Skip to content

Commit 63e69f4

Browse files
committed
unblock global sa unit tests
Signed-off-by: Karol Szwaj <[email protected]> On-behalf-of: @SAP [email protected]
1 parent cefe6f3 commit 63e69f4

File tree

1 file changed

+13
-9
lines changed

1 file changed

+13
-9
lines changed

pkg/authorization/resolver_test.go

+13-9
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,11 @@ func TestResolverWithWarrants(t *testing.T) {
6464
Verbs: []string{"get"},
6565
NonResourceURLs: []string{"/readyz"},
6666
}
67-
getMetrics := &authorizer.DefaultNonResourceRuleInfo{
67+
// TODO(cnvergence): restore the commented lines once we drop the global service account feature flag
68+
/* getMetrics := &authorizer.DefaultNonResourceRuleInfo{
6869
Verbs: []string{"get"},
6970
NonResourceURLs: []string{"/metrics"},
70-
}
71+
} */
7172
getRoot := &authorizer.DefaultNonResourceRuleInfo{
7273
Verbs: []string{"get"},
7374
NonResourceURLs: []string{"/"},
@@ -128,16 +129,19 @@ func TestResolverWithWarrants(t *testing.T) {
128129
wantResourceRules: []authorizer.ResourceRuleInfo{getServices},
129130
wantNonResourceRules: nil, // global service accounts do no work without a cluster.
130131
},
132+
// TODO(cnvergence): restore the commented lines once we drop the global service account feature flag
131133
{
132-
name: "service account with this cluster",
133-
user: &user.DefaultInfo{Name: "system:serviceaccount:default:sa", Groups: []string{"system:serviceaccounts", user.AllAuthenticated}, Extra: map[string][]string{authserviceaccount.ClusterNameKey: {"this"}}},
134-
wantResourceRules: []authorizer.ResourceRuleInfo{getServices},
135-
wantNonResourceRules: []authorizer.NonResourceRuleInfo{getReadyz},
134+
name: "service account with this cluster",
135+
user: &user.DefaultInfo{Name: "system:serviceaccount:default:sa", Groups: []string{"system:serviceaccounts", user.AllAuthenticated}, Extra: map[string][]string{authserviceaccount.ClusterNameKey: {"this"}}},
136+
wantResourceRules: []authorizer.ResourceRuleInfo{getServices},
137+
//wantNonResourceRules: []authorizer.NonResourceRuleInfo{getReadyz},
138+
wantNonResourceRules: nil,
136139
},
137140
{
138-
name: "service account with other cluster",
139-
user: &user.DefaultInfo{Name: "system:serviceaccount:default:sa", Groups: []string{"system:serviceaccounts", user.AllAuthenticated}, Extra: map[string][]string{authserviceaccount.ClusterNameKey: {"other"}}},
140-
wantNonResourceRules: []authorizer.NonResourceRuleInfo{getMetrics},
141+
name: "service account with other cluster",
142+
user: &user.DefaultInfo{Name: "system:serviceaccount:default:sa", Groups: []string{"system:serviceaccounts", user.AllAuthenticated}, Extra: map[string][]string{authserviceaccount.ClusterNameKey: {"other"}}},
143+
//wantNonResourceRules: []authorizer.NonResourceRuleInfo{getMetrics},
144+
wantNonResourceRules: nil,
141145
},
142146
{
143147
name: "base with service account warrant without cluster, ignored",

0 commit comments

Comments
 (0)