mirror of https://github.com/k3s-io/k3s
Improve an error message when privileged containers are disallowed globally on the cluster.
parent
bd100b3b80
commit
7e4b047743
|
@ -3692,7 +3692,7 @@ func ValidateSecurityContext(sc *api.SecurityContext, fldPath *field.Path) field
|
|||
|
||||
if sc.Privileged != nil {
|
||||
if *sc.Privileged && !capabilities.Get().AllowPrivileged {
|
||||
allErrs = append(allErrs, field.Forbidden(fldPath.Child("privileged"), "disallowed by policy"))
|
||||
allErrs = append(allErrs, field.Forbidden(fldPath.Child("privileged"), "disallowed by cluster policy"))
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -8601,7 +8601,7 @@ func TestValidateSecurityContext(t *testing.T) {
|
|||
"request privileged when capabilities forbids": {
|
||||
sc: privRequestWithGlobalDeny,
|
||||
errorType: "FieldValueForbidden",
|
||||
errorDetail: "disallowed by policy",
|
||||
errorDetail: "disallowed by cluster policy",
|
||||
},
|
||||
"negative RunAsUser": {
|
||||
sc: negativeRunAsUser,
|
||||
|
|
Loading…
Reference in New Issue