securityContext in admission-webhook now configurable e.g. to set seccompProfiles (#8930)
* Make securityContext in admission-webhook more configurable e.g. to set seccompProfiles Signed-off-by: Oliver Michels <oliver.michels@aldi-sued.com> * Make securityContext in admission-webhook more configurable e.g. to set seccompProfiles Signed-off-by: Oliver Michels <oliver.michels@aldi-sued.com> * Make securityContext in admission-webhook more configurable e.g. to set seccompProfiles Signed-off-by: Oliver Michels <oliver.michels@aldi-sued.com> * Make securityContext in admission-webhook more configurable e.g. to set seccompProfiles Signed-off-by: Oliver Michels <oliver.michels@aldi-sued.com> Signed-off-by: Oliver Michels <oliver.michels@aldi-sued.com>
This commit is contained in:
parent
1791b62e45
commit
cad575e923
5 changed files with 16 additions and 12 deletions
|
@ -2,7 +2,7 @@ apiVersion: v2
|
||||||
name: ingress-nginx
|
name: ingress-nginx
|
||||||
# When the version is modified, make sure the artifacthub.io/changes list is updated
|
# When the version is modified, make sure the artifacthub.io/changes list is updated
|
||||||
# Also update CHANGELOG.md
|
# Also update CHANGELOG.md
|
||||||
version: 4.2.1
|
version: 4.2.2
|
||||||
appVersion: 1.3.0
|
appVersion: 1.3.0
|
||||||
home: https://github.com/kubernetes/ingress-nginx
|
home: https://github.com/kubernetes/ingress-nginx
|
||||||
description: Ingress controller for Kubernetes using NGINX as a reverse proxy and load balancer
|
description: Ingress controller for Kubernetes using NGINX as a reverse proxy and load balancer
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
[ingress-nginx](https://github.com/kubernetes/ingress-nginx) Ingress controller for Kubernetes using NGINX as a reverse proxy and load balancer
|
[ingress-nginx](https://github.com/kubernetes/ingress-nginx) Ingress controller for Kubernetes using NGINX as a reverse proxy and load balancer
|
||||||
|
|
||||||
  
|
  
|
||||||
|
|
||||||
To use, add `ingressClassName: nginx` spec field or the `kubernetes.io/ingress.class: nginx` annotation to your Ingress resources.
|
To use, add `ingressClassName: nginx` spec field or the `kubernetes.io/ingress.class: nginx` annotation to your Ingress resources.
|
||||||
|
|
||||||
|
@ -252,7 +252,6 @@ Kubernetes: `>=1.20.0-0`
|
||||||
| controller.admissionWebhooks.networkPolicyEnabled | bool | `false` | |
|
| controller.admissionWebhooks.networkPolicyEnabled | bool | `false` | |
|
||||||
| controller.admissionWebhooks.objectSelector | object | `{}` | |
|
| controller.admissionWebhooks.objectSelector | object | `{}` | |
|
||||||
| controller.admissionWebhooks.patch.enabled | bool | `true` | |
|
| controller.admissionWebhooks.patch.enabled | bool | `true` | |
|
||||||
| controller.admissionWebhooks.patch.fsGroup | int | `2000` | |
|
|
||||||
| controller.admissionWebhooks.patch.image.digest | string | `"sha256:549e71a6ca248c5abd51cdb73dbc3083df62cf92ed5e6147c780e30f7e007a47"` | |
|
| controller.admissionWebhooks.patch.image.digest | string | `"sha256:549e71a6ca248c5abd51cdb73dbc3083df62cf92ed5e6147c780e30f7e007a47"` | |
|
||||||
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
|
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
|
||||||
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
|
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
|
||||||
|
@ -262,7 +261,9 @@ Kubernetes: `>=1.20.0-0`
|
||||||
| controller.admissionWebhooks.patch.nodeSelector."kubernetes.io/os" | string | `"linux"` | |
|
| controller.admissionWebhooks.patch.nodeSelector."kubernetes.io/os" | string | `"linux"` | |
|
||||||
| controller.admissionWebhooks.patch.podAnnotations | object | `{}` | |
|
| controller.admissionWebhooks.patch.podAnnotations | object | `{}` | |
|
||||||
| controller.admissionWebhooks.patch.priorityClassName | string | `""` | Provide a priority class name to the webhook patching job |
|
| controller.admissionWebhooks.patch.priorityClassName | string | `""` | Provide a priority class name to the webhook patching job |
|
||||||
| controller.admissionWebhooks.patch.runAsUser | int | `2000` | |
|
| controller.admissionWebhooks.patch.securityContext.fsGroup | int | `2000` | |
|
||||||
|
| controller.admissionWebhooks.patch.securityContext.runAsNonRoot | bool | `true` | |
|
||||||
|
| controller.admissionWebhooks.patch.securityContext.runAsUser | int | `2000` | |
|
||||||
| controller.admissionWebhooks.patch.tolerations | list | `[]` | |
|
| controller.admissionWebhooks.patch.tolerations | list | `[]` | |
|
||||||
| controller.admissionWebhooks.patchWebhookJob.resources | object | `{}` | |
|
| controller.admissionWebhooks.patchWebhookJob.resources | object | `{}` | |
|
||||||
| controller.admissionWebhooks.port | int | `8443` | |
|
| controller.admissionWebhooks.port | int | `8443` | |
|
||||||
|
|
|
@ -72,8 +72,8 @@ spec:
|
||||||
{{- if .Values.controller.admissionWebhooks.patch.tolerations }}
|
{{- if .Values.controller.admissionWebhooks.patch.tolerations }}
|
||||||
tolerations: {{ toYaml .Values.controller.admissionWebhooks.patch.tolerations | nindent 8 }}
|
tolerations: {{ toYaml .Values.controller.admissionWebhooks.patch.tolerations | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if .Values.controller.admissionWebhooks.patch.securityContext }}
|
||||||
securityContext:
|
securityContext:
|
||||||
runAsNonRoot: true
|
{{- toYaml .Values.controller.admissionWebhooks.patch.securityContext | nindent 8 }}
|
||||||
runAsUser: {{ .Values.controller.admissionWebhooks.patch.runAsUser }}
|
{{- end }}
|
||||||
fsGroup: {{ .Values.controller.admissionWebhooks.patch.fsGroup }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -74,8 +74,8 @@ spec:
|
||||||
{{- if .Values.controller.admissionWebhooks.patch.tolerations }}
|
{{- if .Values.controller.admissionWebhooks.patch.tolerations }}
|
||||||
tolerations: {{ toYaml .Values.controller.admissionWebhooks.patch.tolerations | nindent 8 }}
|
tolerations: {{ toYaml .Values.controller.admissionWebhooks.patch.tolerations | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if .Values.controller.admissionWebhooks.patch.securityContext }}
|
||||||
securityContext:
|
securityContext:
|
||||||
runAsNonRoot: true
|
{{- toYaml .Values.controller.admissionWebhooks.patch.securityContext | nindent 8 }}
|
||||||
runAsUser: {{ .Values.controller.admissionWebhooks.patch.runAsUser }}
|
{{- end }}
|
||||||
fsGroup: {{ .Values.controller.admissionWebhooks.patch.fsGroup }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -658,9 +658,12 @@ controller:
|
||||||
tolerations: []
|
tolerations: []
|
||||||
# -- Labels to be added to patch job resources
|
# -- Labels to be added to patch job resources
|
||||||
labels: {}
|
labels: {}
|
||||||
|
securityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
runAsUser: 2000
|
runAsUser: 2000
|
||||||
fsGroup: 2000
|
fsGroup: 2000
|
||||||
|
|
||||||
|
|
||||||
metrics:
|
metrics:
|
||||||
port: 10254
|
port: 10254
|
||||||
# if this port is changed, change healthz-port: in extraArgs: accordingly
|
# if this port is changed, change healthz-port: in extraArgs: accordingly
|
||||||
|
|
Loading…
Reference in a new issue