Skip to content

Commit 07e3b7c

Browse files
authored
Merge pull request kubernetes#74639 from xychu/fix-shellchecks-a
Make test/cmd/a*.sh pass shellcheck
2 parents aa84b99 + 7a385bf commit 07e3b7c

File tree

4 files changed

+338
-341
lines changed

4 files changed

+338
-341
lines changed

hack/.shellcheck_failures

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,6 @@
3030
./hack/test-integration.sh
3131
./hack/update-vendor.sh
3232
./hack/verify-test-featuregates.sh
33-
./test/cmd/apply.sh
34-
./test/cmd/apps.sh
35-
./test/cmd/authorization.sh
3633
./test/cmd/batch.sh
3734
./test/cmd/certificate.sh
3835
./test/cmd/core.sh

test/cmd/apply.sh

Lines changed: 86 additions & 86 deletions
Original file line numberDiff line numberDiff line change
@@ -27,75 +27,75 @@ run_kubectl_apply_tests() {
2727
kube::log::status "Testing kubectl apply"
2828
## kubectl apply should create the resource that doesn't exist yet
2929
# Pre-Condition: no POD exists
30-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
30+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
3131
# Command: apply a pod "test-pod" (doesn't exist) should create this pod
32-
kubectl apply -f hack/testdata/pod.yaml "${kube_flags[@]}"
32+
kubectl apply -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
3333
# Post-Condition: pod "test-pod" is created
34-
kube::test::get_object_assert 'pods test-pod' "{{${labels_field}.name}}" 'test-pod-label'
34+
kube::test::get_object_assert 'pods test-pod' "{{${labels_field:?}.name}}" 'test-pod-label'
3535
# Post-Condition: pod "test-pod" has configuration annotation
36-
[[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
36+
grep -q kubectl.kubernetes.io/last-applied-configuration <<< "$(kubectl get pods test-pod -o yaml "${kube_flags[@]:?}")"
3737
# Clean up
38-
kubectl delete pods test-pod "${kube_flags[@]}"
38+
kubectl delete pods test-pod "${kube_flags[@]:?}"
3939

4040

4141
## kubectl apply should be able to clear defaulted fields.
4242
# Pre-Condition: no deployment exists
43-
kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" ''
43+
kube::test::get_object_assert deployments "{{range.items}}{{${id_field:?}}}:{{end}}" ''
4444
# Command: apply a deployment "test-deployment-retainkeys" (doesn't exist) should create this deployment
45-
kubectl apply -f hack/testdata/retainKeys/deployment/deployment-before.yaml "${kube_flags[@]}"
45+
kubectl apply -f hack/testdata/retainKeys/deployment/deployment-before.yaml "${kube_flags[@]:?}"
4646
# Post-Condition: deployment "test-deployment-retainkeys" created
47-
kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}{{end}}" 'test-deployment-retainkeys'
47+
kube::test::get_object_assert deployments "{{range.items}}{{${id_field:?}}}{{end}}" 'test-deployment-retainkeys'
4848
# Post-Condition: deployment "test-deployment-retainkeys" has defaulted fields
49-
[[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep RollingUpdate)" ]]
50-
[[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep maxSurge)" ]]
51-
[[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep maxUnavailable)" ]]
52-
[[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep emptyDir)" ]]
49+
grep -q RollingUpdate <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
50+
grep -q maxSurge <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
51+
grep -q maxUnavailable <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
52+
grep -q emptyDir <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
5353
# Command: apply a deployment "test-deployment-retainkeys" should clear
5454
# defaulted fields and successfully update the deployment
55-
[[ "$(kubectl apply -f hack/testdata/retainKeys/deployment/deployment-after.yaml "${kube_flags[@]}")" ]]
55+
[[ "$(kubectl apply -f hack/testdata/retainKeys/deployment/deployment-after.yaml "${kube_flags[@]:?}")" ]]
5656
# Post-Condition: deployment "test-deployment-retainkeys" has updated fields
57-
[[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep Recreate)" ]]
58-
! [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep RollingUpdate)" ]]
59-
[[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep hostPath)" ]]
60-
! [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep emptyDir)" ]]
57+
grep -q Recreate <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
58+
! grep -q RollingUpdate <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
59+
grep -q hostPath <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
60+
! grep -q emptyDir <<< "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]:?}")"
6161
# Clean up
62-
kubectl delete deployments test-deployment-retainkeys "${kube_flags[@]}"
62+
kubectl delete deployments test-deployment-retainkeys "${kube_flags[@]:?}"
6363

