@@ -220,6 +220,16 @@ func TestValidatePodSecurityContextFailures(t *testing.T) {
220
220
failUnsafeSysctlFooPod := defaultPod ()
221
221
failUnsafeSysctlFooPod .Annotations [api .UnsafeSysctlsPodAnnotationKey ] = "foo=1"
222
222
223
+ failHostDirPod := defaultPod ()
224
+ failHostDirPod .Spec .Volumes = []api.Volume {
225
+ {
226
+ Name : "bad volume" ,
227
+ VolumeSource : api.VolumeSource {
228
+ HostPath : & api.HostPathVolumeSource {},
229
+ },
230
+ },
231
+ }
232
+
223
233
errorCases := map [string ]struct {
224
234
pod * api.Pod
225
235
scc * securityapi.SecurityContextConstraints
@@ -300,6 +310,11 @@ func TestValidatePodSecurityContextFailures(t *testing.T) {
300
310
scc : failOtherSysctlsAllowedSCC ,
301
311
expectedError : "sysctl \" foo\" is not allowed" ,
302
312
},
313
+ "failHostDirSCC" : {
314
+ pod : failHostDirPod ,
315
+ scc : defaultSCC (),
316
+ expectedError : "hostPath volumes are not allowed to be used" ,
317
+ },
303
318
}
304
319
for k , v := range errorCases {
305
320
provider , err := NewSimpleProvider (v .scc )
@@ -351,16 +366,6 @@ func TestValidateContainerSecurityContextFailures(t *testing.T) {
351
366
Add : []api.Capability {"foo" },
352
367
}
353
368
354
- failHostDirPod := defaultPod ()
355
- failHostDirPod .Spec .Volumes = []api.Volume {
356
- {
357
- Name : "bad volume" ,
358
- VolumeSource : api.VolumeSource {
359
- HostPath : & api.HostPathVolumeSource {},
360
- },
361
- },
362
- }
363
-
364
369
failHostPortPod := defaultPod ()
365
370
failHostPortPod .Spec .Containers [0 ].Ports = []api.ContainerPort {{HostPort : 1 }}
366
371
@@ -406,11 +411,6 @@ func TestValidateContainerSecurityContextFailures(t *testing.T) {
406
411
scc : defaultSCC (),
407
412
expectedError : "capability may not be added" ,
408
413
},
409
- "failHostDirSCC" : {
410
- pod : failHostDirPod ,
411
- scc : defaultSCC (),
412
- expectedError : "hostPath volumes are not allowed to be used" ,
413
- },
414
414
"failHostPortSCC" : {
415
415
pod : failHostPortPod ,
416
416
scc : defaultSCC (),
@@ -926,7 +926,7 @@ func TestValidateAllowedVolumes(t *testing.T) {
926
926
}
927
927
928
928
// expect a denial for this SCC and test the error message to ensure it's related to the volumesource
929
- errs := provider .ValidateContainerSecurityContext (pod , & pod . Spec . Containers [ 0 ] , field .NewPath ("" ))
929
+ errs := provider .ValidatePodSecurityContext (pod , field .NewPath ("" ))
930
930
if len (errs ) != 1 {
931
931
t .Errorf ("expected exactly 1 error for %s but got %v" , fieldVal .Name , errs )
932
932
} else {
@@ -937,14 +937,14 @@ func TestValidateAllowedVolumes(t *testing.T) {
937
937
938
938
// now add the fstype directly to the scc and it should validate
939
939
scc .Volumes = []securityapi.FSType {fsType }
940
- errs = provider .ValidateContainerSecurityContext (pod , & pod . Spec . Containers [ 0 ] , field .NewPath ("" ))
940
+ errs = provider .ValidatePodSecurityContext (pod , field .NewPath ("" ))
941
941
if len (errs ) != 0 {
942
942
t .Errorf ("directly allowing volume expected no errors for %s but got %v" , fieldVal .Name , errs )
943
943
}
944
944
945
945
// now change the scc to allow any volumes and the pod should still validate
946
946
scc .Volumes = []securityapi.FSType {securityapi .FSTypeAll }
947
- errs = provider .ValidateContainerSecurityContext (pod , & pod . Spec . Containers [ 0 ] , field .NewPath ("" ))
947
+ errs = provider .ValidatePodSecurityContext (pod , field .NewPath ("" ))
948
948
if len (errs ) != 0 {
949
949
t .Errorf ("wildcard volume expected no errors for %s but got %v" , fieldVal .Name , errs )
950
950
}
0 commit comments