@@ -30,12 +30,14 @@ public function test_cluster_role_binding_build()
30
30
31
31
$ crb = $ this ->cluster ->clusterRoleBinding ()
32
32
->setName ('user-binding ' )
33
+ ->setLabels (['tier ' => 'backend ' ])
33
34
->setRole ($ cr )
34
35
->addSubjects ([$ subject ])
35
36
->setSubjects ([$ subject ]);
36
37
37
38
$ this ->assertEquals ('rbac.authorization.k8s.io/v1 ' , $ crb ->getApiVersion ());
38
39
$ this ->assertEquals ('user-binding ' , $ crb ->getName ());
40
+ $ this ->assertEquals (['tier ' => 'backend ' ], $ crb ->getLabels ());
39
41
$ this ->assertEquals ([$ subject ], $ crb ->getSubjects ());
40
42
$ this ->assertEquals (['apiGroup ' => 'rbac.authorization.k8s.io ' , 'kind ' => 'ClusterRole ' , 'name ' => 'admin-cr ' ], $ crb ->getRole ());
41
43
}
@@ -62,6 +64,7 @@ public function test_cluster_role_binding_from_yaml()
62
64
63
65
$ this ->assertEquals ('rbac.authorization.k8s.io/v1 ' , $ crb ->getApiVersion ());
64
66
$ this ->assertEquals ('user-binding ' , $ crb ->getName ());
67
+ $ this ->assertEquals (['tier ' => 'backend ' ], $ crb ->getLabels ());
65
68
$ this ->assertEquals ([$ subject ], $ crb ->getSubjects ());
66
69
$ this ->assertEquals (['apiGroup ' => 'rbac.authorization.k8s.io ' , 'kind ' => 'ClusterRole ' , 'name ' => 'admin-cr ' ], $ crb ->getRole ());
67
70
}
@@ -97,6 +100,7 @@ public function runCreationTests()
97
100
98
101
$ crb = $ this ->cluster ->clusterRoleBinding ()
99
102
->setName ('user-binding ' )
103
+ ->setLabels (['tier ' => 'backend ' ])
100
104
->setRole ($ cr )
101
105
->addSubjects ([$ subject ])
102
106
->setSubjects ([$ subject ]);
@@ -114,6 +118,7 @@ public function runCreationTests()
114
118
115
119
$ this ->assertEquals ('rbac.authorization.k8s.io/v1 ' , $ crb ->getApiVersion ());
116
120
$ this ->assertEquals ('user-binding ' , $ crb ->getName ());
121
+ $ this ->assertEquals (['tier ' => 'backend ' ], $ crb ->getLabels ());
117
122
$ this ->assertEquals ([$ subject ], $ crb ->getSubjects ());
118
123
$ this ->assertEquals (['apiGroup ' => 'rbac.authorization.k8s.io ' , 'kind ' => 'ClusterRole ' , 'name ' => 'admin-cr ' ], $ crb ->getRole ());
119
124
}
@@ -147,6 +152,7 @@ public function runGetTests()
147
152
148
153
$ this ->assertEquals ('rbac.authorization.k8s.io/v1 ' , $ crb ->getApiVersion ());
149
154
$ this ->assertEquals ('user-binding ' , $ crb ->getName ());
155
+ $ this ->assertEquals (['tier ' => 'backend ' ], $ crb ->getLabels ());
150
156
$ this ->assertEquals ([$ subject ], $ crb ->getSubjects ());
151
157
$ this ->assertEquals (['apiGroup ' => 'rbac.authorization.k8s.io ' , 'kind ' => 'ClusterRole ' , 'name ' => 'admin-cr ' ], $ crb ->getRole ());
152
158
}
@@ -171,6 +177,7 @@ public function runUpdateTests()
171
177
172
178
$ this ->assertEquals ('rbac.authorization.k8s.io/v1 ' , $ crb ->getApiVersion ());
173
179
$ this ->assertEquals ('user-binding ' , $ crb ->getName ());
180
+ $ this ->assertEquals (['tier ' => 'backend ' ], $ crb ->getLabels ());
174
181
$ this ->assertEquals ([$ subject ], $ crb ->getSubjects ());
175
182
$ this ->assertEquals (['apiGroup ' => 'rbac.authorization.k8s.io ' , 'kind ' => 'ClusterRole ' , 'name ' => 'admin-cr ' ], $ crb ->getRole ());
176
183
}
0 commit comments