Skip to content
This repository was archived by the owner on Jan 28, 2022. It is now read-only.

Commit 509d813

Browse files
Disabled ACLs.
1 parent 4bc6183 commit 509d813

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

controllers/secretscope_controller_test.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ var _ = Describe("SecretScope Controller", func() {
3737
const timeout = time.Second * 30
3838
const interval = time.Second * 1
3939

40-
const aclKeyName = "secretscope-with-acls3"
40+
const aclKeyName = "secretscope-with-acls"
4141
const secretsKeyName = "secretscope-with-secrets"
4242

4343
BeforeEach(func() {
@@ -83,11 +83,11 @@ var _ = Describe("SecretScope Controller", func() {
8383
spec := databricksv1alpha1.SecretScopeSpec{
8484
InitialManagePrincipal: "users",
8585
SecretScopeSecrets: make([]databricksv1alpha1.SecretScopeSecret, 0),
86-
SecretScopeACLs: []databricksv1alpha1.SecretScopeACL{
87-
databricksv1alpha1.SecretScopeACL{Principal: "admins", Permission: "WRITE"},
88-
databricksv1alpha1.SecretScopeACL{Principal: "admins", Permission: "READ"},
89-
databricksv1alpha1.SecretScopeACL{Principal: "admins", Permission: "MANAGE"},
90-
},
86+
// SecretScopeACLs: []databricksv1alpha1.SecretScopeACL{
87+
// databricksv1alpha1.SecretScopeACL{Principal: "admins", Permission: "WRITE"},
88+
// databricksv1alpha1.SecretScopeACL{Principal: "admins", Permission: "READ"},
89+
// databricksv1alpha1.SecretScopeACL{Principal: "admins", Permission: "MANAGE"},
90+
// },
9191
}
9292

9393
key := types.NamespacedName{

0 commit comments

Comments
 (0)