grpc: move to use grpc.WithTransportCredentials()
v1.43.0 marked grpc.WithInsecure() deprecated so this commit moves to use what is the recommended replacement: grpc.WithTransportCredentials(insecure.NewCredentials()) Signed-off-by: Mikko Ylinen <mikko.ylinen@intel.com> Kubernetes-commit: 2c8bfad9106039aa15233b5bf7282b25a7b7e0a0
This commit is contained in:
parent
cf846c4344
commit
12a8b7fef3
|
|
@ -30,6 +30,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/credentials/insecure"
|
||||||
|
|
||||||
utilnet "k8s.io/apimachinery/pkg/util/net"
|
utilnet "k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apiserver/pkg/apis/apiserver"
|
"k8s.io/apiserver/pkg/apis/apiserver"
|
||||||
|
|
@ -214,7 +215,8 @@ func (u *udsGRPCConnector) connect(_ context.Context) (proxier, error) {
|
||||||
// we cannot use ctx just for dialing and control the connection lifetime separately.
|
// we cannot use ctx just for dialing and control the connection lifetime separately.
|
||||||
// See https://github.com/kubernetes-sigs/apiserver-network-proxy/issues/357.
|
// See https://github.com/kubernetes-sigs/apiserver-network-proxy/issues/357.
|
||||||
tunnelCtx := context.TODO()
|
tunnelCtx := context.TODO()
|
||||||
tunnel, err := client.CreateSingleUseGrpcTunnel(tunnelCtx, udsName, dialOption, grpc.WithInsecure())
|
tunnel, err := client.CreateSingleUseGrpcTunnel(tunnelCtx, udsName, dialOption,
|
||||||
|
grpc.WithTransportCredentials(insecure.NewCredentials()))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -29,6 +29,7 @@ import (
|
||||||
"k8s.io/klog/v2"
|
"k8s.io/klog/v2"
|
||||||
|
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/credentials/insecure"
|
||||||
|
|
||||||
kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1"
|
kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1"
|
||||||
)
|
)
|
||||||
|
|
@ -64,7 +65,7 @@ func NewGRPCService(endpoint string, callTimeout time.Duration) (Service, error)
|
||||||
s := &gRPCService{callTimeout: callTimeout}
|
s := &gRPCService{callTimeout: callTimeout}
|
||||||
s.connection, err = grpc.Dial(
|
s.connection, err = grpc.Dial(
|
||||||
addr,
|
addr,
|
||||||
grpc.WithInsecure(),
|
grpc.WithTransportCredentials(insecure.NewCredentials()),
|
||||||
grpc.WithUnaryInterceptor(s.interceptor),
|
grpc.WithUnaryInterceptor(s.interceptor),
|
||||||
grpc.WithDefaultCallOptions(grpc.WaitForReady(true)),
|
grpc.WithDefaultCallOptions(grpc.WaitForReady(true)),
|
||||||
grpc.WithContextDialer(
|
grpc.WithContextDialer(
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue