This repository was archived by the owner on Jul 26, 2022. It is now read-only.
File tree 2 files changed +14
-4
lines changed
charts/kubernetes-external-secrets
2 files changed +14
-4
lines changed Original file line number Diff line number Diff line change 83
83
{{- end }}
84
84
{{- end }}
85
85
{{- end }}
86
+ {{- if .Values.containerSecurityContext }}
87
+ securityContext :
88
+ {{- toYaml .Values.containerSecurityContext | nindent 12 }}
89
+ {{- end }}
86
90
{{- with .Values.dnsConfig }}
87
91
dnsConfig :
88
92
{{- toYaml . | nindent 8 }}
Original file line number Diff line number Diff line change 12
12
LOG_LEVEL : info
13
13
LOG_MESSAGE_KEY : " msg"
14
14
15
- # Akeyless rest-v2 endpoint
16
- AKEYLESS_API_ENDPOINT : https://api.akeyless.io
15
+ # Akeyless rest-v2 endpoint
16
+ AKEYLESS_API_ENDPOINT : https://api.akeyless.io
17
17
AKEYLESS_ACCESS_ID :
18
18
# AKEYLESS_ACCESS_TYPE can be one of the following: aws_iam/azure_ad/gcp/access_key
19
19
AKEYLESS_ACCESS_TYPE :
20
20
# AKEYLESS_ACCESS_TYPE_PARAM can be one of the following: gcp-audience/azure-obj-id/access-key
21
- # AKEYLESS_ACCESS_TYPE_PARAM:
22
-
21
+ # AKEYLESS_ACCESS_TYPE_PARAM:
22
+
23
23
24
24
# Print logs level as string ("info") rather than integer (30)
25
25
# USE_HUMAN_READABLE_LOG_LEVELS: true
@@ -146,6 +146,12 @@ securityContext:
146
146
# Required for use of IRSA, see https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
147
147
# fsGroup: 65534
148
148
149
+ # A security context defines privilege and access control settings for a Pod or Container.
150
+ # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
151
+ containerSecurityContext : {}
152
+ # allowPrivilegeEscalation: false
153
+ # privileged: false
154
+
149
155
resources :
150
156
{}
151
157
# We usually recommend not to specify default resources and to leave this as a conscious
You can’t perform that action at this time.
0 commit comments