Skip to content

Commit

Permalink
security: Added qatlib scc yaml
Browse files Browse the repository at this point in the history
Resolves intel#122
qatlib scc for IPC_LOCK in security/
qatlib needs to run as root
SCC based on OCP default restricted-v2 SCC, with root permissions
Used for intel#117

Signed-off-by: vbedida79 <veenadhari.bedida@intel.com>
  • Loading branch information
vbedida79 committed Sep 13, 2023
1 parent 2deb078 commit eff9a88
Showing 1 changed file with 42 additions and 0 deletions.
42 changes: 42 additions & 0 deletions security/qatlib_scc.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
# Copyright (c) 2023 Intel Corporation
# SPDX-License-Identifier: Apache-2.0

apiVersion: security.openshift.io/v1
allowHostDirVolumePlugin: false
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegeEscalation: false
allowPrivilegedContainer: false
allowedCapabilities:
- IPC_LOCK
defaultAddCapabilities: null
fsGroup:
type: MustRunAs
groups: []
kind: SecurityContextConstraints
metadata:
annotations:
kubernetes.io/description: 'SCC to use IPC_LOCK capability for qatlib pod'
name: intel-qat-scc
priority: null
readOnlyRootFilesystem: false
requiredDropCapabilities:
- ALL
runAsUser:
type: RunAsAny
seLinuxContext:
type: MustRunAs
supplementalGroups:
type: RunAsAny
seccompProfiles:
- runtime/default
volumes:
- configMap
- downwardAPI
- emptyDir
- ephemeral
- persistentVolumeClaim
- projected
- secret

0 comments on commit eff9a88

Please sign in to comment.