-
Notifications
You must be signed in to change notification settings - Fork 40k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #24600 from pweil-/psp
Automatic merge from submit-queue PSP admission ```release-note Update PodSecurityPolicy types and add admission controller that could enforce them ``` Still working on removing the non-relevant parts of the tests but I wanted to get this open to start soliciting feedback. - [x] bring PSP up to date with any new features we've added to SCC for discussion - [x] create admission controller that is a pared down version of SCC (no ns based strategies, no user/groups/service account permissioning) - [x] fix tests @liggitt @pmorie - this is the simple implementation requested that assumes all PSPs should be checked for each requests. It is a slimmed down version of our SCC admission controller @erictune @smarterclayton
- Loading branch information
Showing
57 changed files
with
8,426 additions
and
504 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
apiVersion: extensions/v1beta1 | ||
kind: PodSecurityPolicy | ||
metadata: | ||
annotations: | ||
kubernetes.io/description: 'privileged allows access to all privileged and host | ||
features and the ability to run as any user, any group, any fsGroup, and with | ||
any SELinux context.' | ||
creationTimestamp: 2016-05-06T19:28:58Z | ||
name: privileged | ||
spec: | ||
privileged: true | ||
defaultAddCapabilities: null | ||
requiredDropCapabilities: null | ||
allowedCapabilities: null | ||
volumes: | ||
- '*' | ||
hostNetwork: true | ||
hostPorts: | ||
- | ||
min: 0 | ||
max: 65535 | ||
hostIPC: true | ||
hostPID: true | ||
runAsUser: | ||
rule: 'RunAsAny' | ||
seLinux: | ||
rule: 'RunAsAny' | ||
supplementalGroups: | ||
rule: 'RunAsAny' | ||
fsGroup: | ||
rule: 'RunAsAny' | ||
readOnlyRootFilesystem: false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.