@@ -242,7 +242,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
242
242
| controller.admissionWebhooks.certificate | string | `"/usr/local/certificates/cert"` | |
243
243
| controller.admissionWebhooks.createSecretJob.name | string | `"create"` | |
244
244
| controller.admissionWebhooks.createSecretJob.resources | object | `{}` | |
245
- | controller.admissionWebhooks.createSecretJob.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for secret creation containers |
245
+ | controller.admissionWebhooks.createSecretJob.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsGroup":65532," runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for secret creation containers |
246
246
| controller.admissionWebhooks.enabled | bool | `true` | |
247
247
| controller.admissionWebhooks.existingPsp | string | `""` | Use an existing PSP instead of creating one |
248
248
| controller.admissionWebhooks.extraEnvs | list | `[]` | Additional environment variables to set |
@@ -273,7 +273,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
273
273
| controller.admissionWebhooks.patch.tolerations | list | `[]` | |
274
274
| controller.admissionWebhooks.patchWebhookJob.name | string | `"patch"` | |
275
275
| controller.admissionWebhooks.patchWebhookJob.resources | object | `{}` | |
276
- | controller.admissionWebhooks.patchWebhookJob.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for webhook patch containers |
276
+ | controller.admissionWebhooks.patchWebhookJob.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsGroup":65532," runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for webhook patch containers |
277
277
| controller.admissionWebhooks.port | int | `8443` | |
278
278
| controller.admissionWebhooks.service.annotations | object | `{}` | |
279
279
| controller.admissionWebhooks.service.externalIPs | list | `[]` | |
@@ -331,6 +331,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
331
331
| controller.image.pullPolicy | string | `"IfNotPresent"` | |
332
332
| controller.image.readOnlyRootFilesystem | bool | `false` | |
333
333
| controller.image.registry | string | `"registry.k8s.io"` | |
334
+ | controller.image.runAsGroup | int | `82` | |
334
335
| controller.image.runAsNonRoot | bool | `true` | |
335
336
| controller.image.runAsUser | int | `101` | |
336
337
| controller.image.seccompProfile.type | string | `"RuntimeDefault"` | |
@@ -396,6 +397,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
396
397
| controller.opentelemetry.containerSecurityContext.allowPrivilegeEscalation | bool | `false` | |
397
398
| controller.opentelemetry.containerSecurityContext.capabilities.drop[0] | string | `"ALL"` | |
398
399
| controller.opentelemetry.containerSecurityContext.readOnlyRootFilesystem | bool | `true` | |
400
+ | controller.opentelemetry.containerSecurityContext.runAsGroup | int | `65532` | |
399
401
| controller.opentelemetry.containerSecurityContext.runAsNonRoot | bool | `true` | |
400
402
| controller.opentelemetry.containerSecurityContext.runAsUser | int | `65532` | The image's default user, inherited from its base image `cgr.dev/chainguard/static`. |
401
403
| controller.opentelemetry.containerSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
@@ -505,6 +507,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
505
507
| defaultBackend.image.pullPolicy | string | `"IfNotPresent"` | |
506
508
| defaultBackend.image.readOnlyRootFilesystem | bool | `true` | |
507
509
| defaultBackend.image.registry | string | `"registry.k8s.io"` | |
510
+ | defaultBackend.image.runAsGroup | int | `65534` | |
508
511
| defaultBackend.image.runAsNonRoot | bool | `true` | |
509
512
| defaultBackend.image.runAsUser | int | `65534` | |
510
513
| defaultBackend.image.seccompProfile.type | string | `"RuntimeDefault"` | |
0 commit comments