@@ -223,48 +223,38 @@ func TestAdmitSuccess(t *testing.T) {
223
223
Level : "s0:c1,c0" ,
224
224
}
225
225
226
+ // level matches a value from namespace (see CreateNamespaceForTest())
227
+ seLinuxLevelFromNamespace := "s0:c1,c0"
228
+
226
229
testCases := map [string ]struct {
227
- pod * kapi.Pod
228
- expectedUID int64
229
- expectedLevel string
230
- expectedFSGroup int64
231
- expectedSupGroups []int64
232
- expectedPriv bool
230
+ pod * kapi.Pod
231
+ expectedPodSC * kapi.PodSecurityContext
232
+ expectedContainerSC * kapi.SecurityContext
233
233
}{
234
234
"specifyUIDInRange" : {
235
- pod : specifyUIDInRange ,
236
- expectedUID : * specifyUIDInRange .Spec .Containers [0 ].SecurityContext .RunAsUser ,
237
- expectedLevel : "s0:c1,c0" ,
238
- expectedFSGroup : defaultGroup ,
239
- expectedSupGroups : []int64 {defaultGroup },
235
+ pod : specifyUIDInRange ,
236
+ expectedPodSC : podSC (seLinuxLevelFromNamespace , defaultGroup , defaultGroup ),
237
+ expectedContainerSC : containerSC (seLinuxLevelFromNamespace , goodUID ),
240
238
},
241
239
"specifyLabels" : {
242
- pod : specifyLabels ,
243
- expectedUID : 1 ,
244
- expectedLevel : specifyLabels .Spec .Containers [0 ].SecurityContext .SELinuxOptions .Level ,
245
- expectedFSGroup : defaultGroup ,
246
- expectedSupGroups : []int64 {defaultGroup },
240
+ pod : specifyLabels ,
241
+ expectedPodSC : podSC (seLinuxLevelFromNamespace , defaultGroup , defaultGroup ),
242
+ expectedContainerSC : containerSC (seLinuxLevelFromNamespace , 1 ),
247
243
},
248
244
"specifyFSGroup" : {
249
- pod : specifyFSGroupInRange ,
250
- expectedUID : 1 ,
251
- expectedLevel : "s0:c1,c0" ,
252
- expectedFSGroup : * specifyFSGroupInRange .Spec .SecurityContext .FSGroup ,
253
- expectedSupGroups : []int64 {defaultGroup },
245
+ pod : specifyFSGroupInRange ,
246
+ expectedPodSC : podSC (seLinuxLevelFromNamespace , goodFSGroup , defaultGroup ),
247
+ expectedContainerSC : containerSC (seLinuxLevelFromNamespace , 1 ),
254
248
},
255
249
"specifySupGroup" : {
256
- pod : specifySupGroup ,
257
- expectedUID : 1 ,
258
- expectedLevel : "s0:c1,c0" ,
259
- expectedFSGroup : defaultGroup ,
260
- expectedSupGroups : []int64 {specifySupGroup .Spec .SecurityContext .SupplementalGroups [0 ]},
250
+ pod : specifySupGroup ,
251
+ expectedPodSC : podSC (seLinuxLevelFromNamespace , defaultGroup , 3 ),
252
+ expectedContainerSC : containerSC (seLinuxLevelFromNamespace , 1 ),
261
253
},
262
254
"specifyPodLevelSELinuxLevel" : {
263
- pod : specifyPodLevelSELinux ,
264
- expectedUID : 1 ,
265
- expectedLevel : "s0:c1,c0" ,
266
- expectedFSGroup : defaultGroup ,
267
- expectedSupGroups : []int64 {defaultGroup },
255
+ pod : specifyPodLevelSELinux ,
256
+ expectedPodSC : podSC (seLinuxLevelFromNamespace , defaultGroup , defaultGroup ),
257
+ expectedContainerSC : containerSC (seLinuxLevelFromNamespace , 1 ),
268
258
},
269
259
}
270
260
@@ -290,28 +280,12 @@ func TestAdmitSuccess(t *testing.T) {
290
280
t .Errorf ("%s should have validated against %s but found %s" , k , saSCC .Name , validatedSCC )
291
281
}
292
282
293
- // ensure anything we expected to be defaulted on the container level is set
294
- if * containers [0 ].SecurityContext .RunAsUser != v .expectedUID {
295
