Skip to content

Commit 250b562

Browse files
authored
[timescaledb] make timescaledb run on openshift (CloudPirates-io#205)
make timescaledb run on openshift
1 parent 2c31a43 commit 250b562

File tree

5 files changed

+22
-24
lines changed

5 files changed

+22
-24
lines changed

charts/timescaledb/Chart.lock

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
dependencies:
22
- name: common
33
repository: oci://registry-1.docker.io/cloudpirates
4-
version: 1.0.0
5-
digest: sha256:4dc4489391e65614af4cd64d56a213e353a7a70b231faf64c584779774304d96
6-
generated: "2025-08-14T12:32:38.1323+02:00"
4+
version: 1.1.1
5+
digest: sha256:8da3c04e2c4a1ebfff4f21936399938e0f3fcf9fbd2f7135e7e907ce725b8f00
6+
generated: "2025-10-01T22:19:25.458376+02:00"

charts/timescaledb/Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ apiVersion: v2
22
name: timescaledb
33
description: TimescaleDB - The Open Source Time-Series Database for PostgreSQL
44
type: application
5-
version: 0.2.2
5+
version: 0.3.0
66
appVersion: "2.22.0-pg17"
77
keywords:
88
- timescaledb

charts/timescaledb/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -89,15 +89,15 @@ The following table lists the configurable parameters of the TimescaleDB chart a
8989

9090
### Security Context
9191

92-
| Parameter | Description | Default |
93-
| ------------------------------------------ | ------------------------------------------------- | --------- |
94-
| `podSecurityContext.fsGroup` | Group ID for the volumes of the pod | `999` |
95-
| `securityContext.allowPrivilegeEscalation` | Enable container privilege escalation | `false` |
96-
| `securityContext.runAsNonRoot` | Configure the container to run as a non-root user | `true` |
97-
| `securityContext.runAsUser` | User ID for the TimescaleDB container | `999` |
98-
| `securityContext.runAsGroup` | Group ID for the TimescaleDB container | `999` |
99-
| `securityContext.readOnlyRootFilesystem` | Mount container root filesystem as read-only | `false` |
100-
| `securityContext.capabilities.drop` | Linux capabilities to be dropped | `["ALL"]` |
92+
| Parameter | Description | Default |
93+
| --------------------------------------------------- | ------------------------------------------------- | --------- |
94+
| `podSecurityContext.fsGroup` | Group ID for the volumes of the pod | `999` |
95+
| `containerSecurityContext.allowPrivilegeEscalation` | Enable container privilege escalation | `false` |
96+
| `containerSecurityContext.runAsNonRoot` | Configure the container to run as a non-root user | `true` |
97+
| `containerSecurityContext.runAsUser` | User ID for the TimescaleDB container | `999` |
98+
| `containerSecurityContext.runAsGroup` | Group ID for the TimescaleDB container | `999` |
99+
| `containerSecurityContext.readOnlyRootFilesystem` | Mount container root filesystem as read-only | `false` |
100+
| `containerSecurityContext.capabilities.drop` | Linux capabilities to be dropped | `["ALL"]` |
101101

102102
### TimescaleDB Authentication
103103

charts/timescaledb/templates/statefulset.yaml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,10 @@ spec:
2929
{{- with (include "timescaledb.imagePullSecrets" .) }}
3030
{{ . | nindent 6 }}
3131
{{- end }}
32-
securityContext:
33-
{{- toYaml .Values.podSecurityContext | nindent 8 }}
32+
securityContext: {{ include "common.renderPodSecurityContext" . | nindent 8 }}
3433
containers:
3534
- name: {{ .Chart.Name }}
36-
securityContext:
37-
{{- toYaml .Values.securityContext | nindent 12 }}
35+
securityContext: {{ include "common.renderContainerSecurityContext" . | nindent 12 }}
3836
image: {{ include "timescaledb.image" . }}
3937
imagePullPolicy: {{ .Values.image.imagePullPolicy }}
4038
env:

charts/timescaledb/values.yaml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,18 +35,18 @@ podSecurityContext:
3535
## @param podSecurityContext.fsGroup Group ID for the volumes of the pod
3636
fsGroup: 999
3737

38-
securityContext:
39-
## @param securityContext.allowPrivilegeEscalation Enable container privilege escalation
38+
containerSecurityContext:
39+
## @param containerSecurityContext.allowPrivilegeEscalation Enable container privilege escalation
4040
allowPrivilegeEscalation: false
41-
## @param securityContext.runAsNonRoot Configure the container to run as a non-root user
41+
## @param containerSecurityContext.runAsNonRoot Configure the container to run as a non-root user
4242
runAsNonRoot: true
43-
## @param securityContext.runAsUser User ID for the TimescaleDB container
43+
## @param containerSecurityContext.runAsUser User ID for the TimescaleDB container
4444
runAsUser: 999
45-
## @param securityContext.runAsGroup Group ID for the TimescaleDB container
45+
## @param containerSecurityContext.runAsGroup Group ID for the TimescaleDB container
4646
runAsGroup: 999
47-
## @param securityContext.readOnlyRootFilesystem Mount container root filesystem as read-only
47+
## @param containerSecurityContext.readOnlyRootFilesystem Mount container root filesystem as read-only
4848
readOnlyRootFilesystem: false
49-
## @param securityContext.capabilities.drop Linux capabilities to be dropped
49+
## @param containerSecurityContext.capabilities.drop Linux capabilities to be dropped
5050
capabilities:
5151
drop:
5252
- ALL

0 commit comments

Comments
 (0)