Skip to content

Commit ada1609

Browse files
author
Maurice Faber
authored
fix: podspec, docker-compose (#206)
1 parent cb3aea2 commit ada1609

File tree

2 files changed

+17
-3
lines changed

2 files changed

+17
-3
lines changed

docker-compose-deps.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,15 @@ services:
55
container_name: tools
66
image: otomi/core:${TOOLS_TAG:-master}
77
user: ${USER_ID}
8-
command: binzx/otomi server -vv
8+
command: binzx/otomi server
99
expose:
1010
- 17771
1111
ports:
1212
- 17771:17771
1313
volumes:
14-
- /tmp:/tmp
14+
- $ENV_DIR:$ENV_DIR
1515
environment:
16-
ENV_DIR: /tmp/otomi-values
16+
ENV_DIR: $ENV_DIR
17+
VERBOSITY: 2
1718
env_file:
1819
- .env

src/openapi/definitions.yaml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -624,6 +624,19 @@ podSpec:
624624
default: true
625625
title: Run as non-root
626626
type: boolean
627+
fsGroup:
628+
description: Supplementary group ID. Volumes that support ownership management are modified to be owned and writable by this ID.
629+
type: string
630+
fsGroupChangePolicy:
631+
description:
632+
'Defines behavior for changing ownership and permission of the volume before being exposed inside a Pod. This field only applies to volume types that support fsGroup controlled ownership and permissions.
633+
This field has two possible values:
634+
OnRootMismatch: Only change permissions and ownership if permission and ownership of root directory does not match with expected permissions of the volume. This could help shorten the time it takes to change ownership and permission of a volume.
635+
Always: Always change permission and ownership of the volume when volume is mounted.'
636+
enum:
637+
- null
638+
- Always
639+
- OnRootMismatch
627640
description: Security context for the pod.
628641
title: Pod security context
629642
# just commenting podSecurityContext out here is required to make form work

0 commit comments

Comments
 (0)