rbac.yaml 960 B

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. ---
  2. apiVersion: policy/v1beta1
  3. kind: PodSecurityPolicy
  4. metadata:
  5. name: jitsi-privileged
  6. spec:
  7. allowPrivilegeEscalation: true
  8. fsGroup:
  9. rule: RunAsAny
  10. hostIPC: false
  11. hostNetwork: true
  12. hostPID: true
  13. hostPorts:
  14. - max: 65535
  15. min: 0
  16. privileged: true
  17. runAsUser:
  18. rule: RunAsAny
  19. seLinux:
  20. rule: RunAsAny
  21. supplementalGroups:
  22. rule: RunAsAny
  23. volumes:
  24. - configMap
  25. - downwardAPI
  26. - emptyDir
  27. - persistentVolumeClaim
  28. - projected
  29. - secret
  30. ---
  31. apiVersion: rbac.authorization.k8s.io/v1
  32. kind: Role
  33. metadata:
  34. name: jitsi-privileged
  35. namespace: jitsi
  36. rules:
  37. - apiGroups:
  38. - policy
  39. resources:
  40. - podsecuritypolicies
  41. resourceNames:
  42. - jitsi-privileged
  43. verbs:
  44. - use
  45. ---
  46. apiVersion: rbac.authorization.k8s.io/v1
  47. kind: RoleBinding
  48. metadata:
  49. name: jitsi-privileged
  50. namespace: jitsi
  51. roleRef:
  52. apiGroup: rbac.authorization.k8s.io
  53. kind: Role
  54. name: jitsi-privileged
  55. subjects:
  56. - kind: ServiceAccount
  57. name: jitsi