diff --git a/.github/workflows/chart-testing.yaml b/.github/workflows/chart-testing.yaml index 79289eeb6..cf1ef1863 100644 --- a/.github/workflows/chart-testing.yaml +++ b/.github/workflows/chart-testing.yaml @@ -81,7 +81,7 @@ jobs: python-version: 3.7 - name: Setup chart-testing id: lint - uses: helm/chart-testing-action@e8788873172cb653a90ca2e819d79d65a66d4e76 + uses: helm/chart-testing-action@v2.6.0 - name: Run chart-testing run: ct lint-and-install --validate-maintainers=false --charts deploy/helm - name: Delete kind cluster diff --git a/.github/workflows/publish-helm-chart.yaml b/.github/workflows/publish-helm-chart.yaml index d7156a4d4..c3e013f51 100644 --- a/.github/workflows/publish-helm-chart.yaml +++ b/.github/workflows/publish-helm-chart.yaml @@ -32,7 +32,7 @@ jobs: python-version: 3.7 - name: Setup Chart Linting id: lint - uses: helm/chart-testing-action@e8788873172cb653a90ca2e819d79d65a66d4e76 # v2.1.0 + uses: helm/chart-testing-action@v2.6.0 - name: Setup Kubernetes cluster (KIND) uses: helm/kind-action@v1.8.0 # v1.5.0 with: diff --git a/deploy/helm/README.md b/deploy/helm/README.md index 5291bb78d..0f63c8383 100644 --- a/deploy/helm/README.md +++ b/deploy/helm/README.md @@ -32,7 +32,7 @@ Keeps security report resources updated | nodeCollector.registry | string | `"ghcr.io"` | registry of the node-collector image | | nodeCollector.repository | string | `"aquasecurity/node-collector"` | repository of the node-collector image | | nodeCollector.tag | string | `"0.0.8"` | tag version of the node-collector image | -| nodeCollector.volumeMounts | list | `[{"mountPath":"/var/lib/etcd","name":"var-lib-etcd","readOnly":true},{"mountPath":"/var/lib/kubelet","name":"var-lib-kubelet","readOnly":true},{"mountPath":"/var/lib/kube-scheduler","name":"var-lib-kube-scheduler","readOnly":true},{"mountPath":"/var/lib/kube-controller-manager","name":"var-lib-kube-controller-manager","readOnly":true},{"mountPath":"/etc/systemd","name":"etc-systemd","readOnly":true},{"mountPath":"/lib/systemd/","name":"lib-systemd","readOnly":true},{"mountPath":"/etc/kubernetes","name":"etc-kubernetes","readOnly":true},{"mountPath":"/etc/cni/net.d/","name":"etc-cni-netd","readOnly":true}]` | node-collector pod volumeMounts definition for collecting config files information | +| nodeCollector.volumeMounts | list | `[{"mountPath":"/var/lib/etcd","name":"var-lib-etcd","readOnly":true},{"mountPath":"/var/lib/kubelet","name":"var-lib-kubelet","readOnly":true},{"mountPath":"/var/lib/kube-scheduler","name":"var-lib-kube-scheduler","readOnly":true},{"mountPath":"/var/lib/kube-controller-manager","name":"var-lib-kube-controller-manager","readOnly":true},{"mountPath":"/etc/systemd","name":"etc-systemd","readOnly":true},{"mountPath":"/lib/systemd/","name":"lib-systemd","readOnly":true},{"mountPath":"/etc/kubernetes","name":"etc-kubernetes","readOnly":true},{"mountPath":"/etc/cni/net.d/","name":"etc-cni-netd","readOnly":true}]` | node-collector pod volume mounts definition for collecting config files information | | nodeCollector.volumes | list | `[{"hostPath":{"path":"/var/lib/etcd"},"name":"var-lib-etcd"},{"hostPath":{"path":"/var/lib/kubelet"},"name":"var-lib-kubelet"},{"hostPath":{"path":"/var/lib/kube-scheduler"},"name":"var-lib-kube-scheduler"},{"hostPath":{"path":"/var/lib/kube-controller-manager"},"name":"var-lib-kube-controller-manager"},{"hostPath":{"path":"/etc/systemd"},"name":"etc-systemd"},{"hostPath":{"path":"/lib/systemd"},"name":"lib-systemd"},{"hostPath":{"path":"/etc/kubernetes"},"name":"etc-kubernetes"},{"hostPath":{"path":"/etc/cni/net.d/"},"name":"etc-cni-netd"}]` | node-collector pod volumes definition for collecting config files information | | nodeSelector | object | `{}` | nodeSelector set the operator nodeSelector | | operator.accessGlobalSecretsAndServiceAccount | bool | `true` | accessGlobalSecretsAndServiceAccount The flag to enable access to global secrets/service accounts to allow `vulnerability scan job` to pull images from private registries | diff --git a/deploy/helm/values.yaml b/deploy/helm/values.yaml index 91e2559ed..fe5c3c6d6 100644 --- a/deploy/helm/values.yaml +++ b/deploy/helm/values.yaml @@ -554,7 +554,7 @@ nodeCollector: imagePullSecret: ~ # -- excludeNodes comma-separated node labels that the node-collector job should exclude from scanning (example kubernetes.io/arch=arm64,team=dev) excludeNodes: - # -- node-collector pod volumeMounts definition for collecting config files information + # -- node-collector pod volume mounts definition for collecting config files information volumeMounts: - name: var-lib-etcd mountPath: /var/lib/etcd