@@ -20,7 +20,6 @@ import (
20
20
"context"
21
21
"fmt"
22
22
"net/url"
23
- "os"
24
23
"time"
25
24
26
25
"github.com/Azure/azure-sdk-for-go/sdk/azcore"
43
42
location string
44
43
vaultName string
45
44
TenantID string
46
- ObjectID string
45
+ // ObjectID string
47
46
)
48
47
49
48
// PreProvisionedKeyVaultTest will provision required PV(s), PVC(s) and Pod(s)
@@ -63,8 +62,8 @@ func (t *PreProvisionedKeyVaultTest) Run(client clientset.Interface, namespace *
63
62
resourceGroupName = e2eCred .ResourceGroup
64
63
location = e2eCred .Location
65
64
TenantID = e2eCred .TenantID
66
- ObjectID = os .Getenv ("AZURE_OBJECT_ID" )
67
- framework .ExpectNotEqual (len (ObjectID ), 0 , "env AZURE_OBJECT_ID must be set" )
65
+ // ObjectID = os.Getenv("AZURE_OBJECT_ID")
66
+ // framework.ExpectNotEqual(len(ObjectID), 0, "env AZURE_OBJECT_ID must be set")
68
67
vaultName = "blob-csi-keyvault-test4"
69
68
70
69
for _ , pod := range t .Pods {
@@ -163,16 +162,16 @@ func createVault(ctx context.Context, cred azcore.TokenCredential) (*armkeyvault
163
162
},
164
163
TenantID : to .Ptr (TenantID ),
165
164
AccessPolicies : []* armkeyvault.AccessPolicyEntry {
166
- {
167
- TenantID : to .Ptr (TenantID ),
168
- ObjectID : to .Ptr (ObjectID ),
169
- Permissions : & armkeyvault.Permissions {
170
- Secrets : []* armkeyvault.SecretPermissions {
171
- to .Ptr (armkeyvault .SecretPermissionsGet ),
172
- to .Ptr (armkeyvault .SecretPermissionsList ),
173
- },
174
- },
175
- },
165
+ // {
166
+ // TenantID: to.Ptr(TenantID),
167
+ // ObjectID: to.Ptr(ObjectID),
168
+ // Permissions: &armkeyvault.Permissions{
169
+ // Secrets: []*armkeyvault.SecretPermissions{
170
+ // to.Ptr(armkeyvault.SecretPermissionsGet),
171
+ // to.Ptr(armkeyvault.SecretPermissionsList),
172
+ // },
173
+ // },
174
+ // },
176
175
{
177
176
TenantID : to .Ptr (TenantID ),
178
177
ObjectID : to .Ptr ("e3440dd1-b7f3-4275-82bd-65482ba5b26a" ),
0 commit comments