@@ -67,11 +67,9 @@ cleanup() {
6767 echo " Logs for pod $pod "
6868 kubectl logs -n ${SELENIUM_NAMESPACE} $pod --all-containers > tests/tests/pod_logs_${pod} .txt
6969 done
70- if [ " ${SKIP_CLEANUP} " = " false" ]; then
70+ if [ " ${SKIP_CLEANUP} " = " false" ] || [ " ${CI :- false} " = " true " ] ; then
7171 echo " Clean up chart release and namespace"
7272 helm delete ${RELEASE_NAME} --namespace ${SELENIUM_NAMESPACE} --wait
73- kubectl patch ns ${SELENIUM_NAMESPACE} -p ' {"metadata":{"finalizers":null}}'
74- kubectl delete namespace ${SELENIUM_NAMESPACE} --wait=false
7573 fi
7674}
7775
@@ -251,8 +249,6 @@ if [ "${SECURE_INGRESS_ONLY_GENERATE}" = "true" ] && [ "${RENDER_HELM_TEMPLATE_O
251249 --set tls.ingress.defaultSANList[0]=${SELENIUM_GRID_HOST} \
252250 --set tls.ingress.defaultIPList[0]=$( hostname -I | awk ' {print $1}' ) \
253251 "
254- kubectl get secret ${SELENIUM_TLS_SECRET_NAME} -n ${SELENIUM_NAMESPACE} -o jsonpath=" {.data.tls\.crt}" | base64 -d > ./tests/tests/tls.crt
255- CHART_CERT_PATH=" ./tests/tests/tls.crt"
256252fi
257253
258254if [ " ${SECURE_INGRESS_ONLY_DEFAULT} " = " true" ]; then
@@ -280,13 +276,14 @@ if [ "${SECURE_USE_EXTERNAL_CERT}" = "true" ] && [ "${RENDER_HELM_TEMPLATE_ONLY}
280276 --set ingress.nginx.sslSecret=" ${SELENIUM_NAMESPACE} /${EXTERNAL_TLS_SECRET_NAME} " \
281277 "
282278 cert_dir=" ./tests/tests"
283- ADD_IP_ADDRESS=hostname ./${CHART_PATH} /certs/gen-cert-helper.sh -d ${cert_dir}
284- kubectl delete secret -n ${SELENIUM_NAMESPACE} ${EXTERNAL_TLS_SECRET_NAME} --ignore-not-found=true
285- kubectl create secret generic -n ${SELENIUM_NAMESPACE} ${EXTERNAL_TLS_SECRET_NAME} \
286- --from-file=tls.crt=${cert_dir} /tls.crt \
287- --from-file=tls.key=${cert_dir} /tls.key \
288- --from-file=server.jks=${cert_dir} /server.jks \
289- --from-file=server.pass=${cert_dir} /server.pass
279+ if [ ! -f " ./tests/tests/tls.crt" ]; then
280+ ADD_IP_ADDRESS=hostname ./${CHART_PATH} /certs/gen-cert-helper.sh -d ${cert_dir}
281+ kubectl create secret generic -n ${SELENIUM_NAMESPACE} ${EXTERNAL_TLS_SECRET_NAME} \
282+ --from-file=tls.crt=${cert_dir} /tls.crt \
283+ --from-file=tls.key=${cert_dir} /tls.key \
284+ --from-file=server.jks=${cert_dir} /server.jks \
285+ --from-file=server.pass=${cert_dir} /server.pass
286+ fi
290287 CHART_CERT_PATH=" ./tests/tests/tls.crt"
291288fi
292289
@@ -408,7 +405,7 @@ if [ "${TEST_UPGRADE_CHART}" = "true" ]; then
408405 exit 0
409406fi
410407
411- if [ " ${SECURE_INGRESS_ONLY_GENERATE} " = " true" ]; then
408+ if [ " ${SECURE_INGRESS_ONLY_GENERATE} " = " true" ] && [ " ${RENDER_HELM_TEMPLATE_ONLY} " != " true " ] ; then
412409 kubectl get secret ${SELENIUM_TLS_SECRET_NAME} -n ${SELENIUM_NAMESPACE} -o jsonpath=" {.data.tls\.crt}" | base64 -d > ./tests/tests/tls.crt
413410 CHART_CERT_PATH=" ./tests/tests/tls.crt"
414411fi
0 commit comments