Skip to content

Commit 62bdbd1

Browse files
committed
Update snapshot
Newer helm unit versions don't include the notes of subcharts anymore Which is good as we don't control it and it's not displayed to users Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
1 parent 9240d60 commit 62bdbd1

File tree

1 file changed

+22
-56
lines changed

1 file changed

+22
-56
lines changed

operator/tests/__snapshot__/operator_test.yaml.snap

Lines changed: 22 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -1,41 +1,7 @@
11
matches the snapshot:
22
1: |
3-
raw: |
4-
CHART NAME: minio
5-
CHART VERSION: 13.4.6
6-
APP VERSION: 2024.2.13
7-
8-
** Please be patient while the chart is being deployed **
9-
10-
MinIO&reg; can be accessed via port on the following DNS name from within your cluster:
11-
12-
RELEASE-NAME-minio.NAMESPACE.svc.cluster.local
13-
14-
To get your credentials run:
15-
16-
export ROOT_USER=$(kubectl get secret --namespace NAMESPACE RELEASE-NAME-minio -o jsonpath="{.data.root-user}" | base64 -d)
17-
export ROOT_PASSWORD=$(kubectl get secret --namespace NAMESPACE RELEASE-NAME-minio -o jsonpath="{.data.root-password}" | base64 -d)
18-
19-
To connect to your MinIO&reg; server using a client:
20-
21-
- Run a MinIO&reg; Client pod and append the desired command (e.g. 'admin info'):
22-
23-
kubectl run --namespace NAMESPACE RELEASE-NAME-minio-client \
24-
--rm --tty -i --restart='Never' \
25-
--env MINIO_SERVER_ROOT_USER=$ROOT_USER \
26-
--env MINIO_SERVER_ROOT_PASSWORD=$ROOT_PASSWORD \
27-
--env MINIO_SERVER_HOST=RELEASE-NAME-minio \
28-
--image docker.io/bitnami/minio-client:2024.2.9-debian-11-r7 -- admin info minio
29-
30-
To access the MinIO&reg; web UI:
31-
32-
- Get the MinIO&reg; URL:
33-
34-
echo "MinIO&reg; web URL: http://127.0.0.1:9001/minio"
35-
kubectl port-forward --namespace NAMESPACE svc/RELEASE-NAME-minio 9001:9001
36-
2: |
373
raw: "\nsecureCodeBox Operator Deployed \U0001F680\n\nThe operator can orchestrate the execution of various security scanning tools inside of your cluster.\nYou can find a list of all officially supported scanners here: https://www.securecodebox.io/\nThe website also lists other integrations, like persisting scan results to DefectDojo or Elasticsearch.\n\nThe operator send out regular telemetry pings to a central service.\nThis lets us, the secureCodeBox team, get a grasp on how much the secureCodeBox is used.\nThe submitted data is chosen to be as anonymous as possible.\nYou can find a complete report of the data submitted and links to the source-code at: https://www.securecodebox.io/docs/telemetry\nThe first ping is send one hour after the install, you can prevent this by upgrading the chart and setting `telemetryEnabled` to `false`.\n"
38-
3: |
4+
2: |
395
apiVersion: apps/v1
406
kind: Deployment
417
metadata:
@@ -139,7 +105,7 @@ matches the snapshot:
139105
- configMap:
140106
name: foo
141107
name: ca-certificate
142-
4: |
108+
3: |
143109
apiVersion: rbac.authorization.k8s.io/v1
144110
kind: ClusterRole
145111
metadata:
@@ -149,7 +115,7 @@ matches the snapshot:
149115
- /metrics
150116
verbs:
151117
- get
152-
5: |
118+
4: |
153119
apiVersion: rbac.authorization.k8s.io/v1
154120
kind: ClusterRole
155121
metadata:
@@ -167,7 +133,7 @@ matches the snapshot:
167133
- subjectaccessreviews
168134
verbs:
169135
- create
170-
6: |
136+
5: |
171137
apiVersion: rbac.authorization.k8s.io/v1
172138
kind: ClusterRoleBinding
173139
metadata:
@@ -180,7 +146,7 @@ matches the snapshot:
180146
- kind: ServiceAccount
181147
name: securecodebox-operator
182148
namespace: NAMESPACE
183-
7: |
149+
6: |
184150
apiVersion: v1
185151
kind: Service
186152
metadata:
