remove KUBE_API_VERSIONS
Kubernetes-commit: a68c57155e728b2782408cbab88ecee0444a4ba8
This commit is contained in:
parent
853dc10af4
commit
bf8532c54e
|
@ -37,7 +37,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
registry = registered.NewOrDie("")
|
registry = registered.NewAPIRegistrationManager()
|
||||||
scheme = runtime.NewScheme()
|
scheme = runtime.NewScheme()
|
||||||
codecs = serializer.NewCodecFactory(scheme)
|
codecs = serializer.NewCodecFactory(scheme)
|
||||||
)
|
)
|
||||||
|
|
|
@ -166,7 +166,7 @@ func newFakeAPIResourceConfigSource() *serverstore.ResourceConfig {
|
||||||
}
|
}
|
||||||
|
|
||||||
func newFakeRegistry() *registered.APIRegistrationManager {
|
func newFakeRegistry() *registered.APIRegistrationManager {
|
||||||
registry := registered.NewOrDie("")
|
registry := registered.NewAPIRegistrationManager()
|
||||||
|
|
||||||
registry.RegisterGroup(apimachinery.GroupMeta{
|
registry.RegisterGroup(apimachinery.GroupMeta{
|
||||||
GroupVersion: apiv1.SchemeGroupVersion,
|
GroupVersion: apiv1.SchemeGroupVersion,
|
||||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
||||||
package storage
|
package storage
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
|
||||||
"reflect"
|
"reflect"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
@ -35,7 +34,7 @@ import (
|
||||||
var (
|
var (
|
||||||
v1GroupVersion = schema.GroupVersion{Group: "", Version: "v1"}
|
v1GroupVersion = schema.GroupVersion{Group: "", Version: "v1"}
|
||||||
|
|
||||||
registry = registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS"))
|
registry = registered.NewAPIRegistrationManager()
|
||||||
scheme = runtime.NewScheme()
|
scheme = runtime.NewScheme()
|
||||||
codecs = serializer.NewCodecFactory(scheme)
|
codecs = serializer.NewCodecFactory(scheme)
|
||||||
parameterCodec = runtime.NewParameterCodec(scheme)
|
parameterCodec = runtime.NewParameterCodec(scheme)
|
||||||
|
@ -116,7 +115,7 @@ func TestConfigurableStorageFactory(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdateEtcdOverrides(t *testing.T) {
|
func TestUpdateEtcdOverrides(t *testing.T) {
|
||||||
registry := registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS"))
|
registry := registered.NewAPIRegistrationManager()
|
||||||
exampleinstall.Install(registry, scheme)
|
exampleinstall.Install(registry, scheme)
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
|
|
|
@ -70,25 +70,6 @@ var (
|
||||||
retryBackoff = time.Duration(500) * time.Millisecond
|
retryBackoff = time.Duration(500) * time.Millisecond
|
||||||
)
|
)
|
||||||
|
|
||||||
// TestDisabledGroupVersion ensures that requiring a group version works as expected
|
|
||||||
func TestDisabledGroupVersion(t *testing.T) {
|
|
||||||
gv := schema.GroupVersion{Group: "webhook.util.k8s.io", Version: "v1"}
|
|
||||||
gvs := []schema.GroupVersion{gv}
|
|
||||||
registry := registered.NewOrDie(gv.String())
|
|
||||||
_, err := NewGenericWebhook(registry, scheme.Codecs, "/some/path", gvs, retryBackoff)
|
|
||||||
|
|
||||||
if err == nil {
|
|
||||||
t.Errorf("expected an error")
|
|
||||||
} else {
|
|
||||||
aErrMsg := err.Error()
|
|
||||||
eErrMsg := fmt.Sprintf("webhook plugin requires enabling extension resource: %s", gv)
|
|
||||||
|
|
||||||
if aErrMsg != eErrMsg {
|
|
||||||
t.Errorf("unexpected error message mismatch:\n Expected: %s\n Actual: %s", eErrMsg, aErrMsg)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// TestKubeConfigFile ensures that a kube config file, regardless of validity, is handled properly
|
// TestKubeConfigFile ensures that a kube config file, regardless of validity, is handled properly
|
||||||
func TestKubeConfigFile(t *testing.T) {
|
func TestKubeConfigFile(t *testing.T) {
|
||||||
badCAPath := "/tmp/missing/ca.pem"
|
badCAPath := "/tmp/missing/ca.pem"
|
||||||
|
@ -277,7 +258,7 @@ func TestKubeConfigFile(t *testing.T) {
|
||||||
if err == nil {
|
if err == nil {
|
||||||
defer os.Remove(kubeConfigFile)
|
defer os.Remove(kubeConfigFile)
|
||||||
|
|
||||||
_, err = NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, kubeConfigFile, groupVersions, retryBackoff)
|
_, err = NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, kubeConfigFile, groupVersions, retryBackoff)
|
||||||
}
|
}
|
||||||
|
|
||||||
return err
|
return err
|
||||||
|
@ -300,7 +281,7 @@ func TestKubeConfigFile(t *testing.T) {
|
||||||
// TestMissingKubeConfigFile ensures that a kube config path to a missing file is handled properly
|
// TestMissingKubeConfigFile ensures that a kube config path to a missing file is handled properly
|
||||||
func TestMissingKubeConfigFile(t *testing.T) {
