@@ -32,8 +32,8 @@ export WINDOWS_USE_HOST_PROCESS_CONTAINERS=true
32
32
# Deploy the GCE PD CSI Driver if required
33
33
if [[ " ${DEPLOY_GCI_DRIVER:- false} " == " true" ]]; then
34
34
if [[ -n " ${E2E_GOOGLE_APPLICATION_CREDENTIALS:- } " ]]; then
35
- kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " apply -f " ${CLUSTERLOADER_ROOT} " /drivers/gcp-csi-driver-stable.yaml
36
- kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " create secret generic cloud-sa --from-file=cloud-sa.json=" ${E2E_GOOGLE_APPLICATION_CREDENTIALS:- } " -n gce-pd-csi-driver
35
+ kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " apply -n default - f " ${CLUSTERLOADER_ROOT} " /drivers/gcp-csi-driver-stable.yaml
36
+ kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " create secret generic -n default cloud-sa --from-file=cloud-sa.json=" ${E2E_GOOGLE_APPLICATION_CREDENTIALS:- } " -n gce-pd-csi-driver
37
37
else
38
38
echo " Env var E2E_GOOGLE_APPLICATION_CREDENTIALS is unset."
39
39
echo " Falling back to using Application Default Credentials for GCE PD CSI driver deployment."
@@ -56,22 +56,22 @@ if [[ "${DEPLOY_GCI_DRIVER:-false}" == "true" ]]; then
56
56
del(.volumeMounts[] | select(.name == "cloud-sa-volume"))
57
57
)
58
58
)' " ${CLUSTERLOADER_ROOT} " /drivers/gcp-csi-driver-stable.yaml > " ${tmpfile} "
59
- kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " apply -f " ${tmpfile} "
59
+ kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " apply -n default - f " ${tmpfile} "
60
60
rm " ${tmpfile} "
61
61
fi
62
62
kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " wait -n gce-pd-csi-driver deployment csi-gce-pd-controller --for condition=available --timeout=300s
63
63
64
64
# make sure there's a default storage class
65
- names=( $( kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " get sc -o name) )
65
+ names=( $( kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " get -n default sc -o name) )
66
66
i=0
67
67
for name in " ${names[@]} "
68
68
do
69
- if [[ $( kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " get $name -o jsonpath=' {.metadata.annotations.storageclass\.kubernetes\.io/is-default-class}' ) = true ]]; then
69
+ if [[ $( kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " get -n default $name -o jsonpath=' {.metadata.annotations.storageclass\.kubernetes\.io/is-default-class}' ) = true ]]; then
70
70
(( i+= 1 ))
71
71
fi
72
72
done
73
73
if [[ $i < 1 ]]; then
74
- kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " patch storageclass csi-gce-pd -p ' {"metadata": {"annotations":{"storageclass.kubernetes.io/is-default-class":"true"}}}'
74
+ kubectl --kubeconfig " ${CSI_DRIVER_KUBECONFIG} " patch storageclass -n default csi-gce-pd -p ' {"metadata": {"annotations":{"storageclass.kubernetes.io/is-default-class":"true"}}}'
75
75
fi
76
76
fi
77
77
@@ -80,17 +80,17 @@ if [[ "${DEPLOY_AZURE_CSI_DRIVER:-false}" == "true" ]]; then
80
80
fi
81
81
82
82
# Create a dedicated service account for cluster-loader.
83
- cluster_loader_sa_exists=$( kubectl --kubeconfig " ${KUBECONFIG} " get serviceaccount cluster-loader --ignore-not-found | wc -l)
83
+ cluster_loader_sa_exists=$( kubectl --kubeconfig " ${KUBECONFIG} " get serviceaccount -n default cluster-loader --ignore-not-found | wc -l)
84
84
if [[ " $cluster_loader_sa_exists " -eq 0 ]]; then
85
- kubectl --kubeconfig " ${KUBECONFIG} " create serviceaccount cluster-loader
85
+ kubectl --kubeconfig " ${KUBECONFIG} " create serviceaccount -n default cluster-loader
86
86
fi
87
- cluster_loader_crb_exists=$( kubectl --kubeconfig " ${KUBECONFIG} " get clusterrolebinding cluster-loader --ignore-not-found | wc -l)
87
+ cluster_loader_crb_exists=$( kubectl --kubeconfig " ${KUBECONFIG} " get clusterrolebinding -n default cluster-loader --ignore-not-found | wc -l)
88
88
if [[ " $cluster_loader_crb_exists " -eq 0 ]]; then
89
- kubectl --kubeconfig " ${KUBECONFIG} " create clusterrolebinding cluster-loader --clusterrole=cluster-admin --serviceaccount=default:cluster-loader
89
+ kubectl --kubeconfig " ${KUBECONFIG} " create clusterrolebinding -n default cluster-loader --clusterrole=cluster-admin --serviceaccount=default:cluster-loader
90
90
fi
91
- cluster_loader_secret_exists=$( kubectl --kubeconfig " ${KUBECONFIG} " get secret cluster-loader --ignore-not-found | wc -l)
91
+ cluster_loader_secret_exists=$( kubectl --kubeconfig " ${KUBECONFIG} " get secret -n default cluster-loader --ignore-not-found | wc -l)
92
92
if [[ " $cluster_loader_secret_exists " -eq 0 ]]; then
93
- cat << EOF | kubectl --kubeconfig "${KUBECONFIG} " create -f -
93
+ cat << EOF | kubectl --kubeconfig "${KUBECONFIG} " create -n default - f -
94
94
apiVersion: v1
95
95
kind: Secret
96
96
metadata:
105
105
106
106
# Create a kubeconfig to use the above service account.
107
107
kubeconfig=$( mktemp)
108
- server=$( kubectl --kubeconfig " ${KUBECONFIG} " config view -o jsonpath=' {.clusters[0].cluster.server}' )
109
- ca=$( kubectl --kubeconfig " ${KUBECONFIG} " get secret cluster-loader -o jsonpath=' {.data.ca\.crt}' )
110
- token=$( kubectl --kubeconfig " ${KUBECONFIG} " get secret cluster-loader -o jsonpath=' {.data.token}' | base64 --decode)
108
+ server=$( kubectl --kubeconfig " ${KUBECONFIG} " config -n default view -o jsonpath=' {.clusters[0].cluster.server}' )
109
+ ca=$( kubectl --kubeconfig " ${KUBECONFIG} " get secret -n default cluster-loader -o jsonpath=' {.data.ca\.crt}' )
110
+ token=$( kubectl --kubeconfig " ${KUBECONFIG} " get secret -n default cluster-loader -o jsonpath=' {.data.token}' | base64 --decode)
111
111
echo "
112
112
apiVersion: v1
113
113
kind: Config
0 commit comments