Skip to content

Commit 04f083c

Browse files
committed
Delete more traefik related resources
1 parent b8d5646 commit 04f083c

File tree

1 file changed

+9
-4
lines changed

1 file changed

+9
-4
lines changed

src/integration-tests/bash/cleanup.sh

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,9 +97,6 @@ function genericDelete {
9797

9898
kubectl get $1 --show-labels=true --all-namespaces=true > $resfile1 2>&1
9999

100-
# (We ignore 'secrets.*traefik.token' resources as these somehow intermittently get recreated
101-
# after each delete, and subsequent runs seem to run fine even if they haven't been deleted.)
102-
# TODO: Find a way to remove the secret's zombie powers.
103100
egrep -e "($2)" $resfile1 | grep -v 'secrets.*traefik.token' > $resfile2
104101
artcount="`cat $resfile2 | wc -l`"
105102

@@ -211,6 +208,14 @@ function orderlyDelete {
211208

212209
echo @@ Deleting configmap domain-${curdomain}-scripts in namespace $curns
213210
kubectl -n $curns delete cm domain-${curdomain}-scripts --ignore-not-found
211+
212+
kubectl -n $curns delete deploy ${curdomain}-cluster-1-traefik --ignore-not-found=true
213+
kubectl -n $curns delete service ${curdomain}-cluster-1-traefik --ignore-not-found=true
214+
kubectl -n $curns delete service ${curdomain}-cluster-1-traefik-dashboard --ignore-not-found=true
215+
kubectl -n $curns delete cm ${curdomain}-cluster-1-traefik --ignore-not-found=true
216+
kubectl -n $curns delete serviceaccount ${curdomain}-cluster-1-traefik --ignore-not-found=true
217+
kubectl -n $curns delete clusterrole ${curdomain}-cluster-1-traefik --ignore-not-found=true
218+
kubectl -n $curns delete clusterrolebinding ${curdomain}-cluster-1-traefik --ignore-not-found=true
214219
done
215220

216221
for ((i=0;i<OCOUNT;i++)); do
@@ -299,7 +304,7 @@ orderlyDelete
299304
# phase 1: wait to see if artificts dissappear naturally due to the above orderlyDelete
300305
# phase 2: kubectl delete left over artifacts
301306

302-
genericDelete "all,crd,cm,pv,pvc,ns,roles,rolebindings,clusterroles,clusterrolebindings,secrets" "logstash|kibana|elastisearch|weblogic|elk|domain"
307+
genericDelete "all,crd,cm,pv,pvc,ns,roles,rolebindings,clusterroles,clusterrolebindings,serviceaccount,secrets" "logstash|kibana|elastisearch|weblogic|elk|domain|traefik"
303308
SUCCESS="$?"
304309

305310
# Delete pv directories using a job (/scratch maps to PV_ROOT on the k8s cluster machines).

0 commit comments

Comments
 (0)