You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
os::cmd::expect_failure_and_text "oc get pods --token='${whoamitoken}' -n '${project}'""prevent this action; User \"scoped-user\" cannot list pods in project\"${project}\""
50
+
os::cmd::expect_failure_and_text "oc get pods --token='${whoamitoken}' -n '${project}'""pods is forbidden: User \"scoped-user\" cannot list pods in the namespace\"${project}\""
51
51
52
52
listprojecttoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=listproject SCOPE=user:list-scoped-projects USER_NAME="${username}" USER_UID="${useruid}"| oc create -f - -o name | awk -F/ '{print $2}')"
53
53
# this token doesn't have rights to see any projects even though it can hit the list endpoint, so an empty list is correct
54
54
# we'll add another scope that allows listing all known projects even if this token has no other powers in them.
55
55
os::cmd::expect_success_and_not_text "oc get projects --token='${listprojecttoken}'""${project}"
56
-
os::cmd::expect_failure_and_text "oc get user/~ --token='${listprojecttoken}'"'prevent this action; User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
57
-
os::cmd::expect_failure_and_text "oc get pods --token='${listprojecttoken}' -n '${project}'""prevent this action; User \"scoped-user\" cannot list pods in project\"${project}\""
56
+
os::cmd::expect_failure_and_text "oc get user/~ --token='${listprojecttoken}'"'User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
57
+
os::cmd::expect_failure_and_text "oc get pods --token='${listprojecttoken}' -n '${project}'""User \"scoped-user\" cannot list pods in the namespace\"${project}\""
58
58
59
59
listprojecttoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=listallprojects SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}"| oc create -f - -o name | awk -F/ '{print $2}')"
60
60
os::cmd::expect_success_and_text "oc get projects --token='${listprojecttoken}'""${project}"
61
61
62
62
adminnonescalatingpowerstoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}"| oc create -f - -o name | awk -F/ '{print $2}')"
63
-
os::cmd::expect_failure_and_text "oc get user/~ --token='${adminnonescalatingpowerstoken}'"'prevent this action; User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
64
-
os::cmd::expect_failure_and_text "oc get secrets --token='${adminnonescalatingpowerstoken}' -n '${project}'""prevent this action; User \"scoped-user\" cannot list secrets in project\"${project}\""
63
+
os::cmd::expect_failure_and_text "oc get user/~ --token='${adminnonescalatingpowerstoken}'"'User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
64
+
os::cmd::expect_failure_and_text "oc get secrets --token='${adminnonescalatingpowerstoken}' -n '${project}'""User \"scoped-user\" cannot list secrets in the namespace\"${project}\""
65
65
os::cmd::expect_success_and_text "oc get 'projects/${project}' --token='${adminnonescalatingpowerstoken}' -n '${project}'""${project}"
66
66
67
67
allescalatingpowerstoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=clusteradmin SCOPE='role:cluster-admin:*:!' USER_NAME="${username}" USER_UID="${useruid}"| oc create -f - -o name | awk -F/ '{print $2}')"
os::cmd::expect_failure_and_text 'oc policy scc-review -z default -f ${OS_ROOT}/test/testdata/job.yaml --namespace=no-exist''error: unable to compute Pod Security Policy Review for "hello": podsecuritypolicyreviews.security.openshift.io is forbidden: User "bob" cannot create podsecuritypolicyreviews.security.openshift.io in the namespace "no-exist": User "bob" cannot create podsecuritypolicyreviews.security.openshift.io in project "no-exist"'
237
+
os::cmd::expect_failure_and_text 'oc policy scc-review -z default -f ${OS_ROOT}/test/testdata/job.yaml --namespace=no-exist''error: unable to compute Pod Security Policy Review for "hello": podsecuritypolicyreviews.security.openshift.io is forbidden: User "bob" cannot create podsecuritypolicyreviews.security.openshift.io in the namespace "no-exist"'
238
238
os::cmd::expect_failure_and_text 'oc policy scc-review -z default -f ${OS_ROOT}/test/testdata/pspreview_unsupported_statefulset.yaml''error: StatefulSet "rd" with spec.volumeClaimTemplates currently not supported.'
239
239
os::cmd::expect_failure_and_text 'oc policy scc-review -z no-exist -f ${OS_ROOT}/test/testdata/job.yaml''error: unable to compute Pod Security Policy Review for "hello": unable to retrieve ServiceAccount no-exist: serviceaccount "no-exist" not found'
anonymousError=`users.user.openshift.io "~" is forbidden: User "system:anonymous" cannot get users.user.openshift.io at the cluster scope: User "system:anonymous" cannot get users.user.openshift.io at the cluster scope`
38
+
anonymousError=`users.user.openshift.io "~" is forbidden: User "system:anonymous" cannot get users.user.openshift.io at the cluster scope`
0 commit comments