From 11db258517b02167c9306756908c31625a2fb6d8 Mon Sep 17 00:00:00 2001 From: John Murret Date: Fri, 20 May 2022 18:27:34 -0600 Subject: [PATCH] Updating the doc string for TestVault_WebhookCerts --- acceptance/tests/vault/vault_webhook_certs_test.go | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-) diff --git a/acceptance/tests/vault/vault_webhook_certs_test.go b/acceptance/tests/vault/vault_webhook_certs_test.go index 8a36c88400..ace9d612a9 100644 --- a/acceptance/tests/vault/vault_webhook_certs_test.go +++ b/acceptance/tests/vault/vault_webhook_certs_test.go @@ -18,6 +18,10 @@ import ( // It then configures Consul to use vault as the backend and checks that it works // by turning off web cert manager and configuring controller and connect injector // to receive ca bundles and tls certs from Vault PKI engine. +// This test is modeled after TestVault() with the addition of configuring it +// to turn off web cert manager and have controller get tls and ca certs +// from Vault PKI Engine. + func TestVault_WebhookCerts(t *testing.T) { cfg := suite.Config() ctx := suite.Environment().DefaultContext(t) @@ -170,13 +174,6 @@ func TestVault_WebhookCerts(t *testing.T) { PolicyNames: serverPKIConfig.PolicyName, }) - // pathForConnectInjectWebookCerts := - // vault.ConfigurePKICertificatesForConnectInjectWebhook(t, vaultClient, - // consulReleaseName, ns, "dc1", "1h") - // pathForControllerWebookCerts := - // vault.ConfigurePKICertificatesForControllerWebhook(t, vaultClient, - // consulReleaseName, ns, "dc1", "1h") - vaultCASecret := vault.CASecretName(vaultReleaseName) consulHelmValues := map[string]string{