@@ -27,75 +27,75 @@ run_kubectl_apply_tests() {
27
27
kube::log::status " Testing kubectl apply"
28
28
# # kubectl apply should create the resource that doesn't exist yet
29
29
# Pre-Condition: no POD exists
30
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
30
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
31
31
# Command: apply a pod "test-pod" (doesn't exist) should create this pod
32
- kubectl apply -f hack/testdata/pod.yaml " ${kube_flags[@]} "
32
+ kubectl apply -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
33
33
# Post-Condition: pod "test-pod" is created
34
- kube::test::get_object_assert ' pods test-pod' " {{${labels_field} .name}}" ' test-pod-label'
34
+ kube::test::get_object_assert ' pods test-pod' " {{${labels_field:? } .name}}" ' test-pod-label'
35
35
# Post-Condition: pod "test-pod" has configuration annotation
36
- [[ " $( kubectl get pods test-pod -o yaml " ${kube_flags[@]} " | grep kubectl.kubernetes.io/last-applied-configuration ) " ]]
36
+ grep -q kubectl.kubernetes.io/last-applied-configuration <<< " $(kubectl get pods test-pod -o yaml " ${kube_flags[@]:? } " ) "
37
37
# Clean up
38
- kubectl delete pods test-pod " ${kube_flags[@]} "
38
+ kubectl delete pods test-pod " ${kube_flags[@]:? } "
39
39
40
40
41
41
# # kubectl apply should be able to clear defaulted fields.
42
42
# Pre-Condition: no deployment exists
43
- kube::test::get_object_assert deployments " {{range.items}}{{$id_field }}:{{end}}" ' '
43
+ kube::test::get_object_assert deployments " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
44
44
# Command: apply a deployment "test-deployment-retainkeys" (doesn't exist) should create this deployment
45
- kubectl apply -f hack/testdata/retainKeys/deployment/deployment-before.yaml " ${kube_flags[@]} "
45
+ kubectl apply -f hack/testdata/retainKeys/deployment/deployment-before.yaml " ${kube_flags[@]:? } "
46
46
# Post-Condition: deployment "test-deployment-retainkeys" created
47
- kube::test::get_object_assert deployments " {{range.items}}{{$id_field }}{{end}}" ' test-deployment-retainkeys'
47
+ kube::test::get_object_assert deployments " {{range.items}}{{${ id_field:? } }}{{end}}" ' test-deployment-retainkeys'
48
48
# Post-Condition: deployment "test-deployment-retainkeys" has defaulted fields
49
- [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep RollingUpdate ) " ]]
50
- [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep maxSurge ) " ]]
51
- [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep maxUnavailable ) " ]]
52
- [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep emptyDir ) " ]]
49
+ grep -q RollingUpdate <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
50
+ grep -q maxSurge <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
51
+ grep -q maxUnavailable <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
52
+ grep -q emptyDir <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
53
53
# Command: apply a deployment "test-deployment-retainkeys" should clear
54
54
# defaulted fields and successfully update the deployment
55
- [[ " $( kubectl apply -f hack/testdata/retainKeys/deployment/deployment-after.yaml " ${kube_flags[@]} " ) " ]]
55
+ [[ " $( kubectl apply -f hack/testdata/retainKeys/deployment/deployment-after.yaml " ${kube_flags[@]:? } " ) " ]]
56
56
# Post-Condition: deployment "test-deployment-retainkeys" has updated fields
57
- [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep Recreate ) " ]]
58
- ! [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep RollingUpdate ) " ]]
59
- [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep hostPath ) " ]]
60
- ! [[ " $( kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]} " | grep emptyDir ) " ]]
57
+ grep -q Recreate <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
58
+ ! grep -q RollingUpdate <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
59
+ grep -q hostPath <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
