text stringlengths 0 59.1k |
|---|
ports: |
- containerPort: 80 |
securityContext: |
privileged: true |
<|endoftext|> |
# source: k8s_examples/_archived/podsecuritypolicy/rbac/bindings.yaml type: yaml |
# privileged-psp-users gives the privileged-psp-user role |
# to the group privileged-psp-users. |
apiVersion: rbac.authorization.k8s.io/v1 |
kind: ClusterRoleBinding |
metadata: |
name: privileged-psp-users |
subjects: |
- kind: Group |
apiGroup: rbac.authorization.k8s.io |
name: privileged-psp-users |
roleRef: |
apiGroup: rbac.authorization.k8s.io |
kind: ClusterRole |
name: privileged-psp-user |
--- |
# restricted-psp-users grants the restricted-psp-user role to |
# the groups restricted-psp-users and privileged-psp-users. |
apiVersion: rbac.authorization.k8s.io/v1 |
kind: ClusterRoleBinding |
metadata: |
name: restricted-psp-users |
subjects: |
- kind: Group |
apiGroup: rbac.authorization.k8s.io |
name: restricted-psp-users |
- kind: Group |
apiGroup: rbac.authorization.k8s.io |
name: privileged-psp-users |
roleRef: |
apiGroup: rbac.authorization.k8s.io |
kind: ClusterRole |
name: restricted-psp-user |
--- |
# edit grants edit role to the groups |
# restricted-psp-users and privileged-psp-users. |
apiVersion: rbac.authorization.k8s.io/v1 |
kind: ClusterRoleBinding |
metadata: |
name: edit |
subjects: |
- kind: Group |
apiGroup: rbac.authorization.k8s.io |
name: privileged-psp-users |
- kind: Group |
apiGroup: rbac.authorization.k8s.io |
name: restricted-psp-users |
roleRef: |
apiGroup: rbac.authorization.k8s.io |
kind: ClusterRole |
name: edit |
<|endoftext|> |
# source: k8s_examples/_archived/podsecuritypolicy/rbac/policies.yaml type: yaml |
apiVersion: policy/v1beta1 |
kind: PodSecurityPolicy |
metadata: |
name: privileged |
spec: |
fsGroup: |
rule: RunAsAny |
privileged: true |
runAsUser: |
rule: RunAsAny |
seLinux: |
rule: RunAsAny |
supplementalGroups: |
rule: RunAsAny |
volumes: |
- '*' |
allowedCapabilities: |
- '*' |
hostPID: true |
hostIPC: true |
hostNetwork: true |
hostPorts: |
- min: 1 |
max: 65536 |
--- |
apiVersion: policy/v1beta1 |
kind: PodSecurityPolicy |
metadata: |
name: restricted |
spec: |
privileged: false |
fsGroup: |
rule: RunAsAny |
runAsUser: |
rule: MustRunAsNonRoot |
seLinux: |
rule: RunAsAny |
supplementalGroups: |
rule: RunAsAny |
volumes: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.