mirror of
https://github.com/bitnami/charts.git
synced 2026-03-16 06:47:30 +08:00
[bitnami/minio] fix: 🐛 Set seLinuxOptions to null for Openshift compatibility (#22626)
Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
committed by
GitHub
parent
a2ee442ada
commit
d6eb7e2031
@@ -143,7 +143,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `provisioning.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `provisioning.podSecurityContext.fsGroup` | Group ID for the container | `1001` |
|
||||
| `provisioning.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `provisioning.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `provisioning.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `provisioning.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `provisioning.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `provisioning.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
@@ -166,7 +166,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `podSecurityContext.fsGroupChangePolicy` | When K8s should preform chown on attached volumes | `OnRootMismatch` |
|
||||
| `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
@@ -289,7 +289,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `volumePermissions.resources.limits` | Init container volume-permissions resource limits | `{}` |
|
||||
| `volumePermissions.resources.requests` | Init container volume-permissions resource requests | `{}` |
|
||||
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `volumePermissions.containerSecurityContext.runAsUser` | User ID for the init container | `0` |
|
||||
|
||||
### RBAC parameters
|
||||
|
||||
@@ -411,7 +411,7 @@ provisioning:
|
||||
## MinIO® container Security Context
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
|
||||
## @param provisioning.containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param provisioning.containerSecurityContext.seLinuxOptions Set SELinux options in container
|
||||
## @param provisioning.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param provisioning.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param provisioning.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param provisioning.containerSecurityContext.privileged Set container's Security Context privileged
|
||||
@@ -422,7 +422,7 @@ provisioning:
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
seLinuxOptions: {}
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
@@ -474,7 +474,7 @@ podSecurityContext:
|
||||
## MinIO® container Security Context
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
|
||||
## @param containerSecurityContext.enabled Enabled containers' Security Context
|
||||
## @param containerSecurityContext.seLinuxOptions Set SELinux options in container
|
||||
## @param containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param containerSecurityContext.runAsUser Set containers' Security Context runAsUser
|
||||
## @param containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
|
||||
## @param containerSecurityContext.privileged Set container's Security Context privileged
|
||||
@@ -485,7 +485,7 @@ podSecurityContext:
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
seLinuxOptions: {}
|
||||
seLinuxOptions: null
|
||||
runAsUser: 1001
|
||||
runAsNonRoot: true
|
||||
privileged: false
|
||||
@@ -1033,11 +1033,11 @@ volumePermissions:
|
||||
## Init container' Security Context
|
||||
## Note: the chown of the data folder is done to containerSecurityContext.runAsUser
|
||||
## and not the below volumePermissions.containerSecurityContext.runAsUser
|
||||
## @param volumePermissions.containerSecurityContext.seLinuxOptions Set SELinux options in container
|
||||
## @param volumePermissions.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
|
||||
## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container
|
||||
##
|
||||
containerSecurityContext:
|
||||
seLinuxOptions: {}
|
||||
seLinuxOptions: null
|
||||
runAsUser: 0
|
||||
|
||||
## @section RBAC parameters
|
||||
|
||||
Reference in New Issue
Block a user