Merge pull request #124117 from aojea/netpol
allow to use kube-network-policies on CI
This commit is contained in:
		
							
								
								
									
										8
									
								
								cluster/addons/kube-network-policies/OWNERS
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								cluster/addons/kube-network-policies/OWNERS
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,8 @@
 | 
			
		||||
# See the OWNERS docs at https://go.k8s.io/owners
 | 
			
		||||
 | 
			
		||||
approvers:
 | 
			
		||||
  - aojea
 | 
			
		||||
  - danwinship
 | 
			
		||||
reviewers:
 | 
			
		||||
  - aojea
 | 
			
		||||
  - danwinship
 | 
			
		||||
@@ -0,0 +1,49 @@
 | 
			
		||||
kind: ClusterRole
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
metadata:
 | 
			
		||||
  name: system:network-policies
 | 
			
		||||
  namespace: kube-system
 | 
			
		||||
  labels:
 | 
			
		||||
    addonmanager.kubernetes.io/mode: Reconcile
 | 
			
		||||
rules:
 | 
			
		||||
  - apiGroups: [""]
 | 
			
		||||
    resources:
 | 
			
		||||
      - pods
 | 
			
		||||
      - nodes
 | 
			
		||||
      - namespaces
 | 
			
		||||
    verbs:
 | 
			
		||||
      - get
 | 
			
		||||
      - watch
 | 
			
		||||
      - list
 | 
			
		||||
  # Watch for changes to Kubernetes NetworkPolicies.
 | 
			
		||||
  - apiGroups: ["networking.k8s.io"]
 | 
			
		||||
    resources:
 | 
			
		||||
      - networkpolicies
 | 
			
		||||
    verbs:
 | 
			
		||||
      - watch
 | 
			
		||||
      - list
 | 
			
		||||
---
 | 
			
		||||
kind: ClusterRoleBinding
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
metadata:
 | 
			
		||||
  name: kube-network-policies
 | 
			
		||||
  labels:
 | 
			
		||||
    addonmanager.kubernetes.io/mode: Reconcile
 | 
			
		||||
roleRef:
 | 
			
		||||
  apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  name: system:network-policies
 | 
			
