[bitnami/apisix] fix: 🐛 Set seLinuxOptions to null for Openshift compatibility (#22567)

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
Javier J. Salmerón-García
2024-01-25 10:18:06 +01:00
committed by GitHub
parent 661356b98a
commit 6829af8b96
3 changed files with 16 additions and 16 deletions

View File

@@ -45,4 +45,4 @@ sources:
- https://github.com/bitnami/charts/tree/main/bitnami/apisix
- https://github.com/bitnami/charts/tree/main/bitnami/apisix-dashboard
- https://github.com/bitnami/charts/tree/main/bitnami/apisix-ingress-controller
version: 2.5.1
version: 2.5.2

View File

@@ -122,7 +122,7 @@ The command removes all the Kubernetes components associated with the chart and
| `dataPlane.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `dataPlane.podSecurityContext.fsGroup` | Set APISIX pod's Security Context fsGroup | `1001` |
| `dataPlane.containerSecurityContext.enabled` | Enabled APISIX containers' Security Context | `true` |
| `dataPlane.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `dataPlane.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `dataPlane.containerSecurityContext.runAsUser` | Set APISIX containers' Security Context runAsUser | `1001` |
| `dataPlane.containerSecurityContext.runAsNonRoot` | Set APISIX containers' Security Context runAsNonRoot | `true` |
| `dataPlane.containerSecurityContext.readOnlyRootFilesystem` | Set APISIX containers' Security Context runAsNonRoot | `true` |
@@ -293,7 +293,7 @@ The command removes all the Kubernetes components associated with the chart and
| `controlPlane.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `controlPlane.podSecurityContext.fsGroup` | Set APISIX pod's Security Context fsGroup | `1001` |
| `controlPlane.containerSecurityContext.enabled` | Enabled APISIX containers' Security Context | `true` |
| `controlPlane.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `controlPlane.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `controlPlane.containerSecurityContext.runAsUser` | Set APISIX containers' Security Context runAsUser | `1001` |
| `controlPlane.containerSecurityContext.runAsNonRoot` | Set APISIX containers' Security Context runAsNonRoot | `true` |
| `controlPlane.containerSecurityContext.readOnlyRootFilesystem` | Set APISIX containers' Security Context runAsNonRoot | `true` |
@@ -511,7 +511,7 @@ The command removes all the Kubernetes components associated with the chart and
| `dashboard.resources.limits` | The resources limits for the Dashboard container | `{}` |
| `dashboard.resources.requests` | The requested resources for the Dashboard container | `{}` |
| `dashboard.containerSecurityContext.enabled` | Enabled Dashboard container' Security Context | `true` |
| `dashboard.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `dashboard.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `dashboard.containerSecurityContext.runAsUser` | Set Dashboard container' Security Context runAsUser | `1001` |
| `dashboard.containerSecurityContext.runAsNonRoot` | Set Dashboard container' Security Context runAsNonRoot | `true` |
| `dashboard.containerSecurityContext.privileged` | Set Dashboard container' Security Context privileged | `false` |
@@ -627,7 +627,7 @@ The command removes all the Kubernetes components associated with the chart and
| `ingressController.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `ingressController.podSecurityContext.fsGroup` | Set APISIX Ingress Controller pod's Security Context fsGroup | `1001` |
| `ingressController.containerSecurityContext.enabled` | Enabled APISIX Ingress Controller containers' Security Context | `true` |
| `ingressController.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `ingressController.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `ingressController.containerSecurityContext.runAsUser` | Set APISIX Ingress Controller containers' Security Context runAsUser | `1001` |
| `ingressController.containerSecurityContext.runAsNonRoot` | Set APISIX Ingress Controller containers' Security Context runAsNonRoot | `true` |
| `ingressController.containerSecurityContext.privileged` | Set APISIX Ingress Controller containers' Security Context privileged | `false` |
@@ -761,7 +761,7 @@ The command removes all the Kubernetes components associated with the chart and
| `waitContainer.image.pullPolicy` | Init container wait-container image pull policy | `IfNotPresent` |
| `waitContainer.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `waitContainer.containerSecurityContext.enabled` | Enabled APISIX containers' Security Context | `true` |
| `waitContainer.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `waitContainer.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `waitContainer.containerSecurityContext.runAsUser` | Set APISIX containers' Security Context runAsUser | `1001` |
| `waitContainer.containerSecurityContext.runAsNonRoot` | Set APISIX containers' Security Context runAsNonRoot | `true` |
| `waitContainer.containerSecurityContext.readOnlyRootFilesystem` | Set APISIX containers' Security Context runAsNonRoot | `true` |

