[bitnami/redis-cluster] fix: 🐛 Set seLinuxOptions to null for Openshift compatibility (#22654)

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
Javier J. Salmerón-García
2024-01-25 10:14:07 +01:00
committed by GitHub
parent aedab13188
commit 62a26a3d72
3 changed files with 10 additions and 10 deletions

View File

@@ -32,4 +32,4 @@ maintainers:
name: redis-cluster
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/redis-cluster
version: 9.3.0
version: 9.3.1

View File

@@ -120,7 +120,7 @@ The command removes all the Kubernetes components associated with the chart and
| `minAvailable` | Min number of pods that must still be available after the eviction | `""` |
| `maxUnavailable` | Max number of pods that can be unavailable after the eviction | `""` |
| `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
| `containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
@@ -174,7 +174,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `volumePermissions.containerSecurityContext.enabled` | Enable Containers' Security Context | `true` |
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `volumePermissions.containerSecurityContext.runAsUser` | User ID for the containers. | `0` |
| `volumePermissions.containerSecurityContext.privileged` | Run container as privileged | `false` |
| `volumePermissions.resources.limits` | The resources limits for the container | `{}` |
@@ -348,7 +348,7 @@ The command removes all the Kubernetes components associated with the chart and
| `sysctlImage.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `sysctlImage.mountHostSys` | Mount the host `/sys` folder to `/host-sys` | `false` |
| `sysctlImage.containerSecurityContext.enabled` | Enable Containers' Security Context | `true` |
| `sysctlImage.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `sysctlImage.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `sysctlImage.containerSecurityContext.runAsUser` | User ID for the containers. | `0` |
| `sysctlImage.containerSecurityContext.privileged` | Run privileged as privileged | `true` |
| `sysctlImage.resources.limits` | The resources limits for the container | `{}` |

View File

@@ -171,7 +171,7 @@ minAvailable: ""
maxUnavailable: ""
## Containers Security Context
## @param containerSecurityContext.enabled Enabled containers' Security Context
## @param containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param containerSecurityContext.privileged Set container's Security Context privileged
@@ -182,7 +182,7 @@ maxUnavailable: ""
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
privileged: false
@@ -388,13 +388,13 @@ volumePermissions:
pullSecrets: []
## Containers Security Context
## @param volumePermissions.containerSecurityContext.enabled Enable Containers' Security Context
## @param volumePermissions.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param volumePermissions.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param volumePermissions.containerSecurityContext.runAsUser User ID for the containers.
## @param volumePermissions.containerSecurityContext.privileged Run container as privileged
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 0
privileged: false
## Container resource requests and limits
@@ -1058,13 +1058,13 @@ sysctlImage:
mountHostSys: false
## Containers Security Context
## @param sysctlImage.containerSecurityContext.enabled Enable Containers' Security Context
## @param sysctlImage.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param sysctlImage.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param sysctlImage.containerSecurityContext.runAsUser User ID for the containers.
## @param sysctlImage.containerSecurityContext.privileged Run privileged as privileged
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 0
privileged: true
## Container resource requests and limits