add postgres securityContext at pod level #1947
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
SUMMARY
The description for
postgres_security_context_settings
'...will be set under the pod-level securityContext field' is wrong, this settings are injected in container-level securityContext.For setting on pod-level the field
postgres_pod_security_context_settings
is addedISSUE TYPE
ADDITIONAL INFORMATION
For some CSI-Drivers (e.g. Longhorn) it's required to modify the securityContext on pod-level.
(see also https://longhorn.io/docs/1.7.0/nodes-and-volumes/volumes/pvc-ownership-and-permission).
The existing field
postgres_security_context_settings
is for container-level.Maybe this field should renamed to postgres_container_security_context_settings.