fix(vault): add priority to SCC to ensure correct application
This commit is contained in:
27
01-claude-ocp/vault-rbac.yaml
Normal file
27
01-claude-ocp/vault-rbac.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: vault-restricted-scc-role
|
||||
rules:
|
||||
- apiGroups:
|
||||
- security.openshift.io
|
||||
resources:
|
||||
- securitycontextconstraints
|
||||
resourceNames:
|
||||
- vault-restricted
|
||||
verbs:
|
||||
- use
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: vault-restricted-scc-binding
|
||||
namespace: vault
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: vault-restricted-scc-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: vault
|
||||
namespace: vault
|
||||
25
01-claude-ocp/vault-scc.yaml
Normal file
25
01-claude-ocp/vault-scc.yaml
Normal file
@@ -0,0 +1,25 @@
|
||||
kind: SecurityContextConstraints
|
||||
apiVersion: security.openshift.io/v1
|
||||
metadata:
|
||||
name: vault-restricted
|
||||
priority: 20
|
||||
allowPrivilegedContainer: false
|
||||
allowHostDirVolumePlugin: false
|
||||
allowHostIPC: false
|
||||
allowHostNetwork: false
|
||||
allowHostPID: false
|
||||
allowHostPorts: false
|
||||
runAsUser:
|
||||
type: MustRunAs
|
||||
uid: 100
|
||||
seLinuxContext:
|
||||
type: MustRunAs
|
||||
fsGroup:
|
||||
type: MustRunAs
|
||||
supplementalGroups:
|
||||
type: RunAsAny
|
||||
defaultAddCapabilities: []
|
||||
requiredDropCapabilities:
|
||||
- ALL
|
||||
users: []
|
||||
groups: []
|
||||
Reference in New Issue
Block a user