- t .Errorf ("%s expected UID %d but found %d" , k , v .expectedUID , * containers [0 ].SecurityContext .RunAsUser )
296
- }
297
- if containers [0 ].SecurityContext .SELinuxOptions .Level != v .expectedLevel {
298
- t .Errorf ("%s expected Level %s but found %s" , k , v .expectedLevel , containers [0 ].SecurityContext .SELinuxOptions .Level )
283
+ if ! reflect .DeepEqual (v .expectedPodSC , v .pod .Spec .SecurityContext ) {
284
+ t .Errorf ("%s unexpected pod SecurityContext diff:\n %s" , k , diff .ObjectGoPrintSideBySide (v .expectedPodSC , v .pod .Spec .SecurityContext ))
299
285
}
300
286
301
- // ensure anything we expected to be defaulted on the pod level is set
302
- if v .pod .Spec .SecurityContext .SELinuxOptions .Level != v .expectedLevel {
303
- t .Errorf ("%s expected pod level SELinux Level %s but found %s" , k , v .expectedLevel , v .pod .Spec .SecurityContext .SELinuxOptions .Level )
304
- }
305
- if * v .pod .Spec .SecurityContext .FSGroup != v .expectedFSGroup {
306
- t .Errorf ("%s expected fsgroup %d but found %d" , k , v .expectedFSGroup , * v .pod .Spec .SecurityContext .FSGroup )
307
- }
308
- if len (v .pod .Spec .SecurityContext .SupplementalGroups ) != len (v .expectedSupGroups ) {
309
- t .Errorf ("%s found unexpected supplemental groups. Expected: %v, actual %v" , k , v .expectedSupGroups , v .pod .Spec .SecurityContext .SupplementalGroups )
310
- }
311
- for _ , g := range v .expectedSupGroups {
312
- if ! hasSupGroup (g , v .pod .Spec .SecurityContext .SupplementalGroups ) {
313
- t .Errorf ("%s expected sup group %d" , k , g )
314
- }
287
+ if ! reflect .DeepEqual (v .expectedContainerSC , containers [0 ].SecurityContext ) {
288
+ t .Errorf ("%s unexpected container SecurityContext diff:\n %s" , k , diff .ObjectGoPrintSideBySide (v .expectedContainerSC , containers [0 ].SecurityContext ))
315
289
}
316
290
}
317
291
}
@@ -441,15 +415,6 @@ func TestAdmitFailure(t *testing.T) {
441
415
}
442
416
}
443
417
444
- func hasSupGroup (group int64 , groups []int64 ) bool {
445
- for _ , g := range groups {
446
- if g == group {
447
- return true
448
- }
449
- }
450
- return false
451
- }
452
-
453
418
func TestCreateProvidersFromConstraints (t * testing.T ) {
454
419
namespaceValid := & kapi.Namespace {
455
420
ObjectMeta : metav1.ObjectMeta {
@@ -1124,6 +1089,27 @@ func goodPod() *kapi.Pod {
1124
1089
}
1125
1090
}
1126
1091
1092
+ func containerSC (seLinuxLevel string , uid int64 ) * kapi.SecurityContext {
1093
+ no := false
1094
+ return & kapi.SecurityContext {
1095
+ Privileged : & no ,
1096
+ RunAsUser : & uid ,
1097
+ SELinuxOptions : & kapi.SELinuxOptions {
1098
+ Level : seLinuxLevel ,
1099
+ },
1100
+ }
1101
+ }
1102
+
1103
+ func podSC (seLinuxLevel string , fsGroup , supGroup int64 ) * kapi.PodSecurityContext {
1104
+ return & kapi.PodSecurityContext {
1105
+ SELinuxOptions : & kapi.SELinuxOptions {
1106
+ Level : seLinuxLevel ,
1107
+ },
1108
+ SupplementalGroups : []int64 {supGroup },
1109
+ FSGroup : & fsGroup ,
1110
+ }
1111
+ }
1112
+
1127
1113
func setupClientSet () * clientsetfake.Clientset {
1128
1114
// create the annotated namespace and add it to the fake client
1129
1115
namespace := admissiontesting .CreateNamespaceForTest ()
0 commit comments