@@ -617,7 +617,7 @@ wait_for_delete() {
617617 let retry+=1
618618 if [ $retry -ge $wait_time ]; then
619619 collect_k8s_logs
620- kubectl_bin logs ${OPERATOR_NS: +-n $OPERATOR_NS } $( get_operator_pod) \
620+ kubectl logs ${OPERATOR_NS: +-n $OPERATOR_NS } $( get_operator_pod) \
621621 | grep -v ' level=info' \
622622 | grep -v ' level=debug' \
623623 | grep -v ' Getting tasks for pod' \
@@ -906,21 +906,21 @@ deploy_cert_manager() {
906906delete_crd () {
907907 desc ' get and delete old CRDs and RBAC'
908908
909- kubectl_bin delete -f " ${src_dir} /deploy/crd.yaml" --ignore-not-found --wait=false || :
909+ kubectl delete -f " ${src_dir} /deploy/crd.yaml" --ignore-not-found --wait=false || :
910910 for crd_name in $( yq eval ' .metadata.name' " ${src_dir} /deploy/crd.yaml" | grep -v ' \-\-\-' ) ; do
911911 kubectl get ${crd_name} --all-namespaces -o wide \
912912 | grep -v ' NAMESPACE' \
913913 | xargs -L 1 sh -xc ' kubectl patch ' ${crd_name} ' -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' \
914914 || :
915- kubectl_bin wait --for=delete crd ${crd_name} || :
915+ kubectl wait --for=delete crd ${crd_name} || :
916916 done
917917
918918 local rbac_yaml=' rbac.yaml'
919919 if [ -n " ${OPERATOR_NS} " ]; then
920920 rbac_yaml=' cw-rbac.yaml'
921921 fi
922922
923- kubectl_bin delete -f " ${src_dir} /deploy/$rbac_yaml " --ignore-not-found || true
923+ kubectl delete -f " ${src_dir} /deploy/$rbac_yaml " --ignore-not-found || true
924924}
925925
926926destroy () {
@@ -929,7 +929,7 @@ destroy() {
929929
930930 desc ' destroy cluster/operator and all other resources'
931931 if [ ${ignore_logs} == " false" ] && [ " ${DEBUG_TESTS} " == 1 ]; then
932- kubectl_bin logs ${OPERATOR_NS: +-n $OPERATOR_NS } $( get_operator_pod) \
932+ kubectl logs ${OPERATOR_NS: +-n $OPERATOR_NS } $( get_operator_pod) \
933933 | grep -v ' level=info' \
934934 | grep -v ' level=debug' \
935935 | grep -v ' Getting tasks for pod' \
@@ -952,9 +952,9 @@ destroy() {
952952 oc delete --grace-period=0 --force=true project " $OPERATOR_NS " &
953953 fi
954954 else
955- kubectl_bin delete --grace-period=0 --force=true namespace " $namespace " &
955+ kubectl delete --grace-period=0 --force=true namespace " $namespace " &
956956 if [ -n " $OPERATOR_NS " ]; then
957- kubectl_bin delete --grace-period=0 --force=true namespace " $OPERATOR_NS " &
957+ kubectl delete --grace-period=0 --force=true namespace " $OPERATOR_NS " &
958958 fi
959959 fi
960960 rm -rf ${tmp_dir}
@@ -1257,7 +1257,7 @@ check_crd_for_deletion() {
12571257 local git_tag=" $1 "
12581258
12591259 for crd_name in $( curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag} /deploy/crd.yaml | yq eval ' .metadata.name' | $sed ' s/---//g' | $sed ' :a;N;$!ba;s/\n/ /g' ) ; do
1260- if [[ $( kubectl_bin get crd/${crd_name} -o jsonpath=' {.status.conditions[-1].type}' ) == " Terminating" ]]; then
1260+ if [[ $( kubectl get crd/${crd_name} -o jsonpath=' {.status.conditions[-1].type}' ) == " Terminating" ]]; then
12611261 kubectl get ${crd_name} --all-namespaces -o wide \
12621262 | grep -v ' NAMESPACE' \
12631263 | xargs -L 1 sh -xc ' kubectl patch ' ${crd_name} ' -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' \
@@ -1335,39 +1335,39 @@ collect_k8s_logs() {
13351335 mkdir -p ${logs_path}
13361336
13371337 for ns in ${check_namespaces} ; do
1338- local pods=$( kubectl_bin get pods -n " ${ns} " -o name | awk -F " /" ' {print $2}' )
1338+ local pods=$( kubectl get pods -n " ${ns} " -o name | awk -F " /" ' {print $2}' )
13391339 for p in ${pods} ; do
1340- kubectl_bin -n " ${ns} " describe pod ${p} > ${logs_path} /pod_${ns} _${p} .dsc || :
1341- local containers=$( kubectl_bin -n " ${ns} " get pod ${p} -o jsonpath=' {.spec.containers[*].name}' )
1340+ kubectl -n " ${ns} " describe pod ${p} > ${logs_path} /pod_${ns} _${p} .dsc || :
1341+ local containers=$( kubectl -n " ${ns} " get pod ${p} -o jsonpath=' {.spec.containers[*].name}' )
13421342 for c in ${containers} ; do
1343- kubectl_bin -n " ${ns} " logs ${p} -c ${c} > ${logs_path} /container_${p} _${c} .log || :
