@@ -23,6 +23,8 @@ metadata:
23
23
labels :
24
24
app : {{ template "openmatch.name" . }}
25
25
release : {{ .Release.Name }}
26
+ pod-security.kubernetes.io/enforce : baseline
27
+ pod-security.kubernetes.io/warn : baseline
26
28
{{- end }}
27
29
---
28
30
# Create a universal service account for open-match-core services.
@@ -39,79 +41,4 @@ metadata:
39
41
release : {{ .Release.Name }}
40
42
automountServiceAccountToken : true
41
43
---
42
- kind : Role
43
- apiVersion : rbac.authorization.k8s.io/v1
44
- metadata :
45
- name : {{ include "openmatch.fullname" . }}-service-role
46
- namespace : {{ .Release.Namespace }}
47
- annotations : {{- include "openmatch.chartmeta" . | nindent 4 }}
48
- labels :
49
- app : {{ template "openmatch.name" . }}
50
- release : {{ .Release.Name }}
51
- rules :
52
- - apiGroups :
53
- - extensions
54
- resources :
55
- - podsecuritypolicies
56
- resourceNames :
57
- - {{ include "openmatch.fullname" . }}-core-podsecuritypolicy
58
- verbs :
59
- - use
60
- ---
61
- kind : RoleBinding
62
- apiVersion : rbac.authorization.k8s.io/v1
63
- metadata :
64
- name : {{ include "openmatch.fullname" . }}-service-role-binding
65
- namespace : {{ .Release.Namespace }}
66
- annotations : {{- include "openmatch.chartmeta" . | nindent 4 }}
67
- labels :
68
- app : {{ template "openmatch.name" . }}
69
- release : {{ .Release.Name }}
70
- subjects :
71
- - kind : Group
72
- name : system:authenticated # All authenticated users
73
- apiGroup : rbac.authorization.k8s.io
74
- roleRef :
75
- kind : Role
76
- name : {{ include "openmatch.fullname" . }}-service-role
77
- apiGroup : rbac.authorization.k8s.io
78
- ---
79
- {{- if index .Values "open-match-core" "redis" "enabled" }}
80
- kind : Role
81
- apiVersion : rbac.authorization.k8s.io/v1
82
- metadata :
83
- name : {{ include "openmatch.fullname" . }}-redis-role
84
- namespace : {{ .Release.Namespace }}
85
- annotations : {{- include "openmatch.chartmeta" . | nindent 4 }}
86
- labels :
87
- app : {{ template "openmatch.name" . }}
88
- release : {{ .Release.Name }}
89
- rules :
90
- - apiGroups :
91
- - extensions
92
- resources :
93
- - podsecuritypolicies
94
- resourceNames :
95
- - {{ include "openmatch.fullname" . }}-redis-podsecuritypolicy
96
- verbs :
97
- - use
98
- ---
99
- kind : RoleBinding
100
- apiVersion : rbac.authorization.k8s.io/v1
101
- metadata :
102
- name : {{ include "openmatch.fullname" . }}-redis-role-binding
103
- namespace : {{ .Release.Namespace }}
104
- annotations : {{- include "openmatch.chartmeta" . | nindent 4 }}
105
- labels :
106
- app : {{ template "openmatch.name" . }}
107
- release : {{ .Release.Name }}
108
- subjects :
109
- - kind : ServiceAccount
110
- name : {{ include "call-nested" (list . "redis" "redis.serviceAccountName") }}
111
- namespace : {{ .Release.Namespace }}
112
- roleRef :
113
- kind : Role
114
- name : {{ include "openmatch.fullname" . }}-redis-role
115
- apiGroup : rbac.authorization.k8s.io
116
- {{- end }}
117
44
{{- end }}
0 commit comments