Skip to content

Commit 0ea1b36

Browse files
committed
admission_test.go(TestAdmitSuccess): compare SecurityContexts instead of particular members.
1 parent 4eaeda2 commit 0ea1b36

File tree

1 file changed

+46
-60
lines changed

1 file changed

+46
-60
lines changed

pkg/security/admission/admission_test.go

+46-60
Original file line numberDiff line numberDiff line change
@@ -223,48 +223,38 @@ func TestAdmitSuccess(t *testing.T) {
223223
Level: "s0:c1,c0",
224224
}
225225

226+
// level matches a value from namespace (see CreateNamespaceForTest())
227+
seLinuxLevelFromNamespace := "s0:c1,c0"
228+
226229
testCases := map[string]struct {
227-
pod *kapi.Pod
228-
expectedUID int64
229-
expectedLevel string
230-
expectedFSGroup int64
231-
expectedSupGroups []int64
232-
expectedPriv bool
230+
pod *kapi.Pod
231+
expectedPodSC *kapi.PodSecurityContext
232+
expectedContainerSC *kapi.SecurityContext
233233
}{
234234
"specifyUIDInRange": {
235-
pod: specifyUIDInRange,
236-
expectedUID: *specifyUIDInRange.Spec.Containers[0].SecurityContext.RunAsUser,
237-
expectedLevel: "s0:c1,c0",
238-
expectedFSGroup: defaultGroup,
239-
expectedSupGroups: []int64{defaultGroup},
235+
pod: specifyUIDInRange,
236+
expectedPodSC: podSC(seLinuxLevelFromNamespace, defaultGroup, defaultGroup),
237+
expectedContainerSC: containerSC(seLinuxLevelFromNamespace, goodUID),
240238
},
241239
"specifyLabels": {
242-
pod: specifyLabels,
243-
expectedUID: 1,
244-
expectedLevel: specifyLabels.Spec.Containers[0].SecurityContext.SELinuxOptions.Level,
245-
expectedFSGroup: defaultGroup,
246-
expectedSupGroups: []int64{defaultGroup},
240+
pod: specifyLabels,
241+
expectedPodSC: podSC(seLinuxLevelFromNamespace, defaultGroup, defaultGroup),
242+
expectedContainerSC: containerSC(seLinuxLevelFromNamespace, 1),
247243
},
248244
"specifyFSGroup": {
249-
pod: specifyFSGroupInRange,
250-
expectedUID: 1,
251-
expectedLevel: "s0:c1,c0",
252-
expectedFSGroup: *specifyFSGroupInRange.Spec.SecurityContext.FSGroup,
253-
expectedSupGroups: []int64{defaultGroup},
245+
pod: specifyFSGroupInRange,
246+
expectedPodSC: podSC(seLinuxLevelFromNamespace, goodFSGroup, defaultGroup),
247+
expectedContainerSC: containerSC(seLinuxLevelFromNamespace, 1),
254248
},
255249
"specifySupGroup": {
256-
pod: specifySupGroup,
257-
expectedUID: 1,
258-
expectedLevel: "s0:c1,c0",
259-
expectedFSGroup: defaultGroup,
260-
expectedSupGroups: []int64{specifySupGroup.Spec.SecurityContext.SupplementalGroups[0]},
250+
pod: specifySupGroup,
251+
expectedPodSC: podSC(seLinuxLevelFromNamespace, defaultGroup, 3),
252+
expectedContainerSC: containerSC(seLinuxLevelFromNamespace, 1),
261253
},
262254
"specifyPodLevelSELinuxLevel": {
263-
pod: specifyPodLevelSELinux,
264-
expectedUID: 1,
265-
expectedLevel: "s0:c1,c0",
266-
expectedFSGroup: defaultGroup,
267-
expectedSupGroups: []int64{defaultGroup},
255+
pod: specifyPodLevelSELinux,
256+
expectedPodSC: podSC(seLinuxLevelFromNamespace, defaultGroup, defaultGroup),
257+
expectedContainerSC: containerSC(seLinuxLevelFromNamespace, 1),
268258
},
269259
}
270260

