@@ -206,33 +206,25 @@ var _ = Describe("dex rendering tests", func() {
206206 component := render .Dex (cfg )
207207 resources , _ := component .Objects ()
208208
209- expectedResources := []struct {
210- name string
211- ns string
212- group string
213- version string
214- kind string
215- }{
216- {render .DexObjectName , "" , "" , "v1" , "Namespace" },
217- {render .DexPolicyName , render .DexNamespace , "projectcalico.org" , "v3" , "NetworkPolicy" },
218- {networkpolicy .TigeraComponentDefaultDenyPolicyName , render .DexNamespace , "projectcalico.org" , "v3" , "NetworkPolicy" },
219- {render .DexObjectName , render .DexNamespace , "" , "v1" , "ServiceAccount" },
220- {render .DexObjectName , render .DexNamespace , "apps" , "v1" , "Deployment" },
221- {render .DexObjectName , render .DexNamespace , "" , "v1" , "Service" },
222- {render .DexObjectName , "" , rbac , "v1" , "ClusterRole" },
223- {render .DexObjectName , "" , rbac , "v1" , "ClusterRoleBinding" },
224- {render .DexObjectName , render .DexNamespace , "" , "v1" , "ConfigMap" },
225- {render .DexObjectName , common .OperatorNamespace (), "" , "v1" , "Secret" },
226- {render .OIDCSecretName , common .OperatorNamespace (), "" , "v1" , "Secret" },
227- {render .DexObjectName , render .DexNamespace , "" , "v1" , "Secret" },
228- {render .OIDCSecretName , render .DexNamespace , "" , "v1" , "Secret" },
229- {pullSecretName , render .DexNamespace , "" , "v1" , "Secret" },
209+ expectedResources := []client.Object {
210+ & corev1.Namespace {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName }, TypeMeta : metav1.TypeMeta {Kind : "Namespace" , APIVersion : "v1" }},
211+ & v3.NetworkPolicy {ObjectMeta : metav1.ObjectMeta {Name : render .DexPolicyName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "NetworkPolicy" , APIVersion : "projectcalico.org/v3" }},
212+ & v3.NetworkPolicy {ObjectMeta : metav1.ObjectMeta {Name : networkpolicy .TigeraComponentDefaultDenyPolicyName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "NetworkPolicy" , APIVersion : "projectcalico.org/v3" }},
213+ & corev1.ServiceAccount {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "ServiceAccount" , APIVersion : "v1" }},
214+ & appsv1.Deployment {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Deployment" , APIVersion : "apps/v1" }},
215+ & corev1.Service {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Service" , APIVersion : "v1" }},
216+ & rbacv1.ClusterRole {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName }, TypeMeta : metav1.TypeMeta {Kind : "ClusterRole" , APIVersion : "rbac.authorization.k8s.io/v1" }},
217+ & rbacv1.ClusterRoleBinding {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName }, TypeMeta : metav1.TypeMeta {Kind : "ClusterRoleBinding" , APIVersion : "rbac.authorization.k8s.io/v1" }},
218+ & corev1.ConfigMap {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "ConfigMap" , APIVersion : "v1" }},
219+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : common .OperatorNamespace ()}, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
220+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .OIDCSecretName , Namespace : common .OperatorNamespace ()}, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
221+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
222+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .OIDCSecretName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
223+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : pullSecretName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
224+ & rbacv1.RoleBinding {ObjectMeta : metav1.ObjectMeta {Name : render .TigeraOperatorSecrets , Namespace : render .DexNamespace }},
230225 }
231226
232- for i , expectedRes := range expectedResources {
233- rtest .ExpectResourceTypeAndObjectMetadata (resources [i ], expectedRes .name , expectedRes .ns , expectedRes .group , expectedRes .version , expectedRes .kind )
234- }
235- Expect (len (resources )).To (Equal (len (expectedResources )))
227+ rtest .ExpectResources (resources , expectedResources )
236228
237229 d := rtest .GetResource (resources , "tigera-dex" , "tigera-dex" , "apps" , "v1" , "Deployment" ).(* appsv1.Deployment )
238230
@@ -346,34 +338,26 @@ var _ = Describe("dex rendering tests", func() {
346338 component := render .Dex (cfg )
347339 resources , _ := component .Objects ()
348340
349- expectedResources := []struct {
350- name string
