ingress-nginx-helm/docs/examples/psp/psp.yaml

76 lines
1.4 KiB
YAML
Raw Normal View History

2019-07-29 12:05:36 +00:00
apiVersion: v1
kind: Namespace
metadata:
name: ingress-nginx
---
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: ingress-nginx
2020-08-11 15:21:48 +00:00
namespace: ingress-nginx
2019-07-29 12:05:36 +00:00
spec:
allowedCapabilities:
2020-08-11 15:21:48 +00:00
- NET_BIND_SERVICE
privileged: false
2019-07-29 12:05:36 +00:00
allowPrivilegeEscalation: true
2020-08-11 15:21:48 +00:00
# Allow core volume types.
volumes:
- configMap
- secret
2019-07-29 12:05:36 +00:00
hostIPC: false
hostPID: false
runAsUser:
2020-08-11 15:21:48 +00:00
# Require the container to run without root privileges.
rule: MustRunAsNonRoot
2019-07-29 12:05:36 +00:00
supplementalGroups:
2020-08-11 15:21:48 +00:00
rule: MustRunAs
2019-07-29 12:05:36 +00:00
ranges:
2020-08-11 15:21:48 +00:00
# Forbid adding the root group.
- min: 1
max: 65535
fsGroup:
rule: MustRunAs
ranges:
# Forbid adding the root group.
- min: 1
max: 65535
readOnlyRootFilesystem: false
seLinux:
rule: RunAsAny
2019-07-29 12:05:36 +00:00
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: ingress-nginx-psp
namespace: ingress-nginx
rules:
2020-08-11 15:21:48 +00:00
- apiGroups: [policy]
resources: [podsecuritypolicies]
verbs: [use]
resourceNames: [ingress-nginx]
2019-07-29 12:05:36 +00:00
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: ingress-nginx-psp
namespace: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: ingress-nginx-psp
subjects:
- kind: ServiceAccount
name: default
- kind: ServiceAccount
2020-08-11 15:21:48 +00:00
name: ingress-nginx
namespace: ingress-nginx
- kind: ServiceAccount
name: ingress-nginx-admission
namespace: ingress-nginx