Remove unused Azure scripts (#618)

This were previously used for setting up azure creds for ACI specific
tests, but are no longer needed since that has moved to a separate repo.
This commit is contained in:
Brian Goff
2019-05-14 16:02:33 -07:00
committed by GitHub
parent 63fa4e124b
commit e820c905b7
6 changed files with 0 additions and 96 deletions

View File

@@ -25,13 +25,6 @@ jobs:
working_directory: /go/src/github.com/virtual-kubelet/virtual-kubelet
steps:
- checkout
- run:
name: Create the credentials file
command: sh scripts/createCredentials.sh
- run: |
echo 'export AZURE_AUTH_LOCATION=${outputPathCredsfile}' >> $BASH_ENV
- run: |
echo 'export KUBECONFIG=${outputPathKubeConfigFile}' >> $BASH_ENV
- run:
name: Build
command: V=1 make build

View File

@@ -1,27 +0,0 @@
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: virtual-kubelet
namespace: default
spec:
replicas: 1
template:
metadata:
labels:
app: virtual-kubelet
spec:
containers:
- name: virtual-kubelet
image: rbitia/virtual-kubelet:latest
imagePullPolicy: Always
env:
- name: AZURE_CLIENT_ID
value: $clientId
- name: AZURE_CLIENT_KEY
value: $clientSecret
- name: AZURE_TENANT_ID
value: $tenantId
- name: AZURE_SUBSCRIPTION_ID
value: $subscriptionId
- name: ACI_RESOURCE_GROUP
value: $aciRecourceGroup

View File

@@ -1,10 +0,0 @@
#!/bin/bash
# Generate cert and key for chart
openssl req -newkey rsa:4096 -new -nodes -x509 -days 3650 -keyout key.pem -out cert.pem -subj "/C=US/ST=CA/L=virtualkubelet/O=virtualkubelet/OU=virtualkubelet/CN=virtualkubelet"
if [[ "$OSTYPE" == "darwin"* ]]; then
cert=$(base64 cert.pem)
key=$(base64 key.pem)
else
cert=$(base64 cert.pem -w0)
key=$(base64 key.pem -w0)
fi

View File

@@ -1,47 +0,0 @@
#!/bin/bash
# This will build the credentials during the CI
cat <<EOF > ${outputPathCredsfile}
{
"clientId": "$clientId",
"clientSecret": "$clientSecret",
"subscriptionId": "$subscriptionId",
"tenantId": "$tenantId",
"activeDirectoryEndpointUrl": "$activeDirectoryEndpointUrl",
"resourceManagerEndpointUrl": "$resourceManagerEndpointUrl",
"activeDirectoryGraphResourceId": "$activeDirectoryGraphResourceId",
"sqlManagementEndpointUrl": "$sqlManagementEndpointUrl",
"galleryEndpointUrl": "$galleryEndpointUrl",
"managementEndpointUrl": "$managementEndpointUrl"
}
EOF
# This will build the log analytics credentials during CI
cat <<EOF > ${outputPathLogAnalyticsFile}
{
"workspaceID": "$omsworkspaceID",
"workspaceKey": "$omsworkspaceKey"
}
EOF
# This will build the kubeConfig during the CI
cat <<EOF > ${outputPathKubeConfigFile}
---
apiVersion: v1
clusters:
- cluster:
certificate-authority-data: "$kubeConfigCertificateAuthorityData"
server: $kubeConfigServer
name: "aci-connector-k8s"
contexts:
- context:
cluster: "aci-connector-k8s"
user: "aci-connector-k8s-admin"
name: "aci-connector-k8s"
current-context: "aci-connector-k8s"
kind: Config
users:
- name: "aci-connector-k8s-admin"
user:
client-certificate-data: "$kubeConfigClientCertificateData"
client-key-data: "$kubeConfigClientKeyData"
EOF

View File

@@ -1 +0,0 @@
#!/bin/bash

View File

@@ -1,4 +0,0 @@
#!/bin/bash
# Retrieve kubeconfig for CI
az login --service-principal -u http://azure-cli-2017-11-28-20-22-27 -p $clientSecret --tenant $tenantId
az keyvault secret download --vault-name aciconnectorkv --name kubeconfig -f $PWD/config