mirror of
https://github.com/bitnami/charts.git
synced 2026-04-02 07:17:26 +08:00
[bitnami/harbor] feat: ✨ 🔒 Add readOnlyRootFilesystem support (#23914)
* [bitnami/harbor] feat: ✨ 🔒 Add readOnlyRootFilesystem support Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> --------- Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
committed by
GitHub
parent
abcddbcdbc
commit
6925aa1591
@@ -796,6 +796,7 @@ nginx:
|
||||
## @param nginx.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param nginx.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param nginx.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param nginx.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param nginx.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param nginx.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param nginx.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -807,6 +808,7 @@ nginx:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -1133,6 +1135,7 @@ portal:
|
||||
## @param portal.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param portal.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param portal.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param portal.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param portal.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param portal.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param portal.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -1144,6 +1147,7 @@ portal:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -1536,6 +1540,7 @@ core:
|
||||
## @param core.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param core.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param core.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param core.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param core.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param core.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param core.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -1547,6 +1552,7 @@ core:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -1904,6 +1910,7 @@ jobservice:
|
||||
## @param jobservice.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param jobservice.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param jobservice.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param jobservice.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param jobservice.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param jobservice.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param jobservice.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -1915,6 +1922,7 @@ jobservice:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -2467,6 +2475,7 @@ registry:
|
||||
## @param registry.server.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param registry.server.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param registry.server.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param registry.server.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param registry.server.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param registry.server.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param registry.server.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -2478,6 +2487,7 @@ registry:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -2633,6 +2643,7 @@ registry:
|
||||
## @param registry.controller.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param registry.controller.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param registry.controller.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param registry.controller.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param registry.controller.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param registry.controller.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param registry.controller.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -2644,6 +2655,7 @@ registry:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -2866,6 +2878,7 @@ trivy:
|
||||
## @param trivy.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param trivy.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param trivy.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param trivy.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param trivy.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param trivy.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param trivy.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -2877,6 +2890,7 @@ trivy:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
@@ -3206,6 +3220,7 @@ exporter:
|
||||
## @param exporter.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param exporter.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param exporter.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param exporter.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
|
||||
## @param exporter.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param exporter.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
## @param exporter.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
|
||||
@@ -3217,6 +3232,7 @@ exporter:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsGroup: 0
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
|
||||
Reference in New Issue
Block a user