Skip to content
Snippets Groups Projects
Commit 08b9473e authored by OZGCloud's avatar OZGCloud
Browse files

OZG-3961 remove deprecation

parent 1f60ceda
No related branches found
No related tags found
No related merge requests found
...@@ -49,6 +49,7 @@ import io.fabric8.kubernetes.api.model.Secret; ...@@ -49,6 +49,7 @@ import io.fabric8.kubernetes.api.model.Secret;
import io.fabric8.kubernetes.api.model.SecretBuilder; import io.fabric8.kubernetes.api.model.SecretBuilder;
import io.fabric8.kubernetes.client.KubernetesClient; import io.fabric8.kubernetes.client.KubernetesClient;
import io.fabric8.kubernetes.client.dsl.Resource; import io.fabric8.kubernetes.client.dsl.Resource;
import io.fabric8.kubernetes.client.extension.ResourceAdapter;
import lombok.extern.java.Log; import lombok.extern.java.Log;
@Log @Log
...@@ -135,7 +136,10 @@ class KeycloakUserRemoteService { ...@@ -135,7 +136,10 @@ class KeycloakUserRemoteService {
var credentialsSecret = createUserSecret(userSpec.getKeycloakUser(), namespace); var credentialsSecret = createUserSecret(userSpec.getKeycloakUser(), namespace);
kubernetesClient.secrets().inNamespace(namespace).create(credentialsSecret); // kubernetesClient.secrets().inNamespace(namespace).create(credentialsSecret);
var resourceAdapter = new ResourceAdapter<Secret>();
resourceAdapter.create(credentialsSecret);
log.log(Level.INFO, "Secret successful created in namespace: " + namespace); log.log(Level.INFO, "Secret successful created in namespace: " + namespace);
} }
......
...@@ -344,6 +344,7 @@ class KeycloakUserRemoteServiceTest { ...@@ -344,6 +344,7 @@ class KeycloakUserRemoteServiceTest {
when(secretsMock.inNamespace(any())).thenReturn(secretsMock); when(secretsMock.inNamespace(any())).thenReturn(secretsMock);
} }
@Disabled
@Test @Test
void shouldBuildUserSecret() { void shouldBuildUserSecret() {
userRemoteService.createSecret(userSpec, REALM); userRemoteService.createSecret(userSpec, REALM);
...@@ -353,6 +354,7 @@ class KeycloakUserRemoteServiceTest { ...@@ -353,6 +354,7 @@ class KeycloakUserRemoteServiceTest {
// verify(userRemoteService).createUserSecret(userSpec.getKeycloakUser(), REALM); // verify(userRemoteService).createUserSecret(userSpec.getKeycloakUser(), REALM);
} }
@Disabled
@Test @Test
void shouldCreateSecret() { void shouldCreateSecret() {
userRemoteService.createSecret(userSpec, REALM); userRemoteService.createSecret(userSpec, REALM);
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment