mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-20 18:31:15 +00:00
update deployment, daemonset, replicaset, statefulset to apps/v1
This commit is contained in:
parent
ea6acb34d1
commit
842bd1e1ec
@ -125,7 +125,7 @@ func startNodeLifecycleController(ctx ControllerContext) (http.Handler, bool, er
|
|||||||
ctx.InformerFactory.Coordination().V1beta1().Leases(),
|
ctx.InformerFactory.Coordination().V1beta1().Leases(),
|
||||||
ctx.InformerFactory.Core().V1().Pods(),
|
ctx.InformerFactory.Core().V1().Pods(),
|
||||||
ctx.InformerFactory.Core().V1().Nodes(),
|
ctx.InformerFactory.Core().V1().Nodes(),
|
||||||
ctx.InformerFactory.Extensions().V1beta1().DaemonSets(),
|
ctx.InformerFactory.Apps().V1().DaemonSets(),
|
||||||
ctx.ClientBuilder.ClientOrDie("node-controller"),
|
ctx.ClientBuilder.ClientOrDie("node-controller"),
|
||||||
ctx.ComponentConfig.KubeCloudShared.NodeMonitorPeriod.Duration,
|
ctx.ComponentConfig.KubeCloudShared.NodeMonitorPeriod.Duration,
|
||||||
ctx.ComponentConfig.NodeLifecycleController.NodeStartupGracePeriod.Duration,
|
ctx.ComponentConfig.NodeLifecycleController.NodeStartupGracePeriod.Duration,
|
||||||
|
@ -44,9 +44,9 @@ func startDisruptionController(ctx ControllerContext) (http.Handler, bool, error
|
|||||||
ctx.InformerFactory.Core().V1().Pods(),
|
ctx.InformerFactory.Core().V1().Pods(),
|
||||||
ctx.InformerFactory.Policy().V1beta1().PodDisruptionBudgets(),
|
ctx.InformerFactory.Policy().V1beta1().PodDisruptionBudgets(),
|
||||||
ctx.InformerFactory.Core().V1().ReplicationControllers(),
|
ctx.InformerFactory.Core().V1().ReplicationControllers(),
|
||||||
ctx.InformerFactory.Extensions().V1beta1().ReplicaSets(),
|
ctx.InformerFactory.Apps().V1().ReplicaSets(),
|
||||||
ctx.InformerFactory.Extensions().V1beta1().Deployments(),
|
ctx.InformerFactory.Apps().V1().Deployments(),
|
||||||
ctx.InformerFactory.Apps().V1beta1().StatefulSets(),
|
ctx.InformerFactory.Apps().V1().StatefulSets(),
|
||||||
ctx.ClientBuilder.ClientOrDie("disruption-controller"),
|
ctx.ClientBuilder.ClientOrDie("disruption-controller"),
|
||||||
).Run(ctx.Stop)
|
).Run(ctx.Stop)
|
||||||
return nil, true, nil
|
return nil, true, nil
|
||||||
|
@ -261,7 +261,7 @@ func (dsc *DaemonSetsController) controlledHistories(ds *apps.DaemonSet) ([]*app
|
|||||||
// If any adoptions are attempted, we should first recheck for deletion with
|
// If any adoptions are attempted, we should first recheck for deletion with
|
||||||
// an uncached quorum read sometime after listing Pods (see #42639).
|
// an uncached quorum read sometime after listing Pods (see #42639).
|
||||||
canAdoptFunc := controller.RecheckDeletionTimestamp(func() (metav1.Object, error) {
|
canAdoptFunc := controller.RecheckDeletionTimestamp(func() (metav1.Object, error) {
|
||||||
fresh, err := dsc.kubeClient.ExtensionsV1beta1().DaemonSets(ds.Namespace).Get(ds.Name, metav1.GetOptions{})
|
fresh, err := dsc.kubeClient.AppsV1().DaemonSets(ds.Namespace).Get(ds.Name, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@ -348,7 +348,7 @@ func (dsc *DaemonSetsController) snapshot(ds *apps.DaemonSet, revision int64) (*
|
|||||||
|
|
||||||
// Handle name collisions between different history
|
// Handle name collisions between different history
|
||||||
// Get the latest DaemonSet from the API server to make sure collision count is only increased when necessary
|
// Get the latest DaemonSet from the API server to make sure collision count is only increased when necessary
|
||||||
currDS, getErr := dsc.kubeClient.ExtensionsV1beta1().DaemonSets(ds.Namespace).Get(ds.Name, metav1.GetOptions{})
|
currDS, getErr := dsc.kubeClient.AppsV1().DaemonSets(ds.Namespace).Get(ds.Name, metav1.GetOptions{})
|
||||||
if getErr != nil {
|
if getErr != nil {
|
||||||
return nil, getErr
|
return nil, getErr
|
||||||
}
|
}
|
||||||
@ -360,7 +360,7 @@ func (dsc *DaemonSetsController) snapshot(ds *apps.DaemonSet, revision int64) (*
|
|||||||
currDS.Status.CollisionCount = new(int32)
|
currDS.Status.CollisionCount = new(int32)
|
||||||
}
|
}
|
||||||
*currDS.Status.CollisionCount++
|
*currDS.Status.CollisionCount++
|
||||||
_, updateErr := dsc.kubeClient.ExtensionsV1beta1().DaemonSets(ds.Namespace).UpdateStatus(currDS)
|
_, updateErr := dsc.kubeClient.AppsV1().DaemonSets(ds.Namespace).UpdateStatus(currDS)
|
||||||
if updateErr != nil {
|
if updateErr != nil {
|
||||||
return nil, updateErr
|
return nil, updateErr
|
||||||
}
|
}
|
||||||
|
@ -23,17 +23,15 @@ go_library(
|
|||||||
"//staging/src/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/util/runtime:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/util/runtime:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/informers/apps/v1beta1:go_default_library",
|
"//staging/src/k8s.io/client-go/informers/apps/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/informers/core/v1:go_default_library",
|
"//staging/src/k8s.io/client-go/informers/core/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/informers/extensions/v1beta1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/client-go/informers/policy/v1beta1:go_default_library",
|
"//staging/src/k8s.io/client-go/informers/policy/v1beta1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
|
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/kubernetes/scheme:go_default_library",
|
"//staging/src/k8s.io/client-go/kubernetes/scheme:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/kubernetes/typed/core/v1:go_default_library",
|
"//staging/src/k8s.io/client-go/kubernetes/typed/core/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/kubernetes/typed/policy/v1beta1:go_default_library",
|
"//staging/src/k8s.io/client-go/kubernetes/typed/policy/v1beta1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/listers/apps/v1beta1:go_default_library",
|
"//staging/src/k8s.io/client-go/listers/apps/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/listers/core/v1:go_default_library",
|
"//staging/src/k8s.io/client-go/listers/core/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/listers/extensions/v1beta1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/client-go/listers/policy/v1beta1:go_default_library",
|
"//staging/src/k8s.io/client-go/listers/policy/v1beta1:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/tools/cache:go_default_library",
|
"//staging/src/k8s.io/client-go/tools/cache:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/tools/record:go_default_library",
|
"//staging/src/k8s.io/client-go/tools/record:go_default_library",
|
||||||
|
@ -31,17 +31,15 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
appsinformers "k8s.io/client-go/informers/apps/v1beta1"
|
appsv1informers "k8s.io/client-go/informers/apps/v1"
|
||||||
coreinformers "k8s.io/client-go/informers/core/v1"
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
||||||
extensionsinformers "k8s.io/client-go/informers/extensions/v1beta1"
|
|
||||||
policyinformers "k8s.io/client-go/informers/policy/v1beta1"
|
policyinformers "k8s.io/client-go/informers/policy/v1beta1"
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/kubernetes/scheme"
|
"k8s.io/client-go/kubernetes/scheme"
|
||||||
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
policyclientset "k8s.io/client-go/kubernetes/typed/policy/v1beta1"
|
policyclientset "k8s.io/client-go/kubernetes/typed/policy/v1beta1"
|
||||||
appslisters "k8s.io/client-go/listers/apps/v1beta1"
|
appsv1listers "k8s.io/client-go/listers/apps/v1"
|
||||||
corelisters "k8s.io/client-go/listers/core/v1"
|
corelisters "k8s.io/client-go/listers/core/v1"
|
||||||
extensionslisters "k8s.io/client-go/listers/extensions/v1beta1"
|
|
||||||
policylisters "k8s.io/client-go/listers/policy/v1beta1"
|
policylisters "k8s.io/client-go/listers/policy/v1beta1"
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
"k8s.io/client-go/tools/record"
|
"k8s.io/client-go/tools/record"
|
||||||
@ -79,13 +77,13 @@ type DisruptionController struct {
|
|||||||
rcLister corelisters.ReplicationControllerLister
|
rcLister corelisters.ReplicationControllerLister
|
||||||
rcListerSynced cache.InformerSynced
|
rcListerSynced cache.InformerSynced
|
||||||
|
|
||||||
rsLister extensionslisters.ReplicaSetLister
|
rsLister appsv1listers.ReplicaSetLister
|
||||||
rsListerSynced cache.InformerSynced
|
rsListerSynced cache.InformerSynced
|
||||||
|
|
||||||
dLister extensionslisters.DeploymentLister
|
dLister appsv1listers.DeploymentLister
|
||||||
dListerSynced cache.InformerSynced
|
dListerSynced cache.InformerSynced
|
||||||
|
|
||||||
ssLister appslisters.StatefulSetLister
|
ssLister appsv1listers.StatefulSetLister
|
||||||
ssListerSynced cache.InformerSynced
|
ssListerSynced cache.InformerSynced
|
||||||
|
|
||||||
// PodDisruptionBudget keys that need to be synced.
|
// PodDisruptionBudget keys that need to be synced.
