mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 10:33:35 +00:00
vendor files
This commit is contained in:
1
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/README.md
generated
vendored
Normal file
1
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/README.md
generated
vendored
Normal file
@ -0,0 +1 @@
|
||||
This file has moved to [https://github.com/kubernetes/examples/blob/master/staging/podsecuritypolicy/rbac/README.md](https://github.com/kubernetes/examples/blob/master/staging/podsecuritypolicy/rbac/README.md)
|
50
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/bindings.yaml
generated
vendored
Normal file
50
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/bindings.yaml
generated
vendored
Normal file
@ -0,0 +1,50 @@
|
||||
# privileged-psp-users gives the privileged-psp-user role
|
||||
# to the group privileged-psp-users.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: privileged-psp-users
|
||||
subjects:
|
||||
- kind: Group
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
name: privileged-psp-users
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: privileged-psp-user
|
||||
---
|
||||
# restricted-psp-users grants the restricted-psp-user role to
|
||||
# the groups restricted-psp-users and privileged-psp-users.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: restricted-psp-users
|
||||
subjects:
|
||||
- kind: Group
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
name: restricted-psp-users
|
||||
- kind: Group
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
name: privileged-psp-users
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: restricted-psp-user
|
||||
---
|
||||
# edit grants edit role to the groups
|
||||
# restricted-psp-users and privileged-psp-users.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: edit
|
||||
subjects:
|
||||
- kind: Group
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
name: privileged-psp-users
|
||||
- kind: Group
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
name: restricted-psp-users
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: edit
|
12
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/pod.yaml
generated
vendored
Normal file
12
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/pod.yaml
generated
vendored
Normal file
@ -0,0 +1,12 @@
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
name: nginx
|
||||
labels:
|
||||
name: nginx
|
||||
spec:
|
||||
containers:
|
||||
- name: nginx
|
||||
image: nginx
|
||||
ports:
|
||||
- containerPort: 80
|
14
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/pod_priv.yaml
generated
vendored
Normal file
14
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/pod_priv.yaml
generated
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
name: nginx
|
||||
labels:
|
||||
name: nginx
|
||||
spec:
|
||||
containers:
|
||||
- name: nginx
|
||||
image: nginx
|
||||
ports:
|
||||
- containerPort: 80
|
||||
securityContext:
|
||||
privileged: true
|
49
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/policies.yaml
generated
vendored
Normal file
49
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/policies.yaml
generated
vendored
Normal file
@ -0,0 +1,49 @@
|
||||
apiVersion: extensions/v1beta1
|
||||
kind: PodSecurityPolicy
|
||||
metadata:
|
||||
name: privileged
|
||||
spec:
|
||||
fsGroup:
|
||||
rule: RunAsAny
|
||||
privileged: true
|
||||
runAsUser:
|
||||
rule: RunAsAny
|
||||
seLinux:
|
||||
rule: RunAsAny
|
||||
supplementalGroups:
|
||||
rule: RunAsAny
|
||||
volumes:
|
||||
- '*'
|
||||
allowedCapabilities:
|
||||
- '*'
|
||||
hostPID: true
|
||||
hostIPC: true
|
||||
hostNetwork: true
|
||||
hostPorts:
|
||||
- min: 1
|
||||
max: 65536
|
||||
---
|
||||
apiVersion: extensions/v1beta1
|
||||
kind: PodSecurityPolicy
|
||||
metadata:
|
||||
name: restricted
|
||||
spec:
|
||||
privileged: false
|
||||
fsGroup:
|
||||
rule: RunAsAny
|
||||
runAsUser:
|
||||
rule: MustRunAsNonRoot
|
||||
seLinux:
|
||||
rule: RunAsAny
|
||||
supplementalGroups:
|
||||
rule: RunAsAny
|
||||
volumes:
|
||||
- 'emptyDir'
|
||||
- 'secret'
|
||||
- 'downwardAPI'
|
||||
- 'configMap'
|
||||
- 'persistentVolumeClaim'
|
||||
- 'projected'
|
||||
hostPID: false
|
||||
hostIPC: false
|
||||
hostNetwork: false
|
31
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/roles.yaml
generated
vendored
Normal file
31
vendor/k8s.io/kubernetes/examples/podsecuritypolicy/rbac/roles.yaml
generated
vendored
Normal file
@ -0,0 +1,31 @@
|
||||
# restricted-psp-user grants access to use the restricted PSP.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: restricted-psp-user
|
||||
rules:
|
||||
- apiGroups:
|
||||
- extensions
|
||||
resources:
|
||||
- podsecuritypolicies
|
||||
resourceNames:
|
||||
- restricted
|
||||
verbs:
|
||||
- use
|
||||
---
|
||||
# privileged-psp-user grants access to use the privileged PSP.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: privileged-psp-user
|
||||
rules:
|
||||
- apiGroups:
|
||||
- extensions
|
||||
resources:
|
||||
- podsecuritypolicies
|
||||
resourceNames:
|
||||
- privileged
|
||||
verbs:
|
||||
- use
|
||||
|
||||
|
Reference in New Issue
Block a user