summaryrefslogtreecommitdiffstats
path: root/roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml
diff options
context:
space:
mode:
authorScott Dodson <sdodson@redhat.com>2018-02-05 14:31:47 -0500
committerScott Dodson <sdodson@redhat.com>2018-02-05 15:09:07 -0500
commit5402ff05c7f5695bbe60cb6966e57a038c4fe1c0 (patch)
tree5dfc6f4d0df5bd4d455a09efd1f3914bf76cf9d6 /roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml
parent90f577883066f7213afca2a1159c69cabece57dc (diff)
downloadopenshift-5402ff05c7f5695bbe60cb6966e57a038c4fe1c0.tar.gz
openshift-5402ff05c7f5695bbe60cb6966e57a038c4fe1c0.tar.bz2
openshift-5402ff05c7f5695bbe60cb6966e57a038c4fe1c0.tar.xz
openshift-5402ff05c7f5695bbe60cb6966e57a038c4fe1c0.zip
Initial support for 3.10
Diffstat (limited to 'roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml')
-rw-r--r--roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml38
1 files changed, 38 insertions, 0 deletions
diff --git a/roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml b/roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml
new file mode 100644
index 000000000..d2ece9298
--- /dev/null
+++ b/roles/openshift_examples/files/examples/v3.10/cfme-templates/cfme-scc-sysadmin.yaml
@@ -0,0 +1,38 @@
+allowHostDirVolumePlugin: false
+allowHostIPC: false
+allowHostNetwork: false
+allowHostPID: false
+allowHostPorts: false
+allowPrivilegedContainer: false
+allowedCapabilities:
+apiVersion: v1
+defaultAddCapabilities:
+- SYS_ADMIN
+fsGroup:
+ type: RunAsAny
+groups:
+- system:cluster-admins
+kind: SecurityContextConstraints
+metadata:
+ annotations:
+ kubernetes.io/description: cfme-sysadmin provides all features of the anyuid SCC but allows users to have SYS_ADMIN capabilities. This is the required scc for Pods requiring to run with systemd and the message bus.
+ creationTimestamp:
+ name: cfme-sysadmin
+priority: 10
+readOnlyRootFilesystem: false
+requiredDropCapabilities:
+- MKNOD
+- SYS_CHROOT
+runAsUser:
+ type: RunAsAny
+seLinuxContext:
+ type: MustRunAs
+supplementalGroups:
+ type: RunAsAny
+users:
+volumes:
+- configMap
+- downwardAPI
+- emptyDir
+- persistentVolumeClaim
+- secret