You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy/helm/secret-operator/templates/roles.yaml
+43-4Lines changed: 43 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,40 @@
1
+
{{ if .Capabilities.APIVersions.Has "security.openshift.io/v1" }}
2
+
---
3
+
apiVersion: security.openshift.io/v1
4
+
kind: SecurityContextConstraints
5
+
metadata:
6
+
name: stackable-secret-operator-scc
7
+
annotations:
8
+
kubernetes.io/description: SCC for Stackable secret operator
9
+
allowHostDirVolumePlugin: true
10
+
allowHostIPC: false
11
+
allowHostNetwork: false
12
+
allowHostPID: false
13
+
allowHostPorts: false
14
+
allowPrivilegeEscalation: true
15
+
allowPrivilegedContainer: true # Needed because otherwise we get spec.template.spec.containers[0].volumeMounts.mountPropagation: Forbidden: Bidirectional mount propagation is available only to privileged containers
16
+
allowedCapabilities: null
17
+
defaultAddCapabilities: null
18
+
fsGroup:
19
+
type: RunAsAny
20
+
groups: []
21
+
priority: null
22
+
readOnlyRootFilesystem: false
23
+
requiredDropCapabilities:
24
+
- MKNOD
25
+
runAsUser:
26
+
type: RunAsAny
27
+
seLinuxContext:
28
+
type: MustRunAs
29
+
supplementalGroups:
30
+
type: RunAsAny
31
+
users: []
32
+
volumes:
33
+
- downwardAPI
34
+
- projected
35
+
- hostPath
36
+
- emptyDir
37
+
{{ end }}
1
38
---
2
39
apiVersion: rbac.authorization.k8s.io/v1
3
40
kind: ClusterRole
@@ -67,11 +104,13 @@ rules:
67
104
- podlisteners
68
105
verbs:
69
106
- get
107
+
{{ if .Capabilities.APIVersions.Has "security.openshift.io/v1" }}
0 commit comments