mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-14 10:53:34 +00:00
rebase: update K8s packages to v0.32.1
Update K8s packages in go.mod to v0.32.1 Signed-off-by: Praveen M <m.praveen@ibm.com>
This commit is contained in:
33
vendor/k8s.io/pod-security-admission/policy/check_sysctls.go
generated
vendored
33
vendor/k8s.io/pod-security-admission/policy/check_sysctls.go
generated
vendored
@ -47,6 +47,8 @@ spec.securityContext.sysctls[*].name
|
||||
'net.ipv4.tcp_fin_timeout'
|
||||
'net.ipv4.tcp_keepalive_intvl'
|
||||
'net.ipv4.tcp_keepalive_probes'
|
||||
'net.ipv4.tcp_rmem'
|
||||
'net.ipv4.tcp_wmem'
|
||||
|
||||
*/
|
||||
|
||||
@ -72,6 +74,10 @@ func CheckSysctls() Check {
|
||||
MinimumVersion: api.MajorMinorVersion(1, 29),
|
||||
CheckPod: sysctlsV1Dot29,
|
||||
},
|
||||
{
|
||||
MinimumVersion: api.MajorMinorVersion(1, 32),
|
||||
CheckPod: sysctlsV1Dot32,
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
@ -84,26 +90,19 @@ var (
|
||||
"net.ipv4.ping_group_range",
|
||||
"net.ipv4.ip_unprivileged_port_start",
|
||||
)
|
||||
sysctlsAllowedV1Dot27 = sets.NewString(
|
||||
"kernel.shm_rmid_forced",
|
||||
"net.ipv4.ip_local_port_range",
|
||||
"net.ipv4.tcp_syncookies",
|
||||
"net.ipv4.ping_group_range",
|
||||
"net.ipv4.ip_unprivileged_port_start",
|
||||
"net.ipv4.ip_local_reserved_ports",
|
||||
)
|
||||
sysctlsAllowedV1Dot29 = sets.NewString(
|
||||
"kernel.shm_rmid_forced",
|
||||
"net.ipv4.ip_local_port_range",
|
||||
"net.ipv4.tcp_syncookies",
|
||||
"net.ipv4.ping_group_range",
|
||||
"net.ipv4.ip_unprivileged_port_start",
|
||||
sysctlsAllowedV1Dot27 = sysctlsAllowedV1Dot0.Union(sets.NewString(
|
||||
"net.ipv4.ip_local_reserved_ports",
|
||||
))
|
||||
sysctlsAllowedV1Dot29 = sysctlsAllowedV1Dot27.Union(sets.NewString(
|
||||
"net.ipv4.tcp_keepalive_time",
|
||||
"net.ipv4.tcp_fin_timeout",
|
||||
"net.ipv4.tcp_keepalive_intvl",
|
||||
"net.ipv4.tcp_keepalive_probes",
|
||||
)
|
||||
))
|
||||
sysctlsAllowedV1Dot32 = sysctlsAllowedV1Dot29.Union(sets.NewString(
|
||||
"net.ipv4.tcp_rmem",
|
||||
"net.ipv4.tcp_wmem",
|
||||
))
|
||||
)
|
||||
|
||||
func sysctlsV1Dot0(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) CheckResult {
|
||||
@ -118,6 +117,10 @@ func sysctlsV1Dot29(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) Che
|
||||
return sysctls(podMetadata, podSpec, sysctlsAllowedV1Dot29)
|
||||
}
|
||||
|
||||
func sysctlsV1Dot32(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec) CheckResult {
|
||||
return sysctls(podMetadata, podSpec, sysctlsAllowedV1Dot32)
|
||||
}
|
||||
|
||||
func sysctls(podMetadata *metav1.ObjectMeta, podSpec *corev1.PodSpec, sysctls_allowed_set sets.String) CheckResult {
|
||||
var forbiddenSysctls []string
|
||||
|
||||
|
Reference in New Issue
Block a user