Skip to content

Commit a3e7337

Browse files
committed
COSI-75: re-organize-greenfield-custom-resources
1 parent 921135b commit a3e7337

File tree

9 files changed

+13
-13
lines changed

9 files changed

+13
-13
lines changed

.github/scripts/cleanup_cosi_resources.sh

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,12 +52,12 @@ for BUCKET_NAME in $BUCKET_NAMES; do
5252
done
5353

5454
log_and_run echo "Deleting Bucket Access Class..."
55-
log_and_run kubectl delete -f cosi-examples/bucketaccessclass.yaml --all || { echo "No BucketAccessClass resources found." | tee -a "$LOG_FILE"; }
55+
log_and_run kubectl delete -f cosi-examples/greenfield/bucketaccessclass.yaml --all || { echo "No BucketAccessClass resources found." | tee -a "$LOG_FILE"; }
5656

5757
log_and_run echo "Deleting Bucket Class and Bucket Claim..."
58-
log_and_run kubectl delete -f cosi-examples/bucketclass.yaml || { echo "Bucket Class not found." | tee -a "$LOG_FILE"; }
59-
log_and_run kubectl delete -f cosi-examples/bucketclaim.yaml || { echo "Bucket Claim not found." | tee -a "$LOG_FILE"; }
60-
log_and_run kubectl delete -f cosi-examples/bucketclass-delete-on-claim-removal.yaml || { echo "Bucket Class not found." | tee -a "$LOG_FILE"; }
58+
log_and_run kubectl delete -f cosi-examples/greenfield/bucketclass.yaml || { echo "Bucket Class not found." | tee -a "$LOG_FILE"; }
59+
log_and_run kubectl delete -f cosi-examples/greenfield/bucketclaim.yaml || { echo "Bucket Claim not found." | tee -a "$LOG_FILE"; }
60+
log_and_run kubectl delete -f cosi-examples/greenfield/bucketclass-deletion-policy.yaml || { echo "Bucket Class not found." | tee -a "$LOG_FILE"; }
6161

6262
log_and_run echo "Deleting s3-secret-for-cosi secret..."
6363
log_and_run kubectl delete secret s3-secret-for-cosi --namespace=default || { echo "Secret s3-secret-for-cosi not found." | tee -a "$LOG_FILE"; }

.github/scripts/e2e_tests_greenfield_use_case.sh

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -83,19 +83,19 @@ EOF
8383

8484
# Step 4: Apply Bucket Class
8585
log_and_run echo "Applying Bucket Class..."
86-
log_and_run kubectl apply -f cosi-examples/bucketclass.yaml
86+
log_and_run kubectl apply -f cosi-examples/greenfield/bucketclass.yaml
8787

8888
# Step 5: Apply Bucket Claim
8989
log_and_run echo "Applying Bucket Claim..."
90-
log_and_run kubectl apply -f cosi-examples/bucketclaim.yaml
90+
log_and_run kubectl apply -f cosi-examples/greenfield/bucketclaim.yaml
9191

9292
# Step 6: Apply Bucket Access Class
9393
log_and_run echo "Applying Bucket Access Class..."
94-
log_and_run kubectl apply -f cosi-examples/bucketaccessclass.yaml
94+
log_and_run kubectl apply -f cosi-examples/greenfield/bucketaccessclass.yaml
9595

9696
# Step 7: Apply Bucket Access
9797
log_and_run echo "Applying Bucket Access..."
98-
log_and_run kubectl apply -f cosi-examples/bucketaccess.yaml
98+
log_and_run kubectl apply -f cosi-examples/greenfield/bucketaccess.yaml
9999

100100
# Step 8: Verify Bucket Creation with Retry
101101
log_and_run echo "Listing all S3 buckets before verification..."
@@ -213,7 +213,7 @@ fi
213213

214214
# Step 11: Delete Bucket Access Resource
215215
log_and_run echo "Deleting Bucket Access Resource..."
216-
log_and_run kubectl delete -f cosi-examples/bucketaccess.yaml
216+
log_and_run kubectl delete -f cosi-examples/greenfield/bucketaccess.yaml
217217

218218
# Step 12: Verify IAM User Deletion
219219
log_and_run echo "Verifying IAM user '$IAM_USER_NAME' deletion..."
@@ -230,8 +230,8 @@ fi
230230
# Step 13: Test deletion bucket with deletion policy set
231231

232232
log_and_run echo "Applying Bucket Class with deletion policy and respective Bucket Claim..."
233-
log_and_run kubectl apply -f cosi-examples/bucketclass-deletion-policy.yaml
234-
log_and_run kubectl apply -f cosi-examples/bucketclaim-deletion-policy.yaml
233+
log_and_run kubectl apply -f cosi-examples/greenfield/bucketclass-deletion-policy.yaml
234+
log_and_run kubectl apply -f cosi-examples/greenfield/bucketclaim-deletion-policy.yaml
235235

236236
log_and_run echo "Listing all S3 buckets before deletion..."
237237
log_and_run aws s3 ls --endpoint-url "$S3_ENDPOINT"
@@ -259,7 +259,7 @@ if [ -z "$BUCKET_TO_BE_DELETED" ]; then
259259
fi
260260

261261
log_and_run echo "Deleting Bucket Claim..."
262-
log_and_run kubectl delete -f cosi-examples/bucketclaim-deletion-policy.yaml
262+
log_and_run kubectl delete -f cosi-examples/greenfield/bucketclaim-deletion-policy.yaml
263263

264264
# Check if the bucket with name $BUCKET_TO_BE_DELETED exists by doing a head bucket.
265265
# If bucket exists, retry with ATTEMPTS and DELAY. If bucket is not found, test success.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

docs/driver-params.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ The table below details the configuration parameters for BucketClass, which dete
99
| `objectStorageSecretName` | The name of the Kubernetes secret containing S3 credentials and configuration. | `string` | Yes |
1010
| `objectStorageSecretNamespace` | The namespace in which the secret is located (e.g., `default`). | `string` (e.g., `default`) | Yes |
1111

12-
[Example](../cosi-examples/bucketclass.yaml)
12+
[Example](../cosi-examples/greenfield/bucketclass.yaml)
1313

1414
## Configuration Parameters for Kubernetes secret containing S3 credentials and configuration
1515

0 commit comments

Comments
 (0)