Skip to content

Commit

Permalink
test: cleanup provider tests (part 1)
Browse files Browse the repository at this point in the history
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
  • Loading branch information
aramase committed May 9, 2022
1 parent 09d920a commit e020dea
Show file tree
Hide file tree
Showing 4 changed files with 0 additions and 108 deletions.
27 changes: 0 additions & 27 deletions test/bats/aws.bats
Expand Up @@ -61,33 +61,6 @@ teardown_file() {
assert_success
}

@test "secretproviderclasses crd is established" {
kubectl wait --namespace $NAMESPACE --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io

run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io
assert_success
}

@test "Test rbac roles and role bindings exist" {
run kubectl get clusterrole/secretproviderclasses-role
assert_success

run kubectl get clusterrole/secretproviderrotation-role
assert_success

run kubectl get clusterrole/secretprovidersyncing-role
assert_success

run kubectl get clusterrolebinding/secretproviderclasses-rolebinding
assert_success

run kubectl get clusterrolebinding/secretproviderrotation-rolebinding
assert_success

run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding
assert_success
}

@test "deploy aws secretproviderclass crd" {
envsubst < $BATS_TEST_DIR/BasicTestMountSPC.yaml | kubectl --namespace $NAMESPACE apply -f -

Expand Down
27 changes: 0 additions & 27 deletions test/bats/azure.bats
Expand Up @@ -68,33 +68,6 @@ setup() {
assert_success
}

@test "secretproviderclasses crd is established" {
kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io

run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io
assert_success
}

@test "Test rbac roles and role bindings exist" {
run kubectl get clusterrole/secretproviderclasses-role
assert_success

run kubectl get clusterrole/secretproviderrotation-role
assert_success

run kubectl get clusterrole/secretprovidersyncing-role
assert_success

run kubectl get clusterrolebinding/secretproviderclasses-rolebinding
assert_success

run kubectl get clusterrolebinding/secretproviderrotation-rolebinding
assert_success

run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding
assert_success
}

@test "deploy azure secretproviderclass crd" {
envsubst < $BATS_TESTS_DIR/azure_v1_secretproviderclass.yaml | kubectl apply -f -

Expand Down
27 changes: 0 additions & 27 deletions test/bats/gcp.bats
Expand Up @@ -26,33 +26,6 @@ export SECRET_VALUE=${SECRET_VALUE:-"aHVudGVyMg=="}
assert_success
}

@test "secretproviderclasses crd is established" {
kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io

run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io
assert_success
}

@test "Test rbac roles and role bindings exist" {
run kubectl get clusterrole/secretproviderclasses-role
assert_success

run kubectl get clusterrole/secretproviderrotation-role
assert_success

run kubectl get clusterrole/secretprovidersyncing-role
assert_success

run kubectl get clusterrolebinding/secretproviderclasses-rolebinding
assert_success

run kubectl get clusterrolebinding/secretproviderrotation-rolebinding
assert_success

run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding
assert_success
}

@test "deploy gcp secretproviderclass crd" {
envsubst < $BATS_TESTS_DIR/gcp_v1_secretproviderclass.yaml | kubectl apply --namespace=$NAMESPACE -f -

Expand Down
27 changes: 0 additions & 27 deletions test/bats/vault.bats
Expand Up @@ -57,33 +57,6 @@ EOF
ttl=20m
}

@test "secretproviderclasses crd is established" {
kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io

run kubectl get crd/secretproviderclasses.secrets-store.csi.x-k8s.io
assert_success
}

@test "Test rbac roles and role bindings exist" {
run kubectl get clusterrole/secretproviderclasses-role
assert_success

run kubectl get clusterrole/secretproviderrotation-role
assert_success

run kubectl get clusterrole/secretprovidersyncing-role
assert_success

run kubectl get clusterrolebinding/secretproviderclasses-rolebinding
assert_success

run kubectl get clusterrolebinding/secretproviderrotation-rolebinding
assert_success

run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding
assert_success
}

@test "deploy vault secretproviderclass crd" {
kubectl apply -f $BATS_TESTS_DIR/vault_v1_secretproviderclass.yaml
kubectl wait --for condition=established --timeout=60s crd/secretproviderclasses.secrets-store.csi.x-k8s.io
Expand Down

0 comments on commit e020dea

Please sign in to comment.