Skip to content

Commit

Permalink
Fix SELinux contexts used in e2e tests
Browse files Browse the repository at this point in the history
  • Loading branch information
jsafrane committed Jun 6, 2023
1 parent 2eb4eac commit 4d0e251
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions test/e2e/storage/csi_mock/csi_selinux_mount.go
Original file line number Diff line number Diff line change
Expand Up @@ -49,15 +49,15 @@ var _ = utils.SIGDescribe("CSI Mock selinux on mount", func() {
// Make sure all options are set so system specific defaults are not used.
seLinuxOpts1 := v1.SELinuxOptions{
User: "system_u",
Role: "object_r",
Type: "container_file_t",
Role: "system_r",
Type: "container_t",
Level: "s0:c0,c1",
}
seLinuxMountOption1 := "context=\"system_u:object_r:container_file_t:s0:c0,c1\""
seLinuxOpts2 := v1.SELinuxOptions{
User: "system_u",
Role: "object_r",
Type: "container_file_t",
Role: "system_r",
Type: "container_t",
Level: "s0:c98,c99",
}
seLinuxMountOption2 := "context=\"system_u:object_r:container_file_t:s0:c98,c99\""
Expand Down Expand Up @@ -267,14 +267,14 @@ var _ = utils.SIGDescribe("CSI Mock selinux on mount metrics", func() {
// Make sure all options are set so system specific defaults are not used.
seLinuxOpts1 := v1.SELinuxOptions{
User: "system_u",
Role: "object_r",
Type: "container_file_t",
Role: "system_r",
Type: "container_t",
Level: "s0:c0,c1",
}
seLinuxOpts2 := v1.SELinuxOptions{
User: "system_u",
Role: "object_r",
Type: "container_file_t",
Role: "system_r",
Type: "container_t",
Level: "s0:c98,c99",
}

Expand Down

0 comments on commit 4d0e251

Please sign in to comment.