@@ -125,7 +125,7 @@ echo -e " -> Trigger Kind k8s API server restart"
125125kubectl delete -n kube-system pod/kube-apiserver-kleidi-vault-control-plane
126126echo -e " -> Sleeping for 30 seconds to allow kube-apiserver to restart"
127127
128- echo
128+ # echo
129129# echo -e " -> Checking a pre kleidi deployment Secret"
130130# kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/prekleidi" | hexdump -C
131131
136136# echo -e " /!\ no unencrypted prekleidi Secret object found!"
137137# fi
138138
139+ rvho
139140echo -e " -> Checking a pre kleidi deployment Secret"
140141for i in {10..1000}; do kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c " ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/prekleidi$i " | hexdump -C | grep Opaque; done | wc -l
141142
@@ -144,8 +145,8 @@ echo -e " -> Creating 990 post kleidi deployment Secrets"
144145# kubectl create secret generic postkleidi -n default --from-literal=mykey=mydata
145146for i in {10..1000}; do kubectl create secret generic postkleidi$i --from-literal=mykey=mydata; done
146147
147- echo
148- echo -e " -> Checking a post kleidi deployment Secret"
148+ # echo
149+ # echo -e " -> Checking a post kleidi deployment Secret"
149150# kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/postkleidi" | hexdump -C
150151
151152# if kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/postkleidi" | hexdump -C | grep kms;
@@ -181,15 +182,15 @@ echo
181182echo -e " -> Checking a pre kleidi Secret replace"
182183for i in {10..1000}; do kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c " ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/prekleidi$i " | hexdump -C | grep vault; done | wc -l
183184
184- # echo
185- # echo -e " -> Cleaning any existing vault test env"
186- # killall -9 vault ||true
185+ echo
186+ echo -e " -> Cleaning any existing vault test env"
187+ killall -9 vault || true
187188
188- # echo
189- # echo -e " -> Cleaning any existing kind test env"
190- # kind delete cluster --name kleidi-vault
189+ echo
190+ echo -e " -> Cleaning any existing kind test env"
191+ kind delete cluster --name kleidi-vault
191192
192- # echo
193- # echo -e " -> Cleaning vault-encryption-config.yaml"
194- # cp k8s/encryption/vault-encryption-config-bkp.yaml k8s/encryption/vault-encryption-config.yaml
193+ echo
194+ echo -e " -> Cleaning vault-encryption-config.yaml"
195+ cp k8s/encryption/vault-encryption-config-bkp.yaml k8s/encryption/vault-encryption-config.yaml
195196
0 commit comments