6464

6565
## kubectl apply -f with label selector should only apply matching objects
6666
# Pre-Condition: no POD exists
67-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
67+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
6868
# apply
69-
kubectl apply -l unique-label=bingbang -f hack/testdata/filter "${kube_flags[@]}"
69+
kubectl apply -l unique-label=bingbang -f hack/testdata/filter "${kube_flags[@]:?}"
7070
# check right pod exists
71-
kube::test::get_object_assert 'pods selector-test-pod' "{{${labels_field}.name}}" 'selector-test-pod'
71+
kube::test::get_object_assert 'pods selector-test-pod' "{{${labels_field:?}.name}}" 'selector-test-pod'
7272
# check wrong pod doesn't exist
73-
output_message=$(! kubectl get pods selector-test-pod-dont-apply 2>&1 "${kube_flags[@]}")
73+
output_message=$(! kubectl get pods selector-test-pod-dont-apply 2>&1 "${kube_flags[@]:?}")
7474
kube::test::if_has_string "${output_message}" 'pods "selector-test-pod-dont-apply" not found'
7575
# cleanup
7676
kubectl delete pods selector-test-pod
7777

7878
## kubectl apply --server-dry-run
7979
# Pre-Condition: no POD exists
80-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
80+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
8181

8282
# apply dry-run
83-
kubectl apply --server-dry-run -f hack/testdata/pod.yaml "${kube_flags[@]}"
83+
kubectl apply --server-dry-run -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
8484
# No pod exists
85-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
85+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
8686
# apply non dry-run creates the pod
87-
kubectl apply -f hack/testdata/pod.yaml "${kube_flags[@]}"
87+
kubectl apply -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
8888
# apply changes
89-
kubectl apply --server-dry-run -f hack/testdata/pod-apply.yaml "${kube_flags[@]}"
89+
kubectl apply --server-dry-run -f hack/testdata/pod-apply.yaml "${kube_flags[@]:?}"
9090
# Post-Condition: label still has initial value
91-
kube::test::get_object_assert 'pods test-pod' "{{${labels_field}.name}}" 'test-pod-label'
91+
kube::test::get_object_assert 'pods test-pod' "{{${labels_field:?}.name}}" 'test-pod-label'
9292

9393
# clean-up
94-
kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]}"
94+
kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
9595

9696
## kubectl apply dry-run on CR
9797
# Create CRD
98-
kubectl "${kube_flags_with_token[@]}" create -f - << __EOF__
98+
kubectl "${kube_flags_with_token[@]:?}" create -f - << __EOF__
9999
{
100100
"kind": "CustomResourceDefinition",
101101
"apiVersion": "apiextensions.k8s.io/v1beta1",
@@ -117,111 +117,111 @@ run_kubectl_apply_tests() {
117117
__EOF__
118118

119119
# Dry-run create the CR
120-
kubectl "${kube_flags[@]}" apply --server-dry-run -f hack/testdata/CRD/resource.yaml "${kube_flags[@]}"
120+
kubectl "${kube_flags[@]:?}" apply --server-dry-run -f hack/testdata/CRD/resource.yaml "${kube_flags[@]:?}"
121121
# Make sure that the CR doesn't exist
122-
! kubectl "${kube_flags[@]}" get resource/myobj
122+
! kubectl "${kube_flags[@]:?}" get resource/myobj
123123

124124
# clean-up
125-
kubectl "${kube_flags[@]}" delete customresourcedefinition resources.mygroup.example.com
125+
kubectl "${kube_flags[@]:?}" delete customresourcedefinition resources.mygroup.example.com
126126

127127
## kubectl apply --prune
128128
# Pre-Condition: no POD exists
129-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
129+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
130130

131131
# apply a
132-
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]}"
132+
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]:?}"
133133
# check right pod exists
134-
kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
134+
kube::test::get_object_assert 'pods a' "{{${id_field:?}}}" 'a'
135135
# check wrong pod doesn't exist
136-
output_message=$(! kubectl get pods b 2>&1 "${kube_flags[@]}")
136+
output_message=$(! kubectl get pods b 2>&1 "${kube_flags[@]:?}")
137137
kube::test::if_has_string "${output_message}" 'pods "b" not found'
138138

139139
# apply b
140-
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/b.yaml "${kube_flags[@]}"
140+
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/b.yaml "${kube_flags[@]:?}"
141141
# check right pod exists
142-
kube::test::get_object_assert 'pods b' "{{${id_field}}}" 'b'
142+
kube::test::get_object_assert 'pods b' "{{${id_field:?}}}" 'b'
143143
# check wrong pod doesn't exist
144-
output_message=$(! kubectl get pods a 2>&1 "${kube_flags[@]}")
144+
output_message=$(! kubectl get pods a 2>&1 "${kube_flags[@]:?}")
145145
kube::test::if_has_string "${output_message}" 'pods "a" not found'
146146

147147
# cleanup
148148
kubectl delete pods b
149149

150150
# same thing without prune for a sanity check
151151
# Pre-Condition: no POD exists
152-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
152+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
153153

154154
# apply a
155-
kubectl apply -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]}"
155+
kubectl apply -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]:?}"
156156
# check right pod exists
157-
kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
157+
kube::test::get_object_assert 'pods a' "{{${id_field:?}}}" 'a'
158158
# check wrong pod doesn't exist
159-
output_message=$(! kubectl get pods b 2>&1 "${kube_flags[@]}")
159+
output_message=$(! kubectl get pods b 2>&1 "${kube_flags[@]:?}")
160160
kube::test::if_has_string "${output_message}" 'pods "b" not found'
161161

162162
# apply b
163-
kubectl apply -l prune-group=true -f hack/testdata/prune/b.yaml "${kube_flags[@]}"
163+
kubectl apply -l prune-group=true -f hack/testdata/prune/b.yaml "${kube_flags[@]:?}"
164164
# check both pods exist
165-
kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
166-
kube::test::get_object_assert 'pods b' "{{${id_field}}}" 'b'
165+
kube::test::get_object_assert 'pods a' "{{${id_field:?}}}" 'a'
166+
kube::test::get_object_assert 'pods b' "{{${id_field:?}}}" 'b'
167167
# check wrong pod doesn't exist
168168

169169
# cleanup
170170
kubectl delete pod/a pod/b
171171

172172
## kubectl apply --prune requires a --all flag to select everything
173-
output_message=$(! kubectl apply --prune -f hack/testdata/prune 2>&1 "${kube_flags[@]}")
173+
output_message=$(! kubectl apply --prune -f hack/testdata/prune 2>&1 "${kube_flags[@]:?}")
174174
kube::test::if_has_string "${output_message}" \
175175
'all resources selected for prune without explicitly passing --all'
176176
# should apply everything
177177
kubectl apply --all --prune -f hack/testdata/prune
178-
kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
179-
kube::test::get_object_assert 'pods b' "{{${id_field}}}" 'b'
178+
kube::test::get_object_assert 'pods a' "{{${id_field:?}}}" 'a'
179+
kube::test::get_object_assert 'pods b' "{{${id_field:?}}}" 'b'
180180
kubectl delete pod/a pod/b
181181

