privileged.yaml 791 B

12345678910111213141516171819202122232425262728293031323334
  1. apiVersion: policy/v1beta1
  2. kind: PodSecurityPolicy
  3. metadata:
  4. name: gce.privileged
  5. annotations:
  6. kubernetes.io/description: 'privileged allows full unrestricted access to
  7. pod features, as if the PodSecurityPolicy controller was not enabled.'
  8. seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*'
  9. labels:
  10. kubernetes.io/cluster-service: "true"
  11. addonmanager.kubernetes.io/mode: Reconcile
  12. spec:
  13. privileged: true
  14. allowPrivilegeEscalation: true
  15. allowedCapabilities:
  16. - '*'
  17. volumes:
  18. - '*'
  19. hostNetwork: true
  20. hostPorts:
  21. - min: 0
  22. max: 65535
  23. hostIPC: true
  24. hostPID: true
  25. runAsUser:
  26. rule: 'RunAsAny'
  27. seLinux:
  28. rule: 'RunAsAny'
  29. supplementalGroups:
  30. rule: 'RunAsAny'
  31. fsGroup:
  32. rule: 'RunAsAny'
  33. readOnlyRootFilesystem: false