-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
Currently, the Envoy process of the Cilium Proxy doesn't have the capabilities to bind to privileged ports. Even if the respective capabilities would be configured in the Pods SecurityContext, the `cilium-envoy-starter` would drop all capabilities before starting the Envoy process. This commit adds support for binding to privileged ports by introducing a new Helm value `envoy.securityContext.capabilities.keepCapNetBindService` (`bool` - defaults to `false`). If set to `true`, the `cilium-envoy-starter` keeps the capability `NET_BIND_SERVICE` when starting the Envoy process. This way, it's possible to bind to privileged ports. Note: It's still required to add the capability `NET_BIND_SERVICE` to the respective container * daemonset mode: `envoy.securityContext.capabilities.envoy` * embedded mode: `securityContext.capabilities.ciliumAgent` Signed-off-by: Marco Hofstetter <marco.hofstetter@isovalent.com>
- Loading branch information
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1984,6 +1984,9 @@ | |
] | ||
}, | ||
"type": "array" | ||
}, | ||
"keepCapNetBindService": { | ||
"type": "boolean" | ||
} | ||
}, | ||
"type": "object" | ||
|
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.