Skip to content

Commit

Permalink
ci: add readonly config test/example (#215)
Browse files Browse the repository at this point in the history
* ci: add readonly config test/example

* ci: add readonly config test/example
  • Loading branch information
langchain-infra authored Feb 6, 2025
1 parent 34ef546 commit 7e0c19a
Showing 1 changed file with 105 additions and 0 deletions.
105 changes: 105 additions & 0 deletions charts/langgraph-cloud/ci/readonly-config-values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,105 @@
# Read-Only configuration. Use this if you are running in an environment where containers must run as read-only.
config:
langGraphCloudLicenseKey: "YOUR_LICENSE_KEY"

apiServer:
deployment:
resources:
requests:
cpu: 100m
memory: 500Mi
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
securityContext:
capabilities:
drop:
- ALL
seccompProfile:
type: RuntimeDefault
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
# Note you may need to mount tmp directories if your graph writes to disk

studio:
deployment:
resources:
requests:
cpu: 100m
memory: 500Mi
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
securityContext:
capabilities:
drop:
- ALL
seccompProfile:
type: RuntimeDefault
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumes:
- name: tmp
emptyDir: {}
- name: etc
emptyDir: {}
volumeMounts:
- name: tmp
mountPath: /tmp
- name: etc
mountPath: /etc/nginx/conf.d


postgres:
statefulSet:
resources:
requests:
cpu: 500m
memory: 1000Mi
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
securityContext:
capabilities:
drop:
- ALL
seccompProfile:
type: RuntimeDefault
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumes:
- name: tmp
emptyDir: {}
- name: postgres
emptyDir: {}
volumeMounts:
- name: tmp
mountPath: /tmp
- name: postgres
mountPath: /run/postgresql

redis:
deployment:
resources:
requests:
cpu: 200m
memory: 500Mi
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
securityContext:
capabilities:
drop:
- ALL
seccompProfile:
type: RuntimeDefault
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true

0 comments on commit 7e0c19a

Please sign in to comment.