Skip to content

Commit eabcd48

Browse files
committed
(catsrc) rename grpcPodConfig.runAsRoot to grpcPodConfig.SecurityContextConfig
Accepted values for SecurityContextConfig(string): legacy/resctricted(default)
1 parent c6d2f45 commit eabcd48

File tree

3 files changed

+26
-7
lines changed

3 files changed

+26
-7
lines changed

Diff for: crds/operators.coreos.com_catalogsources.yaml

+7-3
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,13 @@ spec:
7979
priorityClassName:
8080
description: If specified, indicates the pod's priority. If not specified, the pod priority will be default or zero if there is no default.
8181
type: string
82-
runAsRoot:
83-
description: RunAsRoot allows admins to indicate that they wish to run the container inside the CatalogSource pod in a privileged mode as root. This should only be enabled when running older catalog images which could not be run as non-root.
84-
type: boolean
82+
securityContextConfig:
83+
description: 'SecurityContextConfig can be one of `legacy` or `restricted`. The CatalogSource''s pod is either injected with the right pod.spec.securityContext and pod.spec.container[*].securityContext values to allow the pod to run in Pod Security Admission(PSA) controller''s `restricted` mode, or doesn''t set these values at all, in which case the pod can only be run in PSA `baseline` or `privileged` namespaces. By default, SecurityContextConfig is set to `restricted`. If the value is unspecified, the default value of `restricted` is used. Specifying any other value will result in a validation error. When using older catalog images, which could not be run in `restricted` mode, the SecurityContextConfig should be set to `legacy`. More information about PSA can be found here: https://kubernetes.io/docs/concepts/security/pod-security-admission/'''
84+
type: string
85+
default: restricted
86+
enum:
87+
- legacy
88+
- restricted
8589
tolerations:
8690
description: Tolerations are the catalog source's pod's tolerations.
8791
type: array

0 commit comments

Comments
 (0)