Skip to content

Commit c2cce78

Browse files
committed
Remove kubectl_bin from collect_k8s_logs and delete_crd
1 parent 384c699 commit c2cce78

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

e2e-tests/functions

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -617,7 +617,7 @@ wait_for_delete() {
617617
let retry+=1
618618
if [ $retry -ge $wait_time ]; then
619619
collect_k8s_logs
620-
kubectl_bin logs ${OPERATOR_NS:+-n $OPERATOR_NS} $(get_operator_pod) \
620+
kubectl logs ${OPERATOR_NS:+-n $OPERATOR_NS} $(get_operator_pod) \
621621
| grep -v 'level=info' \
622622
| grep -v 'level=debug' \
623623
| grep -v 'Getting tasks for pod' \
@@ -906,21 +906,21 @@ deploy_cert_manager() {
906906
delete_crd() {
907907
desc 'get and delete old CRDs and RBAC'
908908

909-
kubectl_bin delete -f "${src_dir}/deploy/crd.yaml" --ignore-not-found --wait=false || :
909+
kubectl delete -f "${src_dir}/deploy/crd.yaml" --ignore-not-found --wait=false || :
910910
for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-'); do
911911
kubectl get ${crd_name} --all-namespaces -o wide \
912912
| grep -v 'NAMESPACE' \
913913
| xargs -L 1 sh -xc 'kubectl patch '${crd_name}' -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' \
914914
|| :
915-
kubectl_bin wait --for=delete crd ${crd_name} || :
915+
kubectl wait --for=delete crd ${crd_name} || :
916916
done
917917

918918
local rbac_yaml='rbac.yaml'
919919
if [ -n "${OPERATOR_NS}" ]; then
920920
rbac_yaml='cw-rbac.yaml'
921921
fi
922922

923-
kubectl_bin delete -f "${src_dir}/deploy/$rbac_yaml" --ignore-not-found || true
923+
kubectl delete -f "${src_dir}/deploy/$rbac_yaml" --ignore-not-found || true
924924
}
925925

926926
destroy() {
@@ -929,7 +929,7 @@ destroy() {
929929

930930
desc 'destroy cluster/operator and all other resources'
931931
if [ ${ignore_logs} == "false" ] && [ "${DEBUG_TESTS}" == 1 ]; then
932-
kubectl_bin logs ${OPERATOR_NS:+-n $OPERATOR_NS} $(get_operator_pod) \
932+
kubectl logs ${OPERATOR_NS:+-n $OPERATOR_NS} $(get_operator_pod) \
933933
| grep -v 'level=info' \
934934
| grep -v 'level=debug' \
935935
| grep -v 'Getting tasks for pod' \
@@ -952,9 +952,9 @@ destroy() {
952952
oc delete --grace-period=0 --force=true project "$OPERATOR_NS" &
953953
fi
954954
else
955-
kubectl_bin delete --grace-period=0 --force=true namespace "$namespace" &
955+
kubectl delete --grace-period=0 --force=true namespace "$namespace" &
956956
if [ -n "$OPERATOR_NS" ]; then
957-
kubectl_bin delete --grace-period=0 --force=true namespace "$OPERATOR_NS" &
957+
kubectl delete --grace-period=0 --force=true namespace "$OPERATOR_NS" &
958958
fi
959959
fi
960960
rm -rf ${tmp_dir}
@@ -1257,7 +1257,7 @@ check_crd_for_deletion() {
12571257
local git_tag="$1"
12581258

12591259
for crd_name in $(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '.metadata.name' | $sed 's/---//g' | $sed ':a;N;$!ba;s/\n/ /g'); do
1260-
if [[ $(kubectl_bin get crd/${crd_name} -o jsonpath='{.status.conditions[-1].type}') == "Terminating" ]]; then
1260+
if [[ $(kubectl get crd/${crd_name} -o jsonpath='{.status.conditions[-1].type}') == "Terminating" ]]; then
12611261
kubectl get ${crd_name} --all-namespaces -o wide \
12621262
| grep -v 'NAMESPACE' \
12631263
| xargs -L 1 sh -xc 'kubectl patch '${crd_name}' -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' \
@@ -1335,39 +1335,39 @@ collect_k8s_logs() {
13351335
mkdir -p ${logs_path}
13361336

