apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: litmus annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' spec: privileged: false # Required to prevent escalations to root. allowPrivilegeEscalation: false # Allow core volume types. volumes: - 'configMap' - 'emptyDir' - 'projected' - 'secret' - 'downwardAPI' # Assume that persistentVolumes set up by the cluster admin are safe to use. - 'persistentVolumeClaim' - 'hostPath' hostNetwork: false hostIPC: false hostPID: false runAsUser: # Require the container to run without root privileges. rule: 'RunAsAny' seLinux: # This policy assumes the nodes are using AppArmor rather than SELinux. rule: 'RunAsAny' supplementalGroups: rule: 'RunAsAny' fsGroup: rule: 'RunAsAny' readOnlyRootFilesystem: false