60
+ ! grep -q emptyDir <<< " $(kubectl get deployments test-deployment-retainkeys -o yaml " ${kube_flags[@]:? } " ) "
61
61
# Clean up
62
- kubectl delete deployments test-deployment-retainkeys " ${kube_flags[@]} "
62
+ kubectl delete deployments test-deployment-retainkeys " ${kube_flags[@]:? } "
63
63
64
64
65
65
# # kubectl apply -f with label selector should only apply matching objects
66
66
# Pre-Condition: no POD exists
67
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
67
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
68
68
# apply
69
- kubectl apply -l unique-label=bingbang -f hack/testdata/filter " ${kube_flags[@]} "
69
+ kubectl apply -l unique-label=bingbang -f hack/testdata/filter " ${kube_flags[@]:? } "
70
70
# check right pod exists
71
- kube::test::get_object_assert ' pods selector-test-pod' " {{${labels_field} .name}}" ' selector-test-pod'
71
+ kube::test::get_object_assert ' pods selector-test-pod' " {{${labels_field:? } .name}}" ' selector-test-pod'
72
72
# check wrong pod doesn't exist
73
- output_message=$( ! kubectl get pods selector-test-pod-dont-apply 2>&1 " ${kube_flags[@]} " )
73
+ output_message=$( ! kubectl get pods selector-test-pod-dont-apply 2>&1 " ${kube_flags[@]:? } " )
74
74
kube::test::if_has_string " ${output_message} " ' pods "selector-test-pod-dont-apply" not found'
75
75
# cleanup
76
76
kubectl delete pods selector-test-pod
77
77
78
78
# # kubectl apply --server-dry-run
79
79
# Pre-Condition: no POD exists
80
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
80
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
81
81
82
82
# apply dry-run
83
- kubectl apply --server-dry-run -f hack/testdata/pod.yaml " ${kube_flags[@]} "
83
+ kubectl apply --server-dry-run -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
84
84
# No pod exists
85
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
85
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
86
86
# apply non dry-run creates the pod
87
- kubectl apply -f hack/testdata/pod.yaml " ${kube_flags[@]} "
87
+ kubectl apply -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
88
88
# apply changes
89
- kubectl apply --server-dry-run -f hack/testdata/pod-apply.yaml " ${kube_flags[@]} "
89
+ kubectl apply --server-dry-run -f hack/testdata/pod-apply.yaml " ${kube_flags[@]:? } "
90
90
# Post-Condition: label still has initial value
91
- kube::test::get_object_assert ' pods test-pod' " {{${labels_field} .name}}" ' test-pod-label'
91
+ kube::test::get_object_assert ' pods test-pod' " {{${labels_field:? } .name}}" ' test-pod-label'
92
92
93
93
# clean-up
94
- kubectl delete -f hack/testdata/pod.yaml " ${kube_flags[@]} "
94
+ kubectl delete -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
95
95
96
96
# # kubectl apply dry-run on CR
97
97
# Create CRD
98
- kubectl " ${kube_flags_with_token[@]} " create -f - << __EOF__
98
+ kubectl " ${kube_flags_with_token[@]:? } " create -f - << __EOF__
99
99
{
100
100
"kind": "CustomResourceDefinition",
101
101
"apiVersion": "apiextensions.k8s.io/v1beta1",
@@ -117,111 +117,111 @@ run_kubectl_apply_tests() {
117
117
__EOF__
118
118
119
119
# Dry-run create the CR
120
- kubectl " ${kube_flags[@]} " apply --server-dry-run -f hack/testdata/CRD/resource.yaml " ${kube_flags[@]} "
120
+ kubectl " ${kube_flags[@]:? } " apply --server-dry-run -f hack/testdata/CRD/resource.yaml " ${kube_flags[@]:? } "
121
121
# Make sure that the CR doesn't exist
122
- ! kubectl " ${kube_flags[@]} " get resource/myobj
122
+ ! kubectl " ${kube_flags[@]:? } " get resource/myobj
123
123
124
124
# clean-up
125
- kubectl " ${kube_flags[@]} " delete customresourcedefinition resources.mygroup.example.com
125
+ kubectl " ${kube_flags[@]:? } " delete customresourcedefinition resources.mygroup.example.com
126
126
127
127
# # kubectl apply --prune
128
128
# Pre-Condition: no POD exists
129
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
129
