mirror of
https://github.com/bitnami/charts.git
synced 2026-03-06 06:58:50 +08:00
[bitnami/sealed-secrets] feat: ✨ 🔒 Add runAsGroup (#23992)
Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
committed by
GitHub
parent
bdf0d79f3a
commit
10744a3cd1
@@ -29,4 +29,4 @@ name: sealed-secrets
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/sealed-secrets
|
||||
- https://github.com/bitnami-labs/sealed-secrets
|
||||
version: 1.10.2
|
||||
version: 1.11.0
|
||||
|
||||
@@ -128,7 +128,6 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `podSecurityContext.fsGroup` | Set Sealed Secret pod's Security Context fsGroup | `1001` |
|
||||
| `podSecurityContext.seccompProfile.type` | Set Sealed Secret pod's Security Context seccompProfile type | `RuntimeDefault` |
|
||||
| `containerSecurityContext.enabled` | Enabled Sealed Secret containers' Security Context | `true` |
|
||||
| `containerSecurityContext.allowPrivilegeEscalation` | Whether the Sealed Secret container can escalate privileges | `false` |
|
||||
| `containerSecurityContext.capabilities.drop` | Which privileges to drop in the Sealed Secret container | `["ALL"]` |
|
||||
@@ -136,6 +135,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `containerSecurityContext.runAsNonRoot` | Indicates that the Sealed Secret container must run as a non-root user | `true` |
|
||||
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `containerSecurityContext.runAsUser` | Set Sealed Secret containers' Security Context runAsUser | `1001` |
|
||||
| `containerSecurityContext.runAsGroup` | Set Sealed Secret containers' Security Context runAsGroup | `1001` |
|
||||
| `containerSecurityContext.seccompProfile.type` | Set Sealed Secret container's Security Context seccompProfile type | `RuntimeDefault` |
|
||||
| `automountServiceAccountToken` | Mount Service Account token in pod | `true` |
|
||||
| `hostAliases` | Sealed Secret pods host aliases | `[]` |
|
||||
|
||||
@@ -190,8 +190,9 @@ spec:
|
||||
port: http
|
||||
{{- end }}
|
||||
volumeMounts:
|
||||
- name: tmp
|
||||
- name: empty-dir
|
||||
mountPath: /tmp
|
||||
subPath: tmp-dir
|
||||
{{- if .Values.extraVolumeMounts }}
|
||||
{{- include "common.tplvalues.render" (dict "value" .Values.extraVolumeMounts "context" $) | nindent 12 }}
|
||||
{{- end }}
|
||||
@@ -199,7 +200,7 @@ spec:
|
||||
{{- include "common.tplvalues.render" ( dict "value" .Values.sidecars "context" $) | nindent 8 }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
- name: tmp
|
||||
- name: empty-dir
|
||||
emptyDir: {}
|
||||
{{- if .Values.extraVolumes }}
|
||||
{{- include "common.tplvalues.render" (dict "value" .Values.extraVolumes "context" $) | nindent 8 }}
|
||||
|
||||
@@ -209,7 +209,6 @@ customStartupProbe: {}
|
||||
## @param podSecurityContext.sysctls Set kernel settings using the sysctl interface
|
||||
## @param podSecurityContext.supplementalGroups Set filesystem extra groups
|
||||
## @param podSecurityContext.fsGroup Set Sealed Secret pod's Security Context fsGroup
|
||||
## @param podSecurityContext.seccompProfile.type Set Sealed Secret pod's Security Context seccompProfile type
|
||||
##
|
||||
podSecurityContext:
|
||||
enabled: true
|
||||
@@ -217,8 +216,6 @@ podSecurityContext:
|
||||
sysctls: []
|
||||
supplementalGroups: []
|
||||
fsGroup: 1001
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
## Configure Container Security Context
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
|
||||
## @param containerSecurityContext.enabled Enabled Sealed Secret containers' Security Context
|
||||
@@ -228,18 +225,19 @@ podSecurityContext:
|
||||
## @param containerSecurityContext.runAsNonRoot Indicates that the Sealed Secret container must run as a non-root user
|
||||
## @param containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param containerSecurityContext.runAsUser Set Sealed Secret containers' Security Context runAsUser
|
||||
## @param containerSecurityContext.runAsGroup Set Sealed Secret containers' Security Context runAsGroup
|
||||
## @param containerSecurityContext.seccompProfile.type Set Sealed Secret container's Security Context seccompProfile type
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
drop: ["ALL"]
|
||||
readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 1001
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
## @param automountServiceAccountToken Mount Service Account token in pod
|
||||
|
||||
Reference in New Issue
Block a user