		||||
subjects:
 | 
			
		||||
- kind: ServiceAccount
 | 
			
		||||
  name: kube-network-policies
 | 
			
		||||
  namespace: kube-system
 | 
			
		||||
---
 | 
			
		||||
apiVersion: v1
 | 
			
		||||
kind: ServiceAccount
 | 
			
		||||
metadata:
 | 
			
		||||
  name: kube-network-policies
 | 
			
		||||
  namespace: kube-system
 | 
			
		||||
  labels:
 | 
			
		||||
    k8s-app: kube-network-policies
 | 
			
		||||
    kubernetes.io/cluster-service: "true"
 | 
			
		||||
    addonmanager.kubernetes.io/mode: Reconcile
 | 
			
		||||
@@ -0,0 +1,54 @@
 | 
			
		||||
---
 | 
			
		||||
apiVersion: apps/v1
 | 
			
		||||
kind: DaemonSet
 | 
			
		||||
metadata:
 | 
			
		||||
  name: kube-network-policies
 | 
			
		||||
  namespace: kube-system
 | 
			
		||||
  labels:
 | 
			
		||||
    tier: node
 | 
			
		||||
    app: kube-network-policies
 | 
			
		||||
    k8s-app: kube-network-policies
 | 
			
		||||
    addonmanager.kubernetes.io/mode: Reconcile
 | 
			
		||||
spec:
 | 
			
		||||
  selector:
 | 
			
		||||
    matchLabels:
 | 
			
		||||
      app: kube-network-policies
 | 
			
		||||
  template:
 | 
			
		||||
    metadata:
 | 
			
		||||
      labels:
 | 
			
		||||
        tier: node
 | 
			
		||||
        app: kube-network-policies
 | 
			
		||||
        k8s-app: kube-network-policies
 | 
			
		||||
    spec:
 | 
			
		||||
      hostNetwork: true
 | 
			
		||||
      tolerations:
 | 
			
		||||
      - operator: Exists
 | 
			
		||||
        effect: NoSchedule
 | 
			
		||||
      serviceAccountName: kube-network-policies
 | 
			
		||||
      containers:
 | 
			
		||||
      - name: kube-network-policies
 | 
			
		||||
        image: registry.k8s.io/networking/kube-network-policies:v0.1.0
 | 
			
		||||
        command:
 | 
			
		||||
        - /bin/sh
 | 
			
		||||
        - -c
 | 
			
		||||
        - /bin/netpol -v 4 1>>/var/log/kube-network-policies.log 2>&1
 | 
			
		||||
        resources:
 | 
			
		||||
          requests:
 | 
			
		||||
            cpu: "100m"
 | 
			
		||||
            memory: "50Mi"
 | 
			
		||||
        securityContext:
 | 
			
		||||
          privileged: true
 | 
			
		||||
        volumeMounts:
 | 
			
		||||
        - mountPath: /var/log
 | 
			
		||||
          name: varlog
 | 
			
		||||
          readOnly: false
 | 
			
		||||
        - mountPath: /lib/modules
 | 
			
		||||
          name: lib-modules
 | 
			
		||||
          readOnly: true
 | 
			
		||||
      volumes:
 | 
			
		||||
      - name: varlog
 | 
			
		||||
        hostPath:
 | 
			
		||||
          path: /var/log
 | 
			
		||||
      - name: lib-modules
 | 
			
		||||
        hostPath:
 | 
			
		||||
          path: /lib/modules
 | 
			
		||||
@@ -2984,6 +2984,9 @@ EOF
 | 
			
		||||
    local -r ds_file="${dst_dir}/calico-policy-controller/calico-node-daemonset.yaml"
 | 
			
		||||
    sed -i -e "s@__CALICO_CNI_DIR__@/home/kubernetes/bin@g" "${ds_file}"
 | 
			
		||||
  fi
 | 
			
		||||
  if [[ "${NETWORK_POLICY_PROVIDER:-}" == "kube-network-policies" ]]; then
 | 
			
		||||
    setup-addon-manifests "addons" "kube-network-policies"
 | 
			
		||||
  fi
 | 
			
		||||
  if [[ "${ENABLE_DEFAULT_STORAGE_CLASS:-}" == "true" ]]; then
 | 
			
		||||
    setup-addon-manifests "addons" "storage-class/gce"
 | 
			
		||||
  fi
 | 
			
		||||
@@ -3249,8 +3252,8 @@ function setup-containerd {
 | 
			
		||||
}
 | 
			
		||||
EOF
 | 
			
		||||
  if [[ "${KUBERNETES_MASTER:-}" != "true" ]]; then
 | 
			
		||||
    if [[ "${NETWORK_POLICY_PROVIDER:-"none"}" != "none" || "${ENABLE_NETD:-}" == "true" ]]; then
 | 
			
		||||
      # Use Kubernetes cni daemonset on node if network policy provider is specified
 | 
			
		||||
    if [[ "${NETWORK_POLICY_PROVIDER:-"none"}" == "calico" || "${ENABLE_NETD:-}" == "true" ]]; then
 | 
			
		||||
      # Use Kubernetes cni daemonset on node if network policy provider calico is specified
 | 
			
		||||
      # or netd is enabled.
 | 
			
		||||
      cni_template_path=""
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -42,7 +42,7 @@ readonly node_ssh_supported_providers="gce gke aws"
 | 
			
		||||
readonly gcloud_supported_providers="gce gke"
 | 
			
		||||
 | 
			
		||||
readonly master_logfiles="kube-apiserver.log kube-apiserver-audit.log kube-scheduler.log kube-controller-manager.log cloud-controller-manager.log etcd.log etcd-events.log glbc.log cluster-autoscaler.log kube-addon-manager.log konnectivity-server.log fluentd.log kubelet.cov"
 | 
			
		||||
readonly node_logfiles="kube-proxy.log containers/konnectivity-agent-*.log fluentd.log node-problem-detector.log kubelet.cov"
 | 
			
		||||
readonly node_logfiles="kube-proxy.log containers/konnectivity-agent-*.log fluentd.log node-problem-detector.log kubelet.cov kube-network-policies.log"
 | 
			
		||||
readonly node_systemd_services="node-problem-detector"
 | 
			
		||||
readonly hollow_node_logfiles="kubelet-hollow-node-*.log kubeproxy-hollow-node-*.log npd-hollow-node-*.log"
 | 
			
		||||
readonly aws_logfiles="cloud-init-output.log"
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user