You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With Pod Security Admission, this is fairly important to ensure our workloads can run on a variety of clusters. It doesn't seem like one set of defaults will work for everybody.
At the API level, I expect something like the following:
typeCryostatSpecstruct {
// ...// Options to configure the Security Contexts for the Cryostat application.// +optional// +operator-sdk:csv:customresourcedefinitions:type=specSecurityOptions*SecurityOptions`json:"securityOptions,omitempty"`
}
typeReportConfigurationstruct {
// ...// Options to configure the Security Contexts for the Cryostat report generator.// +optional// +operator-sdk:csv:customresourcedefinitions:type=specSecurityOptions*ReportsSecurityOptions`json:"securityOptions,omitempty"`
}
// SecurityOptions contains Security Context customizations for the// main Cryostat application at both the pod and container level.typeSecurityOptionsstruct {
// Security Context to apply to the Cryostat pod// +optional// +operator-sdk:csv:customresourcedefinitions:type=specPodSecurityContext*corev1.PodSecurityContext`json:"podSecurityContext,omitempty"`// Security Context to apply to the Cryostat application container// +optional// +operator-sdk:csv:customresourcedefinitions:type=specCoreSecurityContext*corev1.SecurityContext`json:"coreSecurityContext,omitempty"`// Security Context to apply to the JFR Data Source container// +optional// +operator-sdk:csv:customresourcedefinitions:type=specDataSourceSecurityContext*corev1.SecurityContext`json:"dataSourceSecurityContext,omitempty"`// Security Context to apply to the Grafana container// +optional// +operator-sdk:csv:customresourcedefinitions:type=specGrafanaSecurityContext*corev1.SecurityContext`json:"grafanaSecurityContext,omitempty"`
}
// ReportsSecurityOptions contains Security Context customizations for the// Cryostat report generator at both the pod and container level.typeReportsSecurityOptionsstruct {
// Security Context to apply to the Cryostat report generator pod// +optional// +operator-sdk:csv:customresourcedefinitions:type=specPodSecurityContext*corev1.PodSecurityContext`json:"podSecurityContext,omitempty"`// Security Context to apply to the Cryostat report generator container// +optional// +operator-sdk:csv:customresourcedefinitions:type=specReportsSecurityContext*corev1.SecurityContext`json:"reportsSecurityContext,omitempty"`
}
The text was updated successfully, but these errors were encountered:
With Pod Security Admission, this is fairly important to ensure our workloads can run on a variety of clusters. It doesn't seem like one set of defaults will work for everybody.
At the API level, I expect something like the following:
The text was updated successfully, but these errors were encountered: