diff --git a/manifests/scc/.DS_Store b/manifests/scc/.DS_Store index f17f369..5b39829 100644 Binary files a/manifests/scc/.DS_Store and b/manifests/scc/.DS_Store differ diff --git a/manifests/scc/scc-restricted--hostpath-rolebinding-privesc.yaml b/manifests/scc/scc-restricted--hostpath-rolebinding-privesc.yaml new file mode 100644 index 0000000..f4a415a --- /dev/null +++ b/manifests/scc/scc-restricted--hostpath-rolebinding-privesc.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: peanutflix-sa-restricted-hostpath +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:openshift:scc:restricted-hostpath +subjects: + - kind: ServiceAccount + name: peanutflix-sa + namespace: peanutflix \ No newline at end of file diff --git a/manifests/scc/scc-restricted--hostpath-rolebinding.yaml b/manifests/scc/scc-restricted--hostpath-rolebinding.yaml index f4a415a..ca89865 100644 --- a/manifests/scc/scc-restricted--hostpath-rolebinding.yaml +++ b/manifests/scc/scc-restricted--hostpath-rolebinding.yaml @@ -1,11 +1,11 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - name: peanutflix-sa-restricted-hostpath + name: peanutflix-sa-restricted-hostpath-privesc roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: system:openshift:scc:restricted-hostpath + name: system:openshift:scc:restricted-hostpath-privesc subjects: - kind: ServiceAccount name: peanutflix-sa diff --git a/manifests/scc/scc-restricted-hostpath-privesc.yaml b/manifests/scc/scc-restricted-hostpath-privesc.yaml new file mode 100644 index 0000000..18ecb76 --- /dev/null +++ b/manifests/scc/scc-restricted-hostpath-privesc.yaml @@ -0,0 +1,38 @@ +apiVersion: security.openshift.io/v1 +kind: SecurityContextConstraints +metadata: + name: restricted-hostpath-privesc +allowHostDirVolumePlugin: true # Needed for /dev/dri hostPath +allowHostIPC: false +allowHostNetwork: false +allowHostPID: false +allowHostPorts: false +allowPrivilegeEscalation: true +allowPrivilegedContainer: false +allowedCapabilities: null +defaultAddCapabilities: null +fsGroup: + type: MustRunAs + ranges: + - min: 1000 + max: 2000 +readOnlyRootFilesystem: false +requiredDropCapabilities: + - ALL +runAsUser: + type: MustRunAsRange + uidRangeMin: 1000 + uidRangeMax: 2000 +seLinuxContext: + type: MustRunAs +supplementalGroups: + type: RunAsAny +volumes: + - configMap + - downwardAPI + - emptyDir + - hostPath # This is what distinguishes it from restricted-s6 + - persistentVolumeClaim + - projected + - secret +priority: 6 # Higher than restricted-s6 (5) due to hostPath access \ No newline at end of file