File tree Expand file tree Collapse file tree 5 files changed +22
-24
lines changed
Expand file tree Collapse file tree 5 files changed +22
-24
lines changed Original file line number Diff line number Diff line change 11dependencies:
22- name: common
33 repository: oci://registry-1.docker.io/cloudpirates
4- version: 1.0.0
5- digest: sha256:4dc4489391e65614af4cd64d56a213e353a7a70b231faf64c584779774304d96
6- generated: "2025-08-14T12:32:38.1323 +02:00"
4+ version: 1.1.1
5+ digest: sha256:8da3c04e2c4a1ebfff4f21936399938e0f3fcf9fbd2f7135e7e907ce725b8f00
6+ generated: "2025-10-01T22:19:25.458376 +02:00"
Original file line number Diff line number Diff line change @@ -2,7 +2,7 @@ apiVersion: v2
22name : timescaledb
33description : TimescaleDB - The Open Source Time-Series Database for PostgreSQL
44type : application
5- version : 0.2.2
5+ version : 0.3.0
66appVersion : " 2.22.0-pg17"
77keywords :
88 - timescaledb
Original file line number Diff line number Diff line change @@ -89,15 +89,15 @@ The following table lists the configurable parameters of the TimescaleDB chart a
8989
9090### Security Context
9191
92- | Parameter | Description | Default |
93- | ------------------------------------------ | ------------------------------------------------- | --------- |
94- | ` podSecurityContext.fsGroup ` | Group ID for the volumes of the pod | ` 999 ` |
95- | ` securityContext .allowPrivilegeEscalation` | Enable container privilege escalation | ` false ` |
96- | ` securityContext .runAsNonRoot` | Configure the container to run as a non-root user | ` true ` |
97- | ` securityContext .runAsUser` | User ID for the TimescaleDB container | ` 999 ` |
98- | ` securityContext .runAsGroup` | Group ID for the TimescaleDB container | ` 999 ` |
99- | ` securityContext .readOnlyRootFilesystem` | Mount container root filesystem as read-only | ` false ` |
100- | ` securityContext .capabilities.drop` | Linux capabilities to be dropped | ` ["ALL"] ` |
92+ | Parameter | Description | Default |
93+ | --------------------------------------------------- | ------------------------------------------------- | --------- |
94+ | ` podSecurityContext.fsGroup ` | Group ID for the volumes of the pod | ` 999 ` |
95+ | ` containerSecurityContext .allowPrivilegeEscalation` | Enable container privilege escalation | ` false ` |
96+ | ` containerSecurityContext .runAsNonRoot` | Configure the container to run as a non-root user | ` true ` |
97+ | ` containerSecurityContext .runAsUser` | User ID for the TimescaleDB container | ` 999 ` |
98+ | ` containerSecurityContext .runAsGroup` | Group ID for the TimescaleDB container | ` 999 ` |
99+ | ` containerSecurityContext .readOnlyRootFilesystem` | Mount container root filesystem as read-only | ` false ` |
100+ | ` containerSecurityContext .capabilities.drop` | Linux capabilities to be dropped | ` ["ALL"] ` |
101101
102102### TimescaleDB Authentication
103103
Original file line number Diff line number Diff line change @@ -29,12 +29,10 @@ spec:
2929{{- with (include "timescaledb.imagePullSecrets" .) }}
3030{{ . | nindent 6 }}
3131{{- end }}
32- securityContext :
33- {{- toYaml .Values.podSecurityContext | nindent 8 }}
32+ securityContext : {{ include "common.renderPodSecurityContext" . | nindent 8 }}
3433 containers :
3534 - name : {{ .Chart.Name }}
36- securityContext :
37- {{- toYaml .Values.securityContext | nindent 12 }}
35+ securityContext : {{ include "common.renderContainerSecurityContext" . | nindent 12 }}
3836 image : {{ include "timescaledb.image" . }}
3937 imagePullPolicy : {{ .Values.image.imagePullPolicy }}
4038 env :
Original file line number Diff line number Diff line change @@ -35,18 +35,18 @@ podSecurityContext:
3535 # # @param podSecurityContext.fsGroup Group ID for the volumes of the pod
3636 fsGroup : 999
3737
38- securityContext :
39- # # @param securityContext .allowPrivilegeEscalation Enable container privilege escalation
38+ containerSecurityContext :
39+ # # @param containerSecurityContext .allowPrivilegeEscalation Enable container privilege escalation
4040 allowPrivilegeEscalation : false
41- # # @param securityContext .runAsNonRoot Configure the container to run as a non-root user
41+ # # @param containerSecurityContext .runAsNonRoot Configure the container to run as a non-root user
4242 runAsNonRoot : true
43- # # @param securityContext .runAsUser User ID for the TimescaleDB container
43+ # # @param containerSecurityContext .runAsUser User ID for the TimescaleDB container
4444 runAsUser : 999
45- # # @param securityContext .runAsGroup Group ID for the TimescaleDB container
45+ # # @param containerSecurityContext .runAsGroup Group ID for the TimescaleDB container
4646 runAsGroup : 999
47- # # @param securityContext .readOnlyRootFilesystem Mount container root filesystem as read-only
47+ # # @param containerSecurityContext .readOnlyRootFilesystem Mount container root filesystem as read-only
4848 readOnlyRootFilesystem : false
49- # # @param securityContext .capabilities.drop Linux capabilities to be dropped
49+ # # @param containerSecurityContext .capabilities.drop Linux capabilities to be dropped
5050 capabilities :
5151 drop :
5252 - ALL
You can’t perform that action at this time.
0 commit comments