Skip to content

Commit b5f665d

Browse files
author
romdalf
committed
'cleaning up hvault code'
1 parent 00547ab commit b5f665d

1 file changed

Lines changed: 13 additions & 12 deletions

File tree

configuration/testenv4kvault.sh

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ echo -e " -> Trigger Kind k8s API server restart"
125125
kubectl delete -n kube-system pod/kube-apiserver-kleidi-vault-control-plane
126126
echo -e " -> Sleeping for 30 seconds to allow kube-apiserver to restart"
127127

128-
echo
128+
# echo
129129
# echo -e " -> Checking a pre kleidi deployment Secret"
130130
# kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/prekleidi" | hexdump -C
131131

@@ -136,6 +136,7 @@ echo
136136
# echo -e " /!\ no unencrypted prekleidi Secret object found!"
137137
# fi
138138

139+
rvho
139140
echo -e " -> Checking a pre kleidi deployment Secret"
140141
for i in {10..1000}; do kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/prekleidi$i" | hexdump -C | grep Opaque; done | wc -l
141142

@@ -144,8 +145,8 @@ echo -e " -> Creating 990 post kleidi deployment Secrets"
144145
# kubectl create secret generic postkleidi -n default --from-literal=mykey=mydata
145146
for i in {10..1000}; do kubectl create secret generic postkleidi$i --from-literal=mykey=mydata; done
146147

147-
echo
148-
echo -e " -> Checking a post kleidi deployment Secret"
148+
# echo
149+
# echo -e " -> Checking a post kleidi deployment Secret"
149150
# kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/postkleidi" | hexdump -C
150151

151152
# if kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/postkleidi" | hexdump -C | grep kms;
@@ -181,15 +182,15 @@ echo
181182
echo -e " -> Checking a pre kleidi Secret replace"
182183
for i in {10..1000}; do kubectl -n kube-system exec etcd-kleidi-vault-control-plane -- sh -c "ETCDCTL_ENDPOINTS='https://127.0.0.1:2379' ETCDCTL_CACERT='/etc/kubernetes/pki/etcd/ca.crt' ETCDCTL_CERT='/etc/kubernetes/pki/etcd/server.crt' ETCDCTL_KEY='/etc/kubernetes/pki/etcd/server.key' ETCDCTL_API=3 etcdctl get /registry/secrets/default/prekleidi$i" | hexdump -C | grep vault; done | wc -l
183184

184-
# echo
185-
# echo -e " -> Cleaning any existing vault test env"
186-
# killall -9 vault ||true
185+
echo
186+
echo -e " -> Cleaning any existing vault test env"
187+
killall -9 vault ||true
187188

188-
# echo
189-
# echo -e " -> Cleaning any existing kind test env"
190-
# kind delete cluster --name kleidi-vault
189+
echo
190+
echo -e " -> Cleaning any existing kind test env"
191+
kind delete cluster --name kleidi-vault
191192

192-
# echo
193-
# echo -e " -> Cleaning vault-encryption-config.yaml"
194-
# cp k8s/encryption/vault-encryption-config-bkp.yaml k8s/encryption/vault-encryption-config.yaml
193+
echo
194+
echo -e " -> Cleaning vault-encryption-config.yaml"
195+
cp k8s/encryption/vault-encryption-config-bkp.yaml k8s/encryption/vault-encryption-config.yaml
195196

0 commit comments

Comments
 (0)