diff --git a/src/main/helm/templates/network_policy.yaml b/src/main/helm/templates/network_policy.yaml index e5b2c533cc56546800a78f562d1d17fefe4403f9..b49c282354091844db32a2ab99d7e25d93ccba78 100644 --- a/src/main/helm/templates/network_policy.yaml +++ b/src/main/helm/templates/network_policy.yaml @@ -59,10 +59,10 @@ spec: - from: - namespaceSelector: matchLabels: - kubernetes.io/metadata.name: {{((.Values.ozgcloud).antragraum).antragsraumProxyNamespace | default "antragsraum-proxy"}} + kubernetes.io/metadata.name: {{((.Values.ozgcloud).antragraum).antragraumProxyNamespace | default "antragraum-proxy"}} podSelector: matchLabels: - component: antragsraum-proxy + component: antragraum-proxy {{- end }} - from: diff --git a/src/test/helm/deployment_antragraum_test.yaml b/src/test/helm/deployment_antragraum_test.yaml index 29ed00d4c4d008336993014f6b2defd03378fc51..4502b67d7001df5d768cb105168a6681f2c8917c 100644 --- a/src/test/helm/deployment_antragraum_test.yaml +++ b/src/test/helm/deployment_antragraum_test.yaml @@ -35,7 +35,7 @@ set: bezeichner: helm imagePullSecret: test-image-pull-secret tests: - - it: should set antragsraum values + - it: should set antragraum values set: ozgcloud: antragraum: @@ -69,7 +69,7 @@ tests: name: ozgcloud_antragraum_decryptionCertificate value: "file:/keystore/bayernid/bayern-id.crt" - - it: should not generate antragsraum config if disabled + - it: should not generate antragraum config if disabled set: ozgcloud.antragraum.enabled: false asserts: @@ -114,7 +114,7 @@ tests: name: bayernid-certificate mountPath: "/keystore/bayernid" readOnly: true - - it: should not set volumeMounts if antragsraum is disabled + - it: should not set volumeMounts if antragraum is disabled set: ozgcloud.antragraum.enabled: false asserts: @@ -140,7 +140,7 @@ tests: secret: secretName: bayernid-certificate optional: false - - it: should not have volumes if antragsraum is disabled + - it: should not have volumes if antragraum is disabled set: ozgcloud.antragraum.enabled: false asserts: diff --git a/src/test/helm/network_policy_test.yaml b/src/test/helm/network_policy_test.yaml index 8c72186be1545a2ce6c85d8df72f4d8d1e73838a..618dba7961d5776726e0c51387ae466a5036a409 100644 --- a/src/test/helm/network_policy_test.yaml +++ b/src/test/helm/network_policy_test.yaml @@ -154,10 +154,10 @@ tests: from: - namespaceSelector: matchLabels: - kubernetes.io/metadata.name: antragsraum-proxy + kubernetes.io/metadata.name: antragraum-proxy podSelector: matchLabels: - component: antragsraum-proxy + component: antragraum-proxy - it: should set ingress rule for antragraum-proxy if antragraum is enabled set: @@ -166,7 +166,7 @@ tests: ozgcloud: antragraum: enabled: true - antragsraumProxyNamespace: antragsraum-proxy + antragraumProxyNamespace: antragraum-proxy asserts: - contains: path: spec.ingress @@ -174,10 +174,10 @@ tests: from: - namespaceSelector: matchLabels: - kubernetes.io/metadata.name: antragsraum-proxy + kubernetes.io/metadata.name: antragraum-proxy podSelector: matchLabels: - component: antragsraum-proxy + component: antragraum-proxy - it: should not add ingress rule for antragraum if antragraum is disabled