remove KUBE_API_VERSIONS

Kubernetes-commit: a68c57155e728b2782408cbab88ecee0444a4ba8
This commit is contained in:
David Eads 2018-04-25 16:07:15 -04:00 committed by Kubernetes Publisher
parent 853dc10af4
commit bf8532c54e
8 changed files with 13 additions and 33 deletions

View File

@ -37,7 +37,7 @@ import (
) )
var ( var (
registry = registered.NewOrDie("") registry = registered.NewAPIRegistrationManager()
scheme = runtime.NewScheme() scheme = runtime.NewScheme()
codecs = serializer.NewCodecFactory(scheme) codecs = serializer.NewCodecFactory(scheme)
) )

View File

@ -166,7 +166,7 @@ func newFakeAPIResourceConfigSource() *serverstore.ResourceConfig {
} }
func newFakeRegistry() *registered.APIRegistrationManager { func newFakeRegistry() *registered.APIRegistrationManager {
registry := registered.NewOrDie("") registry := registered.NewAPIRegistrationManager()
registry.RegisterGroup(apimachinery.GroupMeta{ registry.RegisterGroup(apimachinery.GroupMeta{
GroupVersion: apiv1.SchemeGroupVersion, GroupVersion: apiv1.SchemeGroupVersion,

View File

@ -17,7 +17,6 @@ limitations under the License.
package storage package storage
import ( import (
"os"
"reflect" "reflect"
"testing" "testing"
@ -35,7 +34,7 @@ import (
var ( var (
v1GroupVersion = schema.GroupVersion{Group: "", Version: "v1"} v1GroupVersion = schema.GroupVersion{Group: "", Version: "v1"}
registry = registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS")) registry = registered.NewAPIRegistrationManager()
scheme = runtime.NewScheme() scheme = runtime.NewScheme()
codecs = serializer.NewCodecFactory(scheme) codecs = serializer.NewCodecFactory(scheme)
parameterCodec = runtime.NewParameterCodec(scheme) parameterCodec = runtime.NewParameterCodec(scheme)
@ -116,7 +115,7 @@ func TestConfigurableStorageFactory(t *testing.T) {
} }
func TestUpdateEtcdOverrides(t *testing.T) { func TestUpdateEtcdOverrides(t *testing.T) {
registry := registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS")) registry := registered.NewAPIRegistrationManager()
exampleinstall.Install(registry, scheme) exampleinstall.Install(registry, scheme)
testCases := []struct { testCases := []struct {

View File

@ -70,25 +70,6 @@ var (
retryBackoff = time.Duration(500) * time.Millisecond retryBackoff = time.Duration(500) * time.Millisecond
) )
// TestDisabledGroupVersion ensures that requiring a group version works as expected
func TestDisabledGroupVersion(t *testing.T) {
gv := schema.GroupVersion{Group: "webhook.util.k8s.io", Version: "v1"}
gvs := []schema.GroupVersion{gv}
registry := registered.NewOrDie(gv.String())
_, err := NewGenericWebhook(registry, scheme.Codecs, "/some/path", gvs, retryBackoff)
if err == nil {
t.Errorf("expected an error")
} else {
aErrMsg := err.Error()
eErrMsg := fmt.Sprintf("webhook plugin requires enabling extension resource: %s", gv)
if aErrMsg != eErrMsg {
t.Errorf("unexpected error message mismatch:\n Expected: %s\n Actual: %s", eErrMsg, aErrMsg)
}
}
}
// TestKubeConfigFile ensures that a kube config file, regardless of validity, is handled properly // TestKubeConfigFile ensures that a kube config file, regardless of validity, is handled properly
func TestKubeConfigFile(t *testing.T) { func TestKubeConfigFile(t *testing.T) {
badCAPath := "/tmp/missing/ca.pem" badCAPath := "/tmp/missing/ca.pem"
@ -277,7 +258,7 @@ func TestKubeConfigFile(t *testing.T) {
if err == nil { if err == nil {
defer os.Remove(kubeConfigFile) defer os.Remove(kubeConfigFile)
_, err = NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, kubeConfigFile, groupVersions, retryBackoff) _, err = NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, kubeConfigFile, groupVersions, retryBackoff)
} }
return err return err
@ -300,7 +281,7 @@ func TestKubeConfigFile(t *testing.T) {
// TestMissingKubeConfigFile ensures that a kube config path to a missing file is handled properly // TestMissingKubeConfigFile ensures that a kube config path to a missing file is handled properly
func TestMissingKubeConfigFile(t *testing.T) { func TestMissingKubeConfigFile(t *testing.T) {
kubeConfigPath := "/some/missing/path" kubeConfigPath := "/some/missing/path"
_, err := NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, kubeConfigPath, groupVersions, retryBackoff) _, err := NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, kubeConfigPath, groupVersions, retryBackoff)
if err == nil { if err == nil {
t.Errorf("creating the webhook should had failed") t.Errorf("creating the webhook should had failed")
@ -412,7 +393,7 @@ func TestTLSConfig(t *testing.T) {
defer os.Remove(configFile) defer os.Remove(configFile)
wh, err := NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, configFile, groupVersions, retryBackoff) wh, err := NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, configFile, groupVersions, retryBackoff)
if err == nil { if err == nil {
err = wh.RestClient.Get().Do().Error() err = wh.RestClient.Get().Do().Error()
@ -477,7 +458,7 @@ func TestRequestTimeout(t *testing.T) {
var requestTimeout = 10 * time.Millisecond var requestTimeout = 10 * time.Millisecond
wh, err := newGenericWebhook(registered.NewOrDie(""), scheme.Codecs, configFile, groupVersions, retryBackoff, requestTimeout) wh, err := newGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, configFile, groupVersions, retryBackoff, requestTimeout)
if err != nil { if err != nil {
t.Fatalf("failed to create the webhook: %v", err) t.Fatalf("failed to create the webhook: %v", err)
} }
@ -563,7 +544,7 @@ func TestWithExponentialBackoff(t *testing.T) {
defer os.Remove(configFile) defer os.Remove(configFile)
wh, err := NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, configFile, groupVersions, retryBackoff) wh, err := NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, configFile, groupVersions, retryBackoff)
if err != nil { if err != nil {
t.Fatalf("failed to create the webhook: %v", err) t.Fatalf("failed to create the webhook: %v", err)

View File

@ -38,7 +38,7 @@ import (
// NOTE: Copied from webhook backend to register auditv1beta1 to scheme // NOTE: Copied from webhook backend to register auditv1beta1 to scheme
var ( var (
registry = registered.NewOrDie("") registry = registered.NewAPIRegistrationManager()
) )
func init() { func init() {

View File

@ -45,7 +45,7 @@ var (
// //
// Can we make these passable to NewGenericWebhook? // Can we make these passable to NewGenericWebhook?
// TODO(audit): figure out a general way to let the client choose their preferred version // TODO(audit): figure out a general way to let the client choose their preferred version
registry = registered.NewOrDie("") registry = registered.NewAPIRegistrationManager()
) )
func init() { func init() {

View File

@ -116,7 +116,7 @@ func (w *WebhookTokenAuthenticator) AuthenticateToken(token string) (user.Info,
// authentication/v1beta1. We construct a registry that acknowledges // authentication/v1beta1. We construct a registry that acknowledges
// authentication/v1beta1 as an enabled version to pass a check enforced in // authentication/v1beta1 as an enabled version to pass a check enforced in
// NewGenericWebhook. // NewGenericWebhook.
var registry = registered.NewOrDie("") var registry = registered.NewAPIRegistrationManager()
func init() { func init() {
registry.RegisterVersions(groupVersions) registry.RegisterVersions(groupVersions)

View File

@ -238,7 +238,7 @@ func convertToSARExtra(extra map[string][]string) map[string]authorization.Extra
// authorization/v1beta1. We construct a registry that acknowledges // authorization/v1beta1. We construct a registry that acknowledges
// authorization/v1beta1 as an enabled version to pass a check enforced in // authorization/v1beta1 as an enabled version to pass a check enforced in
// NewGenericWebhook. // NewGenericWebhook.
var registry = registered.NewOrDie("") var registry = registered.NewAPIRegistrationManager()
func init() { func init() {
registry.RegisterVersions(groupVersions) registry.RegisterVersions(groupVersions)