[bitnami/cainjector] Release 1.11.2-debian-11-r1 (#33690)

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Bitnami Bot
2023-05-12 21:30:45 +01:00
committed by GitHub
parent 36a5866d46
commit 6fb95422ad
2 changed files with 4 additions and 2 deletions

View File

@@ -3,10 +3,10 @@ FROM docker.io/bitnami/minideb:bullseye
ARG TARGETARCH ARG TARGETARCH
LABEL org.opencontainers.image.base.name="docker.io/bitnami/minideb:bullseye" \ LABEL org.opencontainers.image.base.name="docker.io/bitnami/minideb:bullseye" \
org.opencontainers.image.created="2023-05-09T19:58:49Z" \ org.opencontainers.image.created="2023-05-12T20:15:57Z" \
org.opencontainers.image.description="Application packaged by VMware, Inc" \ org.opencontainers.image.description="Application packaged by VMware, Inc" \
org.opencontainers.image.licenses="Apache-2.0" \ org.opencontainers.image.licenses="Apache-2.0" \
org.opencontainers.image.ref.name="1.11.2-debian-11-r0" \ org.opencontainers.image.ref.name="1.11.2-debian-11-r1" \
org.opencontainers.image.title="cainjector" \ org.opencontainers.image.title="cainjector" \
org.opencontainers.image.vendor="VMware, Inc." \ org.opencontainers.image.vendor="VMware, Inc." \
org.opencontainers.image.version="1.11.2" org.opencontainers.image.version="1.11.2"

View File

@@ -36,6 +36,8 @@ Kubernetes cluster with `CustomResourceDefinition` or `ThirdPartyResource suppor
* All Bitnami images available in Docker Hub are signed with [Docker Content Trust (DCT)](https://docs.docker.com/engine/security/trust/content_trust/). You can use `DOCKER_CONTENT_TRUST=1` to verify the integrity of the images. * All Bitnami images available in Docker Hub are signed with [Docker Content Trust (DCT)](https://docs.docker.com/engine/security/trust/content_trust/). You can use `DOCKER_CONTENT_TRUST=1` to verify the integrity of the images.
* Bitnami container images are released on a regular basis with the latest distribution packages available. * Bitnami container images are released on a regular basis with the latest distribution packages available.
Looking to use CA Injector in production? Try [VMware Application Catalog](https://bitnami.com/enterprise), the enterprise edition of Bitnami Application Catalog.
## Why use a non-root container? ## Why use a non-root container?
Non-root container images add an extra layer of security and are generally recommended for production environments. However, because they run as a non-root user, privileged tasks are typically off-limits. Learn more about non-root containers [in our docs](https://docs.bitnami.com/tutorials/work-with-non-root-containers/). Non-root container images add an extra layer of security and are generally recommended for production environments. However, because they run as a non-root user, privileged tasks are typically off-limits. Learn more about non-root containers [in our docs](https://docs.bitnami.com/tutorials/work-with-non-root-containers/).