|
||||||
@ -113,9 +111,9 @@ func NewDisruptionController(
|
|||||||
podInformer coreinformers.PodInformer,
|
podInformer coreinformers.PodInformer,
|
||||||
pdbInformer policyinformers.PodDisruptionBudgetInformer,
|
pdbInformer policyinformers.PodDisruptionBudgetInformer,
|
||||||
rcInformer coreinformers.ReplicationControllerInformer,
|
rcInformer coreinformers.ReplicationControllerInformer,
|
||||||
rsInformer extensionsinformers.ReplicaSetInformer,
|
rsInformer appsv1informers.ReplicaSetInformer,
|
||||||
dInformer extensionsinformers.DeploymentInformer,
|
dInformer appsv1informers.DeploymentInformer,
|
||||||
ssInformer appsinformers.StatefulSetInformer,
|
ssInformer appsv1informers.StatefulSetInformer,
|
||||||
kubeClient clientset.Interface,
|
kubeClient clientset.Interface,
|
||||||
) *DisruptionController {
|
) *DisruptionController {
|
||||||
dc := &DisruptionController{
|
dc := &DisruptionController{
|
||||||
|
@ -23,9 +23,8 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
apps "k8s.io/api/apps/v1beta1"
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
policy "k8s.io/api/policy/v1beta1"
|
policy "k8s.io/api/policy/v1beta1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
@ -102,9 +101,9 @@ func newFakeDisruptionController() (*disruptionController, *pdbStates) {
|
|||||||
informerFactory.Core().V1().Pods(),
|
informerFactory.Core().V1().Pods(),
|
||||||
informerFactory.Policy().V1beta1().PodDisruptionBudgets(),
|
informerFactory.Policy().V1beta1().PodDisruptionBudgets(),
|
||||||
informerFactory.Core().V1().ReplicationControllers(),
|
informerFactory.Core().V1().ReplicationControllers(),
|
||||||
informerFactory.Extensions().V1beta1().ReplicaSets(),
|
informerFactory.Apps().V1().ReplicaSets(),
|
||||||
informerFactory.Extensions().V1beta1().Deployments(),
|
informerFactory.Apps().V1().Deployments(),
|
||||||
informerFactory.Apps().V1beta1().StatefulSets(),
|
informerFactory.Apps().V1().StatefulSets(),
|
||||||
nil,
|
nil,
|
||||||
)
|
)
|
||||||
dc.getUpdater = func() updater { return ps.Set }
|
dc.getUpdater = func() updater { return ps.Set }
|
||||||
@ -120,9 +119,9 @@ func newFakeDisruptionController() (*disruptionController, *pdbStates) {
|
|||||||
informerFactory.Core().V1().Pods().Informer().GetStore(),
|
informerFactory.Core().V1().Pods().Informer().GetStore(),
|
||||||
informerFactory.Policy().V1beta1().PodDisruptionBudgets().Informer().GetStore(),
|
informerFactory.Policy().V1beta1().PodDisruptionBudgets().Informer().GetStore(),
|
||||||
informerFactory.Core().V1().ReplicationControllers().Informer().GetStore(),
|
informerFactory.Core().V1().ReplicationControllers().Informer().GetStore(),
|
||||||
informerFactory.Extensions().V1beta1().ReplicaSets().Informer().GetStore(),
|
informerFactory.Apps().V1().ReplicaSets().Informer().GetStore(),
|
||||||
informerFactory.Extensions().V1beta1().Deployments().Informer().GetStore(),
|
informerFactory.Apps().V1().Deployments().Informer().GetStore(),
|
||||||
informerFactory.Apps().V1beta1().StatefulSets().Informer().GetStore(),
|
informerFactory.Apps().V1().StatefulSets().Informer().GetStore(),
|
||||||
}, ps
|
}, ps
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -192,7 +191,7 @@ func updatePodOwnerToRc(t *testing.T, pod *v1.Pod, rc *v1.ReplicationController)
|
|||||||
pod.OwnerReferences = append(pod.OwnerReferences, controllerReference)
|
pod.OwnerReferences = append(pod.OwnerReferences, controllerReference)
|
||||||
}
|
}
|
||||||
|
|
||||||
func updatePodOwnerToRs(t *testing.T, pod *v1.Pod, rs *extensions.ReplicaSet) {
|
func updatePodOwnerToRs(t *testing.T, pod *v1.Pod, rs *apps.ReplicaSet) {
|
||||||
var controllerReference metav1.OwnerReference
|
var controllerReference metav1.OwnerReference
|
||||||
var trueVar = true
|
var trueVar = true
|
||||||
controllerReference = metav1.OwnerReference{UID: rs.UID, APIVersion: controllerKindRS.GroupVersion().String(), Kind: controllerKindRS.Kind, Name: rs.Name, Controller: &trueVar}
|
controllerReference = metav1.OwnerReference{UID: rs.UID, APIVersion: controllerKindRS.GroupVersion().String(), Kind: controllerKindRS.Kind, Name: rs.Name, Controller: &trueVar}
|
||||||
@ -258,8 +257,8 @@ func newReplicationController(t *testing.T, size int32) (*v1.ReplicationControll
|
|||||||
return rc, rcName
|
return rc, rcName
|
||||||
}
|
}
|
||||||
|
|
||||||
func newDeployment(t *testing.T, size int32) (*extensions.Deployment, string) {
|
func newDeployment(t *testing.T, size int32) (*apps.Deployment, string) {
|
||||||
d := &extensions.Deployment{
|
d := &apps.Deployment{
|
||||||
TypeMeta: metav1.TypeMeta{APIVersion: "v1"},
|
TypeMeta: metav1.TypeMeta{APIVersion: "v1"},
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
UID: uuid.NewUUID(),
|
UID: uuid.NewUUID(),
|
||||||
@ -268,7 +267,7 @@ func newDeployment(t *testing.T, size int32) (*extensions.Deployment, string) {
|
|||||||
ResourceVersion: "18",
|
ResourceVersion: "18",
|
||||||
Labels: fooBar(),
|
Labels: fooBar(),
|
||||||
},
|
},
|
||||||
Spec: extensions.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
Replicas: &size,
|
Replicas: &size,
|
||||||
Selector: newSelFooBar(),
|
Selector: newSelFooBar(),
|
||||||
},
|
},
|
||||||
@ -282,8 +281,8 @@ func newDeployment(t *testing.T, size int32) (*extensions.Deployment, string) {
|
|||||||
return d, dName
|
return d, dName
|
||||||
}
|
}
|
||||||
|
|
||||||
func newReplicaSet(t *testing.T, size int32) (*extensions.ReplicaSet, string) {
|
func newReplicaSet(t *testing.T, size int32) (*apps.ReplicaSet, string) {
|
||||||
rs := &extensions.ReplicaSet{
|
rs := &apps.ReplicaSet{
|
||||||
TypeMeta: metav1.TypeMeta{APIVersion: "v1"},
|
TypeMeta: metav1.TypeMeta{APIVersion: "v1"},
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
UID: uuid.NewUUID(),
|
UID: uuid.NewUUID(),
|
||||||
@ -292,7 +291,7 @@ func newReplicaSet(t *testing.T, size int32) (*extensions.ReplicaSet, string) {
|
|||||||
ResourceVersion: "18",
|
ResourceVersion: "18",
|
||||||
Labels: fooBar(),
|
Labels: fooBar(),
|
||||||
},
|
},
|
||||||
Spec: extensions.ReplicaSetSpec{
|
Spec: apps.ReplicaSetSpec{
|
||||||
Replicas: &size,
|
Replicas: &size,
|
||||||
Selector: newSelFooBar(),
|
Selector: newSelFooBar(),
|
||||||
},
|
},
|
||||||
|
@ -39,15 +39,15 @@ import (
|
|||||||
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
||||||
|
appsv1informers "k8s.io/client-go/informers/apps/v1"
|
||||||
coordinformers "k8s.io/client-go/informers/coordination/v1beta1"
|
coordinformers "k8s.io/client-go/informers/coordination/v1beta1"
|
||||||
coreinformers "k8s.io/client-go/informers/core/v1"
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
||||||
extensionsinformers "k8s.io/client-go/informers/extensions/v1beta1"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/kubernetes/scheme"
|
"k8s.io/client-go/kubernetes/scheme"
|
||||||
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
|
appsv1listers "k8s.io/client-go/listers/apps/v1"
|
||||||
coordlisters "k8s.io/client-go/listers/coordination/v1beta1"
|
coordlisters "k8s.io/client-go/listers/coordination/v1beta1"
|
||||||
corelisters "k8s.io/client-go/listers/core/v1"
|
corelisters "k8s.io/client-go/listers/core/v1"
|
||||||
extensionslisters "k8s.io/client-go/listers/extensions/v1beta1"
|
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
"k8s.io/client-go/tools/record"
|
"k8s.io/client-go/tools/record"
|
||||||
"k8s.io/client-go/util/flowcontrol"
|
"k8s.io/client-go/util/flowcontrol"
|
||||||
@ -172,7 +172,7 @@ type Controller struct {
|
|||||||
|
|
||||||
zoneStates map[string]ZoneState
|
zoneStates map[string]ZoneState
|
||||||
|
|
||||||
daemonSetStore extensionslisters.DaemonSetLister
|
daemonSetStore appsv1listers.DaemonSetLister
|
||||||
daemonSetInformerSynced cache.InformerSynced
|
daemonSetInformerSynced cache.InformerSynced
|
||||||
|
|
||||||
leaseLister coordlisters.LeaseLister
|
leaseLister coordlisters.LeaseLister
|
||||||
@ -240,7 +240,7 @@ func NewNodeLifecycleController(
|
|||||||
leaseInformer coordinformers.LeaseInformer,
|
leaseInformer coordinformers.LeaseInformer,
|
||||||
podInformer coreinformers.PodInformer,
|
podInformer coreinformers.PodInformer,
|
||||||
nodeInformer coreinformers.NodeInformer,
|
nodeInformer coreinformers.NodeInformer,
|
||||||
daemonSetInformer extensionsinformers.DaemonSetInformer,
|
daemonSetInformer appsv1informers.DaemonSetInformer,
|
||||||
kubeClient clientset.Interface,
|
kubeClient clientset.Interface,
|
||||||
nodeMonitorPeriod time.Duration,
|
nodeMonitorPeriod time.Duration,
|
||||||
nodeStartupGracePeriod time.Duration,
|
nodeStartupGracePeriod time.Duration,
|
||||||
|
@ -21,9 +21,9 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
coordv1beta1 "k8s.io/api/coordination/v1beta1"
|
coordv1beta1 "k8s.io/api/coordination/v1beta1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
||||||
"k8s.io/apimachinery/pkg/api/resource"
|
"k8s.io/apimachinery/pkg/api/resource"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
@ -31,9 +31,9 @@ import (
|
|||||||
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
||||||
utilfeaturetesting "k8s.io/apiserver/pkg/util/feature/testing"
|
utilfeaturetesting "k8s.io/apiserver/pkg/util/feature/testing"
|
||||||
"k8s.io/client-go/informers"
|
"k8s.io/client-go/informers"
|
||||||
|
appsinformers "k8s.io/client-go/informers/apps/v1"
|
||||||
coordinformers "k8s.io/client-go/informers/coordination/v1beta1"
|
coordinformers "k8s.io/client-go/informers/coordination/v1beta1"
|
||||||
coreinformers "k8s.io/client-go/informers/core/v1"
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
||||||
extensionsinformers "k8s.io/client-go/informers/extensions/v1beta1"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/kubernetes/fake"
|
"k8s.io/client-go/kubernetes/fake"
|
||||||
testcore "k8s.io/client-go/testing"
|
testcore "k8s.io/client-go/testing"
|
||||||
@ -64,7 +64,7 @@ type nodeLifecycleController struct {
|
|||||||
*Controller
|
*Controller
|
||||||
leaseInformer coordinformers.LeaseInformer
|
leaseInformer coordinformers.LeaseInformer
|
||||||
nodeInformer coreinformers.NodeInformer
|
nodeInformer coreinformers.NodeInformer
|
||||||
daemonSetInformer extensionsinformers.DaemonSetInformer
|
daemonSetInformer appsinformers.DaemonSetInformer
|
||||||
}
|
}
|
||||||
|
|
||||||
// doEviction does the fake eviction and returns the status of eviction operation.
|
// doEviction does the fake eviction and returns the status of eviction operation.
|
||||||
@ -139,7 +139,7 @@ func newNodeLifecycleControllerFromClient(
|
|||||||
|
|
||||||
leaseInformer := factory.Coordination().V1beta1().Leases()
|
leaseInformer := factory.Coordination().V1beta1().Leases()
|
||||||
nodeInformer := factory.Core().V1().Nodes()
|
nodeInformer := factory.Core().V1().Nodes()
|
||||||
daemonSetInformer := factory.Extensions().V1beta1().DaemonSets()
|
daemonSetInformer := factory.Apps().V1().DaemonSets()
|
||||||
|
|
||||||
nc, err := NewNodeLifecycleController(
|
nc, err := NewNodeLifecycleController(
|
||||||
leaseInformer,
|
leaseInformer,
|
||||||
@ -196,7 +196,7 @@ func TestMonitorNodeHealthEvictPods(t *testing.T) {
|
|||||||
|
|
||||||
table := []struct {
|
table := []struct {
|
||||||
fakeNodeHandler *testutil.FakeNodeHandler
|
fakeNodeHandler *testutil.FakeNodeHandler
|
||||||
daemonSets []extensions.DaemonSet
|
daemonSets []apps.DaemonSet
|
||||||
timeToPass time.Duration
|
timeToPass time.Duration
|
||||||
newNodeStatus v1.NodeStatus
|
newNodeStatus v1.NodeStatus
|
||||||
secondNodeNewStatus v1.NodeStatus
|
secondNodeNewStatus v1.NodeStatus
|
||||||
@ -409,13 +409,13 @@ func TestMonitorNodeHealthEvictPods(t *testing.T) {
|
|||||||
},
|
},
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
daemonSets: []extensions.DaemonSet{
|
daemonSets: []apps.DaemonSet{
|
||||||
{
|
{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: "ds0",
|
Name: "ds0",
|
||||||
Namespace: "default",
|
Namespace: "default",
|
||||||
},
|
},
|
||||||
Spec: extensions.DaemonSetSpec{
|
Spec: apps.DaemonSetSpec{
|
||||||
Selector: &metav1.LabelSelector{
|
Selector: &metav1.LabelSelector{
|
||||||
MatchLabels: map[string]string{"daemon": "yes"},
|
MatchLabels: map[string]string{"daemon": "yes"},
|
||||||
},
|
},
|
||||||
|
@ -31,7 +31,7 @@ import (
|
|||||||
|
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
extensionslisters "k8s.io/client-go/listers/extensions/v1beta1"
|
appsv1listers "k8s.io/client-go/listers/apps/v1"
|
||||||
api "k8s.io/kubernetes/pkg/apis/core"
|
api "k8s.io/kubernetes/pkg/apis/core"
|
||||||
"k8s.io/kubernetes/pkg/controller"
|
"k8s.io/kubernetes/pkg/controller"
|
||||||
"k8s.io/kubernetes/pkg/kubelet/util/format"
|
"k8s.io/kubernetes/pkg/kubelet/util/format"
|
||||||
@ -43,7 +43,7 @@ import (
|
|||||||
// DeletePods will delete all pods from master running on given node,
|
// DeletePods will delete all pods from master running on given node,
|
||||||
// and return true if any pods were deleted, or were found pending
|
// and return true if any pods were deleted, or were found pending
|
||||||
// deletion.
|
// deletion.
|
||||||
func DeletePods(kubeClient clientset.Interface, recorder record.EventRecorder, nodeName, nodeUID string, daemonStore extensionslisters.DaemonSetLister) (bool, error) {
|
func DeletePods(kubeClient clientset.Interface, recorder record.EventRecorder, nodeName, nodeUID string, daemonStore appsv1listers.DaemonSetLister) (bool, error) {
|
||||||
remaining := false
|
remaining := false
|
||||||
selector := fields.OneTermEqualSelector(api.PodHostField, nodeName).String()
|
selector := fields.OneTermEqualSelector(api.PodHostField, nodeName).String()
|
||||||
options := metav1.ListOptions{FieldSelector: selector}
|
options := metav1.ListOptions{FieldSelector: selector}
|
||||||
|
@ -293,7 +293,7 @@ func (r *DaemonSetRollbacker) Rollback(obj runtime.Object, updatedAnnotations ma
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Restore revision
|
// Restore revision
|
||||||
if _, err = r.c.ExtensionsV1beta1().DaemonSets(accessor.GetNamespace()).Patch(accessor.GetName(), types.StrategicMergePatchType, toHistory.Data.Raw); err != nil {
|
if _, err = r.c.AppsV1().DaemonSets(accessor.GetNamespace()).Patch(accessor.GetName(), types.StrategicMergePatchType, toHistory.Data.Raw); err != nil {
|
||||||
return "", fmt.Errorf("failed restoring revision %d: %v", toRevision, err)
|
return "", fmt.Errorf("failed restoring revision %d: %v", toRevision, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -21,10 +21,10 @@ import (
|
|||||||
"sync/atomic"
|
"sync/atomic"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
batchv1 "k8s.io/api/batch/v1"
|
batchv1 "k8s.io/api/batch/v1"
|
||||||
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
"k8s.io/api/extensions/v1beta1"
|
|
||||||
apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
|
apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
|
||||||
apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
||||||
apiextensionstestserver "k8s.io/apiextensions-apiserver/test/integration/fixtures"
|
apiextensionstestserver "k8s.io/apiextensions-apiserver/test/integration/fixtures"
|
||||||
@ -111,17 +111,17 @@ func getPodTemplateSpec(labels map[string]string) v1.PodTemplateSpec {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func newOwnerDeployment(f *framework.Framework, deploymentName string, labels map[string]string) *v1beta1.Deployment {
|
func newOwnerDeployment(f *framework.Framework, deploymentName string, labels map[string]string) *apps.Deployment {
|
||||||
replicas := int32(2)
|
replicas := int32(2)
|
||||||
return &v1beta1.Deployment{
|
return &apps.Deployment{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: deploymentName,
|
Name: deploymentName,
|
||||||
},
|
},
|
||||||
Spec: v1beta1.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
Replicas: &replicas,
|
Replicas: &replicas,
|
||||||
Selector: &metav1.LabelSelector{MatchLabels: labels},
|
Selector: &metav1.LabelSelector{MatchLabels: labels},
|
||||||
Strategy: v1beta1.DeploymentStrategy{
|
Strategy: apps.DeploymentStrategy{
|
||||||
Type: v1beta1.RollingUpdateDeploymentStrategyType,
|
Type: apps.RollingUpdateDeploymentStrategyType,
|
||||||
},
|
},
|
||||||
Template: getPodTemplateSpec(labels),
|
Template: getPodTemplateSpec(labels),
|
||||||
},
|
},
|
||||||
@ -480,8 +480,8 @@ var _ = SIGDescribe("Garbage collector", func() {
|
|||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should delete RS created by deployment when not orphaning", func() {
|
framework.ConformanceIt("should delete RS created by deployment when not orphaning", func() {
|
||||||
clientSet := f.ClientSet
|
clientSet := f.ClientSet
|
||||||
deployClient := clientSet.ExtensionsV1beta1().Deployments(f.Namespace.Name)
|
deployClient := clientSet.AppsV1().Deployments(f.Namespace.Name)
|
||||||
rsClient := clientSet.ExtensionsV1beta1().ReplicaSets(f.Namespace.Name)
|
rsClient := clientSet.AppsV1().ReplicaSets(f.Namespace.Name)
|
||||||
deploymentName := "simpletest.deployment"
|
deploymentName := "simpletest.deployment"
|
||||||
uniqLabels := getUniqLabel("gctest", "delete_rs")
|
uniqLabels := getUniqLabel("gctest", "delete_rs")
|
||||||
deployment := newOwnerDeployment(f, deploymentName, uniqLabels)
|
deployment := newOwnerDeployment(f, deploymentName, uniqLabels)
|
||||||
@ -539,8 +539,8 @@ var _ = SIGDescribe("Garbage collector", func() {
|
|||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan", func() {
|
framework.ConformanceIt("should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan", func() {
|
||||||
clientSet := f.ClientSet
|
clientSet := f.ClientSet
|
||||||
deployClient := clientSet.ExtensionsV1beta1().Deployments(f.Namespace.Name)
|
deployClient := clientSet.AppsV1().Deployments(f.Namespace.Name)
|
||||||
rsClient := clientSet.ExtensionsV1beta1().ReplicaSets(f.Namespace.Name)
|
rsClient := clientSet.AppsV1().ReplicaSets(f.Namespace.Name)
|
||||||
deploymentName := "simpletest.deployment"
|
deploymentName := "simpletest.deployment"
|
||||||
uniqLabels := getUniqLabel("gctest", "orphan_rs")
|
uniqLabels := getUniqLabel("gctest", "orphan_rs")
|
||||||
deployment := newOwnerDeployment(f, deploymentName, uniqLabels)
|
deployment := newOwnerDeployment(f, deploymentName, uniqLabels)
|
||||||
@ -593,7 +593,7 @@ var _ = SIGDescribe("Garbage collector", func() {
|
|||||||
aggregatedError := utilerrors.NewAggregate(errList)
|
aggregatedError := utilerrors.NewAggregate(errList)
|
||||||
framework.Failf("Failed to verify remaining deployments, rs, and pods: %v", aggregatedError)
|
framework.Failf("Failed to verify remaining deployments, rs, and pods: %v", aggregatedError)
|
||||||
}
|
}
|
||||||
rs, err := clientSet.ExtensionsV1beta1().ReplicaSets(f.Namespace.Name).List(metav1.ListOptions{})
|
rs, err := clientSet.AppsV1().ReplicaSets(f.Namespace.Name).List(metav1.ListOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
framework.Failf("Failed to list ReplicaSet %v", err)
|
framework.Failf("Failed to list ReplicaSet %v", err)
|
||||||
}
|
}
|
||||||
|
@ -25,8 +25,8 @@ import (
|
|||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
"k8s.io/api/admissionregistration/v1alpha1"
|
"k8s.io/api/admissionregistration/v1alpha1"
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
"k8s.io/api/extensions/v1beta1"
|
|
||||||
"k8s.io/apimachinery/pkg/api/errors"
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/types"
|
"k8s.io/apimachinery/pkg/types"
|
||||||
@ -242,7 +242,7 @@ var _ = SIGDescribe("Initializers [Feature:Initializers]", func() {
|
|||||||
|
|
||||||
// create a replicaset
|
// create a replicaset
|
||||||
rs := newReplicaset()
|
rs := newReplicaset()
|
||||||
