mirror of
https://github.com/bitnami/charts.git
synced 2026-03-14 14:57:22 +08:00
[bitnami/rabbitmq-cluster-operator] Set default SecurityContext readOnlyRootFilesystem to true (#22004)
* Change default values readOnlyRootFilesystem to true Signed-off-by: Bartosz Witkowski <bartek@kompaniait.pl> * Update README.md Signed-off-by: Bartosz Witkowski <bartek@kompaniait.pl> --------- Signed-off-by: Bartosz Witkowski <bartek@kompaniait.pl>
This commit is contained in:
committed by
GitHub
parent
0fb15f352a
commit
7cf9be3bba
@@ -37,4 +37,4 @@ maintainers:
|
||||
name: rabbitmq-cluster-operator
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/rabbitmq-cluster-operator
|
||||
version: 3.10.9
|
||||
version: 3.10.10
|
||||
|
||||
@@ -205,7 +205,7 @@ This solution allows to easily deploy multiple RabbitMQ instances compared to th
|
||||
| `clusterOperator.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `clusterOperator.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `clusterOperator.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `clusterOperator.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` |
|
||||
| `clusterOperator.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `clusterOperator.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `clusterOperator.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `clusterOperator.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
@@ -328,7 +328,7 @@ This solution allows to easily deploy multiple RabbitMQ instances compared to th
|
||||
| `msgTopologyOperator.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `msgTopologyOperator.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `msgTopologyOperator.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `msgTopologyOperator.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` |
|
||||
| `msgTopologyOperator.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `msgTopologyOperator.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `msgTopologyOperator.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `msgTopologyOperator.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
|
||||
@@ -230,7 +230,7 @@ clusterOperator:
|
||||
runAsUser: 1001
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop: ["ALL"]
|
||||
@@ -692,7 +692,7 @@ msgTopologyOperator:
|
||||
runAsUser: 1001
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: false
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop: ["ALL"]
|
||||
|
||||
Reference in New Issue
Block a user