Skip to content
This repository has been archived by the owner on Jan 28, 2022. It is now read-only.

Commit

Permalink
Debug why my tests aren't working.
Browse files Browse the repository at this point in the history
  • Loading branch information
JasonTheDeveloper committed Nov 25, 2019
1 parent 509d813 commit 140973f
Showing 1 changed file with 20 additions and 4 deletions.
24 changes: 20 additions & 4 deletions controllers/secretscope_controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,12 +24,12 @@ import (
databricksv1alpha1 "github.com/microsoft/azure-databricks-operator/api/v1alpha1"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
// databricks "github.com/xinsnake/databricks-sdk-golang"
// dbazure "github.com/xinsnake/databricks-sdk-golang/azure"
// v1 "k8s.io/api/core/v1"
databricks "github.com/xinsnake/databricks-sdk-golang"
dbazure "github.com/xinsnake/databricks-sdk-golang/azure"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
// "os"
"os"
)

var _ = Describe("SecretScope Controller", func() {
Expand Down Expand Up @@ -80,6 +80,22 @@ var _ = Describe("SecretScope Controller", func() {
// test Kubernetes API server, which isn't the goal here.
Context("Secret Scope with ACLs", func() {
It("Should handle scope and ACLs correctly", func() {

var o databricks.DBClientOption
o.Host = os.Getenv("DATABRICKS_HOST")
o.Token = os.Getenv("DATABRICKS_TOKEN")

var APIClient dbazure.DBClient
APIClient.Init(o)

_, err := APIClient.Secrets().ListSecretACLs(aclKeyName)

fmt.Println(err)

l, _ := APIClient.Secrets().ListSecretScopes()

fmt.Println(l)

spec := databricksv1alpha1.SecretScopeSpec{
InitialManagePrincipal: "users",
SecretScopeSecrets: make([]databricksv1alpha1.SecretScopeSecret, 0),
Expand Down

0 comments on commit 140973f

Please sign in to comment.