[bitnami/cert-manager] fix: 🐛 Set seLinuxOptions to null for Openshift compatibility (#22573)

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
Javier J. Salmerón-García
2024-01-25 10:17:41 +01:00
committed by GitHub
parent d616d9e4df
commit fffcc0d601
3 changed files with 10 additions and 10 deletions

View File

@@ -35,4 +35,4 @@ maintainers:
name: cert-manager
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/cert-manager
version: 0.18.0
version: 0.18.1

View File

@@ -102,7 +102,7 @@ The command removes all the Kubernetes components associated with the chart and
| `controller.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `controller.podSecurityContext.fsGroup` | Set Controller pod's Security Context fsGroup | `1001` |
| `controller.containerSecurityContext.enabled` | Enabled controller containers' Security Context | `true` |
| `controller.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `controller.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `controller.containerSecurityContext.runAsUser` | Set controller containers' Security Context runAsUser | `1001` |
| `controller.containerSecurityContext.runAsNonRoot` | Set controller containers' Security Context runAsNonRoot | `true` |
| `controller.containerSecurityContext.readOnlyRootFilesystem` | Set read only root file system pod's Security Conte | `false` |
@@ -193,7 +193,7 @@ The command removes all the Kubernetes components associated with the chart and
| `webhook.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `webhook.podSecurityContext.fsGroup` | Set Webhook pod's Security Context fsGroup | `1001` |
| `webhook.containerSecurityContext.enabled` | Enabled webhook containers' Security Context | `true` |
| `webhook.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `webhook.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `webhook.containerSecurityContext.runAsUser` | Set webhook containers' Security Context runAsUser | `1001` |
| `webhook.containerSecurityContext.runAsNonRoot` | Set webhook containers' Security Context runAsNonRoot | `true` |
| `webhook.containerSecurityContext.readOnlyRootFilesystem` | Set read only root file system pod's Security Conte | `false` |
@@ -280,7 +280,7 @@ The command removes all the Kubernetes components associated with the chart and
| `cainjector.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
| `cainjector.podSecurityContext.fsGroup` | Set CAInjector pod's Security Context fsGroup | `1001` |
| `cainjector.containerSecurityContext.enabled` | Enabled cainjector containers' Security Context | `true` |
| `cainjector.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `cainjector.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `cainjector.containerSecurityContext.runAsUser` | Set cainjector containers' Security Context runAsUser | `1001` |
| `cainjector.containerSecurityContext.runAsNonRoot` | Set cainjector containers' Security Context runAsNonRoot | `true` |
| `cainjector.containerSecurityContext.readOnlyRootFilesystem` | Set read only root file system pod's Security Conte | `false` |

View File

@@ -146,7 +146,7 @@ controller:
## controller containers' Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param controller.containerSecurityContext.enabled Enabled controller containers' Security Context
## @param controller.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param controller.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param controller.containerSecurityContext.runAsUser Set controller containers' Security Context runAsUser
## @param controller.containerSecurityContext.runAsNonRoot Set controller containers' Security Context runAsNonRoot
## @param controller.containerSecurityContext.readOnlyRootFilesystem Set read only root file system pod's Security Conte
@@ -157,7 +157,7 @@ controller:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
privileged: false
@@ -504,7 +504,7 @@ webhook:
## webhook containers' Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param webhook.containerSecurityContext.enabled Enabled webhook containers' Security Context
## @param webhook.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param webhook.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param webhook.containerSecurityContext.runAsUser Set webhook containers' Security Context runAsUser
## @param webhook.containerSecurityContext.runAsNonRoot Set webhook containers' Security Context runAsNonRoot
## @param webhook.containerSecurityContext.readOnlyRootFilesystem Set read only root file system pod's Security Conte
@@ -515,7 +515,7 @@ webhook:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
privileged: false
@@ -847,7 +847,7 @@ cainjector:
## cainjector containers' Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param cainjector.containerSecurityContext.enabled Enabled cainjector containers' Security Context
## @param cainjector.containerSecurityContext.seLinuxOptions Set SELinux options in container
## @param cainjector.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
## @param cainjector.containerSecurityContext.runAsUser Set cainjector containers' Security Context runAsUser
## @param cainjector.containerSecurityContext.runAsNonRoot Set cainjector containers' Security Context runAsNonRoot
## @param cainjector.containerSecurityContext.readOnlyRootFilesystem Set read only root file system pod's Security Conte
@@ -858,7 +858,7 @@ cainjector:
##
containerSecurityContext:
enabled: true
seLinuxOptions: {}
seLinuxOptions: null
runAsUser: 1001
runAsNonRoot: true
privileged: false