{{- if .Values.global.cattle.psp.enabled }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: {{ include "prom2teams.fullname" . }}-psp-{{ include "prom2teams.namespace" . }} labels: {{ include "prom2teams.labels" . | nindent 4 }} spec: privileged: false allowPrivilegeEscalation: false hostNetwork: false hostIPC: false hostPID: false runAsUser: rule: 'MustRunAsNonRoot' seLinux: rule: 'RunAsAny' supplementalGroups: rule: 'MustRunAs' ranges: - min: 1 max: 65535 fsGroup: rule: 'MustRunAs' ranges: - min: 1 max: 65535 readOnlyRootFilesystem: false volumes: - 'configMap' - 'secret' --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ include "prom2teams.fullname" . }}-psp namespace: {{ include "prom2teams.namespace" . }} labels: {{ include "prom2teams.labels" . | nindent 4 }} rules: - apiGroups: - policy resourceNames: - {{ include "prom2teams.fullname" . }}-psp-{{ include "prom2teams.namespace" . }} resources: - podsecuritypolicies verbs: - use --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ include "prom2teams.fullname" . }}-psp namespace: {{ include "prom2teams.namespace" . }} labels: {{ include "prom2teams.labels" . | nindent 4 }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ include "prom2teams.fullname" . }}-psp subjects: - kind: ServiceAccount name: {{ include "prom2teams.fullname" . }} {{- end }}