mirror of https://github.com/knative/pkg.git
Drop Client as it is only used in tests (#2203)
This commit is contained in:
parent
bb4aaf09c4
commit
c367a9d696
|
@ -33,6 +33,7 @@ import (
|
||||||
admissionv1 "k8s.io/api/admission/v1"
|
admissionv1 "k8s.io/api/admission/v1"
|
||||||
authenticationv1 "k8s.io/api/authentication/v1"
|
authenticationv1 "k8s.io/api/authentication/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
kubeclient "knative.dev/pkg/client/injection/kube/client/fake"
|
||||||
"knative.dev/pkg/metrics/metricstest"
|
"knative.dev/pkg/metrics/metricstest"
|
||||||
_ "knative.dev/pkg/metrics/testing"
|
_ "knative.dev/pkg/metrics/testing"
|
||||||
)
|
)
|
||||||
|
@ -84,7 +85,7 @@ func TestAdmissionValidResponseForResource(t *testing.T) {
|
||||||
if pollErr != nil {
|
if pollErr != nil {
|
||||||
t.Fatal("waitForServerAvailable() =", err)
|
t.Fatal("waitForServerAvailable() =", err)
|
||||||
}
|
}
|
||||||
tlsClient, err := createSecureTLSClient(t, wh.Client, &wh.Options)
|
tlsClient, err := createSecureTLSClient(t, kubeclient.Get(ctx), &wh.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("createSecureTLSClient() =", err)
|
t.Fatal("createSecureTLSClient() =", err)
|
||||||
}
|
}
|
||||||
|
@ -214,7 +215,7 @@ func TestAdmissionInvalidResponseForResource(t *testing.T) {
|
||||||
if pollErr != nil {
|
if pollErr != nil {
|
||||||
t.Fatal("waitForServerAvailable() =", err)
|
t.Fatal("waitForServerAvailable() =", err)
|
||||||
}
|
}
|
||||||
tlsClient, err := createSecureTLSClient(t, wh.Client, &wh.Options)
|
tlsClient, err := createSecureTLSClient(t, kubeclient.Get(ctx), &wh.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("createSecureTLSClient() =", err)
|
t.Fatal("createSecureTLSClient() =", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -31,6 +31,7 @@ import (
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/types"
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
kubeclient "knative.dev/pkg/client/injection/kube/client/fake"
|
||||||
)
|
)
|
||||||
|
|
||||||
type fixedConversionController struct {
|
type fixedConversionController struct {
|
||||||
|
@ -82,7 +83,7 @@ func TestConversionValidResponse(t *testing.T) {
|
||||||
if pollErr != nil {
|
if pollErr != nil {
|
||||||
t.Fatal("waitForServerAvailable() =", err)
|
t.Fatal("waitForServerAvailable() =", err)
|
||||||
}
|
}
|
||||||
tlsClient, err := createSecureTLSClient(t, wh.Client, &wh.Options)
|
tlsClient, err := createSecureTLSClient(t, kubeclient.Get(ctx), &wh.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("createSecureTLSClient() =", err)
|
t.Fatal("createSecureTLSClient() =", err)
|
||||||
}
|
}
|
||||||
|
@ -171,7 +172,7 @@ func TestConversionInvalidResponse(t *testing.T) {
|
||||||
if pollErr != nil {
|
if pollErr != nil {
|
||||||
t.Fatal("waitForServerAvailable() =", err)
|
t.Fatal("waitForServerAvailable() =", err)
|
||||||
}
|
}
|
||||||
tlsClient, err := createSecureTLSClient(t, wh.Client, &wh.Options)
|
tlsClient, err := createSecureTLSClient(t, kubeclient.Get(ctx), &wh.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("createSecureTLSClient() =", err)
|
t.Fatal("createSecureTLSClient() =", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,14 +26,13 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
// Injection stuff
|
// Injection stuff
|
||||||
kubeclient "knative.dev/pkg/client/injection/kube/client"
|
|
||||||
kubeinformerfactory "knative.dev/pkg/injection/clients/namespacedkube/informers/factory"
|
kubeinformerfactory "knative.dev/pkg/injection/clients/namespacedkube/informers/factory"
|
||||||
"knative.dev/pkg/network/handlers"
|
"knative.dev/pkg/network/handlers"
|
||||||
|
|
||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
"golang.org/x/sync/errgroup"
|
"golang.org/x/sync/errgroup"
|
||||||
admissionv1 "k8s.io/api/admission/v1"
|
admissionv1 "k8s.io/api/admission/v1"
|
||||||
"k8s.io/client-go/kubernetes"
|
|
||||||
corelisters "k8s.io/client-go/listers/core/v1"
|
corelisters "k8s.io/client-go/listers/core/v1"
|
||||||
"knative.dev/pkg/logging"
|
"knative.dev/pkg/logging"
|
||||||
"knative.dev/pkg/network"
|
"knative.dev/pkg/network"
|
||||||
|
@ -78,7 +77,6 @@ const (
|
||||||
// Webhook implements the external webhook for validation of
|
// Webhook implements the external webhook for validation of
|
||||||
// resources and configuration.
|
// resources and configuration.
|
||||||
type Webhook struct {
|
type Webhook struct {
|
||||||
Client kubernetes.Interface
|
|
||||||
Options Options
|
Options Options
|
||||||
Logger *zap.SugaredLogger
|
Logger *zap.SugaredLogger
|
||||||
|
|
||||||
|
@ -106,8 +104,6 @@ func New(
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
client := kubeclient.Get(ctx)
|
|
||||||
|
|
||||||
// Injection is too aggressive for this case because by simply linking this
|
// Injection is too aggressive for this case because by simply linking this
|
||||||
// library we force consumers to have secret access. If we require that one
|
// library we force consumers to have secret access. If we require that one
|
||||||
// of the admission controllers' informers *also* require the secret
|
// of the admission controllers' informers *also* require the secret
|
||||||
|
@ -132,7 +128,6 @@ func New(
|
||||||
syncCtx, cancel := context.WithCancel(context.Background())
|
syncCtx, cancel := context.WithCancel(context.Background())
|
||||||
|
|
||||||
webhook = &Webhook{
|
webhook = &Webhook{
|
||||||
Client: client,
|
|
||||||
Options: *opts,
|
Options: *opts,
|
||||||
secretlister: secretInformer.Lister(),
|
secretlister: secretInformer.Lister(),
|
||||||
Logger: logger,
|
Logger: logger,
|
||||||
|
|
|
@ -71,7 +71,7 @@ func TestMissingContentType(t *testing.T) {
|
||||||
t.Fatal("waitForServerAvailable() =", err)
|
t.Fatal("waitForServerAvailable() =", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
tlsClient, err := createSecureTLSClient(t, wh.Client, &wh.Options)
|
tlsClient, err := createSecureTLSClient(t, kubeclient.Get(ctx), &wh.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("createSecureTLSClient() =", err)
|
t.Fatal("createSecureTLSClient() =", err)
|
||||||
}
|
}
|
||||||
|
@ -125,7 +125,7 @@ func testEmptyRequestBody(t *testing.T, controller interface{}) {
|
||||||
t.Fatal("waitForServerAvailable() =", err)
|
t.Fatal("waitForServerAvailable() =", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
tlsClient, err := createSecureTLSClient(t, wh.Client, &wh.Options)
|
tlsClient, err := createSecureTLSClient(t, kubeclient.Get(ctx), &wh.Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("createSecureTLSClient() =", err)
|
t.Fatal("createSecureTLSClient() =", err)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue