From 8fa362d27200f13346f374f3aadbf1d4876e1000 Mon Sep 17 00:00:00 2001 From: patoarvizu Date: Sat, 8 Jan 2022 23:18:09 -0500 Subject: [PATCH] Point to master version of 'common-manifests' --- .circleci/config.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.circleci/config.yml b/.circleci/config.yml index 4f18059..955194a 100644 --- a/.circleci/config.yml +++ b/.circleci/config.yml @@ -91,15 +91,15 @@ jobs: kubectl rollout status -n cert-manager deployment/cert-manager-webhook -w kubectl apply -f https://raw.githubusercontent.com/patoarvizu/common-manifests/master/cert-manager/cluster-issuer.yaml kubectl apply -f https://raw.githubusercontent.com/patoarvizu/common-manifests/master/vault/vault-external-service.yaml - kubectl apply -f https://raw.githubusercontent.com/patoarvizu/common-manifests/optimize-kms-vault-operator-build/vault/vault-cluster-v1.yaml + kubectl apply -f https://raw.githubusercontent.com/patoarvizu/common-manifests/master/vault/vault-cluster-v1.yaml while [ "$(kubectl -n vault get statefulset vault -o jsonpath={.status.readyReplicas})" != "1" ]; do sleep 1 done kubectl -n vault create secret generic aws-secrets --from-literal=AWS_ACCESS_KEY_ID=$(echo $AWS_ACCESS_KEY_ID) --from-literal=AWS_SECRET_ACCESS_KEY=$(echo $AWS_SECRET_ACCESS_KEY) helm install kms-vault-operator helm/kms-vault-operator/ -n vault -f test/helm-values/values.yaml go test github.com/patoarvizu/kms-vault-operator/test/e2e -v -ginkgo.focus="With K/V v1 secrets" - kubectl delete -f https://raw.githubusercontent.com/patoarvizu/common-manifests/optimize-kms-vault-operator-build/vault/vault-cluster-v1.yaml - kubectl apply -f https://raw.githubusercontent.com/patoarvizu/common-manifests/optimize-kms-vault-operator-build/vault/vault-cluster-v2.yaml + kubectl delete -f https://raw.githubusercontent.com/patoarvizu/common-manifests/master/vault/vault-cluster-v1.yaml + kubectl apply -f https://raw.githubusercontent.com/patoarvizu/common-manifests/master/vault/vault-cluster-v2.yaml sleep 3 while [ "$(kubectl -n vault get statefulset vault -o jsonpath={.status.readyReplicas})" != "1" ]; do sleep 1