@@ -153,18 +153,6 @@ func generateSASToken(accountName, accountKey string) string {
153
153
}
154
154
155
155
func createVault (ctx context.Context , cred azcore.TokenCredential ) (* armkeyvault.Vault , error ) {
156
- clientObjectID , err := getServicePrincipalObjectID (ctx , clientID )
157
- if err != nil {
158
- return nil , err
159
- }
160
- ginkgo .By ("client object ID: " + clientObjectID )
161
-
162
- msiObjectID , err := getMSIObjectID (ctx , "blobfuse-csi-driver-e2e-test-id" )
163
- if err != nil {
164
- return nil , err
165
- }
166
- ginkgo .By ("MSI object ID: " + msiObjectID )
167
-
168
156
vaultsClient , err := armkeyvault .NewVaultsClient (subscriptionID , cred , nil )
169
157
if err != nil {
170
158
return nil , err
@@ -181,29 +169,8 @@ func createVault(ctx context.Context, cred azcore.TokenCredential) (*armkeyvault
181
169
Family : to .Ptr (armkeyvault .SKUFamilyA ),
182
170
Name : to .Ptr (armkeyvault .SKUNameStandard ),
183
171
},
184
- TenantID : to .Ptr (TenantID ),
185
- AccessPolicies : []* armkeyvault.AccessPolicyEntry {
186
- // permission for upstream e2e test
187
- {
188
- TenantID : to .Ptr (TenantID ),
189
- ObjectID : to .Ptr (clientObjectID ),
190
- Permissions : & armkeyvault.Permissions {
191
- Secrets : []* armkeyvault.SecretPermissions {
192
- to .Ptr (armkeyvault .SecretPermissionsGet ),
193
- },
194
- },
195
- },
196
- // permission for upstream e2e-vmss test
197
- {
198
- TenantID : to .Ptr (TenantID ),
199
- ObjectID : to .Ptr (msiObjectID ),
200
- Permissions : & armkeyvault.Permissions {
201
- Secrets : []* armkeyvault.SecretPermissions {
202
- to .Ptr (armkeyvault .SecretPermissionsGet ),
203
- },
204
- },
205
- },
206
- },
172
+ TenantID : to .Ptr (TenantID ),
173
+ AccessPolicies : getAccessPolicy (ctx ),
207
174
},
208
175
},
209
176
nil ,
@@ -219,6 +186,42 @@ func createVault(ctx context.Context, cred azcore.TokenCredential) (*armkeyvault
219
186
return & resp .Vault , nil
220
187
}
221
188
189
+ func getAccessPolicy (ctx context.Context ) []* armkeyvault.AccessPolicyEntry {
190
+ accessPolicyEntry := []* armkeyvault.AccessPolicyEntry {}
191
+
192
+ // vault secret permission for upstream e2e test, which uses application service principal
193
+ clientObjectID , err := getServicePrincipalObjectID (ctx , clientID )
194
+ if err == nil {
195
+ ginkgo .By ("client object ID: " + clientObjectID )
196
+ accessPolicyEntry = append (accessPolicyEntry , & armkeyvault.AccessPolicyEntry {
197
+ TenantID : to .Ptr (TenantID ),
198
+ ObjectID : to .Ptr (clientObjectID ),
199
+ Permissions : & armkeyvault.Permissions {
200
+ Secrets : []* armkeyvault.SecretPermissions {
201
+ to .Ptr (armkeyvault .SecretPermissionsGet ),
202
+ },
203
+ },
204
+ })
205
+ }
206
+
207
+ // vault secret permission for upstream e2e-vmss test, which uses msi blobfuse-csi-driver-e2e-test-id
208
+ msiObjectID , err := getMSIObjectID (ctx , "blobfuse-csi-driver-e2e-test-id" )
209
+ if err == nil {
210
+ ginkgo .By ("MSI object ID: " + msiObjectID )
211
+ accessPolicyEntry = append (accessPolicyEntry , & armkeyvault.AccessPolicyEntry {
212
+ TenantID : to .Ptr (TenantID ),
213
+ ObjectID : to .Ptr (msiObjectID ),
214
+ Permissions : & armkeyvault.Permissions {
215
+ Secrets : []* armkeyvault.SecretPermissions {
216
+ to .Ptr (armkeyvault .SecretPermissionsGet ),
217
+ },
218
+ },
219
+ })
220
+ }
221
+
222
+ return accessPolicyEntry
223
+ }
224
+
222
225
func cleanVault (ctx context.Context , cred azcore.TokenCredential ) {
223
226
err := deleteVault (ctx , cred )
224
227
framework .ExpectNoError (err )
0 commit comments