chore(lakekeeper): set pod security standards
This commit is contained in:
@@ -154,7 +154,7 @@ create-oidc-api-client client_name='lakekeeper-api':
|
|||||||
if just keycloak::client-exists ${KEYCLOAK_REALM} {{ client_name }} &>/dev/null; then
|
if just keycloak::client-exists ${KEYCLOAK_REALM} {{ client_name }} &>/dev/null; then
|
||||||
echo "Client '{{ client_name }}' already exists."
|
echo "Client '{{ client_name }}' already exists."
|
||||||
echo "To recreate, first delete it with: just lakekeeper::delete-oidc-api-client {{ client_name }}"
|
echo "To recreate, first delete it with: just lakekeeper::delete-oidc-api-client {{ client_name }}"
|
||||||
exit 1
|
exit 0
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Create confidential client with service account
|
# Create confidential client with service account
|
||||||
@@ -222,6 +222,10 @@ install:
|
|||||||
done
|
done
|
||||||
echo "Installing Lakekeeper..."
|
echo "Installing Lakekeeper..."
|
||||||
just create-namespace
|
just create-namespace
|
||||||
|
|
||||||
|
kubectl label namespace ${LAKEKEEPER_NAMESPACE} \
|
||||||
|
pod-security.kubernetes.io/enforce=restricted --overwrite
|
||||||
|
|
||||||
just setup-database
|
just setup-database
|
||||||
just create-oidc-client
|
just create-oidc-client
|
||||||
just add-helm-repo
|
just add-helm-repo
|
||||||
@@ -249,7 +253,6 @@ install:
|
|||||||
echo "Lakekeeper installation completed"
|
echo "Lakekeeper installation completed"
|
||||||
echo "Access Lakekeeper at: https://${LAKEKEEPER_HOST}"
|
echo "Access Lakekeeper at: https://${LAKEKEEPER_HOST}"
|
||||||
|
|
||||||
# Create the OIDC client for API access at the end to print credentials
|
|
||||||
just create-oidc-api-client
|
just create-oidc-api-client
|
||||||
|
|
||||||
# Uninstall Lakekeeper
|
# Uninstall Lakekeeper
|
||||||
|
|||||||
@@ -48,6 +48,27 @@ catalog:
|
|||||||
cpu: 100m
|
cpu: 100m
|
||||||
memory: 256Mi
|
memory: 256Mi
|
||||||
|
|
||||||
|
# Security context for Pod Security Standards (restricted)
|
||||||
|
podSecurityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
fsGroup: 1000
|
||||||
|
fsGroupChangePolicy: OnRootMismatch
|
||||||
|
seccompProfile:
|
||||||
|
type: RuntimeDefault
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: RuntimeDefault
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
|
||||||
# Database migration configuration
|
# Database migration configuration
|
||||||
dbMigrations:
|
dbMigrations:
|
||||||
|
|||||||
Reference in New Issue
Block a user