Skip to content

Commit

Permalink
Bug/fix serviceaccounts (#52)
Browse files Browse the repository at this point in the history
* use default service account

* bump version

* allowPrivilegeEscalation: false to securityContext

* add metadata block policy
  • Loading branch information
alexcos20 authored Feb 27, 2022
1 parent 2b52f70 commit ef1a4c6
Show file tree
Hide file tree
Showing 72 changed files with 24 additions and 17,509 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ The following resources need attention:
| `STORAGE_CLASS` | Storage class to use (see next section). |
| `NOTIFY_START_URL` | URL to call when a new job starts. |
| `NOTIFY_STOP_URL` | URL to call when a new job ends. |
| `SERVICE_ACCOUNT` | K8 service account to run pods (same as the one used in deployment). Defaults to db-operator|
| `SERVICE_ACCOUNT` | K8 service account to run pods. Defaults to 'default' |
| `NODE_SELECTOR` | K8 node selector (if defined) |
| `PULL_SECRET` | ImagesPullSecret (if defined) (see https://kubernetes.io/docs/concepts/containers/images/#referring-to-an-imagepullsecrets-on-a-pod)|
| `PULL_POLICY` | imagePullPolicy (if defined) (see https://kubernetes.io/docs/concepts/configuration/overview/#container-images)|
Expand Down
266 changes: 0 additions & 266 deletions artifacts/AccessSecretStoreCondition.duero.json

This file was deleted.

Loading

0 comments on commit ef1a4c6

Please sign in to comment.