fix: set securitycontext for server to something more secure
Signed-off-by: chgl <chgl@users.noreply.github.com>
This commit is contained in:
parent
b652bdd757
commit
db34ae67b6
2 changed files with 9 additions and 0 deletions
|
@ -32,6 +32,8 @@ spec:
|
|||
- name: argo-server
|
||||
image: "{{ .Values.server.image.registry }}/{{ .Values.server.image.repository }}:{{ .Values.server.image.tag | default .Chart.AppVersion }}"
|
||||
imagePullPolicy: {{ .Values.images.pullPolicy }}
|
||||
securityContext:
|
||||
{{- toYaml .Values.server.securityContext | nindent 12 }}
|
||||
args:
|
||||
- server
|
||||
- --configmap={{ .Release.Name }}-{{ .Values.controller.name }}-configmap
|
||||
|
|
|
@ -172,6 +172,13 @@ server:
|
|||
podLabels: {}
|
||||
# SecurityContext to set on the server pods
|
||||
podSecurityContext: {}
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: false
|
||||
runAsNonRoot: true
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
name: server
|
||||
serviceType: ClusterIP
|
||||
servicePort: 2746
|
||||
|
|
Loading…
Reference in a new issue