1343+ kubectl -n " ${ns} " logs ${p} -c ${c} > ${logs_path} /container_${p} _${c} .log || :
13441344 echo " logs saved in: ${logs_path} /${ns} _${p} _${c} .log"
13451345 done
13461346 done
13471347 done
13481348 for object in psmdb psmdb-backup psmdb-restore pods deployments replicasets services sts configmaps persistentvolumeclaims persistentvolumes secrets roles issuer certificate; do
13491349 echo " ##### START: ${object} NS: ${namespace} #####" >> ${logs_path} /_overview_${namespace} .txt
1350- kubectl_bin get ${object} -n " ${namespace} " >> ${logs_path} /_overview_${namespace} .txt || :
1350+ kubectl get ${object} -n " ${namespace} " >> ${logs_path} /_overview_${namespace} .txt || :
13511351 echo -e " ##### END: ${object} NS: ${namespace} #####\n" >> ${logs_path} /_overview_${namespace} .txt
1352- kubectl_bin get ${object} -n " ${namespace} " -oyaml > ${logs_path} /${object} _${namespace} .yaml || :
1353- kubectl_bin describe ${object} -n " ${namespace} " > ${logs_path} /${object} _${namespace} .dsc || :
1352+ kubectl get ${object} -n " ${namespace} " -oyaml > ${logs_path} /${object} _${namespace} .yaml || :
1353+ kubectl describe ${object} -n " ${namespace} " > ${logs_path} /${object} _${namespace} .dsc || :
13541354 done
1355- kubectl_bin get events --all-namespaces > ${logs_path} /_events.log || :
1356- kubectl_bin get nodes > ${logs_path} /_nodes.log || :
1357- kubectl_bin get clusterroles > ${logs_path} /_clusterroles.log || :
1355+ kubectl get events --all-namespaces > ${logs_path} /_events.log || :
1356+ kubectl get nodes > ${logs_path} /_nodes.log || :
1357+ kubectl get clusterroles > ${logs_path} /_clusterroles.log || :
13581358
13591359 local secret psmdb_secret psmdb_user psmdb_pass
1360- for psmdb_name in " $( kubectl_bin get psmdb -n ${namespace} -o custom-columns=NAME:.metadata.name --no-headers=true) " ; do
1361- psmdb_secret=" $( kubectl_bin get psmdb ${psmdb_name} -n ${namespace} -ojsonpath=' {.spec.secrets.users}' ) "
1360+ for psmdb_name in " $( kubectl get psmdb -n ${namespace} -o custom-columns=NAME:.metadata.name --no-headers=true) " ; do
1361+ psmdb_secret=" $( kubectl get psmdb ${psmdb_name} -n ${namespace} -ojsonpath=' {.spec.secrets.users}' ) "
13621362 if [[ ${psmdb_secret} ]]; then secret=" ${psmdb_secret} " ; else secret=" ${psmdb_name} -secrets" ; fi
1363- psmdb_user=" $( kubectl_bin get secrets ${psmdb_secret} -ojsonpath=' {.data.MONGODB_BACKUP_USER}' | base64 --decode) "
1364- psmdb_pass=" $( kubectl_bin get secrets ${psmdb_secret} -ojsonpath=' {.data.MONGODB_BACKUP_PASSWORD}' | base64 --decode) "
1365- if [[ " $( kubectl_bin get psmdb ${psmdb_name} -n ${namespace} -ojsonpath=' {.spec.sharding.enabled}' ) " == " true" ]]; then
1363+ psmdb_user=" $( kubectl get secrets ${psmdb_secret} -ojsonpath=' {.data.MONGODB_BACKUP_USER}' | base64 --decode) "
1364+ psmdb_pass=" $( kubectl get secrets ${psmdb_secret} -ojsonpath=' {.data.MONGODB_BACKUP_PASSWORD}' | base64 --decode) "
1365+ if [[ " $( kubectl get psmdb ${psmdb_name} -n ${namespace} -ojsonpath=' {.spec.sharding.enabled}' ) " == " true" ]]; then
13661366 local cfg_replica=" cfg"
13671367 echo " ##### sh.status() #####" > ${logs_path} /mongos_${psmdb_name} .mongo
13681368 run_mongos ' sh.status()' " ${psmdb_user} :${psmdb_pass} @${psmdb_name} -mongos.${namespace} " >> ${logs_path} /mongos_${psmdb_name} .mongo
13691369 fi
1370- for psmdb_replset in $( kubectl_bin get psmdb ${psmdb_name} -n ${namespace} -ojsonpath=' {.spec.replsets[*].name}' | awk ' {print $0" ' ${cfg_replica} ' "}' ) ; do
1370+ for psmdb_replset in $( kubectl get psmdb ${psmdb_name} -n ${namespace} -ojsonpath=' {.spec.replsets[*].name}' | awk ' {print $0" ' ${cfg_replica} ' "}' ) ; do
13711371 local command=(" rs.status()" " rs.config()" " db.printSlaveReplicationInfo()" " db.serverCmdLineOpts()" " db.getRoles()" " db.getUsers()" )
13721372 for com in " ${command[@]} " ; do
13731373 echo " ##### START: ${com} #####" >> ${logs_path} /mongodb_${psmdb_name} _${psmdb_replset} .mongo
0 commit comments