55package traefik
66
77import (
8+ "slices"
89 "strings"
910 "testing"
1011
@@ -213,14 +214,7 @@ func TestDeployment_IngressProvider(t *testing.T) {
213214
214215 // Check expected args are present
215216 for _ , expectedArg := range tt .expectedArgs {
216- found := false
217- for _ , arg := range args {
218- if arg == expectedArg {
219- found = true
220- break
221- }
222- }
223- if ! found {
217+ if ! slices .Contains (args , expectedArg ) {
224218 t .Errorf ("expected arg %q not found in deployment args: %v" , expectedArg , args )
225219 }
226220 }
@@ -243,14 +237,7 @@ func TestDeployment_IngressProvider(t *testing.T) {
243237 "--entrypoints.websecure.address=:8443" ,
244238 }
245239 for _ , commonArg := range commonArgs {
246- found := false
247- for _ , arg := range args {
248- if arg == commonArg {
249- found = true
250- break
251- }
252- }
253- if ! found {
240+ if ! slices .Contains (args , commonArg ) {
254241 t .Errorf ("common arg %q not found in deployment args: %v" , commonArg , args )
255242 }
256243 }
@@ -303,27 +290,16 @@ func TestClusterRole_RBAC_Permissions(t *testing.T) {
303290 // Check for namespace permissions
304291 hasNamespacePerms := false
305292 for _ , rule := range clusterRole .Rules {
306- for _ , resource := range rule .Resources {
307- if resource == "namespaces" {
308- hasNamespacePerms = true
309- // Verify the permissions are correct
310- expectedVerbs := []string {"get" , "list" , "watch" }
311- for _ , verb := range expectedVerbs {
312- found := false
313- for _ , v := range rule .Verbs {
314- if v == verb {
315- found = true
316- break
317- }
318- }
319- if ! found {
320- t .Errorf ("expected verb %q for namespaces resource not found" , verb )
321- }
293+ if slices .Contains (rule .Resources , "namespaces" ) {
294+ hasNamespacePerms = true
295+ // Verify the permissions are correct
296+ expectedVerbs := []string {"get" , "list" , "watch" }
297+ for _ , verb := range expectedVerbs {
298+ if ! slices .Contains (rule .Verbs , verb ) {
299+ t .Errorf ("expected verb %q for namespaces resource not found" , verb )
322300 }
323- break
324301 }
325- }
326- if hasNamespacePerms {
302+
327303 break
328304 }
329305 }
@@ -347,23 +323,15 @@ func TestClusterRole_RBAC_Permissions(t *testing.T) {
347323 for resource , expectedVerbs := range commonResources {
348324 found := false
349325 for _ , rule := range clusterRole .Rules {
350- for _ , res := range rule .Resources {
351- if res == resource {
352- found = true
353- for _ , verb := range expectedVerbs {
354- verbFound := false
355- for _ , v := range rule .Verbs {
356- if v == verb {
357- verbFound = true
358- break
359- }
360- }
361- if ! verbFound {
362- t .Errorf ("expected verb %q for resource %q not found" , verb , resource )
363- }
326+ if slices .Contains (rule .Resources , resource ) {
327+ found = true
328+ for _ , verb := range expectedVerbs {
329+ if ! slices .Contains (rule .Verbs , verb ) {
330+ t .Errorf ("expected verb %q for resource %q not found" , verb , resource )
364331 }
365- break
366332 }
333+
334+ break
367335 }
368336 }
369337 if ! found {
0 commit comments