add more settings in k8s yaml to prevent privileges escalation
change image repo url from m7r9p7b3 to aws-application-networking-k8s
change to replicas: 2 in config/manager/manager.yaml
Test
Verify privileges escalation related changes:
Do make build-deploy and kubectl apply -f deploy.yaml
In one of my EKS worker node, check the controller pods info by sudo ctr -n k8s.io containers info <aws-gateway-controller container id>
After changing to replicas: 2 in config/manager/manager.yaml and did kubectl apply -f deploy.yaml
kubectl get pods -A
NAMESPACE NAME READY STATUS RESTARTS AGE
aws-application-networking-system gateway-api-controller-55d9d6db66-f9wz5 2/2 Running 0 14m
aws-application-networking-system gateway-api-controller-55d9d6db66-z9jhm 2/2 Running 0 14m
Changes
m7r9p7b3
toaws-application-networking-k8s
config/manager/manager.yaml
Test
make build-deploy
andkubectl apply -f deploy.yaml
In one of my EKS worker node, check the controller pods info bysudo ctr -n k8s.io containers info <aws-gateway-controller container id>
For the old one it has:
And for the new container info, it changed to:
Change url from
m7r9p7b3
toaws-application-networking-k8s
it still can download controller image success, they are equivalent https://gallery.ecr.aws/aws-application-networking-k8s/aws-gateway-controller https://gallery.ecr.aws/m7r9p7b3/aws-gateway-controllerAfter changing to replicas: 2 in
config/manager/manager.yaml
and didkubectl apply -f deploy.yaml
For one controller pod:
For another controller pod:
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.