diff options
author | Tim Bielawa <tbielawa@redhat.com> | 2017-09-15 17:18:22 -0400 |
---|---|---|
committer | Tim Bielawa <tbielawa@redhat.com> | 2017-10-04 10:48:30 -0400 |
commit | 8e10c53974b4b87e483ed0dfec3946383aa071c7 (patch) | |
tree | 9d1cf76f6e563f9b47fd4f6c6b8bfaa0316ca884 /roles/openshift_cfme/files/templates/cloudforms/cfme-scc-sysadmin.yaml | |
parent | 42d330a1cf2990fee39dab36250524ebfb303428 (diff) | |
download | openshift-8e10c53974b4b87e483ed0dfec3946383aa071c7.tar.gz openshift-8e10c53974b4b87e483ed0dfec3946383aa071c7.tar.bz2 openshift-8e10c53974b4b87e483ed0dfec3946383aa071c7.tar.xz openshift-8e10c53974b4b87e483ed0dfec3946383aa071c7.zip |
Import upstream templates. Do the work. Validate parameters.
Diffstat (limited to 'roles/openshift_cfme/files/templates/cloudforms/cfme-scc-sysadmin.yaml')
-rw-r--r-- | roles/openshift_cfme/files/templates/cloudforms/cfme-scc-sysadmin.yaml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/roles/openshift_cfme/files/templates/cloudforms/cfme-scc-sysadmin.yaml b/roles/openshift_cfme/files/templates/cloudforms/cfme-scc-sysadmin.yaml new file mode 100644 index 000000000..d2ece9298 --- /dev/null +++ b/roles/openshift_cfme/files/templates/cloudforms/cfme-scc-sysadmin.yaml @@ -0,0 +1,38 @@ +allowHostDirVolumePlugin: false +allowHostIPC: false +allowHostNetwork: false +allowHostPID: false +allowHostPorts: false +allowPrivilegedContainer: false +allowedCapabilities: +apiVersion: v1 +defaultAddCapabilities: +- SYS_ADMIN +fsGroup: + type: RunAsAny +groups: +- system:cluster-admins +kind: SecurityContextConstraints +metadata: + annotations: + kubernetes.io/description: cfme-sysadmin provides all features of the anyuid SCC but allows users to have SYS_ADMIN capabilities. This is the required scc for Pods requiring to run with systemd and the message bus. + creationTimestamp: + name: cfme-sysadmin +priority: 10 +readOnlyRootFilesystem: false +requiredDropCapabilities: +- MKNOD +- SYS_CHROOT +runAsUser: + type: RunAsAny +seLinuxContext: + type: MustRunAs +supplementalGroups: + type: RunAsAny +users: +volumes: +- configMap +- downwardAPI +- emptyDir +- persistentVolumeClaim +- secret |