Skip to content

Commit 95be5d7

Browse files
synaretemergify[bot]
authored andcommitted
config: OpenShift's SCC for samba
When running over OpenShift cluster, samba pods requires a dedicated SecurityContextConstraints in order to function properly. This SCC is not as powerful as the privileged but it has stronger capabilities then the default one. In particular, with respect to modification to the underlying volume. It is up to the user to deploy this SCC prior to operator's deployment. Either via kustomization.yaml or via explicit command line: $ oc apply -f config/openshift/samba-scc.yaml Signed-off-by: Shachar Sharon <[email protected]>
1 parent ee19c8f commit 95be5d7

File tree

2 files changed

+29
-0
lines changed

2 files changed

+29
-0
lines changed

config/openshift/kustomization.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
resources:
2+
- scc.yaml

config/openshift/scc.yaml

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
apiVersion: security.openshift.io/v1
3+
kind: SecurityContextConstraints
4+
metadata:
5+
annotations:
6+
kubernetes.io/description: samba-scc
7+
name: samba
8+
allowHostDirVolumePlugin: false
9+
allowHostIPC: false
10+
allowHostNetwork: false
11+
allowHostPID: false
12+
allowHostPorts: false
13+
allowPrivilegeEscalation: true
14+
allowPrivilegedContainer: true
15+
defaultAddCapabilities: null
16+
fsGroup:
17+
type: RunAsAny
18+
readOnlyRootFilesystem: false
19+
requiredDropCapabilities: null
20+
runAsUser:
21+
type: RunAsAny
22+
seLinuxContext:
23+
type: RunAsAny
24+
supplementalGroups:
25+
type: RunAsAny
26+
volumes:
27+
- "*"

0 commit comments

Comments
 (0)