|
func TestMissingKubeConfigFile(t *testing.T) {
|
||||||
kubeConfigPath := "/some/missing/path"
|
kubeConfigPath := "/some/missing/path"
|
||||||
_, err := NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, kubeConfigPath, groupVersions, retryBackoff)
|
_, err := NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, kubeConfigPath, groupVersions, retryBackoff)
|
||||||
|
|
||||||
if err == nil {
|
if err == nil {
|
||||||
t.Errorf("creating the webhook should had failed")
|
t.Errorf("creating the webhook should had failed")
|
||||||
|
@ -412,7 +393,7 @@ func TestTLSConfig(t *testing.T) {
|
||||||
|
|
||||||
defer os.Remove(configFile)
|
defer os.Remove(configFile)
|
||||||
|
|
||||||
wh, err := NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, configFile, groupVersions, retryBackoff)
|
wh, err := NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, configFile, groupVersions, retryBackoff)
|
||||||
|
|
||||||
if err == nil {
|
if err == nil {
|
||||||
err = wh.RestClient.Get().Do().Error()
|
err = wh.RestClient.Get().Do().Error()
|
||||||
|
@ -477,7 +458,7 @@ func TestRequestTimeout(t *testing.T) {
|
||||||
|
|
||||||
var requestTimeout = 10 * time.Millisecond
|
var requestTimeout = 10 * time.Millisecond
|
||||||
|
|
||||||
wh, err := newGenericWebhook(registered.NewOrDie(""), scheme.Codecs, configFile, groupVersions, retryBackoff, requestTimeout)
|
wh, err := newGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, configFile, groupVersions, retryBackoff, requestTimeout)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to create the webhook: %v", err)
|
t.Fatalf("failed to create the webhook: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -563,7 +544,7 @@ func TestWithExponentialBackoff(t *testing.T) {
|
||||||
|
|
||||||
defer os.Remove(configFile)
|
defer os.Remove(configFile)
|
||||||
|
|
||||||
wh, err := NewGenericWebhook(registered.NewOrDie(""), scheme.Codecs, configFile, groupVersions, retryBackoff)
|
wh, err := NewGenericWebhook(registered.NewAPIRegistrationManager(), scheme.Codecs, configFile, groupVersions, retryBackoff)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to create the webhook: %v", err)
|
t.Fatalf("failed to create the webhook: %v", err)
|
||||||
|
|
|
@ -38,7 +38,7 @@ import (
|
||||||
|
|
||||||
// NOTE: Copied from webhook backend to register auditv1beta1 to scheme
|
// NOTE: Copied from webhook backend to register auditv1beta1 to scheme
|
||||||
var (
|
var (
|
||||||
registry = registered.NewOrDie("")
|
registry = registered.NewAPIRegistrationManager()
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
|
|
@ -45,7 +45,7 @@ var (
|
||||||
//
|
//
|
||||||
// Can we make these passable to NewGenericWebhook?
|
// Can we make these passable to NewGenericWebhook?
|
||||||
// TODO(audit): figure out a general way to let the client choose their preferred version
|
// TODO(audit): figure out a general way to let the client choose their preferred version
|
||||||
registry = registered.NewOrDie("")
|
registry = registered.NewAPIRegistrationManager()
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
|
|
@ -116,7 +116,7 @@ func (w *WebhookTokenAuthenticator) AuthenticateToken(token string) (user.Info,
|
||||||
// authentication/v1beta1. We construct a registry that acknowledges
|
// authentication/v1beta1. We construct a registry that acknowledges
|
||||||
// authentication/v1beta1 as an enabled version to pass a check enforced in
|
// authentication/v1beta1 as an enabled version to pass a check enforced in
|
||||||
// NewGenericWebhook.
|
// NewGenericWebhook.
|
||||||
var registry = registered.NewOrDie("")
|
var registry = registered.NewAPIRegistrationManager()
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
registry.RegisterVersions(groupVersions)
|
registry.RegisterVersions(groupVersions)
|
||||||
|
|
|
@ -238,7 +238,7 @@ func convertToSARExtra(extra map[string][]string) map[string]authorization.Extra
|
||||||
// authorization/v1beta1. We construct a registry that acknowledges
|
// authorization/v1beta1. We construct a registry that acknowledges
|
||||||
// authorization/v1beta1 as an enabled version to pass a check enforced in
|
// authorization/v1beta1 as an enabled version to pass a check enforced in
|
||||||
// NewGenericWebhook.
|
// NewGenericWebhook.
|
||||||
var registry = registered.NewOrDie("")
|
var registry = registered.NewAPIRegistrationManager()
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
registry.RegisterVersions(groupVersions)
|
registry.RegisterVersions(groupVersions)
|
||||||
|
|
Loading…
Reference in New Issue