diff --git a/test/bats/aws.bats b/test/bats/aws.bats index 1e4c801a6..4144ccb0c 100644 --- a/test/bats/aws.bats +++ b/test/bats/aws.bats @@ -61,33 +61,6 @@ teardown_file() { assert_success } -@test "secretproviderclasses crd is established" { - kubectl wait --namespace $NAMESPACE --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io - - run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io - assert_success -} - -@test "Test rbac roles and role bindings exist" { - run kubectl get clusterrole/secretproviderclasses-role - assert_success - - run kubectl get clusterrole/secretproviderrotation-role - assert_success - - run kubectl get clusterrole/secretprovidersyncing-role - assert_success - - run kubectl get clusterrolebinding/secretproviderclasses-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretproviderrotation-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding - assert_success -} - @test "deploy aws secretproviderclass crd" { envsubst < $BATS_TEST_DIR/BasicTestMountSPC.yaml | kubectl --namespace $NAMESPACE apply -f - diff --git a/test/bats/azure.bats b/test/bats/azure.bats index c31402f94..dd2e03c04 100644 --- a/test/bats/azure.bats +++ b/test/bats/azure.bats @@ -68,33 +68,6 @@ setup() { assert_success } -@test "secretproviderclasses crd is established" { - kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io - - run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io - assert_success -} - -@test "Test rbac roles and role bindings exist" { - run kubectl get clusterrole/secretproviderclasses-role - assert_success - - run kubectl get clusterrole/secretproviderrotation-role - assert_success - - run kubectl get clusterrole/secretprovidersyncing-role - assert_success - - run kubectl get clusterrolebinding/secretproviderclasses-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretproviderrotation-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding - assert_success -} - @test "deploy azure secretproviderclass crd" { envsubst < $BATS_TESTS_DIR/azure_v1_secretproviderclass.yaml | kubectl apply -f - diff --git a/test/bats/gcp.bats b/test/bats/gcp.bats index 7d0076258..418eb9dab 100644 --- a/test/bats/gcp.bats +++ b/test/bats/gcp.bats @@ -26,33 +26,6 @@ export SECRET_VALUE=${SECRET_VALUE:-"aHVudGVyMg=="} assert_success } -@test "secretproviderclasses crd is established" { - kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io - - run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io - assert_success -} - -@test "Test rbac roles and role bindings exist" { - run kubectl get clusterrole/secretproviderclasses-role - assert_success - - run kubectl get clusterrole/secretproviderrotation-role - assert_success - - run kubectl get clusterrole/secretprovidersyncing-role - assert_success - - run kubectl get clusterrolebinding/secretproviderclasses-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretproviderrotation-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding - assert_success -} - @test "deploy gcp secretproviderclass crd" { envsubst < $BATS_TESTS_DIR/gcp_v1_secretproviderclass.yaml | kubectl apply --namespace=$NAMESPACE -f - diff --git a/test/bats/vault.bats b/test/bats/vault.bats index e6d55eac1..6291113f2 100644 --- a/test/bats/vault.bats +++ b/test/bats/vault.bats @@ -57,33 +57,6 @@ EOF ttl=20m } -@test "secretproviderclasses crd is established" { - kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io - - run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io - assert_success -} - -@test "Test rbac roles and role bindings exist" { - run kubectl get clusterrole/secretproviderclasses-role - assert_success - - run kubectl get clusterrole/secretproviderrotation-role - assert_success - - run kubectl get clusterrole/secretprovidersyncing-role - assert_success - - run kubectl get clusterrolebinding/secretproviderclasses-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretproviderrotation-rolebinding - assert_success - - run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding - assert_success -} - @test "deploy vault secretproviderclass crd" { kubectl apply -f $BATS_TESTS_DIR/vault_v1_secretproviderclass.yaml kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io