diff --git a/acceptance/tests/vault/vault_webhook_certs_test.go b/acceptance/tests/vault/vault_webhook_certs_test.go index 8a36c88400..ace9d612a9 100644 --- a/acceptance/tests/vault/vault_webhook_certs_test.go +++ b/acceptance/tests/vault/vault_webhook_certs_test.go @@ -18,6 +18,10 @@ import ( // It then configures Consul to use vault as the backend and checks that it works // by turning off web cert manager and configuring controller and connect injector // to receive ca bundles and tls certs from Vault PKI engine. +// This test is modeled after TestVault() with the addition of configuring it +// to turn off web cert manager and have controller get tls and ca certs +// from Vault PKI Engine. + func TestVault_WebhookCerts(t *testing.T) { cfg := suite.Config() ctx := suite.Environment().DefaultContext(t) @@ -170,13 +174,6 @@ func TestVault_WebhookCerts(t *testing.T) { PolicyNames: serverPKIConfig.PolicyName, }) - // pathForConnectInjectWebookCerts := - // vault.ConfigurePKICertificatesForConnectInjectWebhook(t, vaultClient, - // consulReleaseName, ns, "dc1", "1h") - // pathForControllerWebookCerts := - // vault.ConfigurePKICertificatesForControllerWebhook(t, vaultClient, - // consulReleaseName, ns, "dc1", "1h") - vaultCASecret := vault.CASecretName(vaultReleaseName) consulHelmValues := map[string]string{