Skip to content

Commit 29a1b65

Browse files
upgrade to latest dependencies (#398)
bumping knative.dev/eventing 0fe923c...0fe923c: bumping knative.dev/serving 6e597fa...d108ba9: > d108ba9 Allow setting seccompProfile to enable using restricted security profile (# 13401) > 388128b Run queue proxy with restricted profile (# 13376) Signed-off-by: Knative Automation <[email protected]> Signed-off-by: Knative Automation <[email protected]>
1 parent 3b4c4a5 commit 29a1b65

File tree

4 files changed

+13
-8
lines changed

4 files changed

+13
-8
lines changed

go.mod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ require (
1313
k8s.io/api v0.25.2
1414
k8s.io/apimachinery v0.25.2
1515
k8s.io/client-go v0.25.2
16-
knative.dev/eventing v0.34.1-0.20221018032010-0fe923cd8a5b
16+
knative.dev/eventing v0.35.0
1717
knative.dev/hack v0.0.0-20221010154335-3fdc50b9c24a
1818
knative.dev/pkg v0.0.0-20221011175852-714b7630a836
19-
knative.dev/serving v0.34.1-0.20221017223110-6e597fa7fd73
19+
knative.dev/serving v0.34.1-0.20221018131616-d108ba9b28c0
2020
)
2121

2222
require (

go.sum

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -973,16 +973,16 @@ k8s.io/kube-openapi v0.0.0-20220803162953-67bda5d908f1 h1:MQ8BAZPZlWk3S9K4a9NCkI
973973
k8s.io/kube-openapi v0.0.0-20220803162953-67bda5d908f1/go.mod h1:C/N6wCaBHeBHkHUesQOQy2/MZqGgMAFPqGsGQLdbZBU=
974974
k8s.io/utils v0.0.0-20220728103510-ee6ede2d64ed h1:jAne/RjBTyawwAy0utX5eqigAwz/lQhTmy+Hr/Cpue4=
975975
k8s.io/utils v0.0.0-20220728103510-ee6ede2d64ed/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
976-
knative.dev/eventing v0.34.1-0.20221018032010-0fe923cd8a5b h1:fgr/yRUg7nHSP0GM4eVO9eRDNV129SrSL3NfPojL6KE=
977-
knative.dev/eventing v0.34.1-0.20221018032010-0fe923cd8a5b/go.mod h1:MEqB5frQ5jQ2/A+WHpDU2VNLXum+4o7TiMhTdCvji9w=
976+
knative.dev/eventing v0.35.0 h1:0sn4Fc0OajdEf4s+0SucwzAIGvO3LZA/BZHsSwfjHes=
977+
knative.dev/eventing v0.35.0/go.mod h1:MEqB5frQ5jQ2/A+WHpDU2VNLXum+4o7TiMhTdCvji9w=
978978
knative.dev/hack v0.0.0-20221010154335-3fdc50b9c24a h1:yfq1OMrkyYkxDeM0pmAOeN4YF16R/WG0C+VvLBeq4uc=
979979
knative.dev/hack v0.0.0-20221010154335-3fdc50b9c24a/go.mod h1:yk2OjGDsbEnQjfxdm0/HJKS2WqTLEFg/N6nUs6Rqx3Q=
980980
knative.dev/networking v0.0.0-20221012062251-58f3e6239b4f h1:e/08+ofUjGjSYV2Usvb22IbkX4MjoiywbRtnXUK3FQY=
981981
knative.dev/networking v0.0.0-20221012062251-58f3e6239b4f/go.mod h1:GciicKYf4aWE138pT2ZKkZ/E10rd0Kt4ziX52A/HnVY=
982982
knative.dev/pkg v0.0.0-20221011175852-714b7630a836 h1:0N7Zo/O+xeUUebJPm9keBaGclrUoEbljr3J1MsqtaIM=
983983
knative.dev/pkg v0.0.0-20221011175852-714b7630a836/go.mod h1:DMTRDJ5WRxf/DrlOPzohzfhSuJggscLZ8EavOq9O/x8=
984-
knative.dev/serving v0.34.1-0.20221017223110-6e597fa7fd73 h1:8Z/YcMlmtXaIoB1Z7eG2Ek/WzN+742byNCHY7ygrVMI=
985-
knative.dev/serving v0.34.1-0.20221017223110-6e597fa7fd73/go.mod h1:eKvzlUmOFunHbVqkP5kmrNKSsjpo9TrYjWk/TK/4eGA=
984+
knative.dev/serving v0.34.1-0.20221018131616-d108ba9b28c0 h1:vLJuyV7sOMlUHnxbs+OOJr6MI5xEBwvWOPHm7AGzpAs=
985+
knative.dev/serving v0.34.1-0.20221018131616-d108ba9b28c0/go.mod h1:eKvzlUmOFunHbVqkP5kmrNKSsjpo9TrYjWk/TK/4eGA=
986986
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
987987
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
988988
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=

vendor/knative.dev/serving/pkg/apis/serving/fieldmask.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -600,12 +600,14 @@ func PodSecurityContextMask(ctx context.Context, in *corev1.PodSecurityContext)
600600
out.RunAsNonRoot = in.RunAsNonRoot
601601
out.FSGroup = in.FSGroup
602602
out.SupplementalGroups = in.SupplementalGroups
603+
out.SeccompProfile = in.SeccompProfile
603604

604605
// Disallowed
605606
// This list is unnecessary, but added here for clarity
606607
out.SELinuxOptions = nil
607608
out.WindowsOptions = nil
608609
out.Sysctls = nil
610+
out.FSGroupChangePolicy = nil
609611

610612
return out
611613
}
@@ -631,6 +633,9 @@ func SecurityContextMask(ctx context.Context, in *corev1.SecurityContext) *corev
631633
// AllowPrivilegeEscalation when unset can behave the same way as true
632634
// We do want the ability for folks to set this value to false
633635
out.AllowPrivilegeEscalation = in.AllowPrivilegeEscalation
636+
// SeccompProfile defaults to "unconstrained", but the safe values are
637+
// "RuntimeDefault" or "Localhost" (with localhost path set)
638+
out.SeccompProfile = in.SeccompProfile
634639

635640
// Disallowed
636641
// This list is unnecessary, but added here for clarity

vendor/modules.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1029,7 +1029,7 @@ k8s.io/utils/net
10291029
k8s.io/utils/pointer
10301030
k8s.io/utils/strings/slices
10311031
k8s.io/utils/trace
1032-
# knative.dev/eventing v0.34.1-0.20221018032010-0fe923cd8a5b
1032+
# knative.dev/eventing v0.35.0
10331033
## explicit; go 1.18
10341034
knative.dev/eventing/pkg/adapter/v2
10351035
knative.dev/eventing/pkg/adapter/v2/util/crstatusevent
@@ -1150,7 +1150,7 @@ knative.dev/pkg/tracker
11501150
knative.dev/pkg/version
11511151
knative.dev/pkg/webhook
11521152
knative.dev/pkg/webhook/certificates/resources
1153-
# knative.dev/serving v0.34.1-0.20221017223110-6e597fa7fd73
1153+
# knative.dev/serving v0.34.1-0.20221018131616-d108ba9b28c0
11541154
## explicit; go 1.18
11551155
knative.dev/serving/pkg/apis/autoscaling
11561156
knative.dev/serving/pkg/apis/autoscaling/v1alpha1

0 commit comments

Comments
 (0)