mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-04 09:49:50 +00:00
Merge pull request #117666 from carlory/fix-008
Remove ability to re-enable serving deprecated policyv1beta1 APIs
This commit is contained in:
commit
56b59c89f5
@ -47,7 +47,6 @@ import (
|
|||||||
networkingapiv1alpha1 "k8s.io/api/networking/v1alpha1"
|
networkingapiv1alpha1 "k8s.io/api/networking/v1alpha1"
|
||||||
nodev1 "k8s.io/api/node/v1"
|
nodev1 "k8s.io/api/node/v1"
|
||||||
policyapiv1 "k8s.io/api/policy/v1"
|
policyapiv1 "k8s.io/api/policy/v1"
|
||||||
policyapiv1beta1 "k8s.io/api/policy/v1beta1"
|
|
||||||
rbacv1 "k8s.io/api/rbac/v1"
|
rbacv1 "k8s.io/api/rbac/v1"
|
||||||
resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
|
resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
|
||||||
schedulingapiv1 "k8s.io/api/scheduling/v1"
|
schedulingapiv1 "k8s.io/api/scheduling/v1"
|
||||||
@ -719,7 +718,6 @@ var (
|
|||||||
// betaAPIGroupVersionsDisabledByDefault is for all future beta groupVersions.
|
// betaAPIGroupVersionsDisabledByDefault is for all future beta groupVersions.
|
||||||
betaAPIGroupVersionsDisabledByDefault = []schema.GroupVersion{
|
betaAPIGroupVersionsDisabledByDefault = []schema.GroupVersion{
|
||||||
authenticationv1beta1.SchemeGroupVersion,
|
authenticationv1beta1.SchemeGroupVersion,
|
||||||
policyapiv1beta1.SchemeGroupVersion,
|
|
||||||
storageapiv1beta1.SchemeGroupVersion,
|
storageapiv1beta1.SchemeGroupVersion,
|
||||||
flowcontrolv1beta1.SchemeGroupVersion,
|
flowcontrolv1beta1.SchemeGroupVersion,
|
||||||
flowcontrolv1beta2.SchemeGroupVersion,
|
flowcontrolv1beta2.SchemeGroupVersion,
|
||||||
|
@ -18,7 +18,6 @@ package rest
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
policyapiv1 "k8s.io/api/policy/v1"
|
policyapiv1 "k8s.io/api/policy/v1"
|
||||||
policyapiv1beta1 "k8s.io/api/policy/v1beta1"
|
|
||||||
"k8s.io/apiserver/pkg/registry/generic"
|
"k8s.io/apiserver/pkg/registry/generic"
|
||||||
"k8s.io/apiserver/pkg/registry/rest"
|
"k8s.io/apiserver/pkg/registry/rest"
|
||||||
genericapiserver "k8s.io/apiserver/pkg/server"
|
genericapiserver "k8s.io/apiserver/pkg/server"
|
||||||
@ -35,12 +34,6 @@ func (p RESTStorageProvider) NewRESTStorage(apiResourceConfigSource serverstorag
|
|||||||
// If you add a version here, be sure to add an entry in `k8s.io/kubernetes/cmd/kube-apiserver/app/aggregator.go with specific priorities.
|
// If you add a version here, be sure to add an entry in `k8s.io/kubernetes/cmd/kube-apiserver/app/aggregator.go with specific priorities.
