From 6057cdc45104fa1cd4f64e4adf90fdfd1bfbafa2 Mon Sep 17 00:00:00 2001 From: Mike-F-G Date: Tue, 29 Oct 2024 14:38:06 +0100 Subject: [PATCH] test(clusters): add permissions tests on cluster resources --- bundle/permissions/mutator_test.go | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/bundle/permissions/mutator_test.go b/bundle/permissions/mutator_test.go index 1a177d902..01995076c 100644 --- a/bundle/permissions/mutator_test.go +++ b/bundle/permissions/mutator_test.go @@ -51,6 +51,9 @@ func TestApplyBundlePermissions(t *testing.T) { "endpoint_1": {}, "endpoint_2": {}, }, + Clusters: map[string]*resources.Cluster{ + "cluster_1": {}, + }, }, }, } @@ -103,6 +106,11 @@ func TestApplyBundlePermissions(t *testing.T) { require.Contains(t, b.Config.Resources.ModelServingEndpoints["endpoint_2"].Permissions, resources.Permission{Level: "CAN_MANAGE", UserName: "TestUser"}) require.Contains(t, b.Config.Resources.ModelServingEndpoints["endpoint_2"].Permissions, resources.Permission{Level: "CAN_VIEW", GroupName: "TestGroup"}) require.Contains(t, b.Config.Resources.ModelServingEndpoints["endpoint_2"].Permissions, resources.Permission{Level: "CAN_QUERY", ServicePrincipalName: "TestServicePrincipal"}) + + require.Len(t, b.Config.Resources.Clusters["cluster_1"].Permissions, 3) + require.Contains(t, b.Config.Resources.Clusters["cluster_1"].Permissions, resources.Permission{Level: "CAN_MANAGE", UserName: "TestUser"}) + require.Contains(t, b.Config.Resources.Clusters["cluster_1"].Permissions, resources.Permission{Level: "CAN_RESTART", GroupName: "TestGroup"}) + require.Contains(t, b.Config.Resources.Clusters["cluster_1"].Permissions, resources.Permission{Level: "CAN_ATTACH_TO", ServicePrincipalName: "TestServicePrincipal"}) } func TestWarningOnOverlapPermission(t *testing.T) {