chore(lakekeeper): set pod security standards

This commit is contained in:
Masaki Yatsu
2025-11-23 16:22:37 +09:00
parent 94e885cf75
commit 8b2fe12a8c
2 changed files with 26 additions and 2 deletions

View File

@@ -154,7 +154,7 @@ create-oidc-api-client client_name='lakekeeper-api':
if just keycloak::client-exists ${KEYCLOAK_REALM} {{ client_name }} &>/dev/null; then
echo "Client '{{ client_name }}' already exists."
echo "To recreate, first delete it with: just lakekeeper::delete-oidc-api-client {{ client_name }}"
exit 1
exit 0
fi
# Create confidential client with service account
@@ -222,6 +222,10 @@ install:
done
echo "Installing Lakekeeper..."
just create-namespace
kubectl label namespace ${LAKEKEEPER_NAMESPACE} \
pod-security.kubernetes.io/enforce=restricted --overwrite
just setup-database
just create-oidc-client
just add-helm-repo
@@ -249,7 +253,6 @@ install:
echo "Lakekeeper installation completed"
echo "Access Lakekeeper at: https://${LAKEKEEPER_HOST}"
# Create the OIDC client for API access at the end to print credentials
just create-oidc-api-client
# Uninstall Lakekeeper

View File

@@ -48,6 +48,27 @@ catalog:
cpu: 100m
memory: 256Mi
# Security context for Pod Security Standards (restricted)
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
fsGroupChangePolicy: OnRootMismatch
seccompProfile:
type: RuntimeDefault
containerSecurityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: false
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
seccompProfile:
type: RuntimeDefault
capabilities:
drop:
- ALL
# Database migration configuration
dbMigrations: