove this binding
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: kubelet-node
|
||||||
|
labels:
|
||||||
|
kubernetes.io/cluster-service: "true"
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: system:node
|
||||||
|
subjects:
|
||||||
|
- apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: User
|
||||||
|
name: kubelet
|
@ -351,7 +351,7 @@ function compute-kube-apiserver-params {
|
|||||||
params+=" --storage-backend=${STORAGE_BACKEND}"
|
params+=" --storage-backend=${STORAGE_BACKEND}"
|
||||||
params+=" --service-cluster-ip-range=${SERVICE_CLUSTER_IP_RANGE}"
|
params+=" --service-cluster-ip-range=${SERVICE_CLUSTER_IP_RANGE}"
|
||||||
params+=" --admission-control=${CUSTOM_ADMISSION_PLUGINS}"
|
params+=" --admission-control=${CUSTOM_ADMISSION_PLUGINS}"
|
||||||
params+=" --authorization-mode=RBAC"
|
params+=" --authorization-mode=Node,RBAC"
|
||||||
echo "${params}"
|
echo "${params}"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user