Remove obsolete files

This commit is contained in:
John Gardiner Myers 2021-07-05 22:35:58 -07:00
parent 0e351edb4c
commit 9c83afb739
7 changed files with 0 additions and 61 deletions

View File

@ -399,7 +399,6 @@ func TestDiscoveryFeatureGate(t *testing.T) {
}
defer unsetFeatureFlags()
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
newIntegrationTest("minimal.example.com", "public-jwks-apiserver").
withServiceAccountRole("dns-controller.kube-system", true).
withOIDCDiscovery().
@ -410,7 +409,6 @@ func TestDiscoveryFeatureGate(t *testing.T) {
func TestVFSServiceAccountIssuerDiscovery(t *testing.T) {
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
newIntegrationTest("minimal.example.com", "vfs-said").
withOIDCDiscovery().
runTestTerraformAWS(t)
@ -425,7 +423,6 @@ func TestAWSLBController(t *testing.T) {
}
defer unsetFeatureFlags()
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
newIntegrationTest("minimal.example.com", "aws-lb-controller").
withOIDCDiscovery().
withServiceAccountRole("dns-controller.kube-system", true).
@ -436,7 +433,6 @@ func TestAWSLBController(t *testing.T) {
}
func TestManyAddons(t *testing.T) {
// We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
newIntegrationTest("minimal.example.com", "many-addons").
withOIDCDiscovery().
withAddons("aws-ebs-csi-driver.addons.k8s.io-k8s-1.17",

View File

@ -1,9 +0,0 @@
Simple test of (experimental) JWKS functionality
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
ca.crt & ca.key generated with:
```
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
```

View File

@ -1,9 +0,0 @@
Simple test of (experimental) JWKS functionality
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
ca.crt & ca.key generated with:
```
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
```

View File

@ -1,11 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,10 +0,0 @@
-----BEGIN PRIVATE KEY-----
MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEA4WWjrM1cq9lYsgmB
YOZyjDaVYwCgb1zW4Bf5FMbWiWNuMjHPlVW2z17Q5ecKd0viUtF0A8/rrg3y7Lm0
N3lIVwIDAQABAkAyOuFf6CAn1/bxLjcb7h9G6f8eogwe5TSpmg4TOEClOw0+Zy/y
vgK2QlNQE0UPbpVXLVTr8/hKeExEpQpWhPoZAiEA91yvETWsBfhd14kiXXtROedu
eeA7VFEKVAs3e6GkoeMCIQDpRJjgK1v66NRR0gWiDUknQg+O92BIX5SZ8F4CC4t5
/QIhANUjwZ2cl6tVRNbxTPErzuOL7P+LHNQcOEAOojIfKBJtAiEAlJsN5WnaDCu9
724kBov+OZNdRBAWd6Tkj3lQ+m6OaaUCIFiopekX5mvhslM7+ghbrwOTTY0Di1W9
+ZFYs9l9pitG
-----END PRIVATE KEY-----

View File

@ -1,9 +0,0 @@
Simple test of (experimental) JWKS functionality
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
ca.crt & ca.key generated with:
```
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
```

View File

@ -1,9 +0,0 @@
Simple test of (experimental) JWKS functionality
We have to use a fixed CA because the fingerprint is inserted into the AWS WebIdentity configuration.
ca.crt & ca.key generated with:
```
openssl req -new -newkey rsa:512 -days 3650 -nodes -x509 -subj "/CN=kubernetes" -keyout ca.key -out ca.crt -config <(cat /etc/ssl/openssl.cnf <(printf "[ v3_ca ]\nkeyUsage = critical,keyCertSign,cRLSign"))
```