Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit e8800aa

Browse files
committedJan 14, 2025··
Set namespace to default for kubectl apply commands in CL2 run-e2e.sh
1 parent 664eb9f commit e8800aa

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed
 

‎clusterloader2/run-e2e.sh

+15-15
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ export WINDOWS_USE_HOST_PROCESS_CONTAINERS=true
3232
# Deploy the GCE PD CSI Driver if required
3333
if [[ "${DEPLOY_GCI_DRIVER:-false}" == "true" ]]; then
3434
if [[ -n "${E2E_GOOGLE_APPLICATION_CREDENTIALS:-}" ]]; then
35-
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" apply -f "${CLUSTERLOADER_ROOT}"/drivers/gcp-csi-driver-stable.yaml
36-
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" create secret generic cloud-sa --from-file=cloud-sa.json="${E2E_GOOGLE_APPLICATION_CREDENTIALS:-}" -n gce-pd-csi-driver
35+
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" apply -n default -f "${CLUSTERLOADER_ROOT}"/drivers/gcp-csi-driver-stable.yaml
36+
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" create secret generic -n default cloud-sa --from-file=cloud-sa.json="${E2E_GOOGLE_APPLICATION_CREDENTIALS:-}" -n gce-pd-csi-driver
3737
else
3838
echo "Env var E2E_GOOGLE_APPLICATION_CREDENTIALS is unset."
3939
echo "Falling back to using Application Default Credentials for GCE PD CSI driver deployment."
@@ -56,22 +56,22 @@ if [[ "${DEPLOY_GCI_DRIVER:-false}" == "true" ]]; then
5656
del(.volumeMounts[] | select(.name == "cloud-sa-volume"))
5757
)
5858
)' "${CLUSTERLOADER_ROOT}"/drivers/gcp-csi-driver-stable.yaml > "${tmpfile}"
59-
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" apply -f "${tmpfile}"
59+
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" apply -n default -f "${tmpfile}"
6060
rm "${tmpfile}"
6161
fi
6262
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" wait -n gce-pd-csi-driver deployment csi-gce-pd-controller --for condition=available --timeout=300s
6363

6464
# make sure there's a default storage class
65-
names=( $(kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" get sc -o name) )
65+
names=( $(kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" get -n default sc -o name) )
6666
i=0
6767
for name in "${names[@]}"
6868
do
69-
if [[ $(kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" get $name -o jsonpath='{.metadata.annotations.storageclass\.kubernetes\.io/is-default-class}') = true ]]; then
69+
if [[ $(kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" get -n default $name -o jsonpath='{.metadata.annotations.storageclass\.kubernetes\.io/is-default-class}') = true ]]; then
7070
((i+=1))
7171
fi
7272
done
7373
if [[ $i < 1 ]]; then
74-
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" patch storageclass csi-gce-pd -p '{"metadata": {"annotations":{"storageclass.kubernetes.io/is-default-class":"true"}}}'
74+
kubectl --kubeconfig "${CSI_DRIVER_KUBECONFIG}" patch storageclass -n default csi-gce-pd -p '{"metadata": {"annotations":{"storageclass.kubernetes.io/is-default-class":"true"}}}'
7575
fi
7676
fi
7777

@@ -80,17 +80,17 @@ if [[ "${DEPLOY_AZURE_CSI_DRIVER:-false}" == "true" ]]; then
8080
fi
8181

8282
# Create a dedicated service account for cluster-loader.
83-
cluster_loader_sa_exists=$(kubectl --kubeconfig "${KUBECONFIG}" get serviceaccount cluster-loader --ignore-not-found | wc -l)
83+
cluster_loader_sa_exists=$(kubectl --kubeconfig "${KUBECONFIG}" get serviceaccount -n default cluster-loader --ignore-not-found | wc -l)
8484
if [[ "$cluster_loader_sa_exists" -eq 0 ]]; then
85-
kubectl --kubeconfig "${KUBECONFIG}" create serviceaccount cluster-loader
85+
kubectl --kubeconfig "${KUBECONFIG}" create serviceaccount -n default cluster-loader
8686
fi
87-
cluster_loader_crb_exists=$(kubectl --kubeconfig "${KUBECONFIG}" get clusterrolebinding cluster-loader --ignore-not-found | wc -l)
87+
cluster_loader_crb_exists=$(kubectl --kubeconfig "${KUBECONFIG}" get clusterrolebinding -n default cluster-loader --ignore-not-found | wc -l)
8888
if [[ "$cluster_loader_crb_exists" -eq 0 ]]; then
89-
kubectl --kubeconfig "${KUBECONFIG}" create clusterrolebinding cluster-loader --clusterrole=cluster-admin --serviceaccount=default:cluster-loader
89+
kubectl --kubeconfig "${KUBECONFIG}" create clusterrolebinding -n default cluster-loader --clusterrole=cluster-admin --serviceaccount=default:cluster-loader
9090
fi
91-
cluster_loader_secret_exists=$(kubectl --kubeconfig "${KUBECONFIG}" get secret cluster-loader --ignore-not-found | wc -l)
91+
cluster_loader_secret_exists=$(kubectl --kubeconfig "${KUBECONFIG}" get secret -n default cluster-loader --ignore-not-found | wc -l)
9292
if [[ "$cluster_loader_secret_exists" -eq 0 ]]; then
93-
cat << EOF | kubectl --kubeconfig "${KUBECONFIG}" create -f -
93+
cat << EOF | kubectl --kubeconfig "${KUBECONFIG}" create -n default -f -
9494
apiVersion: v1
9595
kind: Secret
9696
metadata:
@@ -105,9 +105,9 @@ fi
105105

106106
# Create a kubeconfig to use the above service account.
107107
kubeconfig=$(mktemp)
108-
server=$(kubectl --kubeconfig "${KUBECONFIG}" config view -o jsonpath='{.clusters[0].cluster.server}')
109-
ca=$(kubectl --kubeconfig "${KUBECONFIG}" get secret cluster-loader -o jsonpath='{.data.ca\.crt}')
110-
token=$(kubectl --kubeconfig "${KUBECONFIG}" get secret cluster-loader -o jsonpath='{.data.token}' | base64 --decode)
108+
server=$(kubectl --kubeconfig "${KUBECONFIG}" config -n default view -o jsonpath='{.clusters[0].cluster.server}')
109+
ca=$(kubectl --kubeconfig "${KUBECONFIG}" get secret -n default cluster-loader -o jsonpath='{.data.ca\.crt}')
110+
token=$(kubectl --kubeconfig "${KUBECONFIG}" get secret -n default cluster-loader -o jsonpath='{.data.token}' | base64 --decode)
111111
echo "
112112
apiVersion: v1
113113
kind: Config

0 commit comments

Comments
 (0)
Please sign in to comment.