[bitnami/harbor] feat: 🔒 Add readOnlyRootFilesystem support (#23914)

* [bitnami/harbor] feat:  🔒 Add readOnlyRootFilesystem support

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

---------

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Javier J. Salmerón-García
2024-02-27 11:58:45 +01:00
committed by GitHub
parent abcddbcdbc
commit 6925aa1591
10 changed files with 78 additions and 1 deletions

View File

@@ -796,6 +796,7 @@ nginx:
## @param nginx.containerSecurityContext.enabled Enabled containers' Security Context
## @param nginx.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param nginx.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param nginx.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param nginx.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param nginx.containerSecurityContext.privileged Set container's Security Context privileged
## @param nginx.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -807,6 +808,7 @@ nginx:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -1133,6 +1135,7 @@ portal:
## @param portal.containerSecurityContext.enabled Enabled containers' Security Context
## @param portal.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param portal.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param portal.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param portal.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param portal.containerSecurityContext.privileged Set container's Security Context privileged
## @param portal.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -1144,6 +1147,7 @@ portal:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -1536,6 +1540,7 @@ core:
## @param core.containerSecurityContext.enabled Enabled containers' Security Context
## @param core.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param core.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param core.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param core.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param core.containerSecurityContext.privileged Set container's Security Context privileged
## @param core.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -1547,6 +1552,7 @@ core:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -1904,6 +1910,7 @@ jobservice:
## @param jobservice.containerSecurityContext.enabled Enabled containers' Security Context
## @param jobservice.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param jobservice.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param jobservice.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param jobservice.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param jobservice.containerSecurityContext.privileged Set container's Security Context privileged
## @param jobservice.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -1915,6 +1922,7 @@ jobservice:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -2467,6 +2475,7 @@ registry:
## @param registry.server.containerSecurityContext.enabled Enabled containers' Security Context
## @param registry.server.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param registry.server.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param registry.server.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param registry.server.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param registry.server.containerSecurityContext.privileged Set container's Security Context privileged
## @param registry.server.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -2478,6 +2487,7 @@ registry:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -2633,6 +2643,7 @@ registry:
## @param registry.controller.containerSecurityContext.enabled Enabled containers' Security Context
## @param registry.controller.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param registry.controller.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param registry.controller.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param registry.controller.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param registry.controller.containerSecurityContext.privileged Set container's Security Context privileged
## @param registry.controller.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -2644,6 +2655,7 @@ registry:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -2866,6 +2878,7 @@ trivy:
## @param trivy.containerSecurityContext.enabled Enabled containers' Security Context
## @param trivy.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param trivy.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param trivy.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param trivy.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param trivy.containerSecurityContext.privileged Set container's Security Context privileged
## @param trivy.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -2877,6 +2890,7 @@ trivy:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
@@ -3206,6 +3220,7 @@ exporter:
## @param exporter.containerSecurityContext.enabled Enabled containers' Security Context
## @param exporter.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param exporter.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param exporter.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
## @param exporter.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param exporter.containerSecurityContext.privileged Set container's Security Context privileged
## @param exporter.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
@@ -3217,6 +3232,7 @@ exporter:
enabled: true
seLinuxOptions: null
runAsUser: 1001
runAsGroup: 0
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false