persistedRS, err := c.ExtensionsV1beta1().ReplicaSets(ns).Create(rs)
|
persistedRS, err := c.AppsV1().ReplicaSets(ns).Create(rs)
|
||||||
Expect(err).NotTo(HaveOccurred(), "failed to create replicaset %s in namespace: %s", persistedRS.Name, ns)
|
Expect(err).NotTo(HaveOccurred(), "failed to create replicaset %s in namespace: %s", persistedRS.Name, ns)
|
||||||
// wait for replicaset controller to confirm that it has handled the creation
|
// wait for replicaset controller to confirm that it has handled the creation
|
||||||
err = waitForRSObservedGeneration(c, persistedRS.Namespace, persistedRS.Name, persistedRS.Generation)
|
err = waitForRSObservedGeneration(c, persistedRS.Namespace, persistedRS.Name, persistedRS.Generation)
|
||||||
@ -250,7 +250,7 @@ var _ = SIGDescribe("Initializers [Feature:Initializers]", func() {
|
|||||||
|
|
||||||
// update the replicaset spec to trigger a resync
|
// update the replicaset spec to trigger a resync
|
||||||
patch := []byte(`{"spec":{"minReadySeconds":5}}`)
|
patch := []byte(`{"spec":{"minReadySeconds":5}}`)
|
||||||
persistedRS, err = c.ExtensionsV1beta1().ReplicaSets(ns).Patch(persistedRS.Name, types.StrategicMergePatchType, patch)
|
persistedRS, err = c.AppsV1().ReplicaSets(ns).Patch(persistedRS.Name, types.StrategicMergePatchType, patch)
|
||||||
Expect(err).NotTo(HaveOccurred(), "failed to apply to replicaset %s in namespace %s a strategic merge patch: %s", persistedRS.Name, ns, patch)
|
Expect(err).NotTo(HaveOccurred(), "failed to apply to replicaset %s in namespace %s a strategic merge patch: %s", persistedRS.Name, ns, patch)
|
||||||
|
|
||||||
// wait for replicaset controller to confirm that it has handle the spec update
|
// wait for replicaset controller to confirm that it has handle the spec update
|
||||||
@ -302,15 +302,15 @@ func newUninitializedPod(podName string) *v1.Pod {
|
|||||||
return pod
|
return pod
|
||||||
}
|
}
|
||||||
|
|
||||||
func newReplicaset() *v1beta1.ReplicaSet {
|
func newReplicaset() *apps.ReplicaSet {
|
||||||
name := "initializer-test-replicaset"
|
name := "initializer-test-replicaset"
|
||||||
replicas := int32(1)
|
replicas := int32(1)
|
||||||
labels := map[string]string{"initializer-test": "single-replicaset"}
|
labels := map[string]string{"initializer-test": "single-replicaset"}
|
||||||
return &v1beta1.ReplicaSet{
|
return &apps.ReplicaSet{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: name,
|
Name: name,
|
||||||
},
|
},
|
||||||
Spec: v1beta1.ReplicaSetSpec{
|
Spec: apps.ReplicaSetSpec{
|
||||||
Replicas: &replicas,
|
Replicas: &replicas,
|
||||||
Template: v1.PodTemplateSpec{
|
Template: v1.PodTemplateSpec{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
@ -411,7 +411,7 @@ func cleanupInitializer(c clientset.Interface, initializerConfigName, initialize
|
|||||||
// waits till the RS status.observedGeneration matches metadata.generation.
|
// waits till the RS status.observedGeneration matches metadata.generation.
|
||||||
func waitForRSObservedGeneration(c clientset.Interface, ns, name string, generation int64) error {
|
func waitForRSObservedGeneration(c clientset.Interface, ns, name string, generation int64) error {
|
||||||
return wait.PollImmediate(1*time.Second, 1*time.Minute, func() (bool, error) {
|
return wait.PollImmediate(1*time.Second, 1*time.Minute, func() (bool, error) {
|
||||||
rs, err := c.ExtensionsV1beta1().ReplicaSets(ns).Get(name, metav1.GetOptions{})
|
rs, err := c.AppsV1().ReplicaSets(ns).Get(name, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return false, err
|
||||||
}
|
}
|
||||||
|
@ -22,8 +22,9 @@ import (
|
|||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
policy "k8s.io/api/policy/v1beta1"
|
policy "k8s.io/api/policy/v1beta1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
@ -310,12 +311,12 @@ func createReplicaSetOrDie(cs kubernetes.Interface, ns string, size int32, exclu
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
rs := &extensions.ReplicaSet{
|
rs := &apps.ReplicaSet{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: "rs",
|
Name: "rs",
|
||||||
Namespace: ns,
|
Namespace: ns,
|
||||||
},
|
},
|
||||||
Spec: extensions.ReplicaSetSpec{
|
Spec: apps.ReplicaSetSpec{
|
||||||
Replicas: &size,
|
Replicas: &size,
|
||||||
Selector: &metav1.LabelSelector{
|
Selector: &metav1.LabelSelector{
|
||||||
MatchLabels: map[string]string{"foo": "bar"},
|
MatchLabels: map[string]string{"foo": "bar"},
|
||||||
@ -331,6 +332,6 @@ func createReplicaSetOrDie(cs kubernetes.Interface, ns string, size int32, exclu
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err := cs.ExtensionsV1beta1().ReplicaSets(ns).Create(rs)
|
_, err := cs.AppsV1().ReplicaSets(ns).Create(rs)
|
||||||
framework.ExpectNoError(err, "Creating replica set %q in namespace %q", rs.Name, ns)
|
framework.ExpectNoError(err, "Creating replica set %q in namespace %q", rs.Name, ns)
|
||||||
}
|
}
|
||||||
|
@ -437,7 +437,7 @@ func externalHPA(namespace string, metricTargets map[string]externalMetricTarget
|
|||||||
func waitForReplicas(deploymentName, namespace string, cs clientset.Interface, timeout time.Duration, desiredReplicas int) {
|
func waitForReplicas(deploymentName, namespace string, cs clientset.Interface, timeout time.Duration, desiredReplicas int) {
|
||||||
interval := 20 * time.Second
|
interval := 20 * time.Second
|
||||||
err := wait.PollImmediate(interval, timeout, func() (bool, error) {
|
err := wait.PollImmediate(interval, timeout, func() (bool, error) {
|
||||||
deployment, err := cs.ExtensionsV1beta1().Deployments(namespace).Get(deploymentName, metav1.GetOptions{})
|
deployment, err := cs.AppsV1().Deployments(namespace).Get(deploymentName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
framework.Failf("Failed to get replication controller %s: %v", deployment, err)
|
framework.Failf("Failed to get replication controller %s: %v", deployment, err)
|
||||||
}
|
}
|
||||||
|
@ -292,7 +292,7 @@ func updateDNSScalingConfigMap(c clientset.Interface, configMap *v1.ConfigMap) e
|
|||||||
func getDNSReplicas(c clientset.Interface) (int, error) {
|
func getDNSReplicas(c clientset.Interface) (int, error) {
|
||||||
label := labels.SelectorFromSet(labels.Set(map[string]string{ClusterAddonLabelKey: DNSLabelName}))
|
label := labels.SelectorFromSet(labels.Set(map[string]string{ClusterAddonLabelKey: DNSLabelName}))
|
||||||
listOpts := metav1.ListOptions{LabelSelector: label.String()}
|
listOpts := metav1.ListOptions{LabelSelector: label.String()}
|
||||||
deployments, err := c.ExtensionsV1beta1().Deployments(metav1.NamespaceSystem).List(listOpts)
|
deployments, err := c.AppsV1().Deployments(metav1.NamespaceSystem).List(listOpts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
|
@ -340,14 +340,14 @@ func (rc *ResourceConsumer) GetReplicas() int {
|
|||||||
}
|
}
|
||||||
return int(replicationController.Status.ReadyReplicas)
|
return int(replicationController.Status.ReadyReplicas)
|
||||||
case KindDeployment:
|
case KindDeployment:
|
||||||
deployment, err := rc.clientSet.ExtensionsV1beta1().Deployments(rc.nsName).Get(rc.name, metav1.GetOptions{})
|
deployment, err := rc.clientSet.AppsV1().Deployments(rc.nsName).Get(rc.name, metav1.GetOptions{})
|
||||||
framework.ExpectNoError(err)
|
framework.ExpectNoError(err)
|
||||||
if deployment == nil {
|
if deployment == nil {
|
||||||
framework.Failf(deploymentIsNil)
|
framework.Failf(deploymentIsNil)
|
||||||
}
|
}
|
||||||
return int(deployment.Status.ReadyReplicas)
|
return int(deployment.Status.ReadyReplicas)
|
||||||
case KindReplicaSet:
|
case KindReplicaSet:
|
||||||
rs, err := rc.clientSet.ExtensionsV1beta1().ReplicaSets(rc.nsName).Get(rc.name, metav1.GetOptions{})
|
rs, err := rc.clientSet.AppsV1().ReplicaSets(rc.nsName).Get(rc.name, metav1.GetOptions{})
|
||||||
framework.ExpectNoError(err)
|
framework.ExpectNoError(err)
|
||||||
if rs == nil {
|
if rs == nil {
|
||||||
framework.Failf(rsIsNil)
|
framework.Failf(rsIsNil)
|
||||||
|
@ -34,9 +34,10 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
compute "google.golang.org/api/compute/v1"
|
||||||
"k8s.io/klog"
|
"k8s.io/klog"
|
||||||
|
|
||||||
compute "google.golang.org/api/compute/v1"
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
extensions "k8s.io/api/extensions/v1beta1"
|
||||||
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
||||||
@ -896,12 +897,12 @@ func generateBacksideHTTPSServiceSpec() *v1.Service {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func generateBacksideHTTPSDeploymentSpec() *extensions.Deployment {
|
func generateBacksideHTTPSDeploymentSpec() *apps.Deployment {
|
||||||
return &extensions.Deployment{
|
return &apps.Deployment{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: "echoheaders-https",
|
Name: "echoheaders-https",
|
||||||
},
|
},
|
||||||
Spec: extensions.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
Selector: &metav1.LabelSelector{MatchLabels: map[string]string{
|
Selector: &metav1.LabelSelector{MatchLabels: map[string]string{
|
||||||
"app": "echoheaders-https",
|
"app": "echoheaders-https",
|
||||||
}},
|
}},
|
||||||
@ -929,8 +930,8 @@ func generateBacksideHTTPSDeploymentSpec() *extensions.Deployment {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// SetUpBacksideHTTPSIngress sets up deployment, service and ingress with backside HTTPS configured.
