File tree Expand file tree Collapse file tree 5 files changed +22
-24
lines changed Expand file tree Collapse file tree 5 files changed +22
-24
lines changed Original file line number Diff line number Diff line change 1
1
dependencies:
2
2
- name: common
3
3
repository: oci://registry-1.docker.io/cloudpirates
4
- version: 1.0.0
5
- digest: sha256:4dc4489391e65614af4cd64d56a213e353a7a70b231faf64c584779774304d96
6
- generated: "2025-08-14T12:32:38.1323 +02:00"
4
+ version: 1.1.1
5
+ digest: sha256:8da3c04e2c4a1ebfff4f21936399938e0f3fcf9fbd2f7135e7e907ce725b8f00
6
+ generated: "2025-10-01T22:19:25.458376 +02:00"
Original file line number Diff line number Diff line change @@ -2,7 +2,7 @@ apiVersion: v2
2
2
name : timescaledb
3
3
description : TimescaleDB - The Open Source Time-Series Database for PostgreSQL
4
4
type : application
5
- version : 0.2.2
5
+ version : 0.3.0
6
6
appVersion : " 2.22.0-pg17"
7
7
keywords :
8
8
- timescaledb
Original file line number Diff line number Diff line change @@ -89,15 +89,15 @@ The following table lists the configurable parameters of the TimescaleDB chart a
89
89
90
90
### Security Context
91
91
92
- | Parameter | Description | Default |
93
- | ------------------------------------------ | ------------------------------------------------- | --------- |
94
- | ` podSecurityContext.fsGroup ` | Group ID for the volumes of the pod | ` 999 ` |
95
- | ` securityContext .allowPrivilegeEscalation` | Enable container privilege escalation | ` false ` |
96
- | ` securityContext .runAsNonRoot` | Configure the container to run as a non-root user | ` true ` |
97
- | ` securityContext .runAsUser` | User ID for the TimescaleDB container | ` 999 ` |
98
- | ` securityContext .runAsGroup` | Group ID for the TimescaleDB container | ` 999 ` |
99
- | ` securityContext .readOnlyRootFilesystem` | Mount container root filesystem as read-only | ` false ` |
100
- | ` securityContext .capabilities.drop` | Linux capabilities to be dropped | ` ["ALL"] ` |
92
+ | Parameter | Description | Default |
93
+ | --------------------------------------------------- | ------------------------------------------------- | --------- |
94
+ | ` podSecurityContext.fsGroup ` | Group ID for the volumes of the pod | ` 999 ` |
95
+ | ` containerSecurityContext .allowPrivilegeEscalation` | Enable container privilege escalation | ` false ` |
96
+ | ` containerSecurityContext .runAsNonRoot` | Configure the container to run as a non-root user | ` true ` |
97
+ | ` containerSecurityContext .runAsUser` | User ID for the TimescaleDB container | ` 999 ` |
98
+ | ` containerSecurityContext .runAsGroup` | Group ID for the TimescaleDB container | ` 999 ` |
99
+ | ` containerSecurityContext .readOnlyRootFilesystem` | Mount container root filesystem as read-only | ` false ` |
100
+ | ` containerSecurityContext .capabilities.drop` | Linux capabilities to be dropped | ` ["ALL"] ` |
101
101
102
102
### TimescaleDB Authentication
103
103
Original file line number Diff line number Diff line change @@ -29,12 +29,10 @@ spec:
29
29
{{- with (include "timescaledb.imagePullSecrets" .) }}
30
30
{{ . | nindent 6 }}
31
31
{{- end }}
32
- securityContext :
33
- {{- toYaml .Values.podSecurityContext | nindent 8 }}
32
+ securityContext : {{ include "common.renderPodSecurityContext" . | nindent 8 }}
34
33
containers :
35
34
- name : {{ .Chart.Name }}
36
- securityContext :
37
- {{- toYaml .Values.securityContext | nindent 12 }}
35
+ securityContext : {{ include "common.renderContainerSecurityContext" . | nindent 12 }}
38
36
image : {{ include "timescaledb.image" . }}
39
37
imagePullPolicy : {{ .Values.image.imagePullPolicy }}
40
38
env :
Original file line number Diff line number Diff line change @@ -35,18 +35,18 @@ podSecurityContext:
35
35
# # @param podSecurityContext.fsGroup Group ID for the volumes of the pod
36
36
fsGroup : 999
37
37
38
- securityContext :
39
- # # @param securityContext .allowPrivilegeEscalation Enable container privilege escalation
38
+ containerSecurityContext :
39
+ # # @param containerSecurityContext .allowPrivilegeEscalation Enable container privilege escalation
40
40
allowPrivilegeEscalation : false
41
- # # @param securityContext .runAsNonRoot Configure the container to run as a non-root user
41
+ # # @param containerSecurityContext .runAsNonRoot Configure the container to run as a non-root user
42
42
runAsNonRoot : true
43
- # # @param securityContext .runAsUser User ID for the TimescaleDB container
43
+ # # @param containerSecurityContext .runAsUser User ID for the TimescaleDB container
44
44
runAsUser : 999
45
- # # @param securityContext .runAsGroup Group ID for the TimescaleDB container
45
+ # # @param containerSecurityContext .runAsGroup Group ID for the TimescaleDB container
46
46
runAsGroup : 999
47
- # # @param securityContext .readOnlyRootFilesystem Mount container root filesystem as read-only
47
+ # # @param containerSecurityContext .readOnlyRootFilesystem Mount container root filesystem as read-only
48
48
readOnlyRootFilesystem : false
49
- # # @param securityContext .capabilities.drop Linux capabilities to be dropped
49
+ # # @param containerSecurityContext .capabilities.drop Linux capabilities to be dropped
50
50
capabilities :
51
51
drop :
52
52
- ALL
You can’t perform that action at this time.
0 commit comments