-
Notifications
You must be signed in to change notification settings - Fork 28
/
riverbed-operator-permissions-openshift.yaml
74 lines (72 loc) · 1.92 KB
/
riverbed-operator-permissions-openshift.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
# riverbed-operator-permissions-openshift.yaml
# version: 240624 - Riverbed Community Toolkit
#
# Configure permissions for the riverbed-operator to run a RedHat OpenShift cluster
#
# Usage:
#
# oc apply -f riverbed-operator-permissions-openshift.yaml
#
# or
#
# kubectl apply -f riverbed-operator-permissions-openshift.yaml
---
apiVersion: v1
kind: Namespace
metadata:
labels:
app.kubernetes.io/component: manager
app.kubernetes.io/created-by: riverbed-operator
app.kubernetes.io/instance: system
app.kubernetes.io/managed-by: kustomize
app.kubernetes.io/name: namespace
app.kubernetes.io/part-of: riverbed-operator
control-plane: controller-manager
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/enforce-version: latest
name: riverbed-operator
---
apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
metadata:
annotations:
include.release.openshift.io/ibm-cloud-managed: "true"
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
kubernetes.io/description: 'privileged = root'
release.openshift.io/create-only: "true"
generation: 1
name: privileged-observability
allowHostDirVolumePlugin: true
allowHostIPC: true
allowHostNetwork: true
allowHostPID: true
allowHostPorts: true
allowPrivilegeEscalation: true
allowPrivilegedContainer: true
allowedCapabilities:
- '*'
allowedUnsafeSysctls:
- '*'
defaultAddCapabilities: null
fsGroup:
type: RunAsAny
groups:
- system:cluster-admins
- system:nodes
- system:masters
priority: null
readOnlyRootFilesystem: false
requiredDropCapabilities: null
runAsUser:
type: RunAsAny
seLinuxContext:
type: RunAsAny
seccompProfiles:
- '*'
supplementalGroups:
type: RunAsAny
volumes:
- '*'
users:
- system:serviceaccount:riverbed-operator:riverbed-apm-agent