[bitnami/metallb] fix: 🐛 Set seLinuxOptions to null for Openshift compatibility (#22623)

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
Javier J. Salmerón-García
2024-01-26 09:59:11 +01:00
committed by GitHub
parent 101930aa6c
commit c874b7b7af
3 changed files with 7 additions and 7 deletions

View File

@@ -35,4 +35,4 @@ maintainers:
name: metallb
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/metallb
version: 4.11.0
version: 4.11.1

View File

@@ -126,7 +126,7 @@ The command removes all the Kubernetes components associated with the chart and
| `controller.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `controller.podSecurityContext.fsGroup` | Set MetalLB Controller pod's Security Context fsGroup | `1001` |
| `controller.containerSecurityContext.enabled` | Enabled MetalLB Controller containers' Security Context | `true` |
| `controller.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `controller.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `controller.containerSecurityContext.runAsUser` | Set MetalLB Controller containers' Security Context runAsUser | `1001` |
| `controller.containerSecurityContext.runAsNonRoot` | Set MetalLB Controller container's Security Context runAsNonRoot | `true` |
| `controller.containerSecurityContext.allowPrivilegeEscalation` | Enables privilege Escalation context for the pod. | `false` |
@@ -230,7 +230,7 @@ The command removes all the Kubernetes components associated with the chart and
| `speaker.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `speaker.podSecurityContext.fsGroup` | Set Speaker pod's Security Context fsGroup | `0` |
| `speaker.containerSecurityContext.enabled` | Enabled Speaker containers' Security Context | `true` |
| `speaker.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `speaker.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `speaker.containerSecurityContext.runAsUser` | Set Speaker containers' Security Context runAsUser | `0` |
| `speaker.containerSecurityContext.allowPrivilegeEscalation` | Enables privilege Escalation context for the pod. | `false` |
| `speaker.containerSecurityContext.readOnlyRootFilesystem` | Allows the pod to mount the RootFS as ReadOnly | `true` |

View File

@@ -258,7 +258,7 @@ controller:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
## @param controller.containerSecurityContext.enabled Enabled MetalLB Controller containers' Security Context
## @param controller.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param controller.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param controller.containerSecurityContext.runAsUser Set MetalLB Controller containers' Security Context runAsUser
## @param controller.containerSecurityContext.runAsNonRoot Set MetalLB Controller container's Security Context runAsNonRoot
## @param controller.containerSecurityContext.allowPrivilegeEscalation Enables privilege Escalation context for the pod.
@@ -268,7 +268,7 @@ controller:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
allowPrivilegeEscalation: false
@@ -642,7 +642,7 @@ speaker:
## Configure Container Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
## @param speaker.containerSecurityContext.enabled Enabled Speaker containers' Security Context
## @param speaker.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param speaker.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param speaker.containerSecurityContext.runAsUser Set Speaker containers' Security Context runAsUser
## @param speaker.containerSecurityContext.allowPrivilegeEscalation Enables privilege Escalation context for the pod.
## @param speaker.containerSecurityContext.readOnlyRootFilesystem Allows the pod to mount the RootFS as ReadOnly
@@ -652,7 +652,7 @@ speaker:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 0
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true