Fix kops binary references in keypair rotation scenario

This commit is contained in:
Peter Rifel 2021-07-17 15:46:00 -07:00
parent aad209df8c
commit df8b3a750f
No known key found for this signature in database
GPG Key ID: BC6469E5B16DB2B6
1 changed files with 15 additions and 15 deletions

View File

@ -17,30 +17,30 @@
REPO_ROOT=$(git rev-parse --show-toplevel); REPO_ROOT=$(git rev-parse --show-toplevel);
source "${REPO_ROOT}"/tests/e2e/scenarios/lib/common.sh source "${REPO_ROOT}"/tests/e2e/scenarios/lib/common.sh
kops-acquire-latest KOPS=$(kops-acquire-latest)
kops-up kops-up
REPORT_DIR="${ARTIFACTS:-$(pwd)/_artifacts}/keypair-rotation/" REPORT_DIR="${ARTIFACTS:-$(pwd)/_artifacts}/keypair-rotation/"
kops create keypair all ${KOPS} create keypair all
kops update cluster --yes ${KOPS} update cluster --yes
kops rolling-update cluster --yes --validate-count=10 ${KOPS} rolling-update cluster --yes --validate-count=10
KUBECFG_CREATE=$(mktemp -t kubeconfig.XXXXXXXXX) KUBECFG_CREATE=$(mktemp -t kubeconfig.XXXXXXXXX)
kops export kubecfg --admin --kubeconfig="${KUBECFG_CREATE}" ${KOPS} export kubecfg --admin --kubeconfig="${KUBECFG_CREATE}"
kubectl --kubeconfig="${KUBECFG_CREATE}" config view > "${REPORT_DIR}/create.kubeconfig" kubectl --kubeconfig="${KUBECFG_CREATE}" config view > "${REPORT_DIR}/create.kubeconfig"
# Confirm the first kubeconfig still works # Confirm the first kubeconfig still works
kops validate cluster --wait=10m --count=3 ${KOPS} validate cluster --wait=10m --count=3
export KUBECONFIG="${KUBECFG_CREATE}" export KUBECONFIG="${KUBECFG_CREATE}"
kops promote keypair all ${KOPS} promote keypair all
kops update cluster --yes ${KOPS} update cluster --yes
kops rolling-update cluster --yes --validate-count=10 ${KOPS} rolling-update cluster --yes --validate-count=10
KUBECFG_PROMOTE=$(mktemp -t kubeconfig.XXXXXXXXX) KUBECFG_PROMOTE=$(mktemp -t kubeconfig.XXXXXXXXX)
kops export kubecfg --admin --kubeconfig="${KUBECFG_PROMOTE}" ${KOPS} export kubecfg --admin --kubeconfig="${KUBECFG_PROMOTE}"
kubectl --kubeconfig="${KUBECFG_PROMOTE}" config view > "${REPORT_DIR}/promote.kubeconfig" kubectl --kubeconfig="${KUBECFG_PROMOTE}" config view > "${REPORT_DIR}/promote.kubeconfig"
CA=$(kubectl --kubeconfig="${KUBECFG_PROMOTE}" config view --raw -o jsonpath="{.clusters[0].cluster.certificate-authority-data}" | base64 -D) CA=$(kubectl --kubeconfig="${KUBECFG_PROMOTE}" config view --raw -o jsonpath="{.clusters[0].cluster.certificate-authority-data}" | base64 -D)
@ -50,13 +50,13 @@ if [ "$(echo "${CA}" | grep -c "BEGIN CERTIFICATE")" != "1" ]; then
fi fi
export KUBECONFIG="${KUBECFG_PROMOTE}" export KUBECONFIG="${KUBECFG_PROMOTE}"
kops distrust keypair all ${KOPS} distrust keypair all
kops update cluster --yes ${KOPS} update cluster --yes
kops rolling-update cluster --yes --validate-count=10 ${KOPS} rolling-update cluster --yes --validate-count=10
KUBECFG_DISTRUST=$(mktemp -t kubeconfig.XXXXXXXXX) KUBECFG_DISTRUST=$(mktemp -t kubeconfig.XXXXXXXXX)
kops export kubecfg --admin --kubeconfig="${KUBECFG_DISTRUST}" ${KOPS} export kubecfg --admin --kubeconfig="${KUBECFG_DISTRUST}"
kubectl --kubeconfig="${KUBECFG_DISTRUST}" config view > "${REPORT_DIR}/distrust.kubeconfig" kubectl --kubeconfig="${KUBECFG_DISTRUST}" config view > "${REPORT_DIR}/distrust.kubeconfig"
export KUBECONFIG="${KUBECFG_DISTRUST}" export KUBECONFIG="${KUBECFG_DISTRUST}"
kops validate cluster --wait=10m --count=3 ${KOPS} validate cluster --wait=10m --count=3