mirror of https://github.com/kubernetes/kops.git
Merge pull request #11932 from johngmyers/remove-dead-files
Remove obsolete files
This commit is contained in:
commit
118c9d7b61
|
|
@ -399,7 +399,6 @@ func TestDiscoveryFeatureGate(t *testing.T) {
|
|||
}
|
||||
defer unsetFeatureFlags()
|
||||
|
||||
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
newIntegrationTest("minimal.example.com", "public-jwks-apiserver").
|
||||
withServiceAccountRole("dns-controller.kube-system", true).
|
||||
withOIDCDiscovery().
|
||||
|
|
@ -410,7 +409,6 @@ func TestDiscoveryFeatureGate(t *testing.T) {
|
|||
|
||||
func TestVFSServiceAccountIssuerDiscovery(t *testing.T) {
|
||||
|
||||
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
newIntegrationTest("minimal.example.com", "vfs-said").
|
||||
withOIDCDiscovery().
|
||||
runTestTerraformAWS(t)
|
||||
|
|
@ -425,7 +423,6 @@ func TestAWSLBController(t *testing.T) {
|
|||
}
|
||||
defer unsetFeatureFlags()
|
||||
|
||||
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
newIntegrationTest("minimal.example.com", "aws-lb-controller").
|
||||
withOIDCDiscovery().
|
||||
withServiceAccountRole("dns-controller.kube-system", true).
|
||||
|
|
@ -436,7 +433,6 @@ func TestAWSLBController(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestManyAddons(t *testing.T) {
|
||||
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
newIntegrationTest("minimal.example.com", "many-addons").
|
||||
withOIDCDiscovery().
|
||||
withAddons("aws-ebs-csi-driver.addons.k8s.io-k8s-1.17",
|
||||
|
|
|
|||
|
|
@ -1,9 +0,0 @@
|
|||
Simple test of (experimental) JWKS functionality
|
||||
|
||||
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
|
||||
ca.crt & ca.key generated with:
|
||||
|
||||
```
|
||||
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
|
||||
```
|
||||
|
|
@ -1,9 +0,0 @@
|
|||
Simple test of (experimental) JWKS functionality
|
||||
|
||||
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
|
||||
ca.crt & ca.key generated with:
|
||||
|
||||
```
|
||||
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
|
||||
```
|
||||
|
|
@ -1,11 +0,0 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIBkTCCATugAwIBAgIUCpH+vP36aaPhoMAXYKNtGDRpO+0wDQYJKoZIhvcNAQEL
|
||||
BQAwFTETMBEGA1UEAwwKa3ViZXJuZXRlczAeFw0yMDA5MTIyMDE3MjhaFw0zMDA5
|
||||
MTAyMDE3MjhaMBUxEzARBgNVBAMMCmt1YmVybmV0ZXMwXDANBgkqhkiG9w0BAQEF
|
||||
AANLADBIAkEA4WWjrM1cq9lYsgmBYOZyjDaVYwCgb1zW4Bf5FMbWiWNuMjHPlVW2
|
||||
z17Q5ecKd0viUtF0A8/rrg3y7Lm0N3lIVwIDAQABo2MwYTAdBgNVHQ4EFgQU1d6Y
|
||||
G7ISO0T1baFPjv6ecnRFtJkwHwYDVR0jBBgwFoAU1d6YG7ISO0T1baFPjv6ecnRF
|
||||
tJkwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEL
|
||||
BQADQQBG1IGyIUyg1/1JcqJv97CQdu2N+J/Ktgw7NIDsGwvYp4OW0y3mXSxWoIFk
|
||||
8l05a0McT3dLZawJ9VzpxMzJS4pG
|
||||
-----END CERTIFICATE-----
|
||||
|
|
@ -1,10 +0,0 @@
|
|||
-----BEGIN PRIVATE KEY-----
|
||||
MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEA4WWjrM1cq9lYsgmB
|
||||
YOZyjDaVYwCgb1zW4Bf5FMbWiWNuMjHPlVW2z17Q5ecKd0viUtF0A8/rrg3y7Lm0
|
||||
N3lIVwIDAQABAkAyOuFf6CAn1/bxLjcb7h9G6f8eogwe5TSpmg4TOEClOw0+Zy/y
|
||||
vgK2QlNQE0UPbpVXLVTr8/hKeExEpQpWhPoZAiEA91yvETWsBfhd14kiXXtROedu
|
||||
eeA7VFEKVAs3e6GkoeMCIQDpRJjgK1v66NRR0gWiDUknQg+O92BIX5SZ8F4CC4t5
|
||||
/QIhANUjwZ2cl6tVRNbxTPErzuOL7P+LHNQcOEAOojIfKBJtAiEAlJsN5WnaDCu9
|
||||
724kBov+OZNdRBAWd6Tkj3lQ+m6OaaUCIFiopekX5mvhslM7+ghbrwOTTY0Di1W9
|
||||
+ZFYs9l9pitG
|
||||
-----END PRIVATE KEY-----
|
||||
|
|
@ -1,9 +0,0 @@
|
|||
Simple test of (experimental) JWKS functionality
|
||||
|
||||
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
|
||||
ca.crt & ca.key generated with:
|
||||
|
||||
```
|
||||
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
|
||||
```
|
||||
|
|
@ -1,9 +0,0 @@
|
|||
Simple test of (experimental) JWKS functionality
|
||||
|
||||
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
|
||||
|
||||
ca.crt & ca.key generated with:
|
||||
|
||||
```
|
||||
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
|
||||
```
|
||||
Loading…
Reference in New Issue