[forgejo] securityContext.fsGroup=1000 so /data is writable to forgejo
Phase 0 enabled packages but the pod crashloops on `mkdir /data/tmp: permission denied` — Forgejo loads the chunked upload path (default /data/tmp/package-upload) before s6-overlay gets a chance to chown /data. fsGroup tells kubelet to recursively chown the volume to GID 1000 on mount, which fixes it. Pre-23-day Forgejo deployed with packages off so this code path never ran. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
This commit is contained in:
parent
3fb05825d8
commit
413ceec35c
1 changed files with 8 additions and 0 deletions
|
|
@ -72,6 +72,14 @@ resource "kubernetes_deployment" "forgejo" {
|
|||
}
|
||||
}
|
||||
spec {
|
||||
# fsGroup chowns the mounted PVC to GID 1000 (the forgejo user) on
|
||||
# mount. Without this, /data is owned by root and the
|
||||
# `[packages].CHUNKED_UPLOAD_PATH` default at /data/tmp is not
|
||||
# writable, crashlooping the pod when packages is enabled. Pre-23-day
|
||||
# Forgejo ran without packages on so this never surfaced.
|
||||
security_context {
|
||||
fs_group = 1000
|
||||
}
|
||||
container {
|
||||
name = "forgejo"
|
||||
image = "codeberg.org/forgejo/forgejo:11"
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue