@@ -70,6 +70,8 @@ resource "kubernetes_secret" "cpd_entitlement_key_secret" {
7070}
7171
7272resource "kubernetes_service_account_v1" "cloud_pak_deployer_service_account" {
73+ depends_on = [kubernetes_namespace_v1 . cloud_pak_deployer_namespace ]
74+
7375 metadata {
7476 name = local. cloud_pak_deployer . service_account_name
7577 namespace = local. cloud_pak_deployer . namespace_name
@@ -112,7 +114,10 @@ resource "kubernetes_cluster_role_binding_v1" "cloud_pak_deployer_cluster_role_b
112114 namespace = local. cloud_pak_deployer . namespace_name
113115 }
114116
115- depends_on = [kubernetes_namespace_v1 . cloud_pak_deployer_namespace ]
117+ depends_on = [
118+ kubernetes_namespace_v1 . cloud_pak_deployer_namespace ,
119+ kubernetes_service_account_v1 . cloud_pak_deployer_service_account
120+ ]
116121}
117122
118123resource "kubernetes_secret" "docker_cfg_secret" {
@@ -171,17 +176,14 @@ resource "kubernetes_persistent_volume_claim_v1" "cloud_pak_deployer_persistent_
171176
172177resource "kubernetes_job_v1" "cloud_pak_deployer_job" {
173178 depends_on = [
179+ kubernetes_namespace_v1 . cloud_pak_deployer_namespace ,
180+ kubernetes_secret . cpd_entitlement_key_secret ,
181+ kubernetes_service_account_v1 . cloud_pak_deployer_service_account ,
182+ null_resource. cloud_pak_deployer_security_context_constraint ,
183+ kubernetes_cluster_role_binding_v1 . cloud_pak_deployer_cluster_role_binding ,
184+ kubernetes_secret . docker_cfg_secret ,
174185 kubernetes_config_map_v1 . cloud_pak_deployer_configmap ,
175186 kubernetes_persistent_volume_claim_v1 . cloud_pak_deployer_persistent_volume_claim
176- # kubernetes_manifest.cloud_pak_deployer_cluster_role_binding,
177- # kubernetes_manifest.cloud_pak_deployer_configmap,
178- # kubernetes_namespace_v1.cloud_pak_deployer_namespace,
179- # kubernetes_manifest.cloud_pak_deployer_persistent_volume_claim,
180- # # kubernetes_manifest.cloud_pak_deployer_persistent_volume_claim,
181- # kubernetes_manifest.cloud_pak_deployer_service_account,
182- # kubernetes_manifest.cpd_entitlement_key_secret,
183- # null_resource.cloud_pak_deployer_security_context_constraint,
184- # kubernetes_secret.docker_cfg_secret
185187 ]
186188
187189 metadata {
@@ -273,6 +275,8 @@ resource "kubernetes_job_v1" "cloud_pak_deployer_job" {
273275}
274276
275277resource "terraform_data" "uninstall_cpd" {
278+ depends_on = [kubernetes_job_v1 . cloud_pak_deployer_job ]
279+
276280 triggers_replace = {
277281 job_name = yamldecode (local_file. deployer_definitions [" job_uninstall_cpd" ]. content ).metadata.name
278282 job_uninstall_cpd_filename = local_file.deployer_definitions[" job_uninstall_cpd" ].filename
@@ -295,13 +299,13 @@ resource "terraform_data" "uninstall_cpd" {
295299 ${ self . input . oc } create -f ${ self . input . job_uninstall_cpd_filename }
296300 if [ $? -ne 0 ]; then echo "Unable to create job ${ self . input . job_name } ; exiting..." && exit 1; fi
297301
298- timeout_seconds=900 # 15 minutes
302+ timeout_seconds=1800 # 30 minutes
299303 sleep_seconds=5
300304 number_of_tries=$((timeout_seconds / sleep_seconds))
301305 complete=false
302306 failed=false
303307
304- for ((i = 1; i <= $number_of_tries; i++)) ; do
308+ while [ $i -lt $number_of_tries ] ; do
305309
306310 echo "Waiting for job... ($${i}/$${number_of_tries})"
307311
@@ -311,6 +315,8 @@ resource "terraform_data" "uninstall_cpd" {
311315 ${ self . input . oc } wait --for=condition=failed job ${ self . input . job_name } -n ${ self . input . namespace_name } --timeout=0 2>/dev/null
312316 if [ $? -eq 0 ]; then failed=true && break; fi
313317
318+ i=`expr $i + 1`
319+
314320 sleep $sleep_seconds
315321
316322 done
0 commit comments