Skip to content

Commit c80c98a

Browse files
authored
[all] add tests for openshift (CloudPirates-io#226)
* add tests for openshift * add tests for openshift related parameters
1 parent c931978 commit c80c98a

File tree

15 files changed

+1159
-2
lines changed

15 files changed

+1159
-2
lines changed
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
suite: test openshift related settings
2+
templates:
3+
- templates/deployment.yaml
4+
set:
5+
podSecurityContext:
6+
fsGroup: 999
7+
runAsGroup: 999
8+
runAsNonRoot: true
9+
containerSecurityContext:
10+
allowPrivilegeEscalation: false
11+
runAsNonRoot: true
12+
runAsUser: 999
13+
runAsGroup: 999
14+
readOnlyRootFilesystem: true
15+
seLinuxOptions:
16+
level: "s0:c123,c456"
17+
capabilities:
18+
drop:
19+
- ALL
20+
add: []
21+
targetPlatform: undefined
22+
tests:
23+
- it: should configure default pod security context for OpenShift
24+
asserts:
25+
- equal:
26+
path: spec.template.spec.securityContext.fsGroup
27+
value: 999
28+
- equal:
29+
path: spec.template.spec.securityContext.runAsGroup
30+
value: 999
31+
- equal:
32+
path: spec.template.spec.securityContext.runAsNonRoot
33+
value: true
34+
35+
- it: should configure default container security context for OpenShift
36+
asserts:
37+
- equal:
38+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
39+
value: false
40+
- equal:
41+
path: spec.template.spec.containers[0].securityContext.runAsNonRoot
42+
value: true
43+
- equal:
44+
path: spec.template.spec.containers[0].securityContext.runAsUser
45+
value: 999
46+
- equal:
47+
path: spec.template.spec.containers[0].securityContext.runAsGroup
48+
value: 999
49+
- equal:
50+
path: spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem
51+
value: true
52+
- equal:
53+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions.level
54+
value: "s0:c123,c456"
55+
- equal:
56+
path: spec.template.spec.containers[0].securityContext.capabilities.drop[0]
57+
value: ALL
58+
- equal:
59+
path: spec.template.spec.containers[0].securityContext.capabilities.add
60+
value: []
61+
62+
- it: should configure OpenShift restricted pod security context
63+
set:
64+
targetPlatform: openshift
65+
asserts:
66+
- equal:
67+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
68+
value: false
69+
- isNull:
70+
path: spec.template.spec.securityContext.runAsUser
71+
- isNull:
72+
path: spec.template.spec.securityContext.runAsGroup
73+
- isNull:
74+
path: spec.template.spec.securityContext.seLinuxOptions
75+
76+
- it: should configure OpenShift restricted container security context
77+
set:
78+
targetPlatform: openshift
79+
asserts:
80+
- equal:
81+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
82+
value: false
83+
- isNull:
84+
path: spec.template.spec.containers[0].securityContext.runAsUser
85+
- isNull:
86+
path: spec.template.spec.containers[0].securityContext.runAsGroup
87+
- isNull:
88+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions
89+
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
suite: test openshift related settings
2+
templates:
3+
- templates/deployment.yaml
4+
set:
5+
podSecurityContext:
6+
fsGroup: 999
7+
runAsGroup: 999
8+
runAsNonRoot: true
9+
containerSecurityContext:
10+
allowPrivilegeEscalation: false
11+
runAsNonRoot: true
12+
runAsUser: 999
13+
runAsGroup: 999
14+
readOnlyRootFilesystem: true
15+
seLinuxOptions:
16+
level: "s0:c123,c456"
17+
capabilities:
18+
drop:
19+
- ALL
20+
add: []
21+
targetPlatform: undefined
22+
tests:
23+
- it: should configure default pod security context for OpenShift
24+
asserts:
25+
- equal:
26+
path: spec.template.spec.securityContext.fsGroup
27+
value: 999
28+
- equal:
29+
path: spec.template.spec.securityContext.runAsGroup
30+
value: 999
31+
- equal:
32+
path: spec.template.spec.securityContext.runAsNonRoot
33+
value: true
34+
35+
- it: should configure default container security context for OpenShift
36+
asserts:
37+
- equal:
38+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
39+
value: false
40+
- equal:
41+
path: spec.template.spec.containers[0].securityContext.runAsNonRoot
42+
value: true
43+
- equal:
44+
path: spec.template.spec.containers[0].securityContext.runAsUser
45+
value: 999
46+
- equal:
47+
path: spec.template.spec.containers[0].securityContext.runAsGroup
48+
value: 999
49+
- equal:
50+
path: spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem
51+
value: true
52+
- equal:
53+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions.level
54+
value: "s0:c123,c456"
55+
- equal:
56+
path: spec.template.spec.containers[0].securityContext.capabilities.drop[0]
57+
value: ALL
58+
- equal:
59+
path: spec.template.spec.containers[0].securityContext.capabilities.add
60+
value: []
61+
62+
- it: should configure OpenShift restricted pod security context
63+
set:
64+
targetPlatform: openshift
65+
asserts:
66+
- equal:
67+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
68+
value: false
69+
- isNull:
70+
path: spec.template.spec.securityContext.runAsUser
71+
- isNull:
72+
path: spec.template.spec.securityContext.runAsGroup
73+
- isNull:
74+
path: spec.template.spec.securityContext.seLinuxOptions
75+
76+
- it: should configure OpenShift restricted container security context
77+
set:
78+
targetPlatform: openshift
79+
asserts:
80+
- equal:
81+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
82+
value: false
83+
- isNull:
84+
path: spec.template.spec.containers[0].securityContext.runAsUser
85+
- isNull:
86+
