Skip to content

Commit

Permalink
fix(helm): scc indentation (#492)
Browse files Browse the repository at this point in the history
  • Loading branch information
razvan committed Aug 19, 2024
1 parent ce3ecdd commit 9bba989
Showing 1 changed file with 34 additions and 34 deletions.
68 changes: 34 additions & 34 deletions deploy/helm/secret-operator/templates/roles.yaml
Original file line number Diff line number Diff line change
@@ -1,39 +1,39 @@
{{ if .Capabilities.APIVersions.Has "security.openshift.io/v1" }}
---
apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
metadata:
name: stackable-secret-operator-scc
annotations:
kubernetes.io/description: SCC for Stackable secret operator
allowHostDirVolumePlugin: true
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegeEscalation: true
allowPrivilegedContainer: true # Needed because otherwise we get spec.template.spec.containers[0].volumeMounts.mountPropagation: Forbidden: Bidirectional mount propagation is available only to privileged containers
allowedCapabilities: null
defaultAddCapabilities: null
fsGroup:
type: RunAsAny
groups: []
priority: null
readOnlyRootFilesystem: false
requiredDropCapabilities:
- MKNOD
runAsUser:
type: RunAsAny
seLinuxContext:
type: MustRunAs
supplementalGroups:
type: RunAsAny
users: []
volumes:
- downwardAPI
- projected
- hostPath
- emptyDir
apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
metadata:
name: stackable-secret-operator-scc
annotations:
kubernetes.io/description: SCC for Stackable secret operator
allowHostDirVolumePlugin: true
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegeEscalation: true
allowPrivilegedContainer: true # Needed because otherwise we get spec.template.spec.containers[0].volumeMounts.mountPropagation: Forbidden: Bidirectional mount propagation is available only to privileged containers
allowedCapabilities: null
defaultAddCapabilities: null
fsGroup:
type: RunAsAny
groups: []
priority: null
readOnlyRootFilesystem: false
requiredDropCapabilities:
- MKNOD
runAsUser:
type: RunAsAny
seLinuxContext:
type: MustRunAs
supplementalGroups:
type: RunAsAny
users: []
volumes:
- downwardAPI
- projected
- hostPath
- emptyDir
{{ end }}
---
apiVersion: rbac.authorization.k8s.io/v1
Expand Down

0 comments on commit 9bba989

Please sign in to comment.