-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set nextcloud.podSecurityContext.fsGroup
to 33
by default and allow users to configure it if needed.
#379
base: main
Are you sure you want to change the base?
Conversation
ef312d3
to
e27d420
Compare
5a6eb60
to
4ee5f70
Compare
82
if the image.flavor
is fpm-alpine
podSecurityContext.fsGroup
by default; set nextcloud.securityContext
by default
podSecurityContext.fsGroup
by default; set nextcloud.securityContext
by defaultpodSecurityContext.fsGroup
to 33
by default; set nextcloud.securityContext
by default
a5d1faa
to
180635a
Compare
podSecurityContext.fsGroup
to 33
by default; set nextcloud.securityContext
by defaultpodSecurityContext.fsGroup
to 33
by default
just need to rebase to fix the commits, but this seems to be okay now I think |
f6816df
to
057c957
Compare
The name of the commit/PR is a bit misleading because fsGroup was 33 by default if using apache, so nothing changes for those cases. |
podSecurityContext.fsGroup
to 33
by defaultpodSecurityContext.fsGroup
to 33
, even if nginx is enabled
Fixed the PR and can fix the commits. does this work?
Happy to change it to whatever makes most sense. Also, thank you again for all your patience through this. It's been a doozy 😅 |
3f280fa
to
2e62198
Compare
fixed commit message :) |
Looking into why CI is failing. Submitted this PR, which will at least help with the warnings. |
Perhaps it just doesn't like the |
2e62198
to
8f0fbf9
Compare
Getting this error still in the linting step in the github workflow:
maybe it has something to do with the fact that we changed the default branch from |
seems to be happening on another PR as well, checking something, going to do a test commit here |
477b13c
to
8f0fbf9
Compare
Yeah, Nextcloud uses a lot of GH actions and there is a max limit per org. I think some people are experimenting with adding our own runners to speed this up. |
Oh, thank you for letting me know! Then I will not try to cancel and re-run them. Sorry about doing that earlier. I only tried to cancel and rerun one of them after it'd been over 15 minutes, because I thought there was something wrong with my own rate limiting, because I do a lot of stuff on github. 😅 |
CI finished, this is a working PR, finally! |
add note in README about alpine containers needing to change to 82 manually this ensures our defaults work when using image.flavor fpm or apache Signed-off-by: Jesse Hitch <[email protected]>
Signed-off-by: JesseBot <[email protected]> Signed-off-by: Jesse Hitch <[email protected]>
9d42830
to
fa070cc
Compare
Signed-off-by: JesseBot <[email protected]>
I haven't merged this because I switched to using the |
ok, I have to begrudgingly reopen this because I want to solve #367 but if this is not merged, then I cannot test using the fpm container with no nginx container. |
Signed-off-by: JesseBot <[email protected]>
podSecurityContext.fsGroup
to 33
, even if nginx is enablednextcloud.podSecurityContext.fsGroup
to 33
by default and allow users to configure it if needed.
Signed-off-by: JesseBot <[email protected]>
@@ -136,7 +138,8 @@ The following table lists the configurable parameters of the nextcloud chart and | |||
| `nextcloud.extraVolumes` | specify additional volumes for the NextCloud pod | `{}` | | |||
| `nextcloud.extraVolumeMounts` | specify additional volume mounts for the NextCloud pod | `{}` | | |||
| `nextcloud.securityContext` | Optional security context for the NextCloud container | `nil` | | |||
| `nextcloud.podSecurityContext` | Optional security context for the NextCloud pod (applies to all containers in the pod) | `nil` | | |||
| `nextcloud.podSecurityContext` | Optional security context for the NextCloud pod (applies to all containers in the pod) | `{fsgroup: 33}` | | |||
| `nextcloud.podSecurityContext.fsGroup` | special supplemental group that applies to all containers in the NextCloud pod | `33` | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
duplicated with the line above
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should I combine the description of both? 🤔 Do you prefer we keep the parameter line of 141 or 142? (also congrats on being a collaborator now!! 🎉 )
# runAsUser: 33 | ||
# runAsGroup: 33 | ||
# runAsNonRoot: true | ||
# readOnlyRootFilesystem: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is not part of podSecurityContext
@@ -352,19 +352,12 @@ spec: | |||
{{- toYaml . | nindent 8 }} | |||
{{- end }} | |||
securityContext: | |||
# this is deprecated and will be removed in a future release - use nextcloud.podSecurityContext instead |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we drop securityContext now? And announce it as a breaking change?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm ok with this
Pull Request
Description of the change
Changes default fsGroup to be
33
. In allapache
and regularfpm
, thewww-data
user is33
.The
www-data
user is82
in all alpine images (including nginx), so I added a note in the README about it.Previously we relied on if the user was using
nginx.enabled
which is alpine by default, but usingnginx:alpine
doesn't mean you're usingnextcloud:fpm-alpine
.Benefits
If someone uses
image.flavor
ofapache
orfpm
, thefsGroup
should be33
by default.Possible drawbacks
If you used an alpine image, you will now have to manually set
nextcloud.podSecurityContext.fsGroup
to be82
in your values.yaml.Applicable issues
/var/www/html/config
always owned by root #335Additional information
Checklist
Chart.yaml
according to semver.