@@ -100,6 +100,13 @@ type ServerGroupSpecSecurityContext struct {
100100 DropAllCapabilities * bool `json:"dropAllCapabilities,omitempty"`
101101 // AddCapabilities add new capabilities to containers
102102 AddCapabilities []core.Capability `json:"addCapabilities,omitempty"`
103+
104+ AllowPrivilegeEscalation * bool `json:"allowPrivilegeEscalation,omitempty"`
105+ Privileged * bool `json:"privileged,omitempty"`
106+ ReadOnlyRootFilesystem * bool `json:"readOnlyFileSystem,omitempty"`
107+ RunAsNonRoot * bool `json:"runAsNonRoot,omitempty"`
108+ RunAsUser * int64 `json:"runAsUser,omitempty"`
109+ RunAsGroup * int64 `json:"runAsGroup,omitempty"`
103110}
104111
105112// GetDropAllCapabilities returns flag if capabilities should be dropped
@@ -134,6 +141,15 @@ func (s *ServerGroupSpecSecurityContext) GetAddCapabilities() []core.Capability
134141func (s * ServerGroupSpecSecurityContext ) NewSecurityContext () * core.SecurityContext {
135142 r := & core.SecurityContext {}
136143
144+ if s != nil {
145+ r .AllowPrivilegeEscalation = s .AllowPrivilegeEscalation
146+ r .Privileged = s .Privileged
147+ r .ReadOnlyRootFilesystem = s .ReadOnlyRootFilesystem
148+ r .RunAsNonRoot = s .RunAsNonRoot
149+ r .RunAsUser = s .RunAsUser
150+ r .RunAsGroup = s .RunAsGroup
151+ }
152+
137153 capabilities := & core.Capabilities {}
138154
139155 if s .GetDropAllCapabilities () {
0 commit comments