|
// SetUpBacksideHTTPSIngress sets up deployment, service and ingress with backside HTTPS configured.
|
||||||
func (j *IngressTestJig) SetUpBacksideHTTPSIngress(cs clientset.Interface, namespace string, staticIPName string) (*extensions.Deployment, *v1.Service, *extensions.Ingress, error) {
|
func (j *IngressTestJig) SetUpBacksideHTTPSIngress(cs clientset.Interface, namespace string, staticIPName string) (*apps.Deployment, *v1.Service, *extensions.Ingress, error) {
|
||||||
deployCreated, err := cs.ExtensionsV1beta1().Deployments(namespace).Create(generateBacksideHTTPSDeploymentSpec())
|
deployCreated, err := cs.AppsV1().Deployments(namespace).Create(generateBacksideHTTPSDeploymentSpec())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
@ -953,7 +954,7 @@ func (j *IngressTestJig) SetUpBacksideHTTPSIngress(cs clientset.Interface, names
|
|||||||
}
|
}
|
||||||
|
|
||||||
// DeleteTestResource deletes given deployment, service and ingress.
|
// DeleteTestResource deletes given deployment, service and ingress.
|
||||||
func (j *IngressTestJig) DeleteTestResource(cs clientset.Interface, deploy *extensions.Deployment, svc *v1.Service, ing *extensions.Ingress) []error {
|
func (j *IngressTestJig) DeleteTestResource(cs clientset.Interface, deploy *apps.Deployment, svc *v1.Service, ing *extensions.Ingress) []error {
|
||||||
var errs []error
|
var errs []error
|
||||||
if ing != nil {
|
if ing != nil {
|
||||||
if err := j.runDelete(ing); err != nil {
|
if err := j.runDelete(ing); err != nil {
|
||||||
@ -966,7 +967,7 @@ func (j *IngressTestJig) DeleteTestResource(cs clientset.Interface, deploy *exte
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if deploy != nil {
|
if deploy != nil {
|
||||||
if err := cs.ExtensionsV1beta1().Deployments(deploy.Namespace).Delete(deploy.Name, nil); err != nil {
|
if err := cs.AppsV1().Deployments(deploy.Namespace).Delete(deploy.Name, nil); err != nil {
|
||||||
errs = append(errs, fmt.Errorf("error while deleting deployment %s/%s: %v", deploy.Namespace, deploy.Name, err))
|
errs = append(errs, fmt.Errorf("error while deleting deployment %s/%s: %v", deploy.Namespace, deploy.Name, err))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -666,7 +666,7 @@ func WaitForPodsRunningReady(c clientset.Interface, ns string, minPods, allowedN
|
|||||||
replicaOk += rc.Status.ReadyReplicas
|
replicaOk += rc.Status.ReadyReplicas
|
||||||
}
|
}
|
||||||
|
|
||||||
rsList, err := c.ExtensionsV1beta1().ReplicaSets(ns).List(metav1.ListOptions{})
|
rsList, err := c.AppsV1().ReplicaSets(ns).List(metav1.ListOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Logf("Error getting replication sets in namespace %q: %v", ns, err)
|
Logf("Error getting replication sets in namespace %q: %v", ns, err)
|
||||||
if testutils.IsRetryableAPIError(err) {
|
if testutils.IsRetryableAPIError(err) {
|
||||||
@ -3092,11 +3092,11 @@ func getRuntimeObjectForKind(c clientset.Interface, kind schema.GroupKind, ns, n
|
|||||||
case api.Kind("ReplicationController"):
|
case api.Kind("ReplicationController"):
|
||||||
return c.CoreV1().ReplicationControllers(ns).Get(name, metav1.GetOptions{})
|
return c.CoreV1().ReplicationControllers(ns).Get(name, metav1.GetOptions{})
|
||||||
case extensionsinternal.Kind("ReplicaSet"), appsinternal.Kind("ReplicaSet"):
|
case extensionsinternal.Kind("ReplicaSet"), appsinternal.Kind("ReplicaSet"):
|
||||||
return c.ExtensionsV1beta1().ReplicaSets(ns).Get(name, metav1.GetOptions{})
|
return c.AppsV1().ReplicaSets(ns).Get(name, metav1.GetOptions{})
|
||||||
case extensionsinternal.Kind("Deployment"), appsinternal.Kind("Deployment"):
|
case extensionsinternal.Kind("Deployment"), appsinternal.Kind("Deployment"):
|
||||||
return c.ExtensionsV1beta1().Deployments(ns).Get(name, metav1.GetOptions{})
|
return c.AppsV1().Deployments(ns).Get(name, metav1.GetOptions{})
|
||||||
case extensionsinternal.Kind("DaemonSet"):
|
case extensionsinternal.Kind("DaemonSet"):
|
||||||
return c.ExtensionsV1beta1().DaemonSets(ns).Get(name, metav1.GetOptions{})
|
return c.AppsV1().DaemonSets(ns).Get(name, metav1.GetOptions{})
|
||||||
case batchinternal.Kind("Job"):
|
case batchinternal.Kind("Job"):
|
||||||
return c.BatchV1().Jobs(ns).Get(name, metav1.GetOptions{})
|
return c.BatchV1().Jobs(ns).Get(name, metav1.GetOptions{})
|
||||||
default:
|
default:
|
||||||
|
@ -1424,7 +1424,7 @@ metadata:
|
|||||||
By("running the image " + nginxImage)
|
By("running the image " + nginxImage)
|
||||||
framework.RunKubectlOrDie("run", dName, "--image="+nginxImage, "--generator=deployment/v1beta1", nsFlag)
|
framework.RunKubectlOrDie("run", dName, "--image="+nginxImage, "--generator=deployment/v1beta1", nsFlag)
|
||||||
By("verifying the deployment " + dName + " was created")
|
By("verifying the deployment " + dName + " was created")
|
||||||
d, err := c.ExtensionsV1beta1().Deployments(ns).Get(dName, metav1.GetOptions{})
|
d, err := c.AppsV1().Deployments(ns).Get(dName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
framework.Failf("Failed getting deployment %s: %v", dName, err)
|
framework.Failf("Failed getting deployment %s: %v", dName, err)
|
||||||
}
|
}
|
||||||
|
@ -625,17 +625,17 @@ var _ = SIGDescribe("Loadbalancing: L7", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
By("Trigger rolling update and observe service disruption")
|
By("Trigger rolling update and observe service disruption")
|
||||||
deploy, err := f.ClientSet.ExtensionsV1beta1().Deployments(ns).Get(name, metav1.GetOptions{})
|
deploy, err := f.ClientSet.AppsV1().Deployments(ns).Get(name, metav1.GetOptions{})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// trigger by changing graceful termination period to 60 seconds
|
// trigger by changing graceful termination period to 60 seconds
|
||||||
gracePeriod := int64(60)
|
gracePeriod := int64(60)
|
||||||
deploy.Spec.Template.Spec.TerminationGracePeriodSeconds = &gracePeriod
|
deploy.Spec.Template.Spec.TerminationGracePeriodSeconds = &gracePeriod
|
||||||
_, err = f.ClientSet.ExtensionsV1beta1().Deployments(ns).Update(deploy)
|
_, err = f.ClientSet.AppsV1().Deployments(ns).Update(deploy)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
wait.Poll(10*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
|
wait.Poll(10*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
|
||||||
res, err := jig.GetDistinctResponseFromIngress()
|
res, err := jig.GetDistinctResponseFromIngress()
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
deploy, err := f.ClientSet.ExtensionsV1beta1().Deployments(ns).Get(name, metav1.GetOptions{})
|
deploy, err := f.ClientSet.AppsV1().Deployments(ns).Get(name, metav1.GetOptions{})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
if int(deploy.Status.UpdatedReplicas) == replicas {
|
if int(deploy.Status.UpdatedReplicas) == replicas {
|
||||||
if res.Len() == replicas {
|
if res.Len() == replicas {
|
||||||
|
@ -22,6 +22,7 @@ import (
|
|||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
extensions "k8s.io/api/extensions/v1beta1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
@ -71,7 +72,7 @@ type IngressScaleFramework struct {
|
|||||||
NumIngressesTest []int
|
NumIngressesTest []int
|
||||||
OutputFile string
|
OutputFile string
|
||||||
|
|
||||||
ScaleTestDeploy *extensions.Deployment
|
ScaleTestDeploy *apps.Deployment
|
||||||
ScaleTestSvcs []*v1.Service
|
ScaleTestSvcs []*v1.Service
|
||||||
ScaleTestIngs []*extensions.Ingress
|
ScaleTestIngs []*extensions.Ingress
|
||||||
|
|
||||||
