Skip to content

Commit

Permalink
make generate manifests
Browse files Browse the repository at this point in the history
  • Loading branch information
cbarbian-sap committed Dec 19, 2024
1 parent c9df7fb commit 4d387f0
Showing 1 changed file with 30 additions and 0 deletions.
30 changes: 30 additions & 0 deletions crds/operator.kyma-project.io_redisoperators.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1152,6 +1152,32 @@ spec:
Note that this field cannot be set when spec.os.name is windows.
format: int64
type: integer
seLinuxChangePolicy:
description: |-
seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod.
It has no effect on nodes that do not support SELinux or to volumes does not support SELinux.
Valid values are "MountOption" and "Recursive".
"Recursive" means relabeling of all files on all Pod volumes by the container runtime.
This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node.
"MountOption" mounts all eligible Pod volumes with `-o context` mount option.
This requires all Pods that share the same volume to use the same SELinux label.
It is not possible to share the same volume among privileged and unprivileged Pods.
Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes
whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their
CSIDriver instance. Other volumes are always re-labelled recursively.
"MountOption" value is allowed only when SELinuxMount feature gate is enabled.
If not specified and SELinuxMount feature gate is enabled, "MountOption" is used.
If not specified and SELinuxMount feature gate is disabled, "MountOption" is used for ReadWriteOncePod volumes
and "Recursive" for all other volumes.
This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers.
All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state.
Note that this field cannot be set when spec.os.name is windows.
type: string
seLinuxOptions:
description: |-
The SELinux context to be applied to all containers.
Expand Down Expand Up @@ -1813,6 +1839,10 @@ spec:
kind:
description: API kind.
type: string
lastAppliedAt:
description: Timestamp when this object was last applied.
format: date-time
type: string
managedTypes:
description: Managed types.
items:
Expand Down

0 comments on commit 4d387f0

Please sign in to comment.