Skip to content

Commit d1957d5

Browse files
authored
Fix links to Redhat Practice Guide and add cross references in the CATALOG.md suite table (#3091)
* fix url to guide * add cross-reference to test section in suite table
1 parent 4989565 commit d1957d5

File tree

10 files changed

+335
-335
lines changed

10 files changed

+335
-335
lines changed

CATALOG.md

Lines changed: 101 additions & 101 deletions
Large diffs are not rendered by default.

cmd/certsuite/claim/compare/testdata/claim_access_control.json

Lines changed: 74 additions & 74 deletions
Large diffs are not rendered by default.

cmd/certsuite/claim/compare/testdata/claim_observability.json

Lines changed: 74 additions & 74 deletions
Large diffs are not rendered by default.

cmd/certsuite/claim/show/failures/testdata/claim1.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
"tags": "common"
1717
},
1818
"catalogInfo": {
19-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
19+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
2020
"description": "Ensures that containers do not use SYS_ADMIN capability",
2121
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
2222
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."
@@ -43,7 +43,7 @@
4343
"tags": "telco"
4444
},
4545
"catalogInfo": {
46-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
46+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
4747
"description": "Check that pods running on nodes with realtime kernel enabled have the SYS_NICE capability enabled in their spec. In the case that a CNF is running on a node using the real-time kernel, SYS_NICE will be used to allow DPDK application to switch to SCHED_FIFO.",
4848
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
4949
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."
@@ -70,7 +70,7 @@
7070
"tags": "common"
7171
},
7272
"catalogInfo": {
73-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
73+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
7474
"description": "Tests that no one has changed the node's sysctl configs after the node was created, the tests works by checking if the sysctl configs are consistent with the MachineConfig CR which defines how the node should be configured",
7575
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
7676
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."
@@ -97,7 +97,7 @@
9797
"tags": "common"
9898
},
9999
"catalogInfo": {
100-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
100+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
101101
"description": "Ensures that the Node(s) hosting CNFs do not utilize tainted kernels. This test case is especially important to support Highly Available CNFs, since when a CNF is re-instantiated on a backup Node, that Node's kernel may not have the same hacks.",
102102
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
103103
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."

cmd/certsuite/claim/show/failures/testdata/claim2.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
"tags": "common"
1717
},
1818
"catalogInfo": {
19-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
19+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
2020
"description": "Ensures that containers do not use SYS_ADMIN capability",
2121
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
2222
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."
@@ -43,7 +43,7 @@
4343
"tags": "telco"
4444
},
4545
"catalogInfo": {
46-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
46+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
4747
"description": "Check that pods running on nodes with realtime kernel enabled have the SYS_NICE capability enabled in their spec. In the case that a CNF is running on a node using the real-time kernel, SYS_NICE will be used to allow DPDK application to switch to SCHED_FIFO.",
4848
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
4949
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."
@@ -70,7 +70,7 @@
7070
"tags": "common"
7171
},
7272
"catalogInfo": {
73-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
73+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
7474
"description": "Tests that no one has changed the node's sysctl configs after the node was created, the tests works by checking if the sysctl configs are consistent with the MachineConfig CR which defines how the node should be configured",
7575
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
7676
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."
@@ -97,7 +97,7 @@
9797
"tags": "common"
9898
},
9999
"catalogInfo": {
100-
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac",
100+
"bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac",
101101
"description": "Ensures that the Node(s) hosting CNFs do not utilize tainted kernels. This test case is especially important to support Highly Available CNFs, since when a CNF is re-instantiated on a backup Node, that Node's kernel may not have the same hacks.",
102102
"exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings",
103103
"remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)."

cmd/certsuite/generate/catalog/catalog.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -278,11 +278,11 @@ func outputTestCases() (outString string, summary catalogSummary) { //nolint:fun
278278
}
279279

280280
func summaryToMD(aSummary catalogSummary) (out string) {
281-
const tableHeader = "|---|---|\n"
281+
const tableHeader = "|---|---|---|\n"
282282
out += "## Test cases summary\n\n"
283283
out += fmt.Sprintf("### Total test cases: %d\n\n", aSummary.totalTests)
284284
out += fmt.Sprintf("### Total suites: %d\n\n", aSummary.totalSuites)
285-
out += "|Suite|Tests per suite|\n"
285+
out += "|Suite|Tests per suite|Link|\n"
286286
out += tableHeader
287287

288288
keys := make([]string, 0, len(aSummary.testsPerSuite))
@@ -292,7 +292,7 @@ func summaryToMD(aSummary catalogSummary) (out string) {
292292
}
293293
sort.Strings(keys)
294294
for _, suite := range keys {
295-
out += fmt.Sprintf("|%s|%d|\n", suite, aSummary.testsPerSuite[suite])
295+
out += fmt.Sprintf("|%s|%d|[%s](#%s)|\n", suite, aSummary.testsPerSuite[suite], suite, suite)
296296
}
297297
out += "\n"
298298

docs/assets/images/claim-compare-cni.svg

Lines changed: 1 addition & 1 deletion
Loading

docs/assets/images/claim-compare-results.svg

Lines changed: 1 addition & 1 deletion
Loading

0 commit comments

Comments
 (0)