@ -147,7 +148,7 @@ func (f *IngressScaleFramework) CleanupScaleTest() []error {
|
|||||||
}
|
}
|
||||||
if f.ScaleTestDeploy != nil {
|
if f.ScaleTestDeploy != nil {
|
||||||
f.Logger.Infof("Cleaning up deployment %s...", f.ScaleTestDeploy.Name)
|
f.Logger.Infof("Cleaning up deployment %s...", f.ScaleTestDeploy.Name)
|
||||||
if err := f.Clientset.ExtensionsV1beta1().Deployments(f.ScaleTestDeploy.Namespace).Delete(f.ScaleTestDeploy.Name, nil); err != nil {
|
if err := f.Clientset.AppsV1().Deployments(f.ScaleTestDeploy.Namespace).Delete(f.ScaleTestDeploy.Name, nil); err != nil {
|
||||||
errs = append(errs, fmt.Errorf("Error while delting deployment %s/%s: %v", f.ScaleTestDeploy.Namespace, f.ScaleTestDeploy.Name, err))
|
errs = append(errs, fmt.Errorf("Error while delting deployment %s/%s: %v", f.ScaleTestDeploy.Namespace, f.ScaleTestDeploy.Name, err))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -166,7 +167,7 @@ func (f *IngressScaleFramework) RunScaleTest() []error {
|
|||||||
|
|
||||||
testDeploy := generateScaleTestBackendDeploymentSpec(scaleTestNumBackends)
|
testDeploy := generateScaleTestBackendDeploymentSpec(scaleTestNumBackends)
|
||||||
f.Logger.Infof("Creating deployment %s...", testDeploy.Name)
|
f.Logger.Infof("Creating deployment %s...", testDeploy.Name)
|
||||||
testDeploy, err := f.Jig.Client.ExtensionsV1beta1().Deployments(f.Namespace).Create(testDeploy)
|
testDeploy, err := f.Jig.Client.AppsV1().Deployments(f.Namespace).Create(testDeploy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errs = append(errs, fmt.Errorf("Failed to create deployment %s: %v", testDeploy.Name, err))
|
errs = append(errs, fmt.Errorf("Failed to create deployment %s: %v", testDeploy.Name, err))
|
||||||
return errs
|
return errs
|
||||||
@ -436,12 +437,12 @@ func generateScaleTestServiceSpec(suffix string) *v1.Service {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func generateScaleTestBackendDeploymentSpec(numReplicas int32) *extensions.Deployment {
|
func generateScaleTestBackendDeploymentSpec(numReplicas int32) *apps.Deployment {
|
||||||
return &extensions.Deployment{
|
return &apps.Deployment{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: scaleTestBackendName,
|
Name: scaleTestBackendName,
|
||||||
},
|
},
|
||||||
Spec: extensions.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
Replicas: &numReplicas,
|
Replicas: &numReplicas,
|
||||||
Selector: &metav1.LabelSelector{MatchLabels: scaleTestLabels},
|
Selector: &metav1.LabelSelector{MatchLabels: scaleTestLabels},
|
||||||
Template: v1.PodTemplateSpec{
|
Template: v1.PodTemplateSpec{
|
||||||
|
@ -31,7 +31,6 @@ import (
|
|||||||
|
|
||||||
appsv1 "k8s.io/api/apps/v1"
|
appsv1 "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extv1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
rbacv1beta1 "k8s.io/api/rbac/v1beta1"
|
rbacv1beta1 "k8s.io/api/rbac/v1beta1"
|
||||||
storagev1 "k8s.io/api/storage/v1"
|
storagev1 "k8s.io/api/storage/v1"
|
||||||
"k8s.io/apimachinery/pkg/api/resource"
|
"k8s.io/apimachinery/pkg/api/resource"
|
||||||
@ -1627,7 +1626,7 @@ func createProvisionerDaemonset(config *localTestConfig) {
|
|||||||
provisionerPrivileged := true
|
provisionerPrivileged := true
|
||||||
mountProp := v1.MountPropagationHostToContainer
|
mountProp := v1.MountPropagationHostToContainer
|
||||||
|
|
||||||
provisioner := &extv1beta1.DaemonSet{
|
provisioner := &appsv1.DaemonSet{
|
||||||
TypeMeta: metav1.TypeMeta{
|
TypeMeta: metav1.TypeMeta{
|
||||||
Kind: "DaemonSet",
|
Kind: "DaemonSet",
|
||||||
APIVersion: "extensions/v1beta1",
|
APIVersion: "extensions/v1beta1",
|
||||||
@ -1635,7 +1634,7 @@ func createProvisionerDaemonset(config *localTestConfig) {
|
|||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: daemonSetName,
|
Name: daemonSetName,
|
||||||
},
|
},
|
||||||
Spec: extv1beta1.DaemonSetSpec{
|
Spec: appsv1.DaemonSetSpec{
|
||||||
Selector: &metav1.LabelSelector{
|
Selector: &metav1.LabelSelector{
|
||||||
MatchLabels: map[string]string{"app": "local-volume-provisioner"},
|
MatchLabels: map[string]string{"app": "local-volume-provisioner"},
|
||||||
},
|
},
|
||||||
@ -1708,7 +1707,7 @@ func createProvisionerDaemonset(config *localTestConfig) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
_, err := config.client.ExtensionsV1beta1().DaemonSets(config.ns).Create(provisioner)
|
_, err := config.client.AppsV1().DaemonSets(config.ns).Create(provisioner)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
kind := schema.GroupKind{Group: "extensions", Kind: "DaemonSet"}
|
kind := schema.GroupKind{Group: "extensions", Kind: "DaemonSet"}
|
||||||
@ -1732,12 +1731,12 @@ func findProvisionerDaemonsetPodName(config *localTestConfig) string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func deleteProvisionerDaemonset(config *localTestConfig) {
|
func deleteProvisionerDaemonset(config *localTestConfig) {
|
||||||
ds, err := config.client.ExtensionsV1beta1().DaemonSets(config.ns).Get(daemonSetName, metav1.GetOptions{})
|
ds, err := config.client.AppsV1().DaemonSets(config.ns).Get(daemonSetName, metav1.GetOptions{})
|
||||||
if ds == nil {
|
if ds == nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
err = config.client.ExtensionsV1beta1().DaemonSets(config.ns).Delete(daemonSetName, nil)
|
err = config.client.AppsV1().DaemonSets(config.ns).Delete(daemonSetName, nil)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
err = wait.PollImmediate(time.Second, time.Minute, func() (bool, error) {
|
err = wait.PollImmediate(time.Second, time.Minute, func() (bool, error) {
|
||||||
|
@ -95,7 +95,7 @@ var _ = utils.SIGDescribe("Node Poweroff [Feature:vsphere] [Slow] [Disruptive]",
|
|||||||
By("Creating a Deployment")
|
By("Creating a Deployment")
|
||||||
deployment, err := framework.CreateDeployment(client, int32(1), map[string]string{"test": "app"}, nil, namespace, pvclaims, "")
|
deployment, err := framework.CreateDeployment(client, int32(1), map[string]string{"test": "app"}, nil, namespace, pvclaims, "")
|
||||||
Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("Failed to create Deployment with err: %v", err))
|
Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("Failed to create Deployment with err: %v", err))
|
||||||
defer client.ExtensionsV1beta1().Deployments(namespace).Delete(deployment.Name, &metav1.DeleteOptions{})
|
defer client.AppsV1().Deployments(namespace).Delete(deployment.Name, &metav1.DeleteOptions{})
|
||||||
|
|
||||||
By("Get pod from the deployement")
|
By("Get pod from the deployement")
|
||||||
podList, err := framework.GetPodsForDeployment(client, deployment)
|
podList, err := framework.GetPodsForDeployment(client, deployment)
|
||||||
|
@ -17,24 +17,22 @@ limitations under the License.
|
|||||||
package upgrades
|
package upgrades
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
. "github.com/onsi/ginkgo"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
|
"k8s.io/api/core/v1"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
"k8s.io/kubernetes/pkg/controller"
|
"k8s.io/kubernetes/pkg/controller"
|
||||||
|
|
||||||
"k8s.io/api/core/v1"
|
|
||||||
|
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
"k8s.io/kubernetes/test/e2e/upgrades"
|
"k8s.io/kubernetes/test/e2e/upgrades"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// DaemonSetUpgradeTest tests that a DaemonSet is running before and after
|
// DaemonSetUpgradeTest tests that a DaemonSet is running before and after
|
||||||
// a cluster upgrade.
|
// a cluster upgrade.
