From b23d24f1e486361cae53ae8cf0defea8042d1b9a Mon Sep 17 00:00:00 2001 From: Andrew Azores Date: Thu, 8 Feb 2024 09:47:34 -0500 Subject: [PATCH] hack: run storage as non-root user --- charts/cryostat/values.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/charts/cryostat/values.yaml b/charts/cryostat/values.yaml index 832eec48..cb0cc69b 100644 --- a/charts/cryostat/values.yaml +++ b/charts/cryostat/values.yaml @@ -98,6 +98,8 @@ storage: resources: {} ## @param storage.securityContext [object] Security Context for the storage container. Defaults to meet "restricted" [Pod Security Standard](https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted). See: [SecurityContext](https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context-1) securityContext: + ## @skip storage.securityContext.runAsUser + runAsUser: 1000 ## @skip storage.securityContext.allowPrivilegeEscalation allowPrivilegeEscalation: false ## @skip storage.securityContext.capabilities