split the securityContext in two: pod and container securityContext #259
Reference in New Issue
Block a user
No description provided.
Delete Branch "security-context-2"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Hello !
I'm using the new Helm chart (5.x) and I really like the new configuration mechanism. ?
I would like to contribute the following enhancement.
The problem I want to solve
I'm trying to deploy Gitea in a Kubernetes shared platform and I need to make sure each instance is running as a different user so that in case of container escape, the risk of data leak is minimized.
Additionally, on my platform (OpenShift), arbitrary users (such as uid 1000 for Gitea) are not allowed.
The current helm chart does not allow me to achieve this because:
Also, the securityContext of a pod and the securityContext of a container do not accept the same options.
How I'm solving the problem
I split the
securityContext
(values.yaml) in two:containerSecurityContext
andpodSecurityContext
. The containerSecurityContext applies to all containers (init and main) in order to be consistent with file permissions.The behavior for existing deployments is unchanged:
This approach is well tested: it is used consistently on bitnami's Helm charts.
How I tested
I tested both root and rootless variants on a Kubernetes 1.22, as well as rootless variant on OpenShift 4.7.
rootless variant on Kubernetes:
rootless variant on OpenShift:
Let me know if something is unclear.
Thank your for your contribution. I just had a quick glance at your changes and it looks really promising. The way you prevent a breaking change is neat. What's missing is the modification of README.md. There are all values defined and shortly described.
Thanks for your review and feedback. I completed the documentation with the two new items.
Will check and test this PR today :)
LGTM
LGTM.