-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump consul-template 0.32.0 -> 0.33.0 #22322
Conversation
Build Results: |
CI Results: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great! Just some tiny nitpicks but neither are blockers. Thanks a bunch for the contribution!
secretIDPath := makeTempFile(t, "secret_id.txt", secretID+"\n") | ||
defer os.Remove(roleIDPath) | ||
defer os.Remove(secretIDPath) | ||
roleIDPath, secretIDPath := setupAppRole(t, serverClient) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Love to see this kind of refactoring!
Also adds a test to ensure the new VAULT_CACERT_BYTES functionality works. Conflicts: go.mod go.sum
Bumps consul-template to v0.33.0. Changelog
In particular this pulls in hashicorp/consul-template#1782 to ensure the environment variable
VAULT_CACERT_BYTES
works equally well in both Vault Agent auto auth and Vault Agent templating, whereas previously it only worked for the former.I've added a test for VAULT_CACERT_BYTES, and while it used a lot of copy-paste from the test
TestAgent_Template_Basic
, I also took some time to extract some common AppRole + KV setup from other tests into one consolidated function to reduce duplication.