File tree 1 file changed +53
-0
lines changed
1 file changed +53
-0
lines changed Original file line number Diff line number Diff line change @@ -138,3 +138,56 @@ roleRef:
138
138
kind : ClusterRole
139
139
name : csi-gce-pd-resizer-role
140
140
apiGroup : rbac.authorization.k8s.io
141
+
142
+ ---
143
+ apiVersion : policy/v1beta1
144
+ kind : PodSecurityPolicy
145
+ metadata :
146
+ name : csi-gce-pd-node-psp
147
+ spec :
148
+ seLinux :
149
+ rule : RunAsAny
150
+ supplementalGroups :
151
+ rule : RunAsAny
152
+ runAsUser :
153
+ rule : RunAsAny
154
+ fsGroup :
155
+ rule : RunAsAny
156
+ privileged : true
157
+ volumes :
158
+ - ' *'
159
+ hostNetwork : true
160
+ allowedHostPaths :
161
+ - pathPrefix : " /var/lib/kubelet/plugins_registry/"
162
+ - pathPrefix : " /var/lib/kubelet"
163
+ - pathPrefix : " /var/lib/kubelet/plugins/pd.csi.storage.gke.io/"
164
+ - pathPrefix : " /dev"
165
+ - pathPrefix : " /etc/udev"
166
+ - pathPrefix : " /lib/udev"
167
+ - pathPrefix : " /run/udev"
168
+ - pathPrefix : " /sys"
169
+ ---
170
+
171
+ kind : ClusterRole
172
+ apiVersion : rbac.authorization.k8s.io/v1
173
+ metadata :
174
+ name : csi-gce-pd-node-deploy
175
+ rules :
176
+ - apiGroups : ['policy']
177
+ resources : ['podsecuritypolicies']
178
+ verbs : ['use']
179
+ resourceNames :
180
+ - csi-gce-pd-node-psp
181
+ ---
182
+
183
+ apiVersion : rbac.authorization.k8s.io/v1
184
+ kind : ClusterRoleBinding
185
+ metadata :
186
+ name : csi-gce-pd-node
187
+ roleRef :
188
+ apiGroup : rbac.authorization.k8s.io
189
+ kind : ClusterRole
190
+ name : csi-gce-pd-node-deploy
191
+ subjects :
192
+ - kind : ServiceAccount
193
+ name : csi-gce-pd-node-sa
You can’t perform that action at this time.
0 commit comments