diff options
author | Hordur Freyr Yngvason <hfyngvason@gitlab.com> | 2019-07-04 10:48:45 +0200 |
---|---|---|
committer | Hordur Freyr Yngvason <hfyngvason@gitlab.com> | 2019-07-09 22:01:20 +0200 |
commit | 9ece13af0545f7816027fda19d4744c1b1ae80d7 (patch) | |
tree | c4c9cd206d36bdfd2d73ee830aff88ebf0cf5206 | |
parent | 5732dcbbb0c10904cdb31e86a5ae5f4a6bacf350 (diff) | |
download | gitlab-ce-9ece13af0545f7816027fda19d4744c1b1ae80d7.tar.gz |
Fix mistakenly deleted test file
-rw-r--r-- | spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb | 35 | ||||
-rw-r--r-- | spec/lib/gitlab/kubernetes/cluster_role_spec.rb | 30 |
2 files changed, 35 insertions, 30 deletions
diff --git a/spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb b/spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb new file mode 100644 index 00000000000..e1106f7496a --- /dev/null +++ b/spec/lib/gitlab/kubernetes/cluster_role_binding_spec.rb @@ -0,0 +1,35 @@ +# frozen_string_literal: true + +require 'spec_helper' + +describe Gitlab::Kubernetes::ClusterRoleBinding do + let(:cluster_role_binding) { described_class.new(name, cluster_role_name, subjects) } + let(:name) { 'cluster-role-binding-name' } + let(:cluster_role_name) { 'cluster-admin' } + + let(:subjects) { [{ kind: 'ServiceAccount', name: 'sa', namespace: 'ns' }] } + + describe '#generate' do + let(:role_ref) do + { + apiGroup: 'rbac.authorization.k8s.io', + kind: 'ClusterRole', + name: cluster_role_name + } + end + + let(:resource) do + ::Kubeclient::Resource.new( + metadata: { name: name }, + roleRef: role_ref, + subjects: subjects + ) + end + + subject { cluster_role_binding.generate } + + it 'builds a Kubeclient Resource' do + is_expected.to eq(resource) + end + end +end diff --git a/spec/lib/gitlab/kubernetes/cluster_role_spec.rb b/spec/lib/gitlab/kubernetes/cluster_role_spec.rb deleted file mode 100644 index 620180d6c58..00000000000 --- a/spec/lib/gitlab/kubernetes/cluster_role_spec.rb +++ /dev/null @@ -1,30 +0,0 @@ -# frozen_string_literal: true - -require 'spec_helper' - -describe Gitlab::Kubernetes::ClusterRole do - let(:cluster_role) { described_class.new(name: name, labels: labels, rules: rules) } - - let(:name) { 'example-cluster-role' } - let(:labels) { { 'rbac.authorization.k8s.io/aggregate-to-edit' => 'true' } } - let(:rules) do - [{ - apiGroups: %w(serving.knative.dev), - resources: %w(configurations configurationgenerations routes revisions revisionuids autoscalers services), - verbs: %w(get list create update delete patch watch) - }] - end - - describe '#generate' do - let(:resource) do - ::Kubeclient::Resource.new( - metadata: { name: name, labels: labels }, - rules: rules - ) - end - - subject { cluster_role.generate } - - it { is_expected.to eq(resource) } - end -end |