Skip to content
This repository has been archived by the owner on Jul 26, 2022. It is now read-only.

Commit

Permalink
feat(chart): add securityContext settings for pod container (#780)
Browse files Browse the repository at this point in the history
  • Loading branch information
keisku authored Jul 2, 2021
1 parent 48db901 commit 28ce1a8
Show file tree
Hide file tree
Showing 2 changed files with 14 additions and 4 deletions.
4 changes: 4 additions & 0 deletions charts/kubernetes-external-secrets/templates/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -83,6 +83,10 @@ spec:
{{- end }}
{{- end }}
{{- end }}
{{- if .Values.containerSecurityContext }}
securityContext:
{{- toYaml .Values.containerSecurityContext | nindent 12 }}
{{- end }}
{{- with .Values.dnsConfig }}
dnsConfig:
{{- toYaml . | nindent 8 }}
Expand Down
14 changes: 10 additions & 4 deletions charts/kubernetes-external-secrets/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,14 +12,14 @@ env:
LOG_LEVEL: info
LOG_MESSAGE_KEY: "msg"

#Akeyless rest-v2 endpoint
AKEYLESS_API_ENDPOINT: https://api.akeyless.io
#Akeyless rest-v2 endpoint
AKEYLESS_API_ENDPOINT: https://api.akeyless.io
AKEYLESS_ACCESS_ID:
#AKEYLESS_ACCESS_TYPE can be one of the following: aws_iam/azure_ad/gcp/access_key
AKEYLESS_ACCESS_TYPE:
#AKEYLESS_ACCESS_TYPE_PARAM can be one of the following: gcp-audience/azure-obj-id/access-key
#AKEYLESS_ACCESS_TYPE_PARAM:
#AKEYLESS_ACCESS_TYPE_PARAM:


# Print logs level as string ("info") rather than integer (30)
# USE_HUMAN_READABLE_LOG_LEVELS: true
Expand Down Expand Up @@ -146,6 +146,12 @@ securityContext:
# Required for use of IRSA, see https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
# fsGroup: 65534

# A security context defines privilege and access control settings for a Pod or Container.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
containerSecurityContext: {}
# allowPrivilegeEscalation: false
# privileged: false

resources:
{}
# We usually recommend not to specify default resources and to leave this as a conscious
Expand Down

0 comments on commit 28ce1a8

Please sign in to comment.