Synchronize upstreamed folder to 387ba84b5

This commit is contained in:
bitnami-bot
2019-07-08 08:35:01 +00:00
parent e41bdf2a3a
commit b1d3ef981c
5 changed files with 25 additions and 12 deletions

View File

@@ -1,6 +1,6 @@
apiVersion: v1
name: external-dns
version: 2.0.3
version: 2.1.0
appVersion: 0.5.15
description: ExternalDNS is a Kubernetes addon that configures public DNS servers with information about exposed Kubernetes services to make them discoverable.
keywords:

View File

@@ -44,6 +44,7 @@ The command removes all the Kubernetes components associated with the chart and
The following table lists the configurable parameters of the external-dns chart and their default values.
| Parameter | Description | Default |
| ---------------------------------- | -------------------------------------------------------------------------------------------------------- | -------------------------------------------------------- |
| `global.imageRegistry` | Global Docker image registry | `nil` |
@@ -114,7 +115,10 @@ The following table lists the configurable parameters of the external-dns chart
| `tolerations` | Tolerations for pod assignment (this value is evaluated as a template) | `[]` |
| `podAnnotations` | Additional annotations to apply to the pod. | `{}` |
| `podLabels` | Additional labels to be added to pods | {} |
| `podSecurityContext.fsGroup` | Group ID for the container | `1001` |
| `podSecurityContext.runAsUser` | User ID for the container | `1001` |
| `priorityClassName` | priorityClassName | `""` |
| `securityContext` | Security context for the container | `{}` |
| `service.type` | Kubernetes Service type | `ClusterIP` |
| `service.port` | ExternalDNS client port | `7979` |
| `service.nodePort` | Port to bind to for NodePort service type (client port) | `nil` |
@@ -126,8 +130,6 @@ The following table lists the configurable parameters of the external-dns chart
| `rbac.create` | Wether to create & use RBAC resources or not | `false` |
| `rbac.serviceAccountName` | ServiceAccount (ignored if rbac.create == true) | `default` |
| `rbac.apiVersion` | Version of the RBAC API | `v1beta1` |
| `securityContext.fsGroup` | Group ID for the container | `1001` |
| `securityContext.runAsUser` | User ID for the container | `1001` |
| `resources` | CPU/Memory resource requests/limits. | `{}` |
| `livenessProbe` | Deployment Liveness Probe | See `values.yaml` |
| `readinessProbe` | Deployment Readiness Probe | See `values.yaml` |

View File

@@ -1,4 +1,4 @@
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ template "external-dns.fullname" . }}
@@ -21,10 +21,8 @@ spec:
{{- end }}
spec:
{{- include "external-dns.imagePullSecrets" . | indent 6 }}
{{- if .Values.securityContext.enabled }}
securityContext:
fsGroup: {{ .Values.securityContext.fsGroup }}
runAsUser: {{ .Values.securityContext.runAsUser }}
{{- if .Values.podSecurityContext }}
securityContext: {{ toYaml .Values.podSecurityContext | nindent 8 }}
{{- end }}
{{- with .Values.affinity }}
affinity: {{ tpl (toYaml .) $ | nindent 8 }}
@@ -254,6 +252,9 @@ spec:
containerPort: {{ .Values.service.port }}
readinessProbe: {{ toYaml .Values.readinessProbe | nindent 10 }}
livenessProbe: {{ toYaml .Values.livenessProbe | nindent 10 }}
{{- if .Values.securityContext }}
securityContext: {{ toYaml .Values.securityContext | nindent 10 }}
{{- end }}
{{- if .Values.resources }}
resources: {{ toYaml .Values.resources | nindent 10 }}
{{- end }}

View File

@@ -282,10 +282,15 @@ rbac:
## Kubernetes Security Context
## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
##
securityContext:
enabled: true
securityContext: {}
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
capabilities:
drop: ["ALL"]
podSecurityContext:
fsGroup: 1001
runAsUser: 1001
runAsNonRoot: true
## Configure resource requests and limits
## ref: http://kubernetes.io/docs/user-guide/compute-resources/

View File

@@ -282,10 +282,15 @@ rbac:
## Kubernetes Security Context
## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
##
securityContext:
enabled: true
securityContext: {}
# allowPrivilegeEscalation: false
# readOnlyRootFilesystem: true
# capabilities:
# drop: ["ALL"]
podSecurityContext:
fsGroup: 1001
runAsUser: 1001
# runAsNonRoot: true
## Configure resource requests and limits
## ref: http://kubernetes.io/docs/user-guide/compute-resources/