351- ns string
352- group string
353- version string
354- kind string
355- }{
356- {render .DexObjectName , "" , "" , "v1" , "Namespace" },
357- {render .DexPolicyName , render .DexNamespace , "projectcalico.org" , "v3" , "NetworkPolicy" },
358- {networkpolicy .TigeraComponentDefaultDenyPolicyName , render .DexNamespace , "projectcalico.org" , "v3" , "NetworkPolicy" },
359- {render .DexObjectName , render .DexNamespace , "" , "v1" , "ServiceAccount" },
360- {render .DexObjectName , render .DexNamespace , "apps" , "v1" , "Deployment" },
361- {render .DexObjectName , render .DexNamespace , "" , "v1" , "Service" },
362- {render .DexObjectName , "" , rbac , "v1" , "ClusterRole" },
363- {render .DexObjectName , "" , rbac , "v1" , "ClusterRoleBinding" },
364- {render .DexObjectName , render .DexNamespace , "" , "v1" , "ConfigMap" },
365- {render .DexObjectName , common .OperatorNamespace (), "" , "v1" , "Secret" },
366- {render .OIDCSecretName , common .OperatorNamespace (), "" , "v1" , "Secret" },
367- {render .DexObjectName , render .DexNamespace , "" , "v1" , "Secret" },
368- {render .OIDCSecretName , render .DexNamespace , "" , "v1" , "Secret" },
369- {pullSecretName , render .DexNamespace , "" , "v1" , "Secret" },
370- {"tigera-dex:csr-creator" , "" , "rbac.authorization.k8s.io" , "v1" , "ClusterRoleBinding" },
341+ expectedResources := []client.Object {
342+ & corev1.Namespace {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName }, TypeMeta : metav1.TypeMeta {Kind : "Namespace" , APIVersion : "v1" }},
343+ & v3.NetworkPolicy {ObjectMeta : metav1.ObjectMeta {Name : render .DexPolicyName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "NetworkPolicy" , APIVersion : "projectcalico.org/v3" }},
344+ & v3.NetworkPolicy {ObjectMeta : metav1.ObjectMeta {Name : networkpolicy .TigeraComponentDefaultDenyPolicyName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "NetworkPolicy" , APIVersion : "projectcalico.org/v3" }},
345+ & corev1.ServiceAccount {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "ServiceAccount" , APIVersion : "v1" }},
346+ & appsv1.Deployment {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Deployment" , APIVersion : "apps/v1" }},
347+ & corev1.Service {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Service" , APIVersion : "v1" }},
348+ & rbacv1.ClusterRole {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName }, TypeMeta : metav1.TypeMeta {Kind : "ClusterRole" , APIVersion : "rbac.authorization.k8s.io/v1" }},
349+ & rbacv1.ClusterRoleBinding {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName }, TypeMeta : metav1.TypeMeta {Kind : "ClusterRoleBinding" , APIVersion : "rbac.authorization.k8s.io/v1" }},
350+ & corev1.ConfigMap {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "ConfigMap" , APIVersion : "v1" }},
351+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : common .OperatorNamespace ()}, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
352+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .OIDCSecretName , Namespace : common .OperatorNamespace ()}, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
353+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .DexObjectName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
354+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : render .OIDCSecretName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
355+ & corev1.Secret {ObjectMeta : metav1.ObjectMeta {Name : pullSecretName , Namespace : render .DexNamespace }, TypeMeta : metav1.TypeMeta {Kind : "Secret" , APIVersion : "v1" }},
356+ & rbacv1.ClusterRoleBinding {ObjectMeta : metav1.ObjectMeta {Name : "tigera-dex:csr-creator" }, TypeMeta : metav1.TypeMeta {Kind : "ClusterRoleBinding" , APIVersion : "rbac.authorization.k8s.io/v1" }},
357+ & rbacv1.RoleBinding {ObjectMeta : metav1.ObjectMeta {Name : render .TigeraOperatorSecrets , Namespace : render .DexNamespace }},
371358 }
372359
373- for i , expectedRes := range expectedResources {
374- rtest .ExpectResourceTypeAndObjectMetadata (resources [i ], expectedRes .name , expectedRes .ns , expectedRes .group , expectedRes .version , expectedRes .kind )
375- }
376- Expect (len (resources )).To (Equal (len (expectedResources )))
360+ rtest .ExpectResources (resources , expectedResources )
377361 })
378362
379363 It ("should render SecurityContextConstrains properly when provider is OpenShift" , func () {
0 commit comments