diff --git a/01-claude-ocp/vault-rbac.yaml b/01-claude-ocp/vault-rbac.yaml new file mode 100644 index 0000000..842bff3 --- /dev/null +++ b/01-claude-ocp/vault-rbac.yaml @@ -0,0 +1,27 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: vault-restricted-scc-role +rules: +- apiGroups: + - security.openshift.io + resources: + - securitycontextconstraints + resourceNames: + - vault-restricted + verbs: + - use +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: vault-restricted-scc-binding + namespace: vault +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: vault-restricted-scc-role +subjects: +- kind: ServiceAccount + name: vault + namespace: vault diff --git a/01-claude-ocp/vault-scc.yaml b/01-claude-ocp/vault-scc.yaml new file mode 100644 index 0000000..838adf9 --- /dev/null +++ b/01-claude-ocp/vault-scc.yaml @@ -0,0 +1,25 @@ +kind: SecurityContextConstraints +apiVersion: security.openshift.io/v1 +metadata: + name: vault-restricted +priority: 20 +allowPrivilegedContainer: false +allowHostDirVolumePlugin: false +allowHostIPC: false +allowHostNetwork: false +allowHostPID: false +allowHostPorts: false +runAsUser: + type: MustRunAs + uid: 100 +seLinuxContext: + type: MustRunAs +fsGroup: + type: MustRunAs +supplementalGroups: + type: RunAsAny +defaultAddCapabilities: [] +requiredDropCapabilities: +- ALL +users: [] +groups: []