Initialise e2e vault issuer secret namespace before each
Signed-off-by: JoshVanL <vleeuwenjoshua@gmail.com>
This commit is contained in:
parent
d6248d20bd
commit
dfaf2f20c2
@ -78,14 +78,14 @@ func runVaultAppRoleTests(issuerKind string) {
|
||||
|
||||
var vaultSecretNamespace string
|
||||
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
BeforeEach(func() {
|
||||
By("Configuring the Vault server")
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
vaultInit = &vaultaddon.VaultInitializer{
|
||||
Details: *vault.Details(),
|
||||
RootMount: rootMount,
|
||||
|
||||
@ -73,18 +73,18 @@ func runVaultCustomAppRoleTests(issuerKind string) {
|
||||
vaultPath := path.Join(intermediateMount, "sign", role)
|
||||
var roleId string
|
||||
var secretId string
|
||||
var vaultSecretNamespace string
|
||||
|
||||
var vaultInit *vaultaddon.VaultInitializer
|
||||
|
||||
var vaultSecretNamespace string
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
BeforeEach(func() {
|
||||
By("Configuring the Vault server")
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
vaultInit = &vaultaddon.VaultInitializer{
|
||||
Details: *vault.Details(),
|
||||
RootMount: rootMount,
|
||||
|
||||
@ -84,14 +84,15 @@ func runVaultAppRoleTests(issuerKind string) {
|
||||
var vaultInit *vaultaddon.VaultInitializer
|
||||
|
||||
var vaultSecretNamespace string
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
BeforeEach(func() {
|
||||
By("Configuring the Vault server")
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
vaultInit = &vaultaddon.VaultInitializer{
|
||||
Details: *vault.Details(),
|
||||
RootMount: rootMount,
|
||||
|
||||
@ -85,14 +85,16 @@ func runVaultCustomAppRoleTests(issuerKind string) {
|
||||
var vaultInit *vaultaddon.VaultInitializer
|
||||
|
||||
var vaultSecretNamespace string
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
BeforeEach(func() {
|
||||
By("Configuring the Vault server")
|
||||
|
||||
if issuerKind == cmapi.IssuerKind {
|
||||
vaultSecretNamespace = f.Namespace.Name
|
||||
} else {
|
||||
vaultSecretNamespace = "kube-system"
|
||||
}
|
||||
|
||||
vaultInit = &vaultaddon.VaultInitializer{
|
||||
Details: *vault.Details(),
|
||||
RootMount: rootMount,
|
||||
|
||||
Loading…
Reference in New Issue
Block a user