path: spec.template.spec.containers[0].securityContext.runAsGroup
87+
- isNull:
88+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions
89+
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
suite: test openshift related settings
2+
templates:
3+
- templates/statefulset.yaml
4+
set:
5+
podSecurityContext:
6+
fsGroup: 999
7+
runAsGroup: 999
8+
runAsNonRoot: true
9+
containerSecurityContext:
10+
allowPrivilegeEscalation: false
11+
runAsNonRoot: true
12+
runAsUser: 999
13+
runAsGroup: 999
14+
readOnlyRootFilesystem: true
15+
seLinuxOptions:
16+
level: "s0:c123,c456"
17+
capabilities:
18+
drop:
19+
- ALL
20+
add: []
21+
targetPlatform: undefined
22+
tests:
23+
- it: should configure default pod security context for OpenShift
24+
asserts:
25+
- equal:
26+
path: spec.template.spec.securityContext.fsGroup
27+
value: 999
28+
- equal:
29+
path: spec.template.spec.securityContext.runAsGroup
30+
value: 999
31+
- equal:
32+
path: spec.template.spec.securityContext.runAsNonRoot
33+
value: true
34+
35+
- it: should configure default container security context for OpenShift
36+
asserts:
37+
- equal:
38+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
39+
value: false
40+
- equal:
41+
path: spec.template.spec.containers[0].securityContext.runAsNonRoot
42+
value: true
43+
- equal:
44+
path: spec.template.spec.containers[0].securityContext.runAsUser
45+
value: 999
46+
- equal:
47+
path: spec.template.spec.containers[0].securityContext.runAsGroup
48+
value: 999
49+
- equal:
50+
path: spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem
51+
value: true
52+
- equal:
53+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions.level
54+
value: "s0:c123,c456"
55+
- equal:
56+
path: spec.template.spec.containers[0].securityContext.capabilities.drop[0]
57+
value: ALL
58+
- equal:
59+
path: spec.template.spec.containers[0].securityContext.capabilities.add
60+
value: []
61+
62+
- it: should configure OpenShift restricted pod security context
63+
set:
64+
targetPlatform: openshift
65+
asserts:
66+
- equal:
67+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
68+
value: false
69+
- isNull:
70+
path: spec.template.spec.securityContext.runAsUser
71+
- isNull:
72+
path: spec.template.spec.securityContext.runAsGroup
73+
- isNull:
74+
path: spec.template.spec.securityContext.seLinuxOptions
75+
76+
- it: should configure OpenShift restricted container security context
77+
set:
78+
targetPlatform: openshift
79+
asserts:
80+
- equal:
81+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
82+
value: false
83+
- isNull:
84+
path: spec.template.spec.containers[0].securityContext.runAsUser
85+
- isNull:
86+
path: spec.template.spec.containers[0].securityContext.runAsGroup
87+
- isNull:
88+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions
89+
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
suite: test openshift related settings
2+
templates:
3+
- templates/deployment.yaml
4+
set:
5+
podSecurityContext:
6+
fsGroup: 999
7+
runAsGroup: 999
8+
runAsNonRoot: true
9+
containerSecurityContext:
10+
allowPrivilegeEscalation: false
11+
runAsNonRoot: true
12+
runAsUser: 999
13+
runAsGroup: 999
14+
readOnlyRootFilesystem: true
15+
seLinuxOptions:
16+
level: "s0:c123,c456"
17+
capabilities:
18+
drop:
19+
- ALL
20+
add: []
21+
targetPlatform: undefined
22+
tests:
23+
- it: should configure default pod security context for OpenShift
24+
asserts:
25+
- equal:
26+
path: spec.template.spec.securityContext.fsGroup
27+
value: 999
28+
- equal:
29+
path: spec.template.spec.securityContext.runAsGroup
30+
value: 999
31+
- equal:
32+
path: spec.template.spec.securityContext.runAsNonRoot
33+
value: true
34+
35+
- it: should configure default container security context for OpenShift
36+
asserts:
37+
- equal:
38+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
39+
value: false
40+
- equal:
41+
path: spec.template.spec.containers[0].securityContext.runAsNonRoot
42+
value: true
43+
- equal:
44+
path: spec.template.spec.containers[0].securityContext.runAsUser
45+
value: 999
46+
- equal:
47+
path: spec.template.spec.containers[0].securityContext.runAsGroup
48+
value: 999
49+
- equal:
50+
path: spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem
51+
value: true
52+
- equal:
53+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions.level
54+
value: "s0:c123,c456"
55+
- equal:
56+
path: spec.template.spec.containers[0].securityContext.capabilities.drop[0]
57+
value: ALL
58+
- equal:
59+
path: spec.template.spec.containers[0].securityContext.capabilities.add
60+
value: []
61+
62+
- it: should configure OpenShift restricted pod security context
63+
set:
64+
targetPlatform: openshift
65+
asserts:
66+
- equal:
67+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
68+
value: false
69+
- isNull:
70+
path: spec.template.spec.securityContext.runAsUser
71+
- isNull:
72+
path: spec.template.spec.securityContext.runAsGroup
73+
- isNull:
74+
path: spec.template.spec.securityContext.seLinuxOptions
75+
76+
- it: should configure OpenShift restricted container security context
77+
set:
78+
targetPlatform: openshift
79+
asserts:
80+
- equal:
81+
path: spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation
82+
value: false
83+
- isNull:
84+
path: spec.template.spec.containers[0].securityContext.runAsUser
85+
- isNull:
86+
path: spec.template.spec.containers[0].securityContext.runAsGroup
87+
- isNull:
88+
path: spec.template.spec.containers[0].securityContext.seLinuxOptions
89+

0 commit comments

Comments
 (0)