blob: 9e99f5c764662645f31b598b51fc79a06cc12bfd [file] [log] [blame]
Giorgi Lekveishvilid1234c12023-06-19 10:37:06 +04001{{- if .Values.global.podSecurityPolicy.enabled }}
2apiVersion: policy/v1beta1
3kind: PodSecurityPolicy
4metadata:
5 name: {{ template "cert-manager.fullname" . }}
6 labels:
7 app: {{ include "cert-manager.name" . }}
8 app.kubernetes.io/name: {{ include "cert-manager.name" . }}
9 app.kubernetes.io/instance: {{ .Release.Name }}
10 app.kubernetes.io/component: "controller"
11 {{- include "labels" . | nindent 4 }}
12 annotations:
13 seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default'
14 seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
15 {{- if .Values.global.podSecurityPolicy.useAppArmor }}
16 apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
17 apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
18 {{- end }}
19spec:
20 privileged: false
21 allowPrivilegeEscalation: false
22 allowedCapabilities: [] # default set of capabilities are implicitly allowed
23 volumes:
24 - 'configMap'
25 - 'emptyDir'
26 - 'projected'
27 - 'secret'
28 - 'downwardAPI'
29 hostNetwork: false
30 hostIPC: false
31 hostPID: false
32 runAsUser:
33 rule: 'MustRunAs'
34 ranges:
35 - min: 1000
36 max: 1000
37 seLinux:
38 rule: 'RunAsAny'
39 supplementalGroups:
40 rule: 'MustRunAs'
41 ranges:
42 - min: 1000
43 max: 1000
44 fsGroup:
45 rule: 'MustRunAs'
46 ranges:
47 - min: 1000
48 max: 1000
49{{- end }}