|
||||||
// TODO refactor the plumbing to provide the information in the APIGroupInfo
|
// TODO refactor the plumbing to provide the information in the APIGroupInfo
|
||||||
|
|
||||||
if storageMap, err := p.v1beta1Storage(apiResourceConfigSource, restOptionsGetter); err != nil {
|
|
||||||
return genericapiserver.APIGroupInfo{}, err
|
|
||||||
} else if len(storageMap) > 0 {
|
|
||||||
apiGroupInfo.VersionedResourcesStorageMap[policyapiv1beta1.SchemeGroupVersion.Version] = storageMap
|
|
||||||
}
|
|
||||||
|
|
||||||
if storageMap, err := p.v1Storage(apiResourceConfigSource, restOptionsGetter); err != nil {
|
if storageMap, err := p.v1Storage(apiResourceConfigSource, restOptionsGetter); err != nil {
|
||||||
return genericapiserver.APIGroupInfo{}, err
|
return genericapiserver.APIGroupInfo{}, err
|
||||||
} else if len(storageMap) > 0 {
|
} else if len(storageMap) > 0 {
|
||||||
@ -50,22 +43,6 @@ func (p RESTStorageProvider) NewRESTStorage(apiResourceConfigSource serverstorag
|
|||||||
return apiGroupInfo, nil
|
return apiGroupInfo, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p RESTStorageProvider) v1beta1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) (map[string]rest.Storage, error) {
|
|
||||||
storage := map[string]rest.Storage{}
|
|
||||||
|
|
||||||
// poddisruptionbudgets
|
|
||||||
if resource := "poddisruptionbudgets"; apiResourceConfigSource.ResourceEnabled(policyapiv1beta1.SchemeGroupVersion.WithResource(resource)) {
|
|
||||||
poddisruptionbudgetStorage, poddisruptionbudgetStatusStorage, err := poddisruptionbudgetstore.NewREST(restOptionsGetter)
|
|
||||||
if err != nil {
|
|
||||||
return storage, err
|
|
||||||
}
|
|
||||||
storage[resource] = poddisruptionbudgetStorage
|
|
||||||
storage[resource+"/status"] = poddisruptionbudgetStatusStorage
|
|
||||||
}
|
|
||||||
|
|
||||||
return storage, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p RESTStorageProvider) v1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) (map[string]rest.Storage, error) {
|
func (p RESTStorageProvider) v1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) (map[string]rest.Storage, error) {
|
||||||
storage := map[string]rest.Storage{}
|
storage := map[string]rest.Storage{}
|
||||||
|
|
||||||
|
@ -17,14 +17,17 @@ limitations under the License.
|
|||||||
package disruption
|
package disruption
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"path"
|
||||||
"reflect"
|
"reflect"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/google/go-cmp/cmp"
|
"github.com/google/go-cmp/cmp"
|
||||||
"github.com/google/go-cmp/cmp/cmpopts"
|
"github.com/google/go-cmp/cmp/cmpopts"
|
||||||
|
clientv3 "go.etcd.io/etcd/client/v3"
|
||||||
v1 "k8s.io/api/core/v1"
|
v1 "k8s.io/api/core/v1"
|
||||||
policyv1 "k8s.io/api/policy/v1"
|
policyv1 "k8s.io/api/policy/v1"
|
||||||
"k8s.io/api/policy/v1beta1"
|
"k8s.io/api/policy/v1beta1"
|
||||||
@ -34,9 +37,12 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer/protobuf"
|
||||||
"k8s.io/apimachinery/pkg/types"
|
"k8s.io/apimachinery/pkg/types"
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
|
"k8s.io/apiserver/pkg/registry/rest"
|
||||||
cacheddiscovery "k8s.io/client-go/discovery/cached/memory"
|
cacheddiscovery "k8s.io/client-go/discovery/cached/memory"
|
||||||
"k8s.io/client-go/dynamic"
|
"k8s.io/client-go/dynamic"
|
||||||
"k8s.io/client-go/informers"
|
"k8s.io/client-go/informers"
|
||||||
@ -46,6 +52,7 @@ import (
|
|||||||
"k8s.io/client-go/scale"
|
"k8s.io/client-go/scale"
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
|
kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
|
||||||
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
||||||
"k8s.io/kubernetes/pkg/controller/disruption"
|
"k8s.io/kubernetes/pkg/controller/disruption"
|
||||||
"k8s.io/kubernetes/test/integration/etcd"
|
"k8s.io/kubernetes/test/integration/etcd"
|
||||||
"k8s.io/kubernetes/test/integration/framework"
|
"k8s.io/kubernetes/test/integration/framework"
|
||||||
@ -201,12 +208,12 @@ func TestPDBWithScaleSubresource(t *testing.T) {
|
|||||||
func TestEmptySelector(t *testing.T) {
|
func TestEmptySelector(t *testing.T) {
|
||||||
testcases := []struct {
|
testcases := []struct {
|
||||||
name string
|
name string
|
||||||
createPDBFunc func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error
|
createPDBFunc func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error
|
||||||
expectedCurrentHealthy int32
|
expectedCurrentHealthy int32
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "v1beta1 should not target any pods",
|
name: "v1beta1 should not target any pods",
|
||||||
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error {
|
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error {
|
||||||
pdb := &v1beta1.PodDisruptionBudget{
|
pdb := &v1beta1.PodDisruptionBudget{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: name,
|
Name: name,
|
||||||
@ -216,14 +223,13 @@ func TestEmptySelector(t *testing.T) {
|
|||||||
Selector: &metav1.LabelSelector{},
|
Selector: &metav1.LabelSelector{},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
_, err := clientSet.PolicyV1beta1().PodDisruptionBudgets(nsName).Create(ctx, pdb, metav1.CreateOptions{})
|
return createPDBUsingRemovedAPI(ctx, etcdClient, etcdStoragePrefix, nsName, pdb)
|
||||||
return err
|
|
||||||
},
|
},
|
||||||
expectedCurrentHealthy: 0,
|
expectedCurrentHealthy: 0,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "v1 should target all pods",
|
name: "v1 should target all pods",
|
||||||
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error {
|
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error {
|
||||||
pdb := &policyv1.PodDisruptionBudget{
|
pdb := &policyv1.PodDisruptionBudget{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: name,
|
Name: name,
|
||||||
@ -266,7 +272,7 @@ func TestEmptySelector(t *testing.T) {
|
|||||||
waitToObservePods(t, informers.Core().V1().Pods().Informer(), 4, v1.PodRunning)
|
waitToObservePods(t, informers.Core().V1().Pods().Informer(), 4, v1.PodRunning)
|
||||||
|
|
||||||
pdbName := "test-pdb"
|
pdbName := "test-pdb"
|
||||||
if err := tc.createPDBFunc(ctx, clientSet, pdbName, nsName, minAvailable); err != nil {
|
if err := tc.createPDBFunc(ctx, clientSet, s.EtcdClient, s.EtcdStoragePrefix, pdbName, nsName, minAvailable); err != nil {
|
||||||
t.Errorf("Error creating PodDisruptionBudget: %v", err)
|
t.Errorf("Error creating PodDisruptionBudget: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -287,12 +293,12 @@ func TestEmptySelector(t *testing.T) {
|
|||||||
func TestSelectorsForPodsWithoutLabels(t *testing.T) {
|
func TestSelectorsForPodsWithoutLabels(t *testing.T) {
|
||||||
testcases := []struct {
|
testcases := []struct {
|
||||||
name string
|
name string
|
||||||
createPDBFunc func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error
|
createPDBFunc func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error
|
||||||
expectedCurrentHealthy int32
|
expectedCurrentHealthy int32
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "pods with no labels can be targeted by v1 PDBs with empty selector",
|
name: "pods with no labels can be targeted by v1 PDBs with empty selector",
|
||||||
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error {
|
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error {
|
||||||
pdb := &policyv1.PodDisruptionBudget{
|
pdb := &policyv1.PodDisruptionBudget{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: name,
|
Name: name,
|
||||||
@ -309,7 +315,7 @@ func TestSelectorsForPodsWithoutLabels(t *testing.T) {
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "pods with no labels can be targeted by v1 PDBs with DoesNotExist selector",
|
name: "pods with no labels can be targeted by v1 PDBs with DoesNotExist selector",
|
||||||
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error {
|
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error {
|
||||||
pdb := &policyv1.PodDisruptionBudget{
|
pdb := &policyv1.PodDisruptionBudget{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: name,
|
Name: name,
|
||||||
@ -333,7 +339,7 @@ func TestSelectorsForPodsWithoutLabels(t *testing.T) {
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "pods with no labels can be targeted by v1beta1 PDBs with DoesNotExist selector",
|
name: "pods with no labels can be targeted by v1beta1 PDBs with DoesNotExist selector",
|
||||||
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, name, nsName string, minAvailable intstr.IntOrString) error {
|
createPDBFunc: func(ctx context.Context, clientSet clientset.Interface, etcdClient *clientv3.Client, etcdStoragePrefix, name, nsName string, minAvailable intstr.IntOrString) error {
|
||||||
pdb := &v1beta1.PodDisruptionBudget{
|
pdb := &v1beta1.PodDisruptionBudget{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: name,
|
Name: name,
|
||||||
@ -350,8 +356,7 @@ func TestSelectorsForPodsWithoutLabels(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
_, err := clientSet.PolicyV1beta1().PodDisruptionBudgets(nsName).Create(ctx, pdb, metav1.CreateOptions{})
|
return createPDBUsingRemovedAPI(ctx, etcdClient, etcdStoragePrefix, nsName, pdb)
|
||||||
return err
|
|
||||||
},
|
},
|
||||||
expectedCurrentHealthy: 1,
|
expectedCurrentHealthy: 1,
|
||||||
},
|
},
|
||||||
@ -376,7 +381,7 @@ func TestSelectorsForPodsWithoutLabels(t *testing.T) {
|
|||||||
|
|
||||||
// Create the PDB first and wait for it to settle.
