Skip to content

Commit

Permalink
fixing VAULT_TLSAUtoReload test
Browse files Browse the repository at this point in the history
  • Loading branch information
jmurret committed May 18, 2022
1 parent 5ab0906 commit a77cdce
Showing 1 changed file with 8 additions and 1 deletion.
9 changes: 8 additions & 1 deletion acceptance/tests/vault/vault_tls_auto_reload_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ import (
// TestVault_TlsAutoReload installs Vault, bootstraps it with secrets, policies, and Kube Auth Method.
// It then gets certs for https and rpc on the server. It then waits for the certs to rotate and checks
// that certs have different expirations.
func TestVault_TlsAutoReload(t *testing.T) {
func TestVault_TLSAutoReload(t *testing.T) {
cfg := suite.Config()
ctx := suite.Environment().DefaultContext(t)
ns := ctx.KubectlOptions(t).Namespace
Expand Down Expand Up @@ -151,6 +151,13 @@ func TestVault_TlsAutoReload(t *testing.T) {
PolicyNames: serverPKIConfig.PolicyName,
})

// pathForConnectInjectWebookCerts :=
// vault.ConfigurePKICertificatesForConnectInjectWebhook(t, vaultClient,
// consulReleaseName, ns, "dc1", "1h")
// pathForControllerWebookCerts :=
// vault.ConfigurePKICertificatesForControllerWebhook(t, vaultClient,
// consulReleaseName, ns, "dc1", "1h")

vaultCASecret := vault.CASecretName(vaultReleaseName)

consulHelmValues := map[string]string{
Expand Down

0 comments on commit a77cdce

Please sign in to comment.