@@ -778,7 +778,6 @@ Sidecar configures a sidecar that intercepts every HTTP request, and performs th
778
778
All requests to ingress + ` /oauth2 ` will be processed only by the sidecar, whereas all other requests
779
779
will be proxied to the application.
780
780
781
-
782
781
If the user is authenticated with Entra ID, the ` Authorization ` header will be set to ` Bearer <JWT> ` .
783
782
784
783
Relevant information:
@@ -1109,11 +1108,9 @@ Allowed values: _(empty string)_, `metadata.annotations`, `metadata.labels`, `me
1109
1108
EnvFrom exposes all variables in the ConfigMap or Secret resources as environment variables.
1110
1109
One of ` configMap ` or ` secret ` is required.
1111
1110
1112
-
1113
1111
Environment variables will take the form ` KEY=VALUE ` , where ` key ` is the ConfigMap or Secret key.
1114
1112
You can specify as many keys as you like in a single ConfigMap or Secret.
1115
1113
1116
-
1117
1114
The ConfigMap and Secret resources must live in the same Kubernetes namespace as the Application resource.
1118
1115
1119
1116
Type: ` array ` <br />
@@ -1162,17 +1159,14 @@ Required: `false`<br />
1162
1159
List of ConfigMap, Secret, or EmptyDir resources that will have their contents mounted into the containers.
1163
1160
Either ` configMap ` , ` secret ` , or ` emptyDir ` is required.
1164
1161
1165
-
1166
1162
Files will take the path ` <mountPath>/<key> ` , where ` key ` is the ConfigMap or Secret key.
1167
1163
You can specify as many keys as you like in a single ConfigMap or Secret, and they will all
1168
1164
be mounted to the same directory.
1169
1165
1170
-
1171
1166
If you reference an emptyDir you will just get an empty directory, backed
1172
1167
by your requested memory or the disk on the node where your pod is
1173
1168
running.
1174
1169
1175
-
1176
1170
The ConfigMap and Secret resources must live in the same Kubernetes namespace as the Application resource.
1177
1171
1178
1172
Type: ` array ` <br />
@@ -1262,7 +1256,6 @@ Filesystem path inside the pod where files are mounted.
1262
1256
The directory will be created if it does not exist. If the directory exists,
1263
1257
any files in the directory will be made unaccessible.
1264
1258
1265
-
1266
1259
Defaults to ` /var/run/configmaps/<NAME> ` , ` /var/run/secrets ` , or ` /var/run/pvc/<NAME> ` , depending on which of them is specified.
1267
1260
For EmptyDir, MountPath must be set.
1268
1261
@@ -1815,7 +1808,6 @@ Allows you to uniformly control access to your Cloud Storage resources.
1815
1808
When you enable uniform bucket-level access on a bucket, Access Control Lists (ACLs) are disabled, and only bucket-level Identity
1816
1809
and Access Management (IAM) permissions grant access to that bucket and the objects it contains.
1817
1810
1818
-
1819
1811
Uniform access control can not be reversed after 90 days! This is controlled by Google.
1820
1812
1821
1813
Relevant information:
@@ -2984,7 +2976,7 @@ Required: `false`<br />
2984
2976
2985
2977
##### gcp.sqlInstances[ ] .maintenance.day
2986
2978
Type: ` integer ` <br />
2987
- Required: ` false ` <br />
2979
+ Required: ` true ` <br />
2988
2980
Value range: ` 1 ` -` 7 ` <br />
2989
2981
2990
2982
??? example
@@ -3026,7 +3018,7 @@ Value range: `1`-`7`<br />
3026
3018
3027
3019
##### gcp.sqlInstances[ ] .maintenance.hour
3028
3020
Type: ` integer ` <br />
3029
- Required: ` false ` <br />
3021
+ Required: ` true ` <br />
3030
3022
Value range: ` 0 ` -` 23 ` <br />
3031
3023
3032
3024
??? example
@@ -3399,7 +3391,6 @@ Sidecar configures a sidecar that intercepts every HTTP request, and performs th
3399
3391
All requests to ingress + ` /oauth2 ` will be processed only by the sidecar, whereas all other requests
3400
3392
will be proxied to the application.
3401
3393
3402
-
3403
3394
If the user is authenticated with ID-porten, the ` Authorization ` header will be set to ` Bearer <JWT> ` .
3404
3395
3405
3396
Relevant information:
@@ -4755,7 +4746,6 @@ Command is the command line to execute inside the container before the pod is sh
4755
4746
The command is not run inside a shell, so traditional shell instructions (pipes, redirects, etc.) won't work.
4756
4747
To use a shell, you need to explicitly call out to that shell.
4757
4748
4758
-
4759
4749
If the exit status is non-zero, the pod will still be shut down, and marked as ` Failed ` .
4760
4750
4761
4751
Type: ` array ` <br />
@@ -5813,14 +5803,11 @@ Required: `false`<br />
5813
5803
List of secret paths to be read from Vault and injected into the pod's filesystem.
5814
5804
Overriding the ` paths ` array is optional, and will give you fine-grained control over which Vault paths that will be mounted on the file system.
5815
5805
5816
-
5817
5806
By default, the list will contain an entry with
5818
5807
5819
-
5820
5808
` kvPath: /kv/<environment>/<zone>/<application>/<namespace> `
5821
5809
` mountPath: /var/run/secrets/nais.io/vault `
5822
5810
5823
-
5824
5811
that will always be attempted to be mounted.
5825
5812
5826
5813
Type: ` array ` <br />
0 commit comments