182182
## kubectl apply --prune should fallback to delete for non reapable types
183-
kubectl apply --all --prune -f hack/testdata/prune-reap/a.yml 2>&1 "${kube_flags[@]}"
184-
kube::test::get_object_assert 'pvc a-pvc' "{{${id_field}}}" 'a-pvc'
185-
kubectl apply --all --prune -f hack/testdata/prune-reap/b.yml 2>&1 "${kube_flags[@]}"
186-
kube::test::get_object_assert 'pvc b-pvc' "{{${id_field}}}" 'b-pvc'
187-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
188-
kubectl delete pvc b-pvc 2>&1 "${kube_flags[@]}"
183+
kubectl apply --all --prune -f hack/testdata/prune-reap/a.yml 2>&1 "${kube_flags[@]:?}"
184+
kube::test::get_object_assert 'pvc a-pvc' "{{${id_field:?}}}" 'a-pvc'
185+
kubectl apply --all --prune -f hack/testdata/prune-reap/b.yml 2>&1 "${kube_flags[@]:?}"
186+
kube::test::get_object_assert 'pvc b-pvc' "{{${id_field:?}}}" 'b-pvc'
187+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
188+
kubectl delete pvc b-pvc 2>&1 "${kube_flags[@]:?}"
189189

190190
## kubectl apply --prune --prune-whitelist
191191
# Pre-Condition: no POD exists
192-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
192+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
193193
# apply pod a
194-
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]}"
194+
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]:?}"
195195
# check right pod exists
196-
kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
196+
kube::test::get_object_assert 'pods a' "{{${id_field:?}}}" 'a'
197197
# apply svc and don't prune pod a by overwriting whitelist
198-
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml --prune-whitelist core/v1/Service 2>&1 "${kube_flags[@]}"
199-
kube::test::get_object_assert 'service prune-svc' "{{${id_field}}}" 'prune-svc'
200-
kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
198+
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml --prune-whitelist core/v1/Service 2>&1 "${kube_flags[@]:?}"
199+
kube::test::get_object_assert 'service prune-svc' "{{${id_field:?}}}" 'prune-svc'
200+
kube::test::get_object_assert 'pods a' "{{${id_field:?}}}" 'a'
201201
# apply svc and prune pod a with default whitelist
202-
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml 2>&1 "${kube_flags[@]}"
203-
kube::test::get_object_assert 'service prune-svc' "{{${id_field}}}" 'prune-svc'
204-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
202+
kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml 2>&1 "${kube_flags[@]:?}"
203+
kube::test::get_object_assert 'service prune-svc' "{{${id_field:?}}}" 'prune-svc'
204+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
205205
# cleanup
206-
kubectl delete svc prune-svc 2>&1 "${kube_flags[@]}"
206+
kubectl delete svc prune-svc 2>&1 "${kube_flags[@]:?}"
207207

208208

209209
## kubectl apply -f some.yml --force
210210
# Pre-condition: no service exists
211-
kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" ''
211+
kube::test::get_object_assert services "{{range.items}}{{${id_field:?}}}:{{end}}" ''
212212
# apply service a
213-
kubectl apply -f hack/testdata/service-revision1.yaml "${kube_flags[@]}"
213+
kubectl apply -f hack/testdata/service-revision1.yaml "${kube_flags[@]:?}"
214214
# check right service exists
215-
kube::test::get_object_assert 'services a' "{{${id_field}}}" 'a'
215+
kube::test::get_object_assert 'services a' "{{${id_field:?}}}" 'a'
216216
# change immutable field and apply service a
217-
output_message=$(! kubectl apply -f hack/testdata/service-revision2.yaml 2>&1 "${kube_flags[@]}")
217+
output_message=$(! kubectl apply -f hack/testdata/service-revision2.yaml 2>&1 "${kube_flags[@]:?}")
218218
kube::test::if_has_string "${output_message}" 'field is immutable'
219219
# apply --force to recreate resources for immutable fields
220-
kubectl apply -f hack/testdata/service-revision2.yaml --force "${kube_flags[@]}"
220+
kubectl apply -f hack/testdata/service-revision2.yaml --force "${kube_flags[@]:?}"
221221
# check immutable field exists
222222
kube::test::get_object_assert 'services a' "{{.spec.clusterIP}}" '10.0.0.12'
223223
# cleanup
224-
kubectl delete -f hack/testdata/service-revision2.yaml "${kube_flags[@]}"
224+
kubectl delete -f hack/testdata/service-revision2.yaml "${kube_flags[@]:?}"
225225

