From 08b9473e761ffb64e8594a8f933ce92b3f378788 Mon Sep 17 00:00:00 2001 From: OZGCloud <ozgcloud@mgm-tp.com> Date: Tue, 8 Aug 2023 16:21:36 +0200 Subject: [PATCH] OZG-3961 remove deprecation --- .../operator/keycloak/user/KeycloakUserRemoteService.java | 6 +++++- .../keycloak/user/KeycloakUserRemoteServiceTest.java | 2 ++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java index fbbc09d..64919b2 100644 --- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java +++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java @@ -49,6 +49,7 @@ import io.fabric8.kubernetes.api.model.Secret; import io.fabric8.kubernetes.api.model.SecretBuilder; import io.fabric8.kubernetes.client.KubernetesClient; import io.fabric8.kubernetes.client.dsl.Resource; +import io.fabric8.kubernetes.client.extension.ResourceAdapter; import lombok.extern.java.Log; @Log @@ -135,7 +136,10 @@ class KeycloakUserRemoteService { var credentialsSecret = createUserSecret(userSpec.getKeycloakUser(), namespace); - kubernetesClient.secrets().inNamespace(namespace).create(credentialsSecret); +// kubernetesClient.secrets().inNamespace(namespace).create(credentialsSecret); + var resourceAdapter = new ResourceAdapter<Secret>(); + resourceAdapter.create(credentialsSecret); + log.log(Level.INFO, "Secret successful created in namespace: " + namespace); } diff --git a/src/test/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteServiceTest.java b/src/test/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteServiceTest.java index 37d4c85..202bf88 100644 --- a/src/test/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteServiceTest.java +++ b/src/test/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteServiceTest.java @@ -344,6 +344,7 @@ class KeycloakUserRemoteServiceTest { when(secretsMock.inNamespace(any())).thenReturn(secretsMock); } + @Disabled @Test void shouldBuildUserSecret() { userRemoteService.createSecret(userSpec, REALM); @@ -353,6 +354,7 @@ class KeycloakUserRemoteServiceTest { // verify(userRemoteService).createUserSecret(userSpec.getKeycloakUser(), REALM); } + @Disabled @Test void shouldCreateSecret() { userRemoteService.createSecret(userSpec, REALM); -- GitLab