@@ -1017,7 +1017,7 @@ func TestPodContainerSecurityContext(t *testing.T) {
1017
1017
Capabilities : & corev1.Capabilities {
1018
1018
Drop : []corev1.Capability {"ALL" },
1019
1019
},
1020
- ReadOnlyRootFilesystem : ptr .To (false ), // Reflecting expected 'restricted' settings
1020
+ ReadOnlyRootFilesystem : ptr .To (true ), // Reflecting expected 'restricted' settings
1021
1021
},
1022
1022
expectedSecurityContext : & corev1.PodSecurityContext {
1023
1023
SeccompProfile : & corev1.SeccompProfile {Type : corev1 .SeccompProfileTypeRuntimeDefault },
@@ -1052,7 +1052,7 @@ func TestPodContainerSecurityContext(t *testing.T) {
1052
1052
Capabilities : & corev1.Capabilities {
1053
1053
Drop : []corev1.Capability {"ALL" },
1054
1054
},
1055
- ReadOnlyRootFilesystem : ptr .To (false ),
1055
+ ReadOnlyRootFilesystem : ptr .To (true ),
1056
1056
},
1057
1057
expectedSecurityContext : & corev1.PodSecurityContext {
1058
1058
SeccompProfile : & corev1.SeccompProfile {Type : corev1 .SeccompProfileTypeRuntimeDefault },
@@ -1107,7 +1107,7 @@ func TestPodContainerSecurityContext(t *testing.T) {
1107
1107
},
1108
1108
namespacePodSecurityConfig : v1alpha1 .Legacy , // set to the opposite of the config to catch possible errors
1109
1109
expectedContainerSecurityContext : & corev1.SecurityContext {
1110
- ReadOnlyRootFilesystem : ptr .To (false ),
1110
+ ReadOnlyRootFilesystem : ptr .To (true ),
1111
1111
AllowPrivilegeEscalation : ptr .To (false ),
1112
1112
Capabilities : & corev1.Capabilities {
1113
1113
Drop : []corev1.Capability {"ALL" },
0 commit comments