Skip to content

Commit ca8eb40

Browse files
committed
security: Add qatlib rbac yaml to use custom SCC
for IPC_LOCK and running container as root. refer to #132 Signed-off-by: vbedida79 <veenadhari.bedida@intel.com>
1 parent f9cd06e commit ca8eb40

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed

security/qatlib_rbac.yaml

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
# Copyright (c) 2023 Intel Corporation
2+
# SPDX-License-Identifier: Apache-2.0
3+
---
4+
apiVersion: v1
5+
kind: ServiceAccount
6+
metadata:
7+
name: intel-qat
8+
namespace: intel-qat
9+
---
10+
apiVersion: rbac.authorization.k8s.io/v1
11+
kind: Role
12+
metadata:
13+
name: intel-qat
14+
namespace: intel-qat
15+
rules:
16+
- apiGroups:
17+
- security.openshift.io
18+
resources:
19+
- securitycontextconstraints
20+
resourceNames:
21+
- intel-qat-scc
22+
verbs:
23+
- use
24+
---
25+
apiVersion: rbac.authorization.k8s.io/v1
26+
kind: RoleBinding
27+
metadata:
28+
name: intel-qat
29+
roleRef:
30+
apiGroup: rbac.authorization.k8s.io
31+
kind: Role
32+
name: intel-qat
33+
subjects:
34+
- kind: ServiceAccount
35+
name: intel-qat
36+
namespace: intel-qat

0 commit comments

Comments
 (0)