@@ -328,19 +328,19 @@ func TestAuthorizationResourceAccessReview(t *testing.T) {
328
328
t .Fatalf ("unexpected error: %v" , err )
329
329
}
330
330
331
- requestWhoCanViewDeployments := & authorizationapi.ResourceAccessReview {
332
- Action : authorizationapi.AuthorizationAttributes {Verb : "get" , Resource : "deployments " },
331
+ requestWhoCanViewDeploymentConfigs := & authorizationapi.ResourceAccessReview {
332
+ Action : authorizationapi.AuthorizationAttributes {Verb : "get" , Resource : "deploymentconfigs " },
333
333
}
334
334
335
- localRequestWhoCanViewDeployments := & authorizationapi.LocalResourceAccessReview {
336
- Action : authorizationapi.AuthorizationAttributes {Verb : "get" , Resource : "deployments " },
335
+ localRequestWhoCanViewDeploymentConfigs := & authorizationapi.LocalResourceAccessReview {
336
+ Action : authorizationapi.AuthorizationAttributes {Verb : "get" , Resource : "deploymentconfigs " },
337
337
}
338
338
339
339
{
340
340
test := localResourceAccessReviewTest {
341
- description : "who can view deployments in hammer by harold" ,
341
+ description : "who can view deploymentconfigs in hammer by harold" ,
342
342
clientInterface : haroldClient .LocalResourceAccessReviews ("hammer-project" ),
343
- review : localRequestWhoCanViewDeployments ,
343
+ review : localRequestWhoCanViewDeploymentConfigs ,
344
344
response : authorizationapi.ResourceAccessReviewResponse {
345
345
Users : sets .NewString ("harold" , "valerie" ),
346
346
Groups : sets .NewString (),
@@ -353,9 +353,9 @@ func TestAuthorizationResourceAccessReview(t *testing.T) {
353
353
}
354
354
{
355
355
test := localResourceAccessReviewTest {
356
- description : "who can view deployments in mallet by mark" ,
356
+ description : "who can view deploymentconfigs in mallet by mark" ,
357
357
clientInterface : markClient .LocalResourceAccessReviews ("mallet-project" ),
358
- review : localRequestWhoCanViewDeployments ,
358
+ review : localRequestWhoCanViewDeploymentConfigs ,
359
359
response : authorizationapi.ResourceAccessReviewResponse {
360
360
Users : sets .NewString ("mark" , "edgar" ),
361
361
Groups : sets .NewString (),
@@ -370,9 +370,9 @@ func TestAuthorizationResourceAccessReview(t *testing.T) {
370
370
// mark should not be able to make global access review requests
371
371
{
372
372
test := resourceAccessReviewTest {
373
- description : "who can view deployments in all by mark" ,
373
+ description : "who can view deploymentconfigs in all by mark" ,
374
374
clientInterface : markClient .ResourceAccessReviews (),
375
- review : requestWhoCanViewDeployments ,
375
+ review : requestWhoCanViewDeploymentConfigs ,
376
376
err : "cannot " ,
377
377
}
378
378
test .run (t )
@@ -381,9 +381,9 @@ func TestAuthorizationResourceAccessReview(t *testing.T) {
381
381
// a cluster-admin should be able to make global access review requests
382
382
{
383
383
test := resourceAccessReviewTest {
384
- description : "who can view deployments in all by cluster-admin" ,
384
+ description : "who can view deploymentconfigs in all by cluster-admin" ,
385
385
clientInterface : clusterAdminClient .ResourceAccessReviews (),
386
- review : requestWhoCanViewDeployments ,
386
+ review : requestWhoCanViewDeploymentConfigs ,
387
387
response : authorizationapi.ResourceAccessReviewResponse {
388
388
Users : sets .NewString (),
389
389
Groups : sets .NewString (),
@@ -399,9 +399,9 @@ func TestAuthorizationResourceAccessReview(t *testing.T) {
399
399
t .Errorf ("unexpected error: %v" , err )
400
400
}
401
401
test := localResourceAccessReviewTest {
402
- description : "who can view deployments in mallet by cluster-admin" ,
402
+ description : "who can view deploymentconfigs in mallet by cluster-admin" ,
403
403
clientInterface : clusterAdminClient .LocalResourceAccessReviews ("mallet-project" ),
404
- review : localRequestWhoCanViewDeployments ,
404
+ review : localRequestWhoCanViewDeploymentConfigs ,
405
405
response : authorizationapi.ResourceAccessReviewResponse {
406
406
Users : sets .NewString ("edgar" ),
407
407
Groups : sets .NewString (),
0 commit comments