Skip to content
This repository has been archived by the owner on Aug 25, 2021. It is now read-only.

Commit

Permalink
wip: openshift
Browse files Browse the repository at this point in the history
  • Loading branch information
ishustava committed Sep 4, 2020
1 parent 17ed14c commit a1bd018
Show file tree
Hide file tree
Showing 5 changed files with 18 additions and 40 deletions.
7 changes: 0 additions & 7 deletions templates/server-acl-init-cleanup-job.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52,13 +52,6 @@ spec:
- delete-completed-job
- -k8s-namespace={{ .Release.Namespace }}
- {{ template "consul.fullname" . }}-server-acl-init
resources:
requests:
memory: "25Mi"
cpu: "50m"
limits:
memory: "25Mi"
cpu: "50m"
{{- end }}
{{- end }}
{{- end }}
7 changes: 0 additions & 7 deletions templates/server-acl-init-job.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -233,13 +233,6 @@ spec:
{{- end }}
{{- end }}
resources:
requests:
memory: "25Mi"
cpu: "50m"
limits:
memory: "25Mi"
cpu: "50m"
{{- end }}
{{- end }}
{{- end }}
7 changes: 0 additions & 7 deletions templates/tls-init-cleanup-job.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52,12 +52,5 @@ spec:
curl -s -X DELETE --cacert /var/run/secrets/kubernetes.io/serviceaccount/ca.crt \
https://${KUBERNETES_SERVICE_HOST}:${KUBERNETES_SERVICE_PORT}/api/v1/namespaces/${NAMESPACE}/secrets/{{ template "consul.fullname" . }}-server-cert \
-H "Authorization: Bearer $( cat /var/run/secrets/kubernetes.io/serviceaccount/token )"
resources:
requests:
memory: "25Mi"
cpu: "50m"
limits:
memory: "25Mi"
cpu: "50m"
{{- end }}
{{- end }}
7 changes: 0 additions & 7 deletions templates/tls-init-job.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -114,12 +114,5 @@ spec:
mountPath: /consul/tls/ca/key
readOnly: true
{{- end }}
resources:
requests:
memory: "25Mi"
cpu: "50m"
limits:
memory: "25Mi"
cpu: "50m"
{{- end }}
{{- end }}
30 changes: 18 additions & 12 deletions test/acceptance/framework/consul_cluster.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ import (
"github.com/hashicorp/consul/api"
"github.com/hashicorp/consul/sdk/freeport"
"github.com/stretchr/testify/require"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
)
Expand Down Expand Up @@ -91,7 +92,8 @@ func (h *HelmCluster) Create(t *testing.T) {
// Fail if there are any existing installations of the Helm chart.
h.checkForPriorInstallations(t)

helm.Install(t, h.helmOptions, helmChartPath, h.releaseName)
err := helm.InstallE(t, h.helmOptions, helmChartPath, h.releaseName)
require.NoError(t, err)

helpers.WaitForAllPodsToBeReady(t, h.kubernetesClient, h.helmOptions.KubectlOptions.Namespace, fmt.Sprintf("release=%s", h.releaseName))
}
Expand All @@ -106,23 +108,27 @@ func (h *HelmCluster) Destroy(t *testing.T) {
// delete PVCs
h.kubernetesClient.CoreV1().PersistentVolumeClaims(h.helmOptions.KubectlOptions.Namespace).DeleteCollection(&metav1.DeleteOptions{}, metav1.ListOptions{LabelSelector: "release=" + h.releaseName})

// delete any secrets that have h.releaseName in their name
secrets, err := h.kubernetesClient.CoreV1().Secrets(h.helmOptions.KubectlOptions.Namespace).List(metav1.ListOptions{})
require.NoError(t, err)
for _, secret := range secrets.Items {
if strings.Contains(secret.Name, h.releaseName) {
err := h.kubernetesClient.CoreV1().Secrets(h.helmOptions.KubectlOptions.Namespace).Delete(secret.Name, nil)
require.NoError(t, err)
}
}

// delete any serviceaccounts that have h.releaseName in their name
sas, err := h.kubernetesClient.CoreV1().ServiceAccounts(h.helmOptions.KubectlOptions.Namespace).List(metav1.ListOptions{})
require.NoError(t, err)
for _, sa := range sas.Items {
if strings.Contains(sa.Name, h.releaseName) {
err := h.kubernetesClient.CoreV1().ServiceAccounts(h.helmOptions.KubectlOptions.Namespace).Delete(sa.Name, nil)
require.NoError(t, err)
if !errors.IsNotFound(err) {
require.NoError(t, err)
}
}
}

// delete any secrets that have h.releaseName in their name
secrets, err := h.kubernetesClient.CoreV1().Secrets(h.helmOptions.KubectlOptions.Namespace).List(metav1.ListOptions{})
require.NoError(t, err)
for _, secret := range secrets.Items {
if strings.Contains(secret.Name, h.releaseName) {
err := h.kubernetesClient.CoreV1().Secrets(h.helmOptions.KubectlOptions.Namespace).Delete(secret.Name, nil)
if !errors.IsNotFound(err) {
require.NoError(t, err)
}
}
}
}
Expand Down

0 comments on commit a1bd018

Please sign in to comment.