X-Git-Url: https://gerrit.akraino.org/r/gitweb?p=ta%2Fcaas-security.git;a=blobdiff_plain;f=rbac_manifests%2Fcaas-default-psp.yaml;fp=rbac_manifests%2Fcaas-default-psp.yaml;h=d3d3712c4cc7667f2644e61569fd56fb75d8b469;hp=0000000000000000000000000000000000000000;hb=c177c44e5d4c49eeb51b44487a614b865f8bf002;hpb=f2937b9484f58be8f23ae50500f30ca0f0e16e3b diff --git a/rbac_manifests/caas-default-psp.yaml b/rbac_manifests/caas-default-psp.yaml new file mode 100644 index 0000000..d3d3712 --- /dev/null +++ b/rbac_manifests/caas-default-psp.yaml @@ -0,0 +1,69 @@ +--- +# Copyright 2019 Nokia +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +apiVersion: extensions/v1beta1 +kind: PodSecurityPolicy +metadata: + name: caas-default +spec: + privileged: false + allowPrivilegeEscalation: true + readOnlyRootFilesystem: false + hostIPC: false + hostNetwork: false + hostPID: false + volumes: + - 'configMap' + - 'downwardAPI' + - 'emptyDir' + - 'persistentVolumeClaim' + - 'projected' + - 'secret' + - 'hostPath' + seLinux: + rule: RunAsAny + supplementalGroups: + rule: RunAsAny + runAsUser: + rule: RunAsAny + fsGroup: + rule: RunAsAny +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: caas:default-psp +rules: +- apiGroups: ['extensions'] + resources: ['podsecuritypolicies'] + verbs: ['use'] + resourceNames: ['caas-default'] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:default-psp +roleRef: + kind: ClusterRole + name: caas:default-psp + apiGroup: rbac.authorization.k8s.io +subjects: +# Authorize system:nodes group to be able to create mirror pods +- kind: Group + apiGroup: rbac.authorization.k8s.io + name: system:nodes +- kind: Group + apiGroup: rbac.authorization.k8s.io + name: system:serviceaccounts