@@ -744,11 +744,6 @@ var _ = g.Describe("Authorization via admission-controller [RBAC] [Zalando]", fu
744
744
framework .ExpectNoError (err , "failed to delete cluster role: %s" , nonSystemResource .Name )
745
745
})
746
746
747
- g .It ("should allow write access for collaborator resources" , func () {
748
- err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), "visibility" , metav1.DeleteOptions {DryRun : []string {"All" }})
749
- framework .ExpectNoError (err , "failed to delete cluster role: %s" , "visibility" )
750
- })
751
-
752
747
g .It ("should allow write access for system resources" , func () {
753
748
err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), systemResource .Name , metav1.DeleteOptions {DryRun : []string {"All" }})
754
749
framework .ExpectNoError (err , "failed to delete cluster role: %s" , systemResource .Name )
@@ -770,29 +765,19 @@ var _ = g.Describe("Authorization via admission-controller [RBAC] [Zalando]", fu
770
765
framework .ExpectNoError (err , "failed to delete cluster role: %s" , nonSystemResource .Name )
771
766
})
772
767
773
- g .It ("should allow write access for collaborator resources" , func () {
774
- err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), "visibility" , metav1.DeleteOptions {DryRun : []string {"All" }})
775
- framework .ExpectNoError (err , "failed to delete cluster role: %s" , "visibility" )
776
- })
777
-
778
768
g .It ("should deny write access for system resources" , func () {
779
769
err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), systemResource .Name , metav1.DeleteOptions {DryRun : []string {"All" }})
780
770
gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("write operations are forbidden" )))
781
771
})
782
772
783
773
// test specific namespaces
784
- g .It ("should allow deletion of non-system namespace" , func () {
785
- err := client .CoreV1 ().Namespaces ().Delete (context .Background (), nonSystemResource .Name , metav1.DeleteOptions {DryRun : []string {"All" }})
786
- framework .ExpectNoError (err , "failed to delete namespace: %s" , nonSystemResource .Name )
787
- })
788
-
789
774
g .It ("should deny deletion of visibility namespace" , func () {
790
775
err := client .CoreV1 ().Namespaces ().Delete (context .Background (), "visibility" , metav1.DeleteOptions {DryRun : []string {"All" }})
791
776
gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("write operations are forbidden" )))
792
777
})
793
778
794
779
g .It ("should deny deletion of kube-system namespace" , func () {
795
- err := client .CoreV1 ().Namespaces ().Delete (context .Background (), systemResource . Name , metav1.DeleteOptions {DryRun : []string {"All" }})
780
+ err := client .CoreV1 ().Namespaces ().Delete (context .Background (), "kube-system" , metav1.DeleteOptions {DryRun : []string {"All" }})
796
781
gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("this namespace may not be deleted" )))
797
782
})
798
783
})
@@ -812,11 +797,6 @@ var _ = g.Describe("Authorization via admission-controller [RBAC] [Zalando]", fu
812
797
framework .ExpectNoError (err , "failed to delete cluster role: %s" , nonSystemResource .Name )
813
798
})
814
799
815
- g .It ("should deny write access for collaborator resources" , func () {
816
- err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), "visibility" , metav1.DeleteOptions {DryRun : []string {"All" }})
817
- gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("write operations are forbidden" )))
818
- })
819
-
820
800
g .It ("should deny write access for system resources" , func () {
821
801
err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), systemResource .Name , metav1.DeleteOptions {DryRun : []string {"All" }})
822
802
gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("write operations are forbidden" )))
@@ -829,7 +809,7 @@ var _ = g.Describe("Authorization via admission-controller [RBAC] [Zalando]", fu
829
809
})
830
810
831
811
g .It ("should deny deletion of kube-system namespace" , func () {
832
- err := client .CoreV1 ().Namespaces ().Delete (context .Background (), systemResource . Name , metav1.DeleteOptions {DryRun : []string {"All" }})
812
+ err := client .CoreV1 ().Namespaces ().Delete (context .Background (), "kube-system" , metav1.DeleteOptions {DryRun : []string {"All" }})
833
813
gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("this namespace may not be deleted" )))
834
814
})
835
815
})
@@ -850,11 +830,6 @@ var _ = g.Describe("Authorization via admission-controller [RBAC] [Zalando]", fu
850
830
framework .ExpectNoError (err , "failed to delete cluster role: %s" , nonSystemResource .Name )
851
831
})
852
832
853
- g .It ("should deny write access for collaborator resources" , func () {
854
- err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), "visibility" , metav1.DeleteOptions {DryRun : []string {"All" }})
855
- gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("write operations are forbidden" )))
856
- })
857
-
858
833
g .It ("should deny write access for system resources" , func () {
859
834
err := client .RbacV1 ().ClusterRoles ().Delete (context .Background (), systemResource .Name , metav1.DeleteOptions {DryRun : []string {"All" }})
860
835
gomega .Expect (err ).To (gomega .MatchError (gomega .ContainSubstring ("write operations are forbidden" )))
0 commit comments