Skip to content

Commit 4c0c399

Browse files
clean repo from securityContex tests
The only way that I found that the pod security context was correctly propagated to the singleuser pod was by adding the configuration to the hub.extraConfig, as we do with the token-exchange
1 parent 69b250a commit 4c0c399

File tree

2 files changed

+1
-71
lines changed

2 files changed

+1
-71
lines changed

infrastructure/cluster/flux/jhub/jhub-configmap-profiles.yaml

Lines changed: 0 additions & 67 deletions
This file was deleted.

infrastructure/cluster/flux/jhub/jhub-release.yaml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,6 @@ spec:
3939
type: ClusterIP
4040

4141
hub:
42-
podSecurityContext:
43-
fsGroup: 100
44-
fsGroupChangePolicy: OnRootMismatch
4542
service:
4643
type: ClusterIP
4744
# network policy needs to be modified to allow access to the Rucio server
@@ -119,7 +116,7 @@ spec:
119116
# enable authentication state
120117
c.GenericOAuthenticator.enable_auth_state = True
121118
122-
01-custom-securityContex: |
119+
01-custom-securityContext: |
123120
124121
c.KubeSpawner.pod_security_context = {
125122
'fsGroup': 100,

0 commit comments

Comments
 (0)