226226
## kubectl apply -k somedir
227227
kubectl apply -k hack/testdata/kustomize
@@ -252,31 +252,31 @@ run_kubectl_apply_tests() {
252252
kube::log::status "Testing kubectl apply --experimental-server-side"
253253
## kubectl apply should create the resource that doesn't exist yet
254254
# Pre-Condition: no POD exists
255-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
255+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
256256
# Command: apply a pod "test-pod" (doesn't exist) should create this pod
257-
kubectl apply --experimental-server-side -f hack/testdata/pod.yaml "${kube_flags[@]}"
257+
kubectl apply --experimental-server-side -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
258258
# Post-Condition: pod "test-pod" is created
259-
kube::test::get_object_assert 'pods test-pod' "{{${labels_field}.name}}" 'test-pod-label'
259+
kube::test::get_object_assert 'pods test-pod' "{{${labels_field:?}.name}}" 'test-pod-label'
260260
# Clean up
261-
kubectl delete pods test-pod "${kube_flags[@]}"
261+
kubectl delete pods test-pod "${kube_flags[@]:?}"
262262

263263
## kubectl apply --server-dry-run
264264
# Pre-Condition: no POD exists
265-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
265+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
266266

267267
# apply dry-run
268-
kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod.yaml "${kube_flags[@]}"
268+
kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
269269
# No pod exists
270-
kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
270+
kube::test::get_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" ''
271271
# apply non dry-run creates the pod
272-
kubectl apply --experimental-server-side -f hack/testdata/pod.yaml "${kube_flags[@]}"
272+
kubectl apply --experimental-server-side -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
273273
# apply changes
274-
kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod-apply.yaml "${kube_flags[@]}"
274+
kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod-apply.yaml "${kube_flags[@]:?}"
275275
# Post-Condition: label still has initial value
276-
kube::test::get_object_assert 'pods test-pod' "{{${labels_field}.name}}" 'test-pod-label'
276+
kube::test::get_object_assert 'pods test-pod' "{{${labels_field:?}.name}}" 'test-pod-label'
277277

278278
# clean-up
279-
kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]}"
279+
kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]:?}"
280280

281281
## kubectl apply dry-run on CR
282282
# Create CRD
@@ -302,12 +302,12 @@ run_kubectl_apply_tests() {
302302
__EOF__
303303

304304
# Dry-run create the CR
305-
kubectl "${kube_flags[@]}" apply --experimental-server-side --server-dry-run -f hack/testdata/CRD/resource.yaml "${kube_flags[@]}"
305+
kubectl "${kube_flags[@]:?}" apply --experimental-server-side --server-dry-run -f hack/testdata/CRD/resource.yaml "${kube_flags[@]:?}"
306306
# Make sure that the CR doesn't exist
307-
! kubectl "${kube_flags[@]}" get resource/myobj
307+
! kubectl "${kube_flags[@]:?}" get resource/myobj
308308

309309
# clean-up
310-
kubectl "${kube_flags[@]}" delete customresourcedefinition resources.mygroup.example.com
310+
kubectl "${kube_flags[@]:?}" delete customresourcedefinition resources.mygroup.example.com
311311

312312
set +o nounset
313313
set +o errexit

0 commit comments

Comments
 (0)