@@ -179,24 +179,8 @@ func TestAdmitSuccess(t *testing.T) {
179
179
defaultGroup := int64 (2 )
180
180
181
181
// create scc that requires allocation retrieval
182
- saSCC := & securityapi.SecurityContextConstraints {
183
- ObjectMeta : metav1.ObjectMeta {
184
- Name : "scc-sa" ,
185
- },
186
- RunAsUser : securityapi.RunAsUserStrategyOptions {
187
- Type : securityapi .RunAsUserStrategyMustRunAsRange ,
188
- },
189
- SELinuxContext : securityapi.SELinuxContextStrategyOptions {
190
- Type : securityapi .SELinuxStrategyMustRunAs ,
191
- },
192
- FSGroup : securityapi.FSGroupStrategyOptions {
193
- Type : securityapi .FSGroupStrategyMustRunAs ,
194
- },
195
- SupplementalGroups : securityapi.SupplementalGroupsStrategyOptions {
196
- Type : securityapi .SupplementalGroupsStrategyMustRunAs ,
197
- },
198
- Groups : []string {"system:serviceaccounts" },
199
- }
182
+ saSCC := saSCC ()
183
+
200
184
// create scc that has specific requirements that shouldn't match but is permissioned to
201
185
// service accounts to test that even though this has matching priorities (0) and a
202
186
// lower point value score (which will cause it to be sorted in front of scc-sa) it should not
@@ -337,24 +321,8 @@ func TestAdmitFailure(t *testing.T) {
337
321
tc := setupClientSet ()
338
322
339
323
// create scc that requires allocation retrieval
340
- saSCC := & securityapi.SecurityContextConstraints {
341
- ObjectMeta : metav1.ObjectMeta {
342
- Name : "scc-sa" ,
343
- },
344
- RunAsUser : securityapi.RunAsUserStrategyOptions {
345
- Type : securityapi .RunAsUserStrategyMustRunAsRange ,
346
- },
347
- SELinuxContext : securityapi.SELinuxContextStrategyOptions {
348
- Type : securityapi .SELinuxStrategyMustRunAs ,
349
- },
350
- FSGroup : securityapi.FSGroupStrategyOptions {
351
- Type : securityapi .FSGroupStrategyMustRunAs ,
352
- },
353
- SupplementalGroups : securityapi.SupplementalGroupsStrategyOptions {
354
- Type : securityapi .SupplementalGroupsStrategyMustRunAs ,
355
- },
356
- Groups : []string {"system:serviceaccounts" },
357
- }
324
+ saSCC := saSCC ()
325
+
358
326
// create scc that has specific requirements that shouldn't match but is permissioned to
359
327
// service accounts to test that even though this has matching priorities (0) and a
360
328
// lower point value score (which will cause it to be sorted in front of scc-sa) it should not
@@ -1083,6 +1051,27 @@ func restrictiveSCC() *securityapi.SecurityContextConstraints {
1083
1051
}
1084
1052
}
1085
1053
1054
+ func saSCC () * securityapi.SecurityContextConstraints {
1055
+ return & securityapi.SecurityContextConstraints {
1056
+ ObjectMeta : metav1.ObjectMeta {
1057
+ Name : "scc-sa" ,
1058
+ },
1059
+ RunAsUser : securityapi.RunAsUserStrategyOptions {
1060
+ Type : securityapi .RunAsUserStrategyMustRunAsRange ,
1061
+ },
1062
+ SELinuxContext : securityapi.SELinuxContextStrategyOptions {
1063
+ Type : securityapi .SELinuxStrategyMustRunAs ,
1064
+ },
1065
+ FSGroup : securityapi.FSGroupStrategyOptions {
1066
+ Type : securityapi .FSGroupStrategyMustRunAs ,
1067
+ },
1068
+ SupplementalGroups : securityapi.SupplementalGroupsStrategyOptions {
1069
+ Type : securityapi .SupplementalGroupsStrategyMustRunAs ,
1070
+ },
1071
+ Groups : []string {"system:serviceaccounts" },
1072
+ }
1073
+ }
1074
+
1086
1075
func saExactSCC () * securityapi.SecurityContextConstraints {
1087
1076
var exactUID int64 = 999
1088
1077
return & securityapi.SecurityContextConstraints {
0 commit comments