@@ -6,20 +6,16 @@ metadata:
6
6
# Optional: Allow the default AppArmor profile, requires setting the default.
7
7
apparmor.security.beta.kubernetes.io/allowedProfileNames : ' runtime/default'
8
8
apparmor.security.beta.kubernetes.io/defaultProfileName : ' runtime/default'
9
- # Optional: Allow the default seccomp profile, requires setting the default.
10
- seccomp.security.alpha.kubernetes.io/allowedProfileNames : ' docker/default,runtime/default,unconfined'
11
- seccomp.security.alpha.kubernetes.io/defaultProfileName : ' unconfined'
9
+ seccomp.security.alpha.kubernetes.io/allowedProfileNames : ' *'
12
10
spec :
13
11
privileged : false
14
- # The moby default capability set, defined here:
15
- # https://github.com/moby/moby/blob/0a5cec2833f82a6ad797d70acbf9cbbaf8956017/oci/caps/defaults.go#L6-L19
12
+ # The moby default capability set, minus NET_RAW
16
13
allowedCapabilities :
17
14
- ' CHOWN'
18
15
- ' DAC_OVERRIDE'
19
16
- ' FSETID'
20
17
- ' FOWNER'
21
18
- ' MKNOD'
22
- - ' NET_RAW'
23
19
- ' SETGID'
24
20
- ' SETUID'
25
21
- ' SETFCAP'
@@ -36,15 +32,16 @@ spec:
36
32
- ' projected'
37
33
- ' secret'
38
34
- ' downwardAPI'
39
- # Assume that persistentVolumes set up by the cluster admin are safe to use.
35
+ # Assume that ephemeral CSI drivers & persistentVolumes set up by the cluster admin are safe to use.
36
+ - ' csi'
40
37
- ' persistentVolumeClaim'
38
+ - ' ephemeral'
41
39
# Allow all other non-hostpath volume types.
42
40
- ' awsElasticBlockStore'
43
41
- ' azureDisk'
44
42
- ' azureFile'
45
43
- ' cephFS'
46
44
- ' cinder'
47
- - ' csi'
48
45
- ' fc'
49
46
- ' flexVolume'
50
47
- ' flocker'
67
64
runAsUser :
68
65
rule : ' RunAsAny'
69
66
seLinux :
67
+ # This policy assumes the nodes are using AppArmor rather than SELinux.
68
+ # The PSP SELinux API cannot express the SELinux Pod Security Standards,
69
+ # so if using SELinux, you must choose a more restrictive default.
70
70
rule : ' RunAsAny'
71
71
supplementalGroups :
72
72
rule : ' RunAsAny'
0 commit comments