specify ReadOnlyRootFilesystem: false for pod security policies (#560)
Explicitly specify ReadOnlyRootFilesystem: false so kubernetes can pick a less restrictive policy the operator has access to.
This commit is contained in:
		
							parent
							
								
									44acd7e4db
								
							
						
					
					
						commit
						c65a9baedf
					
				| 
						 | 
				
			
			@ -359,6 +359,8 @@ func generateContainer(
 | 
			
		|||
	volumeMounts []v1.VolumeMount,
 | 
			
		||||
	privilegedMode bool,
 | 
			
		||||
) *v1.Container {
 | 
			
		||||
	falseBool := false
 | 
			
		||||
 | 
			
		||||
	return &v1.Container{
 | 
			
		||||
		Name:            name,
 | 
			
		||||
		Image:           *dockerImage,
 | 
			
		||||
| 
						 | 
				
			
			@ -382,6 +384,7 @@ func generateContainer(
 | 
			
		|||
		Env:          envVars,
 | 
			
		||||
		SecurityContext: &v1.SecurityContext{
 | 
			
		||||
			Privileged: &privilegedMode,
 | 
			
		||||
			ReadOnlyRootFilesystem: &falseBool,
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue