Skip to content

Commit

Permalink
Updated CI tests with new common changes
Browse files Browse the repository at this point in the history
  • Loading branch information
claudiol committed May 15, 2024
1 parent 3ffaca6 commit cb16f7c
Show file tree
Hide file tree
Showing 10 changed files with 195 additions and 25 deletions.
41 changes: 39 additions & 2 deletions tests/common-clustergroup-industrial-edge-factory.expected.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,13 @@ metadata:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/configmap.yaml
apiVersion: v1
kind: ConfigMap
Expand Down Expand Up @@ -116,6 +123,9 @@ data:
initContainers: []
imperative:
activeDeadlineSeconds: 3600
adminClusterRoleName: imperative-admin-cluster-role
adminServiceAccountCreate: true
adminServiceAccountName: imperative-admin-sa
clusterRoleName: imperative-cluster-role
clusterRoleYaml: ""
cronJobName: imperative-cronjob
Expand Down Expand Up @@ -278,11 +288,24 @@ rules:
- list
- watch
---
# Source: clustergroup/templates/imperative/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imperative-admin-cluster-role
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-cluster-admin-rolebinding
name: imperative-cluster-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
Expand All @@ -292,6 +315,20 @@ subjects:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-admin-clusterrolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imperative-admin-cluster-role
subjects:
- kind: ServiceAccount
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/plumbing/argocd-super-role.yaml
# WARNING: ONLY USE THIS FOR MANAGING CLUSTERS NOT FOR REGULAR USERS
apiVersion: rbac.authorization.k8s.io/v1
Expand Down Expand Up @@ -354,7 +391,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: imperative-admin-rolebinding
name: imperative-rolebinding
namespace: imperative
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand Down
41 changes: 39 additions & 2 deletions tests/common-clustergroup-industrial-edge-hub.expected.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,13 @@ metadata:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/configmap.yaml
apiVersion: v1
kind: ConfigMap
Expand Down Expand Up @@ -237,6 +244,9 @@ data:
initContainers: []
imperative:
activeDeadlineSeconds: 3600
adminClusterRoleName: imperative-admin-cluster-role
adminServiceAccountCreate: true
adminServiceAccountName: imperative-admin-sa
clusterRoleName: imperative-cluster-role
clusterRoleYaml: ""
cronJobName: imperative-cronjob
Expand Down Expand Up @@ -439,11 +449,24 @@ rules:
- list
- watch
---
# Source: clustergroup/templates/imperative/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imperative-admin-cluster-role
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-cluster-admin-rolebinding
name: imperative-cluster-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
Expand All @@ -453,6 +476,20 @@ subjects:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-admin-clusterrolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imperative-admin-cluster-role
subjects:
- kind: ServiceAccount
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/plumbing/argocd-super-role.yaml
# WARNING: ONLY USE THIS FOR MANAGING CLUSTERS NOT FOR REGULAR USERS
apiVersion: rbac.authorization.k8s.io/v1
Expand Down Expand Up @@ -515,7 +552,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: imperative-admin-rolebinding
name: imperative-rolebinding
namespace: imperative
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand Down
41 changes: 39 additions & 2 deletions tests/common-clustergroup-medical-diagnosis-hub.expected.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,13 @@ metadata:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/configmap.yaml
apiVersion: v1
kind: ConfigMap
Expand Down Expand Up @@ -220,6 +227,9 @@ data:
initContainers: []
imperative:
activeDeadlineSeconds: 3600
adminClusterRoleName: imperative-admin-cluster-role
adminServiceAccountCreate: true
adminServiceAccountName: imperative-admin-sa
clusterRoleName: imperative-cluster-role
clusterRoleYaml: ""
cronJobName: imperative-cronjob
Expand Down Expand Up @@ -366,11 +376,24 @@ rules:
- list
- watch
---
# Source: clustergroup/templates/imperative/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imperative-admin-cluster-role
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-cluster-admin-rolebinding
name: imperative-cluster-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
Expand All @@ -380,6 +403,20 @@ subjects:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-admin-clusterrolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imperative-admin-cluster-role
subjects:
- kind: ServiceAccount
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/plumbing/argocd-super-role.yaml
# WARNING: ONLY USE THIS FOR MANAGING CLUSTERS NOT FOR REGULAR USERS
apiVersion: rbac.authorization.k8s.io/v1
Expand Down Expand Up @@ -442,7 +479,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: imperative-admin-rolebinding
name: imperative-rolebinding
namespace: imperative
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand Down
41 changes: 39 additions & 2 deletions tests/common-clustergroup-naked.expected.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,13 @@ metadata:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/configmap.yaml
apiVersion: v1
kind: ConfigMap
Expand All @@ -43,6 +50,9 @@ data:
initContainers: []
imperative:
activeDeadlineSeconds: 3600
adminClusterRoleName: imperative-admin-cluster-role
adminServiceAccountCreate: true
adminServiceAccountName: imperative-admin-sa
clusterRoleName: imperative-cluster-role
clusterRoleYaml: ""
cronJobName: imperative-cronjob
Expand Down Expand Up @@ -117,11 +127,24 @@ rules:
- list
- watch
---
# Source: clustergroup/templates/imperative/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imperative-admin-cluster-role
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-cluster-admin-rolebinding
name: imperative-cluster-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
Expand All @@ -131,6 +154,20 @@ subjects:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-admin-clusterrolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imperative-admin-cluster-role
subjects:
- kind: ServiceAccount
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/plumbing/argocd-super-role.yaml
# WARNING: ONLY USE THIS FOR MANAGING CLUSTERS NOT FOR REGULAR USERS
apiVersion: rbac.authorization.k8s.io/v1
Expand Down Expand Up @@ -193,7 +230,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: imperative-admin-rolebinding
name: imperative-rolebinding
namespace: imperative
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand Down
41 changes: 39 additions & 2 deletions tests/common-clustergroup-normal.expected.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,13 @@ metadata:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/configmap.yaml
apiVersion: v1
kind: ConfigMap
Expand Down Expand Up @@ -128,6 +135,9 @@ data:
initContainers: []
imperative:
activeDeadlineSeconds: 3600
adminClusterRoleName: imperative-admin-cluster-role
adminServiceAccountCreate: true
adminServiceAccountName: imperative-admin-sa
clusterRoleName: imperative-cluster-role
clusterRoleYaml: ""
cronJobName: imperative-cronjob
Expand Down Expand Up @@ -328,11 +338,24 @@ rules:
- list
- watch
---
# Source: clustergroup/templates/imperative/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imperative-admin-cluster-role
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-cluster-admin-rolebinding
name: imperative-cluster-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
Expand All @@ -342,6 +365,20 @@ subjects:
name: imperative-sa
namespace: imperative
---
# Source: clustergroup/templates/imperative/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imperative-admin-clusterrolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imperative-admin-cluster-role
subjects:
- kind: ServiceAccount
name: imperative-admin-sa
namespace: imperative
---
# Source: clustergroup/templates/plumbing/argocd-super-role.yaml
# WARNING: ONLY USE THIS FOR MANAGING CLUSTERS NOT FOR REGULAR USERS
apiVersion: rbac.authorization.k8s.io/v1
Expand Down Expand Up @@ -404,7 +441,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: imperative-admin-rolebinding
name: imperative-rolebinding
namespace: imperative
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand Down
Loading

0 comments on commit cb16f7c

Please sign in to comment.