diff --git a/api/swagger-spec/v1beta1.json b/api/swagger-spec/v1beta1.json index aa7e4f5f37b..d293d0ef16e 100644 --- a/api/swagger-spec/v1beta1.json +++ b/api/swagger-spec/v1beta1.json @@ -8236,21 +8236,21 @@ "add": { "type": "array", "items": { - "$ref": "v1beta1.CapabilityType" + "$ref": "v1beta1.Capability" }, "description": "added capabilities" }, "drop": { "type": "array", "items": { - "$ref": "v1beta1.CapabilityType" + "$ref": "v1beta1.Capability" }, "description": "droped capabilities" } } }, - "v1beta1.CapabilityType": { - "id": "v1beta1.CapabilityType", + "v1beta1.Capability": { + "id": "v1beta1.Capability", "properties": {} }, "v1beta1.ComponentCondition": { diff --git a/api/swagger-spec/v1beta2.json b/api/swagger-spec/v1beta2.json index 83227b6f266..f5088d30662 100644 --- a/api/swagger-spec/v1beta2.json +++ b/api/swagger-spec/v1beta2.json @@ -8236,21 +8236,21 @@ "add": { "type": "array", "items": { - "$ref": "v1beta2.CapabilityType" + "$ref": "v1beta2.Capability" }, "description": "added capabilities" }, "drop": { "type": "array", "items": { - "$ref": "v1beta2.CapabilityType" + "$ref": "v1beta2.Capability" }, "description": "droped capabilities" } } }, - "v1beta2.CapabilityType": { - "id": "v1beta2.CapabilityType", + "v1beta2.Capability": { + "id": "v1beta2.Capability", "properties": {} }, "v1beta2.ComponentCondition": { diff --git a/api/swagger-spec/v1beta3.json b/api/swagger-spec/v1beta3.json index 7408ea95a62..53411665a3f 100644 --- a/api/swagger-spec/v1beta3.json +++ b/api/swagger-spec/v1beta3.json @@ -9609,21 +9609,21 @@ "add": { "type": "array", "items": { - "$ref": "v1beta3.CapabilityType" + "$ref": "v1beta3.Capability" }, "description": "added capabilities" }, "drop": { "type": "array", "items": { - "$ref": "v1beta3.CapabilityType" + "$ref": "v1beta3.Capability" }, "description": "droped capabilities" } } }, - "v1beta3.CapabilityType": { - "id": "v1beta3.CapabilityType", + "v1beta3.Capability": { + "id": "v1beta3.Capability", "properties": {} }, "v1beta3.ComponentCondition": { diff --git a/pkg/api/testing/fuzzer.go b/pkg/api/testing/fuzzer.go index 47a492b129d..fbe24679b5f 100644 --- a/pkg/api/testing/fuzzer.go +++ b/pkg/api/testing/fuzzer.go @@ -209,8 +209,8 @@ func FuzzerFor(t *testing.T, version string, src rand.Source) *fuzz.Fuzzer { priv := c.RandBool() sc.Privileged = &priv sc.Capabilities = &api.Capabilities{ - Add: make([]api.CapabilityType, 0), - Drop: make([]api.CapabilityType, 0), + Add: make([]api.Capability, 0), + Drop: make([]api.Capability, 0), } c.Fuzz(&sc.Capabilities.Add) c.Fuzz(&sc.Capabilities.Drop) diff --git a/pkg/api/types.go b/pkg/api/types.go index 18dd3dcbb48..02ba2c1ddfc 100644 --- a/pkg/api/types.go +++ b/pkg/api/types.go @@ -582,15 +582,15 @@ const ( PullIfNotPresent PullPolicy = "IfNotPresent" ) -// CapabilityType represent POSIX capabilities type -type CapabilityType string +// Capability represent POSIX capabilities type +type Capability string // Capabilities represent POSIX capabilities that can be added or removed to a running container. type Capabilities struct { // Added capabilities - Add []CapabilityType `json:"add,omitempty"` + Add []Capability `json:"add,omitempty"` // Removed capabilities - Drop []CapabilityType `json:"drop,omitempty"` + Drop []Capability `json:"drop,omitempty"` } // ResourceRequirements describes the compute resource requirements. diff --git a/pkg/api/v1/conversion_generated.go b/pkg/api/v1/conversion_generated.go index efeb5419e4d..e8ab1b7fd0b 100644 --- a/pkg/api/v1/conversion_generated.go +++ b/pkg/api/v1/conversion_generated.go @@ -84,17 +84,17 @@ func convert_v1_Capabilities_To_api_Capabilities(in *Capabilities, out *newer.Ca defaulting.(func(*Capabilities))(in) } if in.Add != nil { - out.Add = make([]newer.CapabilityType, len(in.Add)) + out.Add = make([]newer.Capability, len(in.Add)) for i := range in.Add { - out.Add[i] = newer.CapabilityType(in.Add[i]) + out.Add[i] = newer.Capability(in.Add[i]) } } else { out.Add = nil } if in.Drop != nil { - out.Drop = make([]newer.CapabilityType, len(in.Drop)) + out.Drop = make([]newer.Capability, len(in.Drop)) for i := range in.Drop { - out.Drop[i] = newer.CapabilityType(in.Drop[i]) + out.Drop[i] = newer.Capability(in.Drop[i]) } } else { out.Drop = nil @@ -107,17 +107,17 @@ func convert_api_Capabilities_To_v1_Capabilities(in *newer.Capabilities, out *Ca defaulting.(func(*newer.Capabilities))(in) } if in.Add != nil { - out.Add = make([]CapabilityType, len(in.Add)) + out.Add = make([]Capability, len(in.Add)) for i := range in.Add { - out.Add[i] = CapabilityType(in.Add[i]) + out.Add[i] = Capability(in.Add[i]) } } else { out.Add = nil } if in.Drop != nil { - out.Drop = make([]CapabilityType, len(in.Drop)) + out.Drop = make([]Capability, len(in.Drop)) for i := range in.Drop { - out.Drop[i] = CapabilityType(in.Drop[i]) + out.Drop[i] = Capability(in.Drop[i]) } } else { out.Drop = nil diff --git a/pkg/api/v1/types.go b/pkg/api/v1/types.go index dbbcd6b69b2..c4c38652f45 100644 --- a/pkg/api/v1/types.go +++ b/pkg/api/v1/types.go @@ -590,15 +590,15 @@ const ( PullIfNotPresent PullPolicy = "IfNotPresent" ) -// CapabilityType represent POSIX capabilities type -type CapabilityType string +// Capability represent POSIX capabilities type +type Capability string // Capabilities represent POSIX capabilities that can be added or removed to a running container. type Capabilities struct { // Added capabilities - Add []CapabilityType `json:"add,omitempty" description:"added capabilities"` + Add []Capability `json:"add,omitempty" description:"added capabilities"` // Removed capabilities - Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"` + Drop []Capability `json:"drop,omitempty" description:"droped capabilities"` } // ResourceRequirements describes the compute resource requirements. diff --git a/pkg/api/v1beta1/conversion_test.go b/pkg/api/v1beta1/conversion_test.go index d8d21ea7c5e..ab74d8fc8fc 100644 --- a/pkg/api/v1beta1/conversion_test.go +++ b/pkg/api/v1beta1/conversion_test.go @@ -771,11 +771,11 @@ func TestBadSecurityContextConversion(t *testing.T) { "mismatched caps add": { c: ¤t.Container{ Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, + Add: []current.Capability{"foo"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"bar"}, + Add: []current.Capability{"bar"}, }, }, }, @@ -784,11 +784,11 @@ func TestBadSecurityContextConversion(t *testing.T) { "mismatched caps drop": { c: ¤t.Container{ Capabilities: current.Capabilities{ - Drop: []current.CapabilityType{"foo"}, + Drop: []current.Capability{"foo"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Drop: []current.CapabilityType{"bar"}, + Drop: []current.Capability{"bar"}, }, }, }, diff --git a/pkg/api/v1beta1/defaults_test.go b/pkg/api/v1beta1/defaults_test.go index 78f10e2d502..c4248d110ac 100644 --- a/pkg/api/v1beta1/defaults_test.go +++ b/pkg/api/v1beta1/defaults_test.go @@ -351,8 +351,8 @@ func TestSetDefaultSecurityContext(t *testing.T) { c: current.Container{ Privileged: false, Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Privileged: &priv, @@ -363,13 +363,13 @@ func TestSetDefaultSecurityContext(t *testing.T) { c: current.Container{ Privileged: false, Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, }, }, @@ -380,8 +380,8 @@ func TestSetDefaultSecurityContext(t *testing.T) { SecurityContext: ¤t.SecurityContext{ Privileged: &priv, Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"biz"}, - Drop: []current.CapabilityType{"baz"}, + Add: []current.Capability{"biz"}, + Drop: []current.Capability{"baz"}, }, }, }, @@ -389,14 +389,14 @@ func TestSetDefaultSecurityContext(t *testing.T) { "upward defaulting priv": { c: current.Container{ Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Privileged: &privTrue, Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, }, }, diff --git a/pkg/api/v1beta1/types.go b/pkg/api/v1beta1/types.go index 262d643e221..b89fbb5f3ba 100644 --- a/pkg/api/v1beta1/types.go +++ b/pkg/api/v1beta1/types.go @@ -481,15 +481,15 @@ const ( PullIfNotPresent PullPolicy = "PullIfNotPresent" ) -// CapabilityType represent POSIX capabilities type -type CapabilityType string +// Capability represent POSIX capabilities type +type Capability string // Capabilities represent POSIX capabilities that can be added or removed to a running container. type Capabilities struct { // Added capabilities - Add []CapabilityType `json:"add,omitempty" description:"added capabilities"` + Add []Capability `json:"add,omitempty" description:"added capabilities"` // Removed capabilities - Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"` + Drop []Capability `json:"drop,omitempty" description:"droped capabilities"` } type ResourceRequirements struct { diff --git a/pkg/api/v1beta2/conversion_test.go b/pkg/api/v1beta2/conversion_test.go index df61dcaa703..08bbe634a07 100644 --- a/pkg/api/v1beta2/conversion_test.go +++ b/pkg/api/v1beta2/conversion_test.go @@ -586,11 +586,11 @@ func TestBadSecurityContextConversion(t *testing.T) { "mismatched caps add": { c: ¤t.Container{ Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, + Add: []current.Capability{"foo"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"bar"}, + Add: []current.Capability{"bar"}, }, }, }, @@ -599,11 +599,11 @@ func TestBadSecurityContextConversion(t *testing.T) { "mismatched caps drop": { c: ¤t.Container{ Capabilities: current.Capabilities{ - Drop: []current.CapabilityType{"foo"}, + Drop: []current.Capability{"foo"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Drop: []current.CapabilityType{"bar"}, + Drop: []current.Capability{"bar"}, }, }, }, diff --git a/pkg/api/v1beta2/defaults_test.go b/pkg/api/v1beta2/defaults_test.go index b41477fef5d..e02f89eb2f9 100644 --- a/pkg/api/v1beta2/defaults_test.go +++ b/pkg/api/v1beta2/defaults_test.go @@ -350,8 +350,8 @@ func TestSetDefaultSecurityContext(t *testing.T) { c: current.Container{ Privileged: false, Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Privileged: &priv, @@ -362,13 +362,13 @@ func TestSetDefaultSecurityContext(t *testing.T) { c: current.Container{ Privileged: false, Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, }, }, @@ -379,8 +379,8 @@ func TestSetDefaultSecurityContext(t *testing.T) { SecurityContext: ¤t.SecurityContext{ Privileged: &priv, Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"biz"}, - Drop: []current.CapabilityType{"baz"}, + Add: []current.Capability{"biz"}, + Drop: []current.Capability{"baz"}, }, }, }, @@ -388,14 +388,14 @@ func TestSetDefaultSecurityContext(t *testing.T) { "upward defaulting priv": { c: current.Container{ Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Privileged: &privTrue, Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, }, }, diff --git a/pkg/api/v1beta2/types.go b/pkg/api/v1beta2/types.go index 3a5bdc5ca57..c59245a45b6 100644 --- a/pkg/api/v1beta2/types.go +++ b/pkg/api/v1beta2/types.go @@ -466,17 +466,17 @@ const ( PullIfNotPresent PullPolicy = "PullIfNotPresent" ) -// CapabilityType represent POSIX capabilities type -type CapabilityType string +// Capability represent POSIX capabilities type +type Capability string // Capabilities represent POSIX capabilities that can be added or removed to a running container. // // http://docs.k8s.io/containers.md#capabilities type Capabilities struct { // Added capabilities - Add []CapabilityType `json:"add,omitempty" description:"added capabilities"` + Add []Capability `json:"add,omitempty" description:"added capabilities"` // Removed capabilities - Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"` + Drop []Capability `json:"drop,omitempty" description:"droped capabilities"` } type ResourceRequirements struct { diff --git a/pkg/api/v1beta3/conversion_generated.go b/pkg/api/v1beta3/conversion_generated.go index 9691ce5efae..61be7d25044 100644 --- a/pkg/api/v1beta3/conversion_generated.go +++ b/pkg/api/v1beta3/conversion_generated.go @@ -84,17 +84,17 @@ func convert_api_Capabilities_To_v1beta3_Capabilities(in *newer.Capabilities, ou defaulting.(func(*newer.Capabilities))(in) } if in.Add != nil { - out.Add = make([]CapabilityType, len(in.Add)) + out.Add = make([]Capability, len(in.Add)) for i := range in.Add { - out.Add[i] = CapabilityType(in.Add[i]) + out.Add[i] = Capability(in.Add[i]) } } else { out.Add = nil } if in.Drop != nil { - out.Drop = make([]CapabilityType, len(in.Drop)) + out.Drop = make([]Capability, len(in.Drop)) for i := range in.Drop { - out.Drop[i] = CapabilityType(in.Drop[i]) + out.Drop[i] = Capability(in.Drop[i]) } } else { out.Drop = nil @@ -107,17 +107,17 @@ func convert_v1beta3_Capabilities_To_api_Capabilities(in *Capabilities, out *new defaulting.(func(*Capabilities))(in) } if in.Add != nil { - out.Add = make([]newer.CapabilityType, len(in.Add)) + out.Add = make([]newer.Capability, len(in.Add)) for i := range in.Add { - out.Add[i] = newer.CapabilityType(in.Add[i]) + out.Add[i] = newer.Capability(in.Add[i]) } } else { out.Add = nil } if in.Drop != nil { - out.Drop = make([]newer.CapabilityType, len(in.Drop)) + out.Drop = make([]newer.Capability, len(in.Drop)) for i := range in.Drop { - out.Drop[i] = newer.CapabilityType(in.Drop[i]) + out.Drop[i] = newer.Capability(in.Drop[i]) } } else { out.Drop = nil diff --git a/pkg/api/v1beta3/conversion_test.go b/pkg/api/v1beta3/conversion_test.go index 497c1a7c8c1..2f611413fb4 100644 --- a/pkg/api/v1beta3/conversion_test.go +++ b/pkg/api/v1beta3/conversion_test.go @@ -67,11 +67,11 @@ func TestBadSecurityContextConversion(t *testing.T) { "mismatched caps add": { c: ¤t.Container{ Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, + Add: []current.Capability{"foo"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"bar"}, + Add: []current.Capability{"bar"}, }, }, }, @@ -80,11 +80,11 @@ func TestBadSecurityContextConversion(t *testing.T) { "mismatched caps drop": { c: ¤t.Container{ Capabilities: current.Capabilities{ - Drop: []current.CapabilityType{"foo"}, + Drop: []current.Capability{"foo"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Drop: []current.CapabilityType{"bar"}, + Drop: []current.Capability{"bar"}, }, }, }, diff --git a/pkg/api/v1beta3/defaults_test.go b/pkg/api/v1beta3/defaults_test.go index a323bdf779b..bc2b794435f 100644 --- a/pkg/api/v1beta3/defaults_test.go +++ b/pkg/api/v1beta3/defaults_test.go @@ -360,8 +360,8 @@ func TestSetDefaultSecurityContext(t *testing.T) { c: current.Container{ Privileged: false, Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Privileged: &priv, @@ -372,13 +372,13 @@ func TestSetDefaultSecurityContext(t *testing.T) { c: current.Container{ Privileged: false, Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, }, }, @@ -389,8 +389,8 @@ func TestSetDefaultSecurityContext(t *testing.T) { SecurityContext: ¤t.SecurityContext{ Privileged: &priv, Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"biz"}, - Drop: []current.CapabilityType{"baz"}, + Add: []current.Capability{"biz"}, + Drop: []current.Capability{"baz"}, }, }, }, @@ -398,14 +398,14 @@ func TestSetDefaultSecurityContext(t *testing.T) { "upward defaulting priv": { c: current.Container{ Capabilities: current.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, SecurityContext: ¤t.SecurityContext{ Privileged: &privTrue, Capabilities: ¤t.Capabilities{ - Add: []current.CapabilityType{"foo"}, - Drop: []current.CapabilityType{"bar"}, + Add: []current.Capability{"foo"}, + Drop: []current.Capability{"bar"}, }, }, }, diff --git a/pkg/api/v1beta3/types.go b/pkg/api/v1beta3/types.go index 4ed3f34d4de..efb6cefce08 100644 --- a/pkg/api/v1beta3/types.go +++ b/pkg/api/v1beta3/types.go @@ -590,15 +590,15 @@ const ( PullIfNotPresent PullPolicy = "IfNotPresent" ) -// CapabilityType represent POSIX capabilities type -type CapabilityType string +// Capability represent POSIX capabilities type +type Capability string // Capabilities represent POSIX capabilities that can be added or removed to a running container. type Capabilities struct { // Added capabilities - Add []CapabilityType `json:"add,omitempty" description:"added capabilities"` + Add []Capability `json:"add,omitempty" description:"added capabilities"` // Removed capabilities - Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"` + Drop []Capability `json:"drop,omitempty" description:"droped capabilities"` } // ResourceRequirements describes the compute resource requirements. diff --git a/pkg/api/validation/validation_test.go b/pkg/api/validation/validation_test.go index b2d5e3e2cb4..0bf0a40c1fb 100644 --- a/pkg/api/validation/validation_test.go +++ b/pkg/api/validation/validation_test.go @@ -3175,8 +3175,8 @@ func TestValidateSecurityContext(t *testing.T) { return &api.SecurityContext{ Privileged: &priv, Capabilities: &api.Capabilities{ - Add: []api.CapabilityType{"foo"}, - Drop: []api.CapabilityType{"bar"}, + Add: []api.Capability{"foo"}, + Drop: []api.Capability{"bar"}, }, SELinuxOptions: &api.SELinuxOptions{ User: "user", diff --git a/pkg/kubelet/rkt/cap.go b/pkg/kubelet/rkt/cap.go index b70217ece46..8cec6964a63 100644 --- a/pkg/kubelet/rkt/cap.go +++ b/pkg/kubelet/rkt/cap.go @@ -116,10 +116,10 @@ func getAllCapabilities() string { return strings.Join(capabilities, ",") } -// TODO(yifan): This assumes that api.CapabilityType has the form of +// TODO(yifan): This assumes that api.Capability has the form of // "CAP_SYS_ADMIN". We need to have a formal definition for // capabilities. -func getCapabilities(caps []api.CapabilityType) string { +func getCapabilities(caps []api.Capability) string { var capList []string for _, cap := range caps { capList = append(capList, fmt.Sprintf("%q", cap)) diff --git a/pkg/securitycontext/provider.go b/pkg/securitycontext/provider.go index 0362fcc0f9c..5cdbf5aae02 100644 --- a/pkg/securitycontext/provider.go +++ b/pkg/securitycontext/provider.go @@ -81,8 +81,8 @@ func modifySecurityOption(config []string, name, value string) []string { return config } -// makeCapabilites creates string slices from CapabilityType slices -func makeCapabilites(capAdd []api.CapabilityType, capDrop []api.CapabilityType) ([]string, []string) { +// makeCapabilites creates string slices from Capability slices +func makeCapabilites(capAdd []api.Capability, capDrop []api.Capability) ([]string, []string) { var ( addCaps []string dropCaps []string diff --git a/pkg/securitycontext/provider_test.go b/pkg/securitycontext/provider_test.go index 1735fdfa99f..35b8c4d7d58 100644 --- a/pkg/securitycontext/provider_test.go +++ b/pkg/securitycontext/provider_test.go @@ -154,8 +154,8 @@ func fullValidSecurityContext() *api.SecurityContext { return &api.SecurityContext{ Privileged: &priv, Capabilities: &api.Capabilities{ - Add: []api.CapabilityType{"addCapA", "addCapB"}, - Drop: []api.CapabilityType{"dropCapA", "dropCapB"}, + Add: []api.Capability{"addCapA", "addCapB"}, + Drop: []api.Capability{"dropCapA", "dropCapB"}, }, SELinuxOptions: &api.SELinuxOptions{ User: "user",