Skip to content

Commit 4a4bb96

Browse files
authored
K8SPSMDB - Fix tests (#1349)
1 parent 7ff82d3 commit 4a4bb96

File tree

4 files changed

+19
-10
lines changed

4 files changed

+19
-10
lines changed

e2e-tests/conf/cmctl.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,13 @@ spec:
1515
serviceAccountName: cmctl
1616
containers:
1717
- name: cmctl
18-
image: debian
18+
image: curlimages/curl
1919
imagePullPolicy: Always
2020
command:
21-
- /bin/bash
21+
- /bin/sh
2222
- -c
2323
- |
24-
apt-get update && apt-get install -y curl \
25-
&& curl -fsSL -o cmctl.tar.gz https://github.com/cert-manager/cert-manager/releases/latest/download/cmctl-linux-amd64.tar.gz \
26-
&& tar xzf cmctl.tar.gz \
24+
curl -fsSL -o /tmp/cmctl.tar.gz https://github.com/cert-manager/cert-manager/releases/latest/download/cmctl-linux-amd64.tar.gz \
25+
&& tar -C /tmp -xzf /tmp/cmctl.tar.gz \
2726
&& sleep 100500
2827
restartPolicy: Always

e2e-tests/default-cr/run

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,11 +86,17 @@ function main() {
8686
platform=openshift
8787
oc create sa pmm-server
8888
oc adm policy add-scc-to-user privileged -z pmm-server
89-
oc create rolebinding pmm-psmdb-operator-namespace-only --role percona-server-mongodb-operator --serviceaccount=$namespace:pmm-server
90-
oc patch role/percona-server-mongodb-operator --type json -p='[{"op":"add","path": "/rules/-","value":{"apiGroups":["security.openshift.io"],"resources":["securitycontextconstraints"],"verbs":["use"],"resourceNames":["privileged"]}}]'
89+
if [ -n "$OPERATOR_NS" ]; then
90+
timeout 30 oc delete clusterrolebinding $(kubectl get clusterrolebinding | grep 'pmm-psmdb-operator-' | awk '{print $1}') || :
91+
oc create clusterrolebinding pmm-psmdb-operator-cluster-wide --clusterrole=percona-server-mongodb-operator --serviceaccount=$namespace:pmm-server
92+
oc patch clusterrole/percona-server-mongodb-operator --type json -p='[{"op":"add","path": "/rules/-","value":{"apiGroups":["security.openshift.io"],"resources":["securitycontextconstraints"],"verbs":["use"],"resourceNames":["privileged"]}}]' ${OPERATOR_NS:+-n $OPERATOR_NS}
93+
else
94+
oc create rolebinding pmm-psmdb-operator-namespace-only --role percona-server-mongodb-operator --serviceaccount=$namespace:pmm-server
95+
oc patch role/percona-server-mongodb-operator --type json -p='[{"op":"add","path": "/rules/-","value":{"apiGroups":["security.openshift.io"],"resources":["securitycontextconstraints"],"verbs":["use"],"resourceNames":["privileged"]}}]'
96+
fi
9197
retry 10 60 helm install monitoring --set imageTag=$IMAGE_PMM_SERVER_TAG --set imageRepo=$IMAGE_PMM_SERVER_REPO --set platform=$platform --set sa=pmm-server --set supresshttp2=false https://percona-charts.storage.googleapis.com/pmm-server-${PMM_SERVER_VER}.tgz
9298
else
93-
helm install monitoring --set imageTag=$IMAGE_PMM_SERVER_TAG --set imageRepo=$IMAGE_PMM_SERVER_REPO --set platform=$platform https://percona-charts.storage.googleapis.com/pmm-server-${PMM_SERVER_VER}.tgz
99+
retry 10 60 helm install monitoring --set imageTag=$IMAGE_PMM_SERVER_TAG --set imageRepo=$IMAGE_PMM_SERVER_REPO --set platform=$platform https://percona-charts.storage.googleapis.com/pmm-server-${PMM_SERVER_VER}.tgz
94100
fi
95101
sleep 20
96102
kubectl_bin patch psmdb ${cluster} --type=merge --patch '{

e2e-tests/security-context/run

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,11 @@ desc 'create additional service account'
1515
kubectl_bin apply -f "$test_dir/conf/service-account.yml"
1616
if [[ -n ${OPENSHIFT} ]]; then
1717
oc adm policy add-scc-to-user privileged -z percona-server-mongodb-operator-workload
18-
oc patch role/percona-server-mongodb-operator --type json -p='[{"op":"add","path": "/rules/-","value":{"apiGroups":["security.openshift.io"],"resources":["securitycontextconstraints"],"verbs":["use"],"resourceNames":["privileged"]}}]'
18+
if [ -n "$OPERATOR_NS" ]; then
19+
oc patch clusterrole/percona-server-mongodb-operator --type json -p='[{"op":"add","path": "/rules/-","value":{"apiGroups":["security.openshift.io"],"resources":["securitycontextconstraints"],"verbs":["use"],"resourceNames":["privileged"]}}]'
20+
else
21+
oc patch role/percona-server-mongodb-operator --type json -p='[{"op":"add","path": "/rules/-","value":{"apiGroups":["security.openshift.io"],"resources":["securitycontextconstraints"],"verbs":["use"],"resourceNames":["privileged"]}}]'
22+
fi
1923
fi
2024

2125
cluster='sec-context'

e2e-tests/tls-issue-cert-manager/run

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ renew-certificate() {
1717
local revision
1818
revision=$(kubectl_bin get certificate "$certificate" -o 'jsonpath={.status.revision}')
1919

20-
kubectl_bin exec "$pod_name" -- ./cmctl renew "$certificate"
20+
kubectl_bin exec "$pod_name" -- /tmp/cmctl renew "$certificate"
2121

2222
# wait for new revision
2323
for i in {1..10}; do

0 commit comments

Comments
 (0)