cleanup: disable dual stack for some manifest UT

This commit is contained in:
pacoxu 2021-03-03 15:52:14 +08:00
parent 5b0d0451ff
commit 496deb6df9

View File

@ -598,6 +598,7 @@ func TestGetControllerManagerCommand(t *testing.T) {
KubernetesVersion: cpVersion, KubernetesVersion: cpVersion,
CertificatesDir: testCertsDir, CertificatesDir: testCertsDir,
ClusterName: "some-other-cluster-name", ClusterName: "some-other-cluster-name",
FeatureGates: map[string]bool{features.IPv6DualStack: false},
}, },
expected: []string{ expected: []string{
"kube-controller-manager", "kube-controller-manager",
@ -615,6 +616,7 @@ func TestGetControllerManagerCommand(t *testing.T) {
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf", "--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
"--client-ca-file=" + testCertsDir + "/ca.crt", "--client-ca-file=" + testCertsDir + "/ca.crt",
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt", "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
"--feature-gates=IPv6DualStack=false",
"--cluster-name=some-other-cluster-name", "--cluster-name=some-other-cluster-name",
}, },
}, },
@ -679,6 +681,7 @@ func TestGetControllerManagerCommand(t *testing.T) {
}, },
CertificatesDir: testCertsDir, CertificatesDir: testCertsDir,
KubernetesVersion: cpVersion, KubernetesVersion: cpVersion,
FeatureGates: map[string]bool{features.IPv6DualStack: false},
}, },
expected: []string{ expected: []string{
"kube-controller-manager", "kube-controller-manager",
@ -696,6 +699,7 @@ func TestGetControllerManagerCommand(t *testing.T) {
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf", "--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
"--client-ca-file=" + testCertsDir + "/ca.crt", "--client-ca-file=" + testCertsDir + "/ca.crt",
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt", "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
"--feature-gates=IPv6DualStack=false",
"--allocate-node-cidrs=true", "--allocate-node-cidrs=true",
"--cluster-cidr=10.0.1.15/16", "--cluster-cidr=10.0.1.15/16",
"--service-cluster-ip-range=172.20.0.0/24", "--service-cluster-ip-range=172.20.0.0/24",
@ -811,7 +815,6 @@ func TestGetControllerManagerCommand(t *testing.T) {
}, },
CertificatesDir: testCertsDir, CertificatesDir: testCertsDir,
KubernetesVersion: cpVersion, KubernetesVersion: cpVersion,
FeatureGates: map[string]bool{features.IPv6DualStack: true},
}, },
expected: []string{ expected: []string{
"kube-controller-manager", "kube-controller-manager",
@ -829,7 +832,6 @@ func TestGetControllerManagerCommand(t *testing.T) {
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf", "--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
"--client-ca-file=" + testCertsDir + "/ca.crt", "--client-ca-file=" + testCertsDir + "/ca.crt",
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt", "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
"--feature-gates=IPv6DualStack=true",
"--allocate-node-cidrs=true", "--allocate-node-cidrs=true",
"--cluster-cidr=10.0.1.15/16,2001:db8::/64", "--cluster-cidr=10.0.1.15/16,2001:db8::/64",
"--node-cidr-mask-size-ipv4=20", "--node-cidr-mask-size-ipv4=20",