diff --git a/charts/trino/README.md b/charts/trino/README.md index 54c0e2cc..0d8cd76d 100644 --- a/charts/trino/README.md +++ b/charts/trino/README.md @@ -244,6 +244,15 @@ Fast distributed SQL query engine for big data analytics that helps you explore ``` * `securityContext.runAsUser` - int, default: `1000` * `securityContext.runAsGroup` - int, default: `1000` +* `containerSecurityContext` - object, default: `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}` + + [Container security context](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) configuration. +* `containerSecurityContext.allowPrivilegeEscalation` - bool, default: `false` + + Control whether a process can gain more privileges than its parent process. +* `containerSecurityContext.capabilities.drop` - list, default: `["ALL"]` + + A list of the Linux kernel capabilities that are dropped from every container. Valid values are listed at https://man7.org/linux/man-pages/man7/capabilities.7.html Ensure to remove the "CAP_" prefix which the kernel attaches to the names of permissions. * `shareProcessNamespace.coordinator` - bool, default: `false` * `shareProcessNamespace.worker` - bool, default: `false` * `service.type` - string, default: `"ClusterIP"` diff --git a/charts/trino/values.yaml b/charts/trino/values.yaml index 9dd6aea3..e0e31fa6 100644 --- a/charts/trino/values.yaml +++ b/charts/trino/values.yaml @@ -267,6 +267,15 @@ securityContext: runAsUser: 1000 runAsGroup: 1000 +# -- [Container security context](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) configuration. +containerSecurityContext: + # -- Control whether a process can gain more privileges than its parent process. + allowPrivilegeEscalation: false + capabilities: + # -- A list of the Linux kernel capabilities that are dropped from every container. Valid values are listed at https://man7.org/linux/man-pages/man7/capabilities.7.html Ensure to remove the "CAP_" prefix which the kernel attaches to the names of permissions. + drop: + - ALL + shareProcessNamespace: coordinator: false worker: false