This repository was archived by the owner on Jul 26, 2022. It is now read-only.
File tree Expand file tree Collapse file tree 2 files changed +14
-4
lines changed
charts/kubernetes-external-secrets Expand file tree Collapse file tree 2 files changed +14
-4
lines changed Original file line number Diff line number Diff line change 8383 {{- end }}
8484 {{- end }}
8585 {{- end }}
86+ {{- if .Values.containerSecurityContext }}
87+ securityContext :
88+ {{- toYaml .Values.containerSecurityContext | nindent 12 }}
89+ {{- end }}
8690 {{- with .Values.dnsConfig }}
8791 dnsConfig :
8892 {{- toYaml . | nindent 8 }}
Original file line number Diff line number Diff line change 1212 LOG_LEVEL : info
1313 LOG_MESSAGE_KEY : " msg"
1414
15- # Akeyless rest-v2 endpoint
16- AKEYLESS_API_ENDPOINT : https://api.akeyless.io
15+ # Akeyless rest-v2 endpoint
16+ AKEYLESS_API_ENDPOINT : https://api.akeyless.io
1717 AKEYLESS_ACCESS_ID :
1818 # AKEYLESS_ACCESS_TYPE can be one of the following: aws_iam/azure_ad/gcp/access_key
1919 AKEYLESS_ACCESS_TYPE :
2020 # AKEYLESS_ACCESS_TYPE_PARAM can be one of the following: gcp-audience/azure-obj-id/access-key
21- # AKEYLESS_ACCESS_TYPE_PARAM:
22-
21+ # AKEYLESS_ACCESS_TYPE_PARAM:
22+
2323
2424 # Print logs level as string ("info") rather than integer (30)
2525 # USE_HUMAN_READABLE_LOG_LEVELS: true
@@ -146,6 +146,12 @@ securityContext:
146146 # Required for use of IRSA, see https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
147147 # fsGroup: 65534
148148
149+ # A security context defines privilege and access control settings for a Pod or Container.
150+ # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
151+ containerSecurityContext : {}
152+ # allowPrivilegeEscalation: false
153+ # privileged: false
154+
149155resources :
150156 {}
151157 # We usually recommend not to specify default resources and to leave this as a conscious
You can’t perform that action at this time.
0 commit comments