From 49dfaec72e7ec35648e6fd34cf7f10c54a9ef32c Mon Sep 17 00:00:00 2001 From: Lantao Liu Date: Sat, 27 Jan 2018 01:43:01 +0000 Subject: [PATCH] Fix pod security policy capability test. --- test/e2e/auth/pod_security_policy.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/test/e2e/auth/pod_security_policy.go b/test/e2e/auth/pod_security_policy.go index 3a3849907d..a7aa50ca5d 100644 --- a/test/e2e/auth/pod_security_policy.go +++ b/test/e2e/auth/pod_security_policy.go @@ -235,10 +235,10 @@ func testPrivilegedPods(f *framework.Framework, tester func(pod *v1.Pod)) { tester(unconfined) }) - By("Running a CAP_SYS_ADMIN pod", func() { + By("Running a SYS_ADMIN pod", func() { sysadmin := restrictedPod(f, "sysadmin") sysadmin.Spec.Containers[0].SecurityContext.Capabilities = &v1.Capabilities{ - Add: []v1.Capability{"CAP_SYS_ADMIN"}, + Add: []v1.Capability{"SYS_ADMIN"}, } sysadmin.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation = nil tester(sysadmin)