Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add non-root end-to-end test cases to credentials test suite #327
base: main
Are you sure you want to change the base?
Add non-root end-to-end test cases to credentials test suite #327
Changes from all commits
68377c3
01cd7f7
12d1737
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why are we always changing this even if the test explicitly set the security context?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you instantiate Kubernetes testing framework with
LevelRestricted
, it sets this totrue
, meaning all containers in the Pod must run as non-root (i.e., not0
).Since this is a generic helper function and gets called from different security levels, we're just making sure to set it to
false
, so we can spawn our privileged container needed to create cache directory. The other containers created for this Pod would probably have theirRunAsUser
set to non-root (due to security level), so we just need to remove this restriction at Pod-level for our container.This whole
ensureCacheDirExistsInNode
is very hacky due to fact Mountpoint running in the host and hopefully this will go away with running Mountpoint inside container.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a way to pass in keyword arguments here? Right now I can't understand what these boolean arguments are for.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Go doesn't support named arguments, usually structs are used if such a thing is desired, but I think it'd make this more verbose. Since this is a local helper function and not used outside this test-case, I think I'd prefer current one.