13371337
for ns in ${check_namespaces}; do
1338-
local pods=$(kubectl_bin get pods -n "${ns}" -o name | awk -F "/" '{print $2}')
1338+
local pods=$(kubectl get pods -n "${ns}" -o name | awk -F "/" '{print $2}')
13391339
for p in ${pods}; do
1340-
kubectl_bin -n "${ns}" describe pod ${p} >${logs_path}/pod_${ns}_${p}.dsc || :
1341-
local containers=$(kubectl_bin -n "${ns}" get pod ${p} -o jsonpath='{.spec.containers[*].name}')
1340+
kubectl -n "${ns}" describe pod ${p} >${logs_path}/pod_${ns}_${p}.dsc || :
1341+
local containers=$(kubectl -n "${ns}" get pod ${p} -o jsonpath='{.spec.containers[*].name}')
13421342
for c in ${containers}; do
1343-
kubectl_bin -n "${ns}" logs ${p} -c ${c} >${logs_path}/container_${p}_${c}.log || :
1343+
kubectl -n "${ns}" logs ${p} -c ${c} >${logs_path}/container_${p}_${c}.log || :
13441344
echo "logs saved in: ${logs_path}/${ns}_${p}_${c}.log"
13451345
done
13461346
done
13471347
done
13481348
for object in psmdb psmdb-backup psmdb-restore pods deployments replicasets services sts configmaps persistentvolumeclaims persistentvolumes secrets roles issuer certificate; do
13491349
echo "##### START: ${object} NS: ${namespace} #####" >>${logs_path}/_overview_${namespace}.txt
1350-
kubectl_bin get ${object} -n "${namespace}" >>${logs_path}/_overview_${namespace}.txt || :
1350+
kubectl get ${object} -n "${namespace}" >>${logs_path}/_overview_${namespace}.txt || :
13511351
echo -e "##### END: ${object} NS: ${namespace} #####\n" >>${logs_path}/_overview_${namespace}.txt
1352-
kubectl_bin get ${object} -n "${namespace}" -oyaml >${logs_path}/${object}_${namespace}.yaml || :
1353-
kubectl_bin describe ${object} -n "${namespace}" >${logs_path}/${object}_${namespace}.dsc || :
1352+
kubectl get ${object} -n "${namespace}" -oyaml >${logs_path}/${object}_${namespace}.yaml || :
1353+
kubectl describe ${object} -n "${namespace}" >${logs_path}/${object}_${namespace}.dsc || :
13541354
done
1355-
kubectl_bin get events --all-namespaces >${logs_path}/_events.log || :
1356-
kubectl_bin get nodes >${logs_path}/_nodes.log || :
1357-
kubectl_bin get clusterroles >${logs_path}/_clusterroles.log || :
1355+
kubectl get events --all-namespaces >${logs_path}/_events.log || :
1356+
kubectl get nodes >${logs_path}/_nodes.log || :
1357+
kubectl get clusterroles >${logs_path}/_clusterroles.log || :
13581358

13591359
local secret psmdb_secret psmdb_user psmdb_pass
1360-
for psmdb_name in "$(kubectl_bin get psmdb -n ${namespace} -o custom-columns=NAME:.metadata.name --no-headers=true)"; do
1361-
psmdb_secret="$(kubectl_bin get psmdb ${psmdb_name} -n ${namespace} -ojsonpath='{.spec.secrets.users}')"
1360+
for psmdb_name in "$(kubectl get psmdb -n ${namespace} -o custom-columns=NAME:.metadata.name --no-headers=true)"; do
1361+
psmdb_secret="$(kubectl get psmdb ${psmdb_name} -n ${namespace} -ojsonpath='{.spec.secrets.users}')"
13621362
if [[ ${psmdb_secret} ]]; then secret="${psmdb_secret}"; else secret="${psmdb_name}-secrets"; fi
1363-
psmdb_user="$(kubectl_bin get secrets ${psmdb_secret} -ojsonpath='{.data.MONGODB_BACKUP_USER}' | base64 --decode)"
1364-
psmdb_pass="$(kubectl_bin get secrets ${psmdb_secret} -ojsonpath='{.data.MONGODB_BACKUP_PASSWORD}' | base64 --decode)"
1365-
if [[ "$(kubectl_bin get psmdb ${psmdb_name} -n ${namespace} -ojsonpath='{.spec.sharding.enabled}')" == "true" ]]; then
1363+
psmdb_user="$(kubectl get secrets ${psmdb_secret} -ojsonpath='{.data.MONGODB_BACKUP_USER}' | base64 --decode)"
1364+
psmdb_pass="$(kubectl get secrets ${psmdb_secret} -ojsonpath='{.data.MONGODB_BACKUP_PASSWORD}' | base64 --decode)"
1365+
if [[ "$(kubectl get psmdb ${psmdb_name} -n ${namespace} -ojsonpath='{.spec.sharding.enabled}')" == "true" ]]; then
13661366
local cfg_replica="cfg"
13671367
echo "##### sh.status() #####" >${logs_path}/mongos_${psmdb_name}.mongo
13681368
run_mongos 'sh.status()' "${psmdb_user}:${psmdb_pass}@${psmdb_name}-mongos.${namespace}" >>${logs_path}/mongos_${psmdb_name}.mongo
13691369
fi
1370-
for psmdb_replset in $(kubectl_bin get psmdb ${psmdb_name} -n ${namespace} -ojsonpath='{.spec.replsets[*].name}' | awk '{print $0" '${cfg_replica}'"}'); do
1370+
for psmdb_replset in $(kubectl get psmdb ${psmdb_name} -n ${namespace} -ojsonpath='{.spec.replsets[*].name}' | awk '{print $0" '${cfg_replica}'"}'); do
13711371
local command=("rs.status()" "rs.config()" "db.printSlaveReplicationInfo()" "db.serverCmdLineOpts()" "db.getRoles()" "db.getUsers()")
13721372
for com in "${command[@]}"; do
13731373
echo "##### START: ${com} #####" >>${logs_path}/mongodb_${psmdb_name}_${psmdb_replset}.mongo

0 commit comments

Comments
 (0)