diff options
author | Martin Polden <mpolden@mpolden.no> | 2020-03-05 14:06:37 +0100 |
---|---|---|
committer | Martin Polden <mpolden@mpolden.no> | 2020-03-05 14:06:37 +0100 |
commit | d06aa3e0bfa0eedde1b8b937d9ca4953add6159f (patch) | |
tree | bf62d2664ba3c261042b5e655763138e9eb36f8d /controller-api/src/test | |
parent | 55dd5a7e8db0cbb79802fdf8b059e8c75b6280f9 (diff) |
Remove unused tenantPipeline role
Diffstat (limited to 'controller-api/src/test')
2 files changed, 2 insertions, 7 deletions
diff --git a/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/integration/user/RolesTest.java b/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/integration/user/RolesTest.java index 2e7308e41e1..636825573f1 100644 --- a/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/integration/user/RolesTest.java +++ b/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/integration/user/RolesTest.java @@ -46,11 +46,6 @@ public class RolesTest { } @Test(expected = IllegalArgumentException.class) - public void illegalRole() { - Roles.valueOf(Role.tenantPipeline(TenantName.from("my-tenant"), ApplicationName.from("my-app"))); - } - - @Test(expected = IllegalArgumentException.class) public void illegalRoleValue() { Roles.toRole("my-tenant.awesomePerson"); } diff --git a/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/role/RoleTest.java b/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/role/RoleTest.java index f78ae24df9e..52e0f3c8a8e 100644 --- a/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/role/RoleTest.java +++ b/controller-api/src/test/java/com/yahoo/vespa/hosted/controller/api/role/RoleTest.java @@ -73,10 +73,10 @@ public class RoleTest { @Test public void build_service_membership() { - Role role = Role.tenantPipeline(TenantName.from("t1"), ApplicationName.from("a1")); + Role role = Role.buildService(TenantName.from("t1"), ApplicationName.from("a1")); assertFalse(publicEnforcer.allows(role, Action.create, URI.create("/not/explicitly/defined"))); assertFalse(publicEnforcer.allows(role, Action.update, URI.create("/application/v4/tenant/t1/application/a1"))); - assertTrue(publicEnforcer.allows(role, Action.create, URI.create("/application/v4/tenant/t1/application/a1/jobreport"))); + assertTrue(publicEnforcer.allows(role, Action.create, URI.create("/application/v4/tenant/t1/application/a1/submit"))); assertFalse("No global read access", publicEnforcer.allows(role, Action.read, URI.create("/controller/v1/foo"))); } |