github.com/jmrodri/operator-sdk@v0.5.0/pkg/scaffold/role_test.go (about)

     1  // Copyright 2018 The Operator-SDK Authors
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package scaffold
    16  
    17  import (
    18  	"testing"
    19  
    20  	"github.com/operator-framework/operator-sdk/internal/util/diffutil"
    21  )
    22  
    23  func TestRole(t *testing.T) {
    24  	s, buf := setupScaffoldAndWriter()
    25  	err := s.Execute(appConfig, &Role{})
    26  	if err != nil {
    27  		t.Fatalf("Failed to execute the scaffold: (%v)", err)
    28  	}
    29  
    30  	if roleExp != buf.String() {
    31  		diffs := diffutil.Diff(roleExp, buf.String())
    32  		t.Fatalf("Expected vs actual differs.\n%v", diffs)
    33  	}
    34  }
    35  
    36  func TestRoleClusterScoped(t *testing.T) {
    37  	s, buf := setupScaffoldAndWriter()
    38  	err := s.Execute(appConfig, &Role{IsClusterScoped: true})
    39  	if err != nil {
    40  		t.Fatalf("Failed to execute the scaffold: (%v)", err)
    41  	}
    42  
    43  	if clusterroleExp != buf.String() {
    44  		diffs := diffutil.Diff(clusterroleExp, buf.String())
    45  		t.Fatalf("Expected vs actual differs.\n%v", diffs)
    46  	}
    47  }
    48  
    49  const roleExp = `kind: Role
    50  apiVersion: rbac.authorization.k8s.io/v1
    51  metadata:
    52    name: app-operator
    53  rules:
    54  - apiGroups:
    55    - ""
    56    resources:
    57    - pods
    58    - services
    59    - endpoints
    60    - persistentvolumeclaims
    61    - events
    62    - configmaps
    63    - secrets
    64    verbs:
    65    - "*"
    66  - apiGroups:
    67    - ""
    68    resources:
    69    - namespaces
    70    verbs:
    71    - get
    72  - apiGroups:
    73    - apps
    74    resources:
    75    - deployments
    76    - daemonsets
    77    - replicasets
    78    - statefulsets
    79    verbs:
    80    - "*"
    81  - apiGroups:
    82    - monitoring.coreos.com
    83    resources:
    84    - servicemonitors
    85    verbs:
    86    - "get"
    87    - "create"
    88  `
    89  
    90  const clusterroleExp = `kind: ClusterRole
    91  apiVersion: rbac.authorization.k8s.io/v1
    92  metadata:
    93    name: app-operator
    94  rules:
    95  - apiGroups:
    96    - ""
    97    resources:
    98    - pods
    99    - services
   100    - endpoints
   101    - persistentvolumeclaims
   102    - events
   103    - configmaps
   104    - secrets
   105    verbs:
   106    - "*"
   107  - apiGroups:
   108    - ""
   109    resources:
   110    - namespaces
   111    verbs:
   112    - get
   113  - apiGroups:
   114    - apps
   115    resources:
   116    - deployments
   117    - daemonsets
   118    - replicasets
   119    - statefulsets
   120    verbs:
   121    - "*"
   122  - apiGroups:
   123    - monitoring.coreos.com
   124    resources:
   125    - servicemonitors
   126    verbs:
   127    - "get"
   128    - "create"
   129  `