Skip to content

Commit 1ca5336

Browse files
committed
Security: Adding intel-qat-scc for Intel QAT based workload
This user-defined SCC is based on the OCP predefined restricted-v2 SCC https://docs.openshift.com/container-platform/4.12/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth The IPC_LOCK capability and RunAsAny permission are added to the restricted-v2 SCC for intel-qat-scc This patch is used to fix #122 Signed-off-by: vbedida79 <veenadhari.bedida@intel.com>
1 parent f9cd06e commit 1ca5336

File tree

1 file changed

+42
-0
lines changed

1 file changed

+42
-0
lines changed

security/qatlib_scc.yaml

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
# Copyright (c) 2023 Intel Corporation
2+
# SPDX-License-Identifier: Apache-2.0
3+
4+
apiVersion: security.openshift.io/v1
5+
allowHostDirVolumePlugin: false
6+
allowHostIPC: false
7+
allowHostNetwork: false
8+
allowHostPID: false
9+
allowHostPorts: false
10+
allowPrivilegeEscalation: false
11+
allowPrivilegedContainer: false
12+
allowedCapabilities:
13+
- IPC_LOCK
14+
defaultAddCapabilities: null
15+
fsGroup:
16+
type: MustRunAs
17+
groups: []
18+
kind: SecurityContextConstraints
19+
metadata:
20+
annotations:
21+
kubernetes.io/description: 'SCC for Intel QAT based workload'
22+
name: intel-qat-scc
23+
priority: null
24+
readOnlyRootFilesystem: false
25+
requiredDropCapabilities:
26+
- ALL
27+
runAsUser:
28+
type: RunAsAny
29+
seLinuxContext:
30+
type: MustRunAs
31+
supplementalGroups:
32+
type: RunAsAny
33+
seccompProfiles:
34+
- runtime/default
35+
volumes:
36+
- configMap
37+
- downwardAPI
38+
- emptyDir
39+
- ephemeral
40+
- persistentVolumeClaim
41+
- projected
42+
- secret

0 commit comments

Comments
 (0)