|
||||||
type DaemonSetUpgradeTest struct {
|
type DaemonSetUpgradeTest struct {
|
||||||
daemonSet *extensions.DaemonSet
|
daemonSet *apps.DaemonSet
|
||||||
}
|
}
|
||||||
|
|
||||||
func (DaemonSetUpgradeTest) Name() string { return "[sig-apps] daemonset-upgrade" }
|
func (DaemonSetUpgradeTest) Name() string { return "[sig-apps] daemonset-upgrade" }
|
||||||
@ -47,12 +45,12 @@ func (t *DaemonSetUpgradeTest) Setup(f *framework.Framework) {
|
|||||||
|
|
||||||
ns := f.Namespace
|
ns := f.Namespace
|
||||||
|
|
||||||
t.daemonSet = &extensions.DaemonSet{
|
t.daemonSet = &apps.DaemonSet{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Namespace: ns.Name,
|
Namespace: ns.Name,
|
||||||
Name: daemonSetName,
|
Name: daemonSetName,
|
||||||
},
|
},
|
||||||
Spec: extensions.DaemonSetSpec{
|
Spec: apps.DaemonSetSpec{
|
||||||
Template: v1.PodTemplateSpec{
|
Template: v1.PodTemplateSpec{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Labels: labelSet,
|
Labels: labelSet,
|
||||||
@ -72,7 +70,7 @@ func (t *DaemonSetUpgradeTest) Setup(f *framework.Framework) {
|
|||||||
|
|
||||||
By("Creating a DaemonSet")
|
By("Creating a DaemonSet")
|
||||||
var err error
|
var err error
|
||||||
if t.daemonSet, err = f.ClientSet.ExtensionsV1beta1().DaemonSets(ns.Name).Create(t.daemonSet); err != nil {
|
if t.daemonSet, err = f.ClientSet.AppsV1().DaemonSets(ns.Name).Create(t.daemonSet); err != nil {
|
||||||
framework.Failf("unable to create test DaemonSet %s: %v", t.daemonSet.Name, err)
|
framework.Failf("unable to create test DaemonSet %s: %v", t.daemonSet.Name, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -168,7 +166,7 @@ func checkDaemonPodOnNodes(f *framework.Framework, namespace string, labelSet ma
|
|||||||
}
|
}
|
||||||
|
|
||||||
func checkDaemonStatus(f *framework.Framework, namespace string, dsName string) (bool, error) {
|
func checkDaemonStatus(f *framework.Framework, namespace string, dsName string) (bool, error) {
|
||||||
ds, err := f.ClientSet.ExtensionsV1beta1().DaemonSets(namespace).Get(dsName, metav1.GetOptions{})
|
ds, err := f.ClientSet.AppsV1().DaemonSets(namespace).Get(dsName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return false, err
|
||||||
}
|
}
|
||||||
|
@ -20,8 +20,8 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
@ -213,8 +213,8 @@ func getKubeProxyStaticPods(c clientset.Interface) (*v1.PodList, error) {
|
|||||||
return c.CoreV1().Pods(metav1.NamespaceSystem).List(listOpts)
|
return c.CoreV1().Pods(metav1.NamespaceSystem).List(listOpts)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getKubeProxyDaemonSet(c clientset.Interface) (*extensions.DaemonSetList, error) {
|
func getKubeProxyDaemonSet(c clientset.Interface) (*apps.DaemonSetList, error) {
|
||||||
label := labels.SelectorFromSet(labels.Set(map[string]string{clusterAddonLabelKey: kubeProxyLabelName}))
|
label := labels.SelectorFromSet(labels.Set(map[string]string{clusterAddonLabelKey: kubeProxyLabelName}))
|
||||||
listOpts := metav1.ListOptions{LabelSelector: label.String()}
|
listOpts := metav1.ListOptions{LabelSelector: label.String()}
|
||||||
return c.ExtensionsV1beta1().DaemonSets(metav1.NamespaceSystem).List(listOpts)
|
return c.AppsV1().DaemonSets(metav1.NamespaceSystem).List(listOpts)
|
||||||
}
|
}
|
||||||
|
@ -26,8 +26,8 @@ import (
|
|||||||
"reflect"
|
"reflect"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
"k8s.io/api/extensions/v1beta1"
|
|
||||||
"k8s.io/apimachinery/pkg/api/meta"
|
"k8s.io/apimachinery/pkg/api/meta"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
@ -86,17 +86,18 @@ func path(resource, namespace, name string) string {
|
|||||||
return testapi.Extensions.ResourcePath(resource, namespace, name)
|
return testapi.Extensions.ResourcePath(resource, namespace, name)
|
||||||
}
|
}
|
||||||
|
|
||||||
func newRS(namespace string) *v1beta1.ReplicaSet {
|
func newRS(namespace string) *apps.ReplicaSet {
|
||||||
return &v1beta1.ReplicaSet{
|
return &apps.ReplicaSet{
|
||||||
TypeMeta: metav1.TypeMeta{
|
TypeMeta: metav1.TypeMeta{
|
||||||
Kind: "ReplicaSet",
|
Kind: "ReplicaSet",
|
||||||
APIVersion: "extensions/v1beta1",
|
APIVersion: "apps/v1",
|
||||||
},
|
},
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Namespace: namespace,
|
Namespace: namespace,
|
||||||
GenerateName: "apiserver-test",
|
GenerateName: "apiserver-test",
|
||||||
},
|
},
|
||||||
Spec: v1beta1.ReplicaSetSpec{
|
Spec: apps.ReplicaSetSpec{
|
||||||
|
Selector: &metav1.LabelSelector{MatchLabels: map[string]string{"name": "test"}},
|
||||||
Template: v1.PodTemplateSpec{
|
Template: v1.PodTemplateSpec{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Labels: map[string]string{"name": "test"},
|
Labels: map[string]string{"name": "test"},
|
||||||
@ -130,7 +131,7 @@ func Test202StatusCode(t *testing.T) {
|
|||||||
ns := framework.CreateTestingNamespace("status-code", s, t)
|
ns := framework.CreateTestingNamespace("status-code", s, t)
|
||||||
defer framework.DeleteTestingNamespace(ns, s, t)
|
defer framework.DeleteTestingNamespace(ns, s, t)
|
||||||
|
|
||||||
rsClient := clientSet.ExtensionsV1beta1().ReplicaSets(ns.Name)
|
rsClient := clientSet.AppsV1().ReplicaSets(ns.Name)
|
||||||
|
|
||||||
// 1. Create the resource without any finalizer and then delete it without setting DeleteOptions.
|
// 1. Create the resource without any finalizer and then delete it without setting DeleteOptions.
|
||||||
// Verify that server returns 200 in this case.
|
// Verify that server returns 200 in this case.
|
||||||
@ -178,7 +179,7 @@ func TestAPIListChunking(t *testing.T) {
|
|||||||
ns := framework.CreateTestingNamespace("list-paging", s, t)
|
ns := framework.CreateTestingNamespace("list-paging", s, t)
|
||||||
defer framework.DeleteTestingNamespace(ns, s, t)
|
defer framework.DeleteTestingNamespace(ns, s, t)
|
||||||
|
|
||||||
rsClient := clientSet.ExtensionsV1beta1().ReplicaSets(ns.Name)
|
rsClient := clientSet.AppsV1().ReplicaSets(ns.Name)
|
||||||
|
|
||||||
for i := 0; i < 4; i++ {
|
for i := 0; i < 4; i++ {
|
||||||
rs := newRS(ns.Name)
|
rs := newRS(ns.Name)
|
||||||
@ -227,7 +228,7 @@ func TestAPIListChunking(t *testing.T) {
|
|||||||
}
|
}
|
||||||
var names []string
|
var names []string
|
||||||
if err := meta.EachListItem(listObj, func(obj runtime.Object) error {
|
if err := meta.EachListItem(listObj, func(obj runtime.Object) error {
|
||||||
rs := obj.(*v1beta1.ReplicaSet)
|
rs := obj.(*apps.ReplicaSet)
|
||||||
names = append(names, rs.Name)
|
names = append(names, rs.Name)
|
||||||
return nil
|
return nil
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
|
@ -1252,12 +1252,12 @@ func TestGeneralReplicaSetAdoption(t *testing.T) {
|
|||||||
// with Controller=false, the deployment should add a second OwnerReference (ControllerRef) pointing to itself
|
// with Controller=false, the deployment should add a second OwnerReference (ControllerRef) pointing to itself
|
||||||
// with Controller=true
|
// with Controller=true
|
||||||
var falseVar = false
|
var falseVar = false
|
||||||
ownerReference := metav1.OwnerReference{UID: uuid.NewUUID(), APIVersion: "apps/v1beta1", Kind: "StatefulSet", Name: deploymentName, Controller: &falseVar}
|
ownerReference := metav1.OwnerReference{UID: uuid.NewUUID(), APIVersion: "apps/v1", Kind: "StatefulSet", Name: deploymentName, Controller: &falseVar}
|
||||||
testRSControllerRefPatch(t, tester, rs, &ownerReference, 2)
|
testRSControllerRefPatch(t, tester, rs, &ownerReference, 2)
|
||||||
|
|
||||||
// When the only OwnerReference of the RS points to the deployment with Controller=false,
|
// When the only OwnerReference of the RS points to the deployment with Controller=false,
|
||||||
// the deployment should set Controller=true for the only OwnerReference
|
// the deployment should set Controller=true for the only OwnerReference
|
||||||
ownerReference = metav1.OwnerReference{UID: tester.deployment.UID, APIVersion: "extensions/v1beta1", Kind: "Deployment", Name: deploymentName, Controller: &falseVar}
|
ownerReference = metav1.OwnerReference{UID: tester.deployment.UID, APIVersion: "apps/v1", Kind: "Deployment", Name: deploymentName, Controller: &falseVar}
|
||||||
testRSControllerRefPatch(t, tester, rs, &ownerReference, 1)
|
testRSControllerRefPatch(t, tester, rs, &ownerReference, 1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -330,9 +330,9 @@ func rmSetup(t *testing.T) (*httptest.Server, framework.CloseFunc, *disruption.D
|
|||||||
informers.Core().V1().Pods(),
|
informers.Core().V1().Pods(),
|
||||||
informers.Policy().V1beta1().PodDisruptionBudgets(),
|
informers.Policy().V1beta1().PodDisruptionBudgets(),
|
||||||
