@@ -1017,7 +1017,7 @@ func TestPodContainerSecurityContext(t *testing.T) {
10171017 Capabilities : & corev1.Capabilities {
10181018 Drop : []corev1.Capability {"ALL" },
10191019 },
1020- ReadOnlyRootFilesystem : ptr .To (false ), // Reflecting expected 'restricted' settings
1020+ ReadOnlyRootFilesystem : ptr .To (true ), // Reflecting expected 'restricted' settings
10211021 },
10221022 expectedSecurityContext : & corev1.PodSecurityContext {
10231023 SeccompProfile : & corev1.SeccompProfile {Type : corev1 .SeccompProfileTypeRuntimeDefault },
@@ -1052,7 +1052,7 @@ func TestPodContainerSecurityContext(t *testing.T) {
10521052 Capabilities : & corev1.Capabilities {
10531053 Drop : []corev1.Capability {"ALL" },
10541054 },
1055- ReadOnlyRootFilesystem : ptr .To (false ),
1055+ ReadOnlyRootFilesystem : ptr .To (true ),
10561056 },
10571057 expectedSecurityContext : & corev1.PodSecurityContext {
10581058 SeccompProfile : & corev1.SeccompProfile {Type : corev1 .SeccompProfileTypeRuntimeDefault },
@@ -1107,7 +1107,7 @@ func TestPodContainerSecurityContext(t *testing.T) {
11071107 },
11081108 namespacePodSecurityConfig : v1alpha1 .Legacy , // set to the opposite of the config to catch possible errors
11091109 expectedContainerSecurityContext : & corev1.SecurityContext {
1110- ReadOnlyRootFilesystem : ptr .To (false ),
1110+ ReadOnlyRootFilesystem : ptr .To (true ),
11111111 AllowPrivilegeEscalation : ptr .To (false ),
11121112 Capabilities : & corev1.Capabilities {
11131113 Drop : []corev1.Capability {"ALL" },
0 commit comments