@@ -195,7 +161,7 @@ matches the snapshot:
195161
targetPort: https
196162
selector:
197163
control-plane: controller-manager
198-
8: |
164+
7: |
199165
apiVersion: rbac.authorization.k8s.io/v1
200166
kind: ClusterRole
201167
metadata:
@@ -219,7 +185,7 @@ matches the snapshot:
219185
- cascadingrules/status
220186
verbs:
221187
- get
222-
9: |
188+
8: |
223189
apiVersion: rbac.authorization.k8s.io/v1
224190
kind: ClusterRole
225191
metadata:
@@ -239,7 +205,7 @@ matches the snapshot:
239205
- cascadingrules/status
240206
verbs:
241207
- get
242-
10: |
208+
9: |
243209
apiVersion: rbac.authorization.k8s.io/v1
244210
kind: Role
245211
metadata:
@@ -276,7 +242,7 @@ matches the snapshot:
276242
verbs:
277243
- create
278244
- patch
279-
11: |
245+
10: |
280246
apiVersion: rbac.authorization.k8s.io/v1
281247
kind: RoleBinding
282248
metadata:
@@ -289,7 +255,7 @@ matches the snapshot:
289255
- kind: ServiceAccount
290256
name: securecodebox-operator
291257
namespace: NAMESPACE
292-
12: |
258+
11: |
293259
apiVersion: rbac.authorization.k8s.io/v1
294260
kind: ClusterRole
295261
metadata:
@@ -313,7 +279,7 @@ matches the snapshot:
313279
- parsedefinitions/status
314280
verbs:
315281
- get
316-
13: |
282+
12: |
317283
apiVersion: rbac.authorization.k8s.io/v1
318284
kind: ClusterRole
319285
metadata:
@@ -333,7 +299,7 @@ matches the snapshot:
333299
- parsedefinitions/status
334300
verbs:
335301
- get
336-
14: |
302+
13: |
337303
apiVersion: rbac.authorization.k8s.io/v1
338304
kind: ClusterRole
339305
metadata:
@@ -464,7 +430,7 @@ matches the snapshot:
464430
- list
465431
- update
466432
- watch
467-
15: |
433+
14: |
468434
apiVersion: rbac.authorization.k8s.io/v1
469435
kind: ClusterRoleBinding
470436
metadata:
@@ -477,7 +443,7 @@ matches the snapshot:
477443
- kind: ServiceAccount
478444
name: securecodebox-operator
479445
namespace: NAMESPACE
480-
16: |
446+
15: |
481447
apiVersion: rbac.authorization.k8s.io/v1
482448
kind: ClusterRole
483449
metadata:
@@ -501,7 +467,7 @@ matches the snapshot:
501467
- scans/status
502468
verbs:
503469
- get
504-
17: |
470+
16: |
505471
apiVersion: rbac.authorization.k8s.io/v1
506472
kind: ClusterRole
507473
metadata:
@@ -521,7 +487,7 @@ matches the snapshot:
521487
- scans/status
522488
verbs:
523489
- get
524-
18: |
490+
17: |
525491
apiVersion: rbac.authorization.k8s.io/v1
526492
kind: ClusterRole
527493
metadata:
@@ -545,7 +511,7 @@ matches the snapshot:
545511
- scancompletionhooks/status
546512
verbs:
547513
- get
548-
19: |
514+
18: |
549515
apiVersion: rbac.authorization.k8s.io/v1
550516
kind: ClusterRole
551517
metadata:
@@ -565,7 +531,7 @@ matches the snapshot:
565531
- scancompletionhooks/status
566532
verbs:
567533
- get
568-
20: |
534+
19: |
569535
apiVersion: rbac.authorization.k8s.io/v1
570536
kind: ClusterRole
571537
metadata:
@@ -589,7 +555,7 @@ matches the snapshot:
589555
- scantypes/status
590556
verbs:
591557
- get
592-
21: |
558+
20: |
593559
apiVersion: rbac.authorization.k8s.io/v1
594560
kind: ClusterRole
595561
metadata:
@@ -609,7 +575,7 @@ matches the snapshot:
609575
- scantypes/status
610576
verbs:
611577
- get
612-
22: |
578+
21: |
613579
apiVersion: rbac.authorization.k8s.io/v1
614580
kind: ClusterRole
615581
metadata:
@@ -633,7 +599,7 @@ matches the snapshot:
633599
- scheduledscans/status
634600
verbs:
635601
- get
636-
23: |
602+
22: |
637603
apiVersion: rbac.authorization.k8s.io/v1
638604
kind: ClusterRole
639605
metadata:
@@ -653,7 +619,7 @@ matches the snapshot:
653619
- scheduledscans/status
654620
verbs:
655621
- get
656-
24: |
622+
23: |
657623
apiVersion: v1
658624
kind: ServiceAccount
659625
metadata:

0 commit comments

Comments
 (0)