@@ -290,28 +280,12 @@ func TestAdmitSuccess(t *testing.T) {
290280
t.Errorf("%s should have validated against %s but found %s", k, saSCC.Name, validatedSCC)
291281
}
292282

293-
// ensure anything we expected to be defaulted on the container level is set
294-
if *containers[0].SecurityContext.RunAsUser != v.expectedUID {
295-
t.Errorf("%s expected UID %d but found %d", k, v.expectedUID, *containers[0].SecurityContext.RunAsUser)
296-
}
297-
if containers[0].SecurityContext.SELinuxOptions.Level != v.expectedLevel {
298-
t.Errorf("%s expected Level %s but found %s", k, v.expectedLevel, containers[0].SecurityContext.SELinuxOptions.Level)
283+
if !reflect.DeepEqual(v.expectedPodSC, v.pod.Spec.SecurityContext) {
284+
t.Errorf("%s unexpected pod SecurityContext diff:\n%s", k, diff.ObjectGoPrintSideBySide(v.expectedPodSC, v.pod.Spec.SecurityContext))
299285
}
300286

301-
// ensure anything we expected to be defaulted on the pod level is set
302-
if v.pod.Spec.SecurityContext.SELinuxOptions.Level != v.expectedLevel {
303-
t.Errorf("%s expected pod level SELinux Level %s but found %s", k, v.expectedLevel, v.pod.Spec.SecurityContext.SELinuxOptions.Level)
304-
}
305-
if *v.pod.Spec.SecurityContext.FSGroup != v.expectedFSGroup {
306-
t.Errorf("%s expected fsgroup %d but found %d", k, v.expectedFSGroup, *v.pod.Spec.SecurityContext.FSGroup)
307-
}
308-
if len(v.pod.Spec.SecurityContext.SupplementalGroups) != len(v.expectedSupGroups) {
309-
t.Errorf("%s found unexpected supplemental groups. Expected: %v, actual %v", k, v.expectedSupGroups, v.pod.Spec.SecurityContext.SupplementalGroups)
310-
}
311-
for _, g := range v.expectedSupGroups {
312-
if !hasSupGroup(g, v.pod.Spec.SecurityContext.SupplementalGroups) {
313-
t.Errorf("%s expected sup group %d", k, g)
314-
}
287+
if !reflect.DeepEqual(v.expectedContainerSC, containers[0].SecurityContext) {
288+
t.Errorf("%s unexpected container SecurityContext diff:\n%s", k, diff.ObjectGoPrintSideBySide(v.expectedContainerSC, containers[0].SecurityContext))
315289
}
316290
}
317291
}
@@ -441,15 +415,6 @@ func TestAdmitFailure(t *testing.T) {
441415
}
442416
}
443417

444-
func hasSupGroup(group int64, groups []int64) bool {
445-
for _, g := range groups {
446-
if g == group {
447-
return true
448-
}
449-
}
450-
return false
451-
}
452-
453418
func TestCreateProvidersFromConstraints(t *testing.T) {
454419
namespaceValid := &kapi.Namespace{
455420
ObjectMeta: metav1.ObjectMeta{
@@ -1124,6 +1089,27 @@ func goodPod() *kapi.Pod {
11241089
}
11251090
}
11261091

1092+
func containerSC(seLinuxLevel string, uid int64) *kapi.SecurityContext {
1093+
no := false
1094+
return &kapi.SecurityContext{
1095+
Privileged: &no,
1096+
RunAsUser: &uid,
1097+
SELinuxOptions: &kapi.SELinuxOptions{
1098+
Level: seLinuxLevel,
1099+
},
1100+
}
1101+
}
1102+
1103+
func podSC(seLinuxLevel string, fsGroup, supGroup int64) *kapi.PodSecurityContext {
1104+
return &kapi.PodSecurityContext{
1105+
SELinuxOptions: &kapi.SELinuxOptions{
1106+
Level: seLinuxLevel,
1107+
},
1108+
SupplementalGroups: []int64{supGroup},
1109+
FSGroup: &fsGroup,
1110+
}
1111+
}
1112+
11271113
func setupClientSet() *clientsetfake.Clientset {
11281114
// create the annotated namespace and add it to the fake client
11291115
namespace := admissiontesting.CreateNamespaceForTest()

0 commit comments

Comments
 (0)