Skip to content

Commit

Permalink
fix(helm): use same scc as olm (#749)
Browse files Browse the repository at this point in the history
  • Loading branch information
razvan committed Aug 9, 2024
1 parent 11ca1ef commit eba516d
Showing 1 changed file with 1 addition and 48 deletions.
49 changes: 1 addition & 48 deletions deploy/helm/kafka-operator/templates/roles.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -121,53 +121,6 @@ rules:
- bind
resourceNames:
- {{ include "operator.name" . }}-clusterrole

{{ if .Capabilities.APIVersions.Has "security.openshift.io/v1" }}
---
apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
metadata:
name: kafka-scc
labels:
{{- include "operator.labels" . | nindent 4 }}
annotations:
kubernetes.io/description: |-
This resource is derived from hostmount-anyuid. It provides all the features of the
restricted SCC but allows host mounts and any UID by a pod. This is primarily
used by the persistent volume recycler. WARNING: this SCC allows host file
system access as any UID, including UID 0. Grant with caution.
release.openshift.io/create-only: "true"
allowHostDirVolumePlugin: true
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegeEscalation: true
allowPrivilegedContainer: false
allowedCapabilities: null
defaultAddCapabilities: null
fsGroup:
type: RunAsAny
groups: []
priority: null
readOnlyRootFilesystem: false
runAsUser:
type: RunAsAny
seLinuxContext:
type: MustRunAs
supplementalGroups:
type: RunAsAny
volumes:
- configMap
- downwardAPI
- emptyDir
- hostPath
- nfs
- persistentVolumeClaim
- projected
- secret
- ephemeral
{{ end }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
Expand Down Expand Up @@ -197,7 +150,7 @@ rules:
resources:
- securitycontextconstraints
resourceNames:
- kafka-scc
- nonroot-v2
verbs:
- use
{{ end }}

0 comments on commit eba516d

Please sign in to comment.