Skip to content
Snippets Groups Projects
Verified Commit 11bd5235 authored by Martin Weise's avatar Martin Weise
Browse files
parent a281bd3b
No related branches found
No related tags found
3 merge requests!422Fixed a library issue where the value could not be empty,!421Fixed a library issue where the value could not be empty,!419Fixed a library issue where the value could not be empty
...@@ -16,6 +16,9 @@ spec: ...@@ -16,6 +16,9 @@ spec:
- name: init - name: init
image: {{ .Values.storageservice.setupJob.image.name }} image: {{ .Values.storageservice.setupJob.image.name }}
imagePullPolicy: {{ .Values.storageservice.setupJob.image.pullPolicy | default "IfNotPresent" }} imagePullPolicy: {{ .Values.storageservice.setupJob.image.pullPolicy | default "IfNotPresent" }}
{{- if .Values.storageservice.setupJob.containerSecurityContext.enabled }}
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.storageservice.setupJob.containerSecurityContext "context" $) | nindent 12 }}
{{- end }}
env: env:
- name: POD_IP - name: POD_IP
valueFrom: valueFrom:
......
...@@ -791,6 +791,29 @@ storageservice: ...@@ -791,6 +791,29 @@ storageservice:
s3: s3:
## @param storageservice.setupJob.s3.endpoint The S3-capable endpoint the microservice connects to. ## @param storageservice.setupJob.s3.endpoint The S3-capable endpoint the microservice connects to.
endpoint: http://storage-service-s3:8333 endpoint: http://storage-service-s3:8333
containerSecurityContext:
## @param storageservice.setupJob.containerSecurityContext.enabled Enabled containers' Security Context
enabled: true
## @param storageservice.setupJob.containerSecurityContext.seLinuxOptions Set SELinux options in container
seLinuxOptions: { }
## @param storageservice.setupJob.containerSecurityContext.runAsUser Set RabbitMQ containers' Security Context runAsUser
runAsUser: 1001
## @param storageservice.setupJob.containerSecurityContext.runAsGroup Set RabbitMQ containers' Security Context runAsGroup
runAsGroup: 0
## @param storageservice.setupJob.containerSecurityContext.runAsNonRoot Set RabbitMQ container's Security Context runAsNonRoot
runAsNonRoot: true
## @param storageservice.setupJob.containerSecurityContext.allowPrivilegeEscalation Set container's privilege escalation
allowPrivilegeEscalation: false
## @param storageservice.setupJob.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
readOnlyRootFilesystem: false
capabilities:
## @param storageservice.setupJob.containerSecurityContext.capabilities.drop Set container's Security Context runAsNonRoot
drop: [ "ALL" ]
## @param storageservice.setupJob.containerSecurityContext.capabilities.add Set container's Security Context runAsNonRoot
add: [ "NET_BIND_SERVICE" ]
seccompProfile:
## @param storageservice.setupJob.containerSecurityContext.seccompProfile.type Set container's Security Context seccomp profile
type: "RuntimeDefault"
## @param storageservice.setupJob.resourcesPreset The container resource preset ## @param storageservice.setupJob.resourcesPreset The container resource preset
resourcesPreset: "nano" resourcesPreset: "nano"
## @param storageservice.setupJob.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads) ## @param storageservice.setupJob.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment