summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHordur Freyr Yngvason <hfyngvason@gitlab.com>2019-07-04 10:48:45 +0200
committerHordur Freyr Yngvason <hfyngvason@gitlab.com>2019-07-09 22:01:20 +0200
commit9ece13af0545f7816027fda19d4744c1b1ae80d7 (patch)
treec4c9cd206d36bdfd2d73ee830aff88ebf0cf5206
parent5732dcbbb0c10904cdb31e86a5ae5f4a6bacf350 (diff)
downloadgitlab-ce-9ece13af0545f7816027fda19d4744c1b1ae80d7.tar.gz
Fix mistakenly deleted test file
-rw-r--r--spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb35
-rw-r--r--spec/lib/gitlab/kubernetes/cluster_role_spec.rb30
2 files changed, 35 insertions, 30 deletions
diff --git a/spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb b/spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb
new file mode 100644
index 00000000000..e1106f7496a
--- /dev/null
+++ b/spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb
@@ -0,0 +1,35 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+describe Gitlab::Kubernetes::ClusterRoleBinding do
+ let(:cluster_role_binding) { described_class.new(name, cluster_role_name, subjects) }
+ let(:name) { 'cluster-role-binding-name' }
+ let(:cluster_role_name) { 'cluster-admin' }
+
+ let(:subjects) { [{ kind: 'ServiceAccount', name: 'sa', namespace: 'ns' }] }
+
+ describe '#generate' do
+ let(:role_ref) do
+ {
+ apiGroup: 'rbac.authorization.k8s.io',
+ kind: 'ClusterRole',
+ name: cluster_role_name
+ }
+ end
+
+ let(:resource) do
+ ::Kubeclient::Resource.new(
+ metadata: { name: name },
+ roleRef: role_ref,
+ subjects: subjects
+ )
+ end
+
+ subject { cluster_role_binding.generate }
+
+ it 'builds a Kubeclient Resource' do
+ is_expected.to eq(resource)
+ end
+ end
+end
diff --git a/spec/lib/gitlab/kubernetes/cluster_role_spec.rb b/spec/lib/gitlab/kubernetes/cluster_role_spec.rb
deleted file mode 100644
index 620180d6c58..00000000000
--- a/spec/lib/gitlab/kubernetes/cluster_role_spec.rb
+++ /dev/null
@@ -1,30 +0,0 @@
-# frozen_string_literal: true
-
-require 'spec_helper'
-
-describe Gitlab::Kubernetes::ClusterRole do
- let(:cluster_role) { described_class.new(name: name, labels: labels, rules: rules) }
-
- let(:name) { 'example-cluster-role' }
- let(:labels) { { 'rbac.authorization.k8s.io/aggregate-to-edit' => 'true' } }
- let(:rules) do
- [{
- apiGroups: %w(serving.knative.dev),
- resources: %w(configurations configurationgenerations routes revisions revisionuids autoscalers services),
- verbs: %w(get list create update delete patch watch)
- }]
- end
-
- describe '#generate' do
- let(:resource) do
- ::Kubeclient::Resource.new(
- metadata: { name: name, labels: labels },
- rules: rules
- )
- end
-
- subject { cluster_role.generate }
-
- it { is_expected.to eq(resource) }
- end
-end