View File

@@ -198,7 +198,7 @@ dataPlane:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param dataPlane.containerSecurityContext.enabled Enabled APISIX containers' Security Context
## @param dataPlane.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param dataPlane.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param dataPlane.containerSecurityContext.runAsUser Set APISIX containers' Security Context runAsUser
## @param dataPlane.containerSecurityContext.runAsNonRoot Set APISIX containers' Security Context runAsNonRoot
## @param dataPlane.containerSecurityContext.readOnlyRootFilesystem Set APISIX containers' Security Context runAsNonRoot
@@ -208,7 +208,7 @@ dataPlane:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
readOnlyRootFilesystem: true
@@ -902,7 +902,7 @@ controlPlane:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param controlPlane.containerSecurityContext.enabled Enabled APISIX containers' Security Context
## @param controlPlane.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param controlPlane.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param controlPlane.containerSecurityContext.runAsUser Set APISIX containers' Security Context runAsUser
## @param controlPlane.containerSecurityContext.runAsNonRoot Set APISIX containers' Security Context runAsNonRoot
## @param controlPlane.containerSecurityContext.readOnlyRootFilesystem Set APISIX containers' Security Context runAsNonRoot
@@ -912,7 +912,7 @@ controlPlane:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
readOnlyRootFilesystem: true
@@ -1948,7 +1948,7 @@ dashboard:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param dashboard.containerSecurityContext.enabled Enabled Dashboard container' Security Context
## @param dashboard.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param dashboard.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param dashboard.containerSecurityContext.runAsUser Set Dashboard container' Security Context runAsUser
## @param dashboard.containerSecurityContext.runAsNonRoot Set Dashboard container' Security Context runAsNonRoot
## @param dashboard.containerSecurityContext.privileged Set Dashboard container' Security Context privileged
@@ -1959,7 +1959,7 @@ dashboard:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
readOnlyRootFilesystem: true
@@ -2348,7 +2348,7 @@ ingressController:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param ingressController.containerSecurityContext.enabled Enabled APISIX Ingress Controller containers' Security Context
## @param ingressController.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param ingressController.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param ingressController.containerSecurityContext.runAsUser Set APISIX Ingress Controller containers' Security Context runAsUser
## @param ingressController.containerSecurityContext.runAsNonRoot Set APISIX Ingress Controller containers' Security Context runAsNonRoot
## @param ingressController.containerSecurityContext.privileged Set APISIX Ingress Controller containers' Security Context privileged
@@ -2359,7 +2359,7 @@ ingressController:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
privileged: false
@@ -2911,7 +2911,7 @@ waitContainer:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param waitContainer.containerSecurityContext.enabled Enabled APISIX containers' Security Context
## @param waitContainer.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param waitContainer.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param waitContainer.containerSecurityContext.runAsUser Set APISIX containers' Security Context runAsUser
## @param waitContainer.containerSecurityContext.runAsNonRoot Set APISIX containers' Security Context runAsNonRoot
## @param waitContainer.containerSecurityContext.readOnlyRootFilesystem Set APISIX containers' Security Context runAsNonRoot
@@ -2922,7 +2922,7 @@ waitContainer:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
privileged: false