@@ -288,28 +288,28 @@ helm install ... --set credentialReferences.MY_GITHUB_TOKEN=<gh-pat>
288288
289289# ## Service Account
290290
291- | Name | Description | Value |
292- | --------------------------------------------------- | -------------------------------------------------------------------------------------------- | ---------------- |
293- | `serviceAccount.create` | Enable creation of a serviceAccount | `true` |
294- | `serviceAccount.existingName` | Optionally provide an existing serviceAccount name | `""` |
295- | `serviceAccount.annotations` | Additional custom annotations for the serviceAccount | `{}` |
296- | `serviceAccount.name` | The name of the serviceAccount to create. If not set and create is true, a name is generated | `""` |
297- | `podSecurityContext.enabled` | Enable security context for Broker Pods | `true` |
298- | `podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
299- | `podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
300- | `podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
301- | `podSecurityContext.fsGroup` | Group ID for the volumes of the pod | `1000` |
302- | `containerSecurityContext.enabled` | Enabled Broker containers' Security Context | `true` |
303- | `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
304- | `containerSecurityContext.runAsUser` | Set Broker containers' Security Context runAsUser | `1000` |
305- | `containerSecurityContext.runAsGroup` | Set Broker containers' Security Context runAsGroup | `1000` |
306- | `containerSecurityContext.allowPrivilegeEscalation` | Set Broker containers' Security Context allowPrivilegeEscalation | `false` |
307- | `containerSecurityContext.capabilities.drop` | Set containers' repo server Security Context capabilities to be dropped | `["ALL"]` |
308- | `containerSecurityContext.readOnlyRootFilesystem` | Set containers' repo server Security Context readOnlyRootFilesystem | `true` |
309- | `containerSecurityContext.runAsNonRoot` | Set Broker containers' Security Context runAsNonRoot | `true` |
310- | `containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
311- | `containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault ` |
312- | `extraVolumes` | Optionally specify extra list of additional volumes for Broker container | `[]` |
313- | `extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for Broker container | `[]` |
314- | `extraEnvVars` | Optionally specify extra list of additional environment variables for Broker container | `[]` |
291+ | Name | Description | Value |
292+ | --------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------ |
293+ | `serviceAccount.create` | Enable creation of a serviceAccount | `true` |
294+ | `serviceAccount.existingName` | Optionally provide an existing serviceAccount name | `""` |
295+ | `serviceAccount.annotations` | Additional custom annotations for the serviceAccount | `{}` |
296+ | `serviceAccount.name` | The name of the serviceAccount to create. If not set and create is true, a name is generated | `""` |
297+ | `podSecurityContext.enabled` | Enable security context for Broker Pods | `true` |
298+ | `podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
299+ | `podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
300+ | `podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
301+ | `podSecurityContext.fsGroup` | Group ID for the volumes of the pod | `1000` |
302+ | `containerSecurityContext.enabled` | Enable Broker container security context | `true` |
303+ | `containerSecurityContext.seLinuxOptions` | Set SELinux options for Broker container | `{}` |
304+ | `containerSecurityContext.runAsUser` | | `1000` |
305+ | `containerSecurityContext.runAsGroup` | | `1000` |
306+ | `containerSecurityContext.allowPrivilegeEscalation` | Allow the Broker container to escalate privileges | `false` |
307+ | `containerSecurityContext.capabilities.drop` | ] Linux capabilities to drop | `""` |
308+ | `containerSecurityContext.readOnlyRootFilesystem` | Must be set to false; Broker will write configuration to filesystem upon startup | `false` |
309+ | `containerSecurityContext.runAsNonRoot` | Run Broker as non-root | `true` |
310+ | `containerSecurityContext.privileged` | Run Broker as a privileged container | `false` |
311+ | `containerSecurityContext.seccompProfile.type` | Set the `seccomProfile` for Broker | `"RunTimeDefault" ` |
312+ | `extraVolumes` | Optionally specify extra list of additional volumes for Broker container | `[]` |
313+ | `extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for Broker container | `[]` |
314+ | `extraEnvVars` | Optionally specify extra list of additional environment variables for Broker container | `[]` |
315315
0 commit comments