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
130
130
131
131
# apply a
132
- kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml " ${kube_flags[@]} "
132
+ kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml " ${kube_flags[@]:? } "
133
133
# check right pod exists
134
- kube::test::get_object_assert ' pods a' " {{${id_field} }}" ' a'
134
+ kube::test::get_object_assert ' pods a' " {{${id_field:? } }}" ' a'
135
135
# check wrong pod doesn't exist
136
- output_message=$( ! kubectl get pods b 2>&1 " ${kube_flags[@]} " )
136
+ output_message=$( ! kubectl get pods b 2>&1 " ${kube_flags[@]:? } " )
137
137
kube::test::if_has_string " ${output_message} " ' pods "b" not found'
138
138
139
139
# apply b
140
- kubectl apply --prune -l prune-group=true -f hack/testdata/prune/b.yaml " ${kube_flags[@]} "
140
+ kubectl apply --prune -l prune-group=true -f hack/testdata/prune/b.yaml " ${kube_flags[@]:? } "
141
141
# check right pod exists
142
- kube::test::get_object_assert ' pods b' " {{${id_field} }}" ' b'
142
+ kube::test::get_object_assert ' pods b' " {{${id_field:? } }}" ' b'
143
143
# check wrong pod doesn't exist
144
- output_message=$( ! kubectl get pods a 2>&1 " ${kube_flags[@]} " )
144
+ output_message=$( ! kubectl get pods a 2>&1 " ${kube_flags[@]:? } " )
145
145
kube::test::if_has_string " ${output_message} " ' pods "a" not found'
146
146
147
147
# cleanup
148
148
kubectl delete pods b
149
149
150
150
# same thing without prune for a sanity check
151
151
# Pre-Condition: no POD exists
152
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
152
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
153
153
154
154
# apply a
155
- kubectl apply -l prune-group=true -f hack/testdata/prune/a.yaml " ${kube_flags[@]} "
155
+ kubectl apply -l prune-group=true -f hack/testdata/prune/a.yaml " ${kube_flags[@]:? } "
156
156
# check right pod exists
157
- kube::test::get_object_assert ' pods a' " {{${id_field} }}" ' a'
157
+ kube::test::get_object_assert ' pods a' " {{${id_field:? } }}" ' a'
158
158
# check wrong pod doesn't exist
159
- output_message=$( ! kubectl get pods b 2>&1 " ${kube_flags[@]} " )
159
+ output_message=$( ! kubectl get pods b 2>&1 " ${kube_flags[@]:? } " )
160
160
kube::test::if_has_string " ${output_message} " ' pods "b" not found'
161
161
162
162
# apply b
163
- kubectl apply -l prune-group=true -f hack/testdata/prune/b.yaml " ${kube_flags[@]} "
163
+ kubectl apply -l prune-group=true -f hack/testdata/prune/b.yaml " ${kube_flags[@]:? } "
164
164
# check both pods exist
165
- kube::test::get_object_assert ' pods a' " {{${id_field} }}" ' a'
166
- kube::test::get_object_assert ' pods b' " {{${id_field} }}" ' b'
165
+ kube::test::get_object_assert ' pods a' " {{${id_field:? } }}" ' a'
166
+ kube::test::get_object_assert ' pods b' " {{${id_field:? } }}" ' b'
167
167
# check wrong pod doesn't exist
168
168
169
169
# cleanup
170
170
kubectl delete pod/a pod/b
171
171
172
172
# # kubectl apply --prune requires a --all flag to select everything
173
- output_message=$( ! kubectl apply --prune -f hack/testdata/prune 2>&1 " ${kube_flags[@]} " )
173
+ output_message=$( ! kubectl apply --prune -f hack/testdata/prune 2>&1 " ${kube_flags[@]:? } " )
174
174
kube::test::if_has_string " ${output_message} " \
175
175
' all resources selected for prune without explicitly passing --all'
176
176
# should apply everything
177
177
kubectl apply --all --prune -f hack/testdata/prune
178
- kube::test::get_object_assert ' pods a' " {{${id_field} }}" ' a'
179
- kube::test::get_object_assert ' pods b' " {{${id_field} }}" ' b'
178
+ kube::test::get_object_assert ' pods a' " {{${id_field:? } }}" ' a'
179
+ kube::test::get_object_assert ' pods b' " {{${id_field:? } }}" ' b'
180
180
kubectl delete pod/a pod/b
181
181
182
182
# # kubectl apply --prune should fallback to delete for non reapable types
183
- kubectl apply --all --prune -f hack/testdata/prune-reap/a.yml 2>&1 " ${kube_flags[@]} "
184
- kube::test::get_object_assert ' pvc a-pvc' " {{${id_field} }}" ' a-pvc'
185
- kubectl apply --all --prune -f hack/testdata/prune-reap/b.yml 2>&1 " ${kube_flags[@]} "
186
- kube::test::get_object_assert ' pvc b-pvc' " {{${id_field} }}" ' b-pvc'
187
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
188
- kubectl delete pvc b-pvc 2>&1 " ${kube_flags[@]} "
183
+ kubectl apply --all --prune -f hack/testdata/prune-reap/a.yml 2>&1 " ${kube_flags[@]:? } "
184
+ kube::test::get_object_assert ' pvc a-pvc' " {{${id_field:? } }}" ' a-pvc'
185
+ kubectl apply --all --prune -f hack/testdata/prune-reap/b.yml 2>&1 " ${kube_flags[@]:? } "
186
+ kube::test::get_object_assert ' pvc b-pvc' " {{${id_field:? } }}" ' b-pvc'
187
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
188
+ kubectl delete pvc b-pvc 2>&1 " ${kube_flags[@]:? } "
189
189
190
190
# # kubectl apply --prune --prune-whitelist
191
191
# Pre-Condition: no POD exists
192
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
192
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
193
193
# apply pod a
194
- kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml " ${kube_flags[@]} "
194
+ kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml " ${kube_flags[@]:? } "
195
195
# check right pod exists
196
- kube::test::get_object_assert ' pods a' " {{${id_field} }}" ' a'
196
+ kube::test::get_object_assert ' pods a' " {{${id_field:? } }}" ' a'
197
197
# apply svc and don't prune pod a by overwriting whitelist
198
- kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml --prune-whitelist core/v1/Service 2>&1 " ${kube_flags[@]} "
199
- kube::test::get_object_assert ' service prune-svc' " {{${id_field} }}" ' prune-svc'
200
- kube::test::get_object_assert ' pods a' " {{${id_field} }}" ' a'
198
+ kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml --prune-whitelist core/v1/Service 2>&1 " ${kube_flags[@]:? } "
199
+ kube::test::get_object_assert ' service prune-svc' " {{${id_field:? } }}" ' prune-svc'
200
+ kube::test::get_object_assert ' pods a' " {{${id_field:? } }}" ' a'
201
201
# apply svc and prune pod a with default whitelist
202
- kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml 2>&1 " ${kube_flags[@]} "
203
- kube::test::get_object_assert ' service prune-svc' " {{${id_field} }}" ' prune-svc'
204
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
202
+ kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml 2>&1 " ${kube_flags[@]:? } "
203
+ kube::test::get_object_assert ' service prune-svc' " {{${id_field:? } }}" ' prune-svc'
204
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
205
205
# cleanup
206
- kubectl delete svc prune-svc 2>&1 " ${kube_flags[@]} "
206
+ kubectl delete svc prune-svc 2>&1 " ${kube_flags[@]:? } "
207
207
208
208
209
209
# # kubectl apply -f some.yml --force
210
210
# Pre-condition: no service exists
211
- kube::test::get_object_assert services " {{range.items}}{{$id_field }}:{{end}}" ' '
211
+ kube::test::get_object_assert services " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
212
212
# apply service a
213
- kubectl apply -f hack/testdata/service-revision1.yaml " ${kube_flags[@]} "
213
+ kubectl apply -f hack/testdata/service-revision1.yaml " ${kube_flags[@]:? } "
214
214
# check right service exists
215
- kube::test::get_object_assert ' services a' " {{${id_field} }}" ' a'
215
+ kube::test::get_object_assert ' services a' " {{${id_field:? } }}" ' a'
216
216
# change immutable field and apply service a
217
- output_message=$( ! kubectl apply -f hack/testdata/service-revision2.yaml 2>&1 " ${kube_flags[@]} " )
217
+ output_message=$( ! kubectl apply -f hack/testdata/service-revision2.yaml 2>&1 " ${kube_flags[@]:? } " )
218
218
kube::test::if_has_string " ${output_message} " ' field is immutable'
219
219
# apply --force to recreate resources for immutable fields
220
- kubectl apply -f hack/testdata/service-revision2.yaml --force " ${kube_flags[@]} "
220
+ kubectl apply -f hack/testdata/service-revision2.yaml --force " ${kube_flags[@]:? } "
221
221
# check immutable field exists
222
222
kube::test::get_object_assert ' services a' " {{.spec.clusterIP}}" ' 10.0.0.12'
223
223
# cleanup
224
- kubectl delete -f hack/testdata/service-revision2.yaml " ${kube_flags[@]} "
224
+ kubectl delete -f hack/testdata/service-revision2.yaml " ${kube_flags[@]:? } "
225
225
226
226
# # kubectl apply -k somedir
227
227
kubectl apply -k hack/testdata/kustomize
@@ -252,31 +252,31 @@ run_kubectl_apply_tests() {
252
252
kube::log::status " Testing kubectl apply --experimental-server-side"
253
253
# # kubectl apply should create the resource that doesn't exist yet
254
254
# Pre-Condition: no POD exists
255
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
255
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
256
256
# Command: apply a pod "test-pod" (doesn't exist) should create this pod
257
- kubectl apply --experimental-server-side -f hack/testdata/pod.yaml " ${kube_flags[@]} "
257
+ kubectl apply --experimental-server-side -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
258
258
# Post-Condition: pod "test-pod" is created
259
- kube::test::get_object_assert ' pods test-pod' " {{${labels_field} .name}}" ' test-pod-label'
259
+ kube::test::get_object_assert ' pods test-pod' " {{${labels_field:? } .name}}" ' test-pod-label'
260
260
# Clean up
261
- kubectl delete pods test-pod " ${kube_flags[@]} "
261
+ kubectl delete pods test-pod " ${kube_flags[@]:? } "
262
262
263
263
# # kubectl apply --server-dry-run
264
264
# Pre-Condition: no POD exists
265
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
265
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
266
266
267
267
# apply dry-run
268
- kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod.yaml " ${kube_flags[@]} "
268
+ kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
269
269
# No pod exists
270
- kube::test::get_object_assert pods " {{range.items}}{{$id_field }}:{{end}}" ' '
270
+ kube::test::get_object_assert pods " {{range.items}}{{${ id_field:? } }}:{{end}}" ' '
271
271
# apply non dry-run creates the pod
272
- kubectl apply --experimental-server-side -f hack/testdata/pod.yaml " ${kube_flags[@]} "
272
+ kubectl apply --experimental-server-side -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
273
273
# apply changes
274
- kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod-apply.yaml " ${kube_flags[@]} "
274
+ kubectl apply --experimental-server-side --server-dry-run -f hack/testdata/pod-apply.yaml " ${kube_flags[@]:? } "
275
275
# Post-Condition: label still has initial value
276
- kube::test::get_object_assert ' pods test-pod' " {{${labels_field} .name}}" ' test-pod-label'
276
+ kube::test::get_object_assert ' pods test-pod' " {{${labels_field:? } .name}}" ' test-pod-label'
277
277
278
278
# clean-up
279
- kubectl delete -f hack/testdata/pod.yaml " ${kube_flags[@]} "
279
+ kubectl delete -f hack/testdata/pod.yaml " ${kube_flags[@]:? } "
280
280
281
281
# # kubectl apply dry-run on CR
282
282
# Create CRD
@@ -302,12 +302,12 @@ run_kubectl_apply_tests() {
302
302
__EOF__
303
303
304
304
# Dry-run create the CR
305
- kubectl " ${kube_flags[@]} " apply --experimental-server-side --server-dry-run -f hack/testdata/CRD/resource.yaml " ${kube_flags[@]} "
305
+ kubectl " ${kube_flags[@]:? } " apply --experimental-server-side --server-dry-run -f hack/testdata/CRD/resource.yaml " ${kube_flags[@]:? } "
306
306
# Make sure that the CR doesn't exist
307
- ! kubectl " ${kube_flags[@]} " get resource/myobj
307
+ ! kubectl " ${kube_flags[@]:? } " get resource/myobj
308
308
309
309
# clean-up
310
- kubectl " ${kube_flags[@]} " delete customresourcedefinition resources.mygroup.example.com
310
+ kubectl " ${kube_flags[@]:? } " delete customresourcedefinition resources.mygroup.example.com
311
311
312
312
set +o nounset
313
313
set +o errexit
0 commit comments