|
// Create the PDB first and wait for it to settle.
|
||||||
pdbName := "test-pdb"
|
pdbName := "test-pdb"
|
||||||
if err := tc.createPDBFunc(ctx, clientSet, pdbName, nsName, minAvailable); err != nil {
|
if err := tc.createPDBFunc(ctx, clientSet, s.EtcdClient, s.EtcdStoragePrefix, pdbName, nsName, minAvailable); err != nil {
|
||||||
t.Errorf("Error creating PodDisruptionBudget: %v", err)
|
t.Errorf("Error creating PodDisruptionBudget: %v", err)
|
||||||
}
|
}
|
||||||
waitPDBStable(ctx, t, clientSet, 0, nsName, pdbName)
|
waitPDBStable(ctx, t, clientSet, 0, nsName, pdbName)
|
||||||
@ -513,6 +518,26 @@ func waitToObservePods(t *testing.T, podInformer cache.SharedIndexInformer, podN
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// createPDBUsingRemovedAPI creates a PDB directly using etcd. This is must *ONLY* be used for checks of compatibility
|
||||||
|
// with removed data. Do not use this just because you don't want to update your test to use v1. Only use this
|
||||||
|
// when it actually matters.
|
||||||
|
func createPDBUsingRemovedAPI(ctx context.Context, etcdClient *clientv3.Client, etcdStoragePrefix, nsName string, betaPDB *v1beta1.PodDisruptionBudget) error {
|
||||||
|
betaPDB.APIVersion = v1beta1.SchemeGroupVersion.Group + "/" + v1beta1.SchemeGroupVersion.Version
|
||||||
|
betaPDB.Kind = "PodDisruptionBudget"
|
||||||
|
betaPDB.Namespace = nsName
|
||||||
|
betaPDB.Generation = 1
|
||||||
|
rest.FillObjectMetaSystemFields(betaPDB)
|
||||||
|
ctx = genericapirequest.WithNamespace(ctx, nsName)
|
||||||
|
key := path.Join("/", etcdStoragePrefix, "poddisruptionbudgets", nsName, betaPDB.Name)
|
||||||
|
protoSerializer := protobuf.NewSerializer(legacyscheme.Scheme, legacyscheme.Scheme)
|
||||||
|
buffer := bytes.NewBuffer(nil)
|
||||||
|
if err := protoSerializer.Encode(betaPDB, buffer); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
_, err := etcdClient.Put(ctx, key, buffer.String())
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
func TestPatchCompatibility(t *testing.T) {
|
func TestPatchCompatibility(t *testing.T) {
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
|
||||||
@ -533,17 +558,6 @@ func TestPatchCompatibility(t *testing.T) {
|
|||||||
fieldManager string
|
fieldManager string
|
||||||
expectSelector *metav1.LabelSelector
|
expectSelector *metav1.LabelSelector
|
||||||
}{
|
}{
|
||||||
{
|
|
||||||
name: "v1beta1-smp",
|
|
||||||
version: "v1beta1",
|
|
||||||
patchType: types.StrategicMergePatchType,
|
|
||||||
patch: `{"spec":{"selector":{"matchLabels":{"patchmatch":"true"},"matchExpressions":[{"key":"patchexpression","operator":"In","values":["true"]}]}}}`,
|
|
||||||
// matchLabels portion is merged, matchExpressions portion is replaced (because it's a list with no patchStrategy defined)
|
|
||||||
expectSelector: &metav1.LabelSelector{
|
|
||||||
MatchLabels: map[string]string{"basematch": "true", "patchmatch": "true"},
|
|
||||||
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
name: "v1-smp",
|
name: "v1-smp",
|
||||||
version: "v1",
|
version: "v1",
|
||||||
@ -555,18 +569,6 @@ func TestPatchCompatibility(t *testing.T) {
|
|||||||
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
||||||
{
|
|
||||||
name: "v1beta1-mergepatch",
|
|
||||||
version: "v1beta1",
|
|
