diff --git a/manifests/.DS_Store b/manifests/.DS_Store index ea329e1..3e3f3f3 100644 Binary files a/manifests/.DS_Store and b/manifests/.DS_Store differ diff --git a/manifests/scc/scc-restricted--hostpath-rolebinding.yaml b/manifests/scc/scc-restricted--hostpath-rolebinding.yaml new file mode 100644 index 0000000..f4a415a --- /dev/null +++ b/manifests/scc/scc-restricted--hostpath-rolebinding.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: peanutflix-sa-restricted-hostpath +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:openshift:scc:restricted-hostpath +subjects: + - kind: ServiceAccount + name: peanutflix-sa + namespace: peanutflix \ No newline at end of file diff --git a/manifests/scc/scc-restricted-hostpath.yaml b/manifests/scc/scc-restricted-hostpath.yaml new file mode 100644 index 0000000..21cd5b5 --- /dev/null +++ b/manifests/scc/scc-restricted-hostpath.yaml @@ -0,0 +1,38 @@ +apiVersion: security.openshift.io/v1 +kind: SecurityContextConstraints +metadata: + name: restricted-hostpath +allowHostDirVolumePlugin: true # Needed for /dev/dri hostPath +allowHostIPC: false +allowHostNetwork: false +allowHostPID: false +allowHostPorts: false +allowPrivilegeEscalation: false +allowPrivilegedContainer: false +allowedCapabilities: null +defaultAddCapabilities: null +fsGroup: + type: MustRunAs + ranges: + - min: 1000 + max: 2000 +readOnlyRootFilesystem: false +requiredDropCapabilities: + - ALL +runAsUser: + type: MustRunAsRange + uidRangeMin: 1000 + uidRangeMax: 2000 +seLinuxContext: + type: MustRunAs +supplementalGroups: + type: RunAsAny +volumes: + - configMap + - downwardAPI + - emptyDir + - hostPath # This is what distinguishes it from restricted-s6 + - persistentVolumeClaim + - projected + - secret +priority: 6 # Higher than restricted-s6 (5) due to hostPath access \ No newline at end of file