Skip to content

Commit 5626894

Browse files
committed
fix e2e test
1 parent bb56007 commit 5626894

File tree

1 file changed

+38
-35
lines changed

1 file changed

+38
-35
lines changed

test/e2e/testsuites/pre_provisioned_keyvault_tester.go

Lines changed: 38 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -153,18 +153,6 @@ func generateSASToken(accountName, accountKey string) string {
153153
}
154154

155155
func createVault(ctx context.Context, cred azcore.TokenCredential) (*armkeyvault.Vault, error) {
156-
clientObjectID, err := getServicePrincipalObjectID(ctx, clientID)
157-
if err != nil {
158-
return nil, err
159-
}
160-
ginkgo.By("client object ID: " + clientObjectID)
161-
162-
msiObjectID, err := getMSIObjectID(ctx, "blobfuse-csi-driver-e2e-test-id")
163-
if err != nil {
164-
return nil, err
165-
}
166-
ginkgo.By("MSI object ID: " + msiObjectID)
167-
168156
vaultsClient, err := armkeyvault.NewVaultsClient(subscriptionID, cred, nil)
169157
if err != nil {
170158
return nil, err
@@ -181,29 +169,8 @@ func createVault(ctx context.Context, cred azcore.TokenCredential) (*armkeyvault
181169
Family: to.Ptr(armkeyvault.SKUFamilyA),
182170
Name: to.Ptr(armkeyvault.SKUNameStandard),
183171
},
184-
TenantID: to.Ptr(TenantID),
185-
AccessPolicies: []*armkeyvault.AccessPolicyEntry{
186-
// permission for upstream e2e test
187-
{
188-
TenantID: to.Ptr(TenantID),
189-
ObjectID: to.Ptr(clientObjectID),
190-
Permissions: &armkeyvault.Permissions{
191-
Secrets: []*armkeyvault.SecretPermissions{
192-
to.Ptr(armkeyvault.SecretPermissionsGet),
193-
},
194-
},
195-
},
196-
// permission for upstream e2e-vmss test
197-
{
198-
TenantID: to.Ptr(TenantID),
199-
ObjectID: to.Ptr(msiObjectID),
200-
Permissions: &armkeyvault.Permissions{
201-
Secrets: []*armkeyvault.SecretPermissions{
202-
to.Ptr(armkeyvault.SecretPermissionsGet),
203-
},
204-
},
205-
},
206-
},
172+
TenantID: to.Ptr(TenantID),
173+
AccessPolicies: getAccessPolicy(ctx),
207174
},
208175
},
209176
nil,
@@ -219,6 +186,42 @@ func createVault(ctx context.Context, cred azcore.TokenCredential) (*armkeyvault
219186
return &resp.Vault, nil
220187
}
221188

189+
func getAccessPolicy(ctx context.Context) []*armkeyvault.AccessPolicyEntry {
190+
accessPolicyEntry := []*armkeyvault.AccessPolicyEntry{}
191+
192+
// vault secret permission for upstream e2e test, which uses application service principal
193+
clientObjectID, err := getServicePrincipalObjectID(ctx, clientID)
194+
if err == nil {
195+
ginkgo.By("client object ID: " + clientObjectID)
196+
accessPolicyEntry = append(accessPolicyEntry, &armkeyvault.AccessPolicyEntry{
197+
TenantID: to.Ptr(TenantID),
198+
ObjectID: to.Ptr(clientObjectID),
199+
Permissions: &armkeyvault.Permissions{
200+
Secrets: []*armkeyvault.SecretPermissions{
201+
to.Ptr(armkeyvault.SecretPermissionsGet),
202+
},
203+
},
204+
})
205+
}
206+
207+
// vault secret permission for upstream e2e-vmss test, which uses msi blobfuse-csi-driver-e2e-test-id
208+
msiObjectID, err := getMSIObjectID(ctx, "blobfuse-csi-driver-e2e-test-id")
209+
if err == nil {
210+
ginkgo.By("MSI object ID: " + msiObjectID)
211+
accessPolicyEntry = append(accessPolicyEntry, &armkeyvault.AccessPolicyEntry{
212+
TenantID: to.Ptr(TenantID),
213+
ObjectID: to.Ptr(msiObjectID),
214+
Permissions: &armkeyvault.Permissions{
215+
Secrets: []*armkeyvault.SecretPermissions{
216+
to.Ptr(armkeyvault.SecretPermissionsGet),
217+
},
218+
},
219+
})
220+
}
221+
222+
return accessPolicyEntry
223+
}
224+
222225
func cleanVault(ctx context.Context, cred azcore.TokenCredential) {
223226
err := deleteVault(ctx, cred)
224227
framework.ExpectNoError(err)

0 commit comments

Comments
 (0)