||||||
patchType: types.MergePatchType,
|
|
||||||
patch: `{"spec":{"selector":{"matchLabels":{"patchmatch":"true"},"matchExpressions":[{"key":"patchexpression","operator":"In","values":["true"]}]}}}`,
|
|
||||||
// matchLabels portion is merged, matchExpressions portion is replaced (because it's a list)
|
|
||||||
expectSelector: &metav1.LabelSelector{
|
|
||||||
MatchLabels: map[string]string{"basematch": "true", "patchmatch": "true"},
|
|
||||||
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
name: "v1-mergepatch",
|
name: "v1-mergepatch",
|
||||||
version: "v1",
|
version: "v1",
|
||||||
@ -578,20 +580,6 @@ func TestPatchCompatibility(t *testing.T) {
|
|||||||
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
||||||
{
|
|
||||||
name: "v1beta1-apply",
|
|
||||||
version: "v1beta1",
|
|
||||||
patchType: types.ApplyPatchType,
|
|
||||||
patch: `{"apiVersion":"policy/v1beta1","kind":"PodDisruptionBudget","spec":{"selector":{"matchLabels":{"patchmatch":"true"},"matchExpressions":[{"key":"patchexpression","operator":"In","values":["true"]}]}}}`,
|
|
||||||
force: pointer.Bool(true),
|
|
||||||
fieldManager: "test",
|
|
||||||
// entire selector is replaced (because structType=atomic)
|
|
||||||
expectSelector: &metav1.LabelSelector{
|
|
||||||
MatchLabels: map[string]string{"patchmatch": "true"},
|
|
||||||
MatchExpressions: []metav1.LabelSelectorRequirement{{Key: "patchexpression", Operator: "In", Values: []string{"true"}}},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
name: "v1-apply",
|
name: "v1-apply",
|
||||||
version: "v1",
|
version: "v1",
|
||||||
@ -641,12 +629,6 @@ func TestPatchCompatibility(t *testing.T) {
|
|||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
resultSelector = result.Spec.Selector
|
resultSelector = result.Spec.Selector
|
||||||
case "v1beta1":
|
|
||||||
result, err := clientSet.PolicyV1beta1().PodDisruptionBudgets(ns).Patch(context.TODO(), pdb.Name, tc.patchType, []byte(tc.patch), metav1.PatchOptions{Force: tc.force, FieldManager: tc.fieldManager})
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
resultSelector = result.Spec.Selector
|
|
||||||
default:
|
default:
|
||||||
t.Error("unknown version")
|
t.Error("unknown version")
|
||||||
}
|
}
|
||||||
|
@ -224,14 +224,6 @@ func GetEtcdStorageDataForNamespace(namespace string) map[schema.GroupVersionRes
|
|||||||
},
|
},
|
||||||
// --
|
// --
|
||||||
|
|
||||||
// k8s.io/kubernetes/pkg/apis/policy/v1beta1
|
|
||||||
gvr("policy", "v1beta1", "poddisruptionbudgets"): {
|
|
||||||
Stub: `{"metadata": {"name": "pdb1"}, "spec": {"selector": {"matchLabels": {"anokkey": "anokvalue"}}}}`,
|
|
||||||
ExpectedEtcdPath: "/registry/poddisruptionbudgets/" + namespace + "/pdb1",
|
|
||||||
ExpectedGVK: gvkP("policy", "v1", "PodDisruptionBudget"),
|
|
||||||
},
|
|
||||||
// --
|
|
||||||
|
|
||||||
// k8s.io/kubernetes/pkg/apis/storage/v1alpha1
|
// k8s.io/kubernetes/pkg/apis/storage/v1alpha1
|
||||||
gvr("storage.k8s.io", "v1alpha1", "csistoragecapacities"): {
|
gvr("storage.k8s.io", "v1alpha1", "csistoragecapacities"): {
|
||||||
Stub: `{"metadata": {"name": "csc-12345-1"}, "storageClassName": "sc1"}`,
|
Stub: `{"metadata": {"name": "csc-12345-1"}, "storageClassName": "sc1"}`,
|
||||||
|
Loading…
Reference in New Issue
Block a user