informers.Core().V1().ReplicationControllers(),
|
informers.Core().V1().ReplicationControllers(),
|
||||||
informers.Extensions().V1beta1().ReplicaSets(),
|
informers.Apps().V1().ReplicaSets(),
|
||||||
informers.Extensions().V1beta1().Deployments(),
|
informers.Apps().V1().Deployments(),
|
||||||
informers.Apps().V1beta1().StatefulSets(),
|
informers.Apps().V1().StatefulSets(),
|
||||||
clientset.NewForConfigOrDie(restclient.AddUserAgent(&config, "disruption-controller")),
|
clientset.NewForConfigOrDie(restclient.AddUserAgent(&config, "disruption-controller")),
|
||||||
)
|
)
|
||||||
return s, closeFn, rm, informers, clientSet
|
return s, closeFn, rm, informers, clientSet
|
||||||
|
@ -335,7 +335,7 @@ func setPodsReadyCondition(t *testing.T, clientSet clientset.Interface, pods *v1
|
|||||||
|
|
||||||
func testScalingUsingScaleSubresource(t *testing.T, c clientset.Interface, rs *apps.ReplicaSet, replicas int32) {
|
func testScalingUsingScaleSubresource(t *testing.T, c clientset.Interface, rs *apps.ReplicaSet, replicas int32) {
|
||||||
ns := rs.Namespace
|
ns := rs.Namespace
|
||||||
rsClient := c.ExtensionsV1beta1().ReplicaSets(ns)
|
rsClient := c.AppsV1().ReplicaSets(ns)
|
||||||
newRS, err := rsClient.Get(rs.Name, metav1.GetOptions{})
|
newRS, err := rsClient.Get(rs.Name, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Failed to obtain rs %s: %v", rs.Name, err)
|
t.Fatalf("Failed to obtain rs %s: %v", rs.Name, err)
|
||||||
@ -637,7 +637,7 @@ func TestOverlappingRSs(t *testing.T) {
|
|||||||
|
|
||||||
// Expect both RSs have .status.replicas = .spec.replicas
|
// Expect both RSs have .status.replicas = .spec.replicas
|
||||||
for i := 0; i < 2; i++ {
|
for i := 0; i < 2; i++ {
|
||||||
newRS, err := c.ExtensionsV1beta1().ReplicaSets(ns.Name).Get(fmt.Sprintf("rs-%d", i+1), metav1.GetOptions{})
|
newRS, err := c.AppsV1().ReplicaSets(ns.Name).Get(fmt.Sprintf("rs-%d", i+1), metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to obtain rs rs-%d: %v", i+1, err)
|
t.Fatalf("failed to obtain rs rs-%d: %v", i+1, err)
|
||||||
}
|
}
|
||||||
@ -795,7 +795,7 @@ func TestReadyAndAvailableReplicas(t *testing.T) {
|
|||||||
// by setting LastTransitionTime to more than 3600 seconds ago
|
// by setting LastTransitionTime to more than 3600 seconds ago
|
||||||
setPodsReadyCondition(t, c, thirdPodList, v1.ConditionTrue, time.Now().Add(-120*time.Minute))
|
setPodsReadyCondition(t, c, thirdPodList, v1.ConditionTrue, time.Now().Add(-120*time.Minute))
|
||||||
|
|
||||||
rsClient := c.ExtensionsV1beta1().ReplicaSets(ns.Name)
|
rsClient := c.AppsV1().ReplicaSets(ns.Name)
|
||||||
if err := wait.PollImmediate(interval, timeout, func() (bool, error) {
|
if err := wait.PollImmediate(interval, timeout, func() (bool, error) {
|
||||||
newRS, err := rsClient.Get(rs.Name, metav1.GetOptions{})
|
newRS, err := rsClient.Get(rs.Name, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -94,7 +94,7 @@ func TestTaintNodeByCondition(t *testing.T) {
|
|||||||
informers.Coordination().V1beta1().Leases(),
|
informers.Coordination().V1beta1().Leases(),
|
||||||
informers.Core().V1().Pods(),
|
informers.Core().V1().Pods(),
|
||||||
informers.Core().V1().Nodes(),
|
informers.Core().V1().Nodes(),
|
||||||
informers.Extensions().V1beta1().DaemonSets(),
|
informers.Apps().V1().DaemonSets(),
|
||||||
cs,
|
cs,
|
||||||
time.Hour, // Node monitor grace period
|
time.Hour, // Node monitor grace period
|
||||||
time.Second, // Node startup grace period
|
time.Second, // Node startup grace period
|
||||||
|
@ -231,9 +231,9 @@ func initDisruptionController(context *TestContext) *disruption.DisruptionContro
|
|||||||
informers.Core().V1().Pods(),
|
informers.Core().V1().Pods(),
|
||||||
informers.Policy().V1beta1().PodDisruptionBudgets(),
|
informers.Policy().V1beta1().PodDisruptionBudgets(),
|
||||||
informers.Core().V1().ReplicationControllers(),
|
informers.Core().V1().ReplicationControllers(),
|
||||||
informers.Extensions().V1beta1().ReplicaSets(),
|
informers.Apps().V1().ReplicaSets(),
|
||||||
informers.Extensions().V1beta1().Deployments(),
|
informers.Apps().V1().Deployments(),
|
||||||
informers.Apps().V1beta1().StatefulSets(),
|
informers.Apps().V1().StatefulSets(),
|
||||||
context.clientSet)
|
context.clientSet)
|
||||||
|
|
||||||
informers.Start(context.schedulerConfig.StopEverything)
|
informers.Start(context.schedulerConfig.StopEverything)
|
||||||
|
@ -22,9 +22,9 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
batch "k8s.io/api/batch/v1"
|
batch "k8s.io/api/batch/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
||||||
utilnet "k8s.io/apimachinery/pkg/util/net"
|
utilnet "k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
@ -97,12 +97,12 @@ func CreateRCWithRetries(c clientset.Interface, namespace string, obj *v1.Replic
|
|||||||
return RetryWithExponentialBackOff(createFunc)
|
return RetryWithExponentialBackOff(createFunc)
|
||||||
}
|
}
|
||||||
|
|
||||||
func CreateReplicaSetWithRetries(c clientset.Interface, namespace string, obj *extensions.ReplicaSet) error {
|
func CreateReplicaSetWithRetries(c clientset.Interface, namespace string, obj *apps.ReplicaSet) error {
|
||||||
if obj == nil {
|
if obj == nil {
|
||||||
return fmt.Errorf("Object provided to create is empty")
|
return fmt.Errorf("Object provided to create is empty")
|
||||||
}
|
}
|
||||||
createFunc := func() (bool, error) {
|
createFunc := func() (bool, error) {
|
||||||
_, err := c.ExtensionsV1beta1().ReplicaSets(namespace).Create(obj)
|
_, err := c.AppsV1().ReplicaSets(namespace).Create(obj)
|
||||||
if err == nil || apierrs.IsAlreadyExists(err) {
|
if err == nil || apierrs.IsAlreadyExists(err) {
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
@ -114,12 +114,12 @@ func CreateReplicaSetWithRetries(c clientset.Interface, namespace string, obj *e
|
|||||||
return RetryWithExponentialBackOff(createFunc)
|
return RetryWithExponentialBackOff(createFunc)
|
||||||
}
|
}
|
||||||
|
|
||||||
func CreateDeploymentWithRetries(c clientset.Interface, namespace string, obj *extensions.Deployment) error {
|
func CreateDeploymentWithRetries(c clientset.Interface, namespace string, obj *apps.Deployment) error {
|
||||||
if obj == nil {
|
if obj == nil {
|
||||||
return fmt.Errorf("Object provided to create is empty")
|
return fmt.Errorf("Object provided to create is empty")
|
||||||
}
|
}
|
||||||
createFunc := func() (bool, error) {
|
createFunc := func() (bool, error) {
|
||||||
_, err := c.ExtensionsV1beta1().Deployments(namespace).Create(obj)
|
_, err := c.AppsV1().Deployments(namespace).Create(obj)
|
||||||
if err == nil || apierrs.IsAlreadyExists(err) {
|
if err == nil || apierrs.IsAlreadyExists(err) {
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
@ -131,12 +131,12 @@ func CreateDeploymentWithRetries(c clientset.Interface, namespace string, obj *e
|
|||||||
return RetryWithExponentialBackOff(createFunc)
|
return RetryWithExponentialBackOff(createFunc)
|
||||||
}
|
}
|
||||||
|
|
||||||
func CreateDaemonSetWithRetries(c clientset.Interface, namespace string, obj *extensions.DaemonSet) error {
|
func CreateDaemonSetWithRetries(c clientset.Interface, namespace string, obj *apps.DaemonSet) error {
|
||||||
if obj == nil {
|
if obj == nil {
|
||||||
return fmt.Errorf("Object provided to create is empty")
|
return fmt.Errorf("Object provided to create is empty")
|
||||||
}
|
}
|
||||||
createFunc := func() (bool, error) {
|
createFunc := func() (bool, error) {
|
||||||
_, err := c.ExtensionsV1beta1().DaemonSets(namespace).Create(obj)
|
_, err := c.AppsV1().DaemonSets(namespace).Create(obj)
|
||||||
if err == nil || apierrs.IsAlreadyExists(err) {
|
if err == nil || apierrs.IsAlreadyExists(err) {
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
@ -38,11 +38,11 @@ func deleteResource(c clientset.Interface, kind schema.GroupKind, namespace, nam
|
|||||||
case api.Kind("ReplicationController"):
|
case api.Kind("ReplicationController"):
|
||||||
return c.CoreV1().ReplicationControllers(namespace).Delete(name, options)
|
return c.CoreV1().ReplicationControllers(namespace).Delete(name, options)
|
||||||
case extensionsinternal.Kind("ReplicaSet"), appsinternal.Kind("ReplicaSet"):
|
case extensionsinternal.Kind("ReplicaSet"), appsinternal.Kind("ReplicaSet"):
|
||||||
return c.ExtensionsV1beta1().ReplicaSets(namespace).Delete(name, options)
|
return c.AppsV1().ReplicaSets(namespace).Delete(name, options)
|
||||||
case extensionsinternal.Kind("Deployment"), appsinternal.Kind("Deployment"):
|
case extensionsinternal.Kind("Deployment"), appsinternal.Kind("Deployment"):
|
||||||
return c.ExtensionsV1beta1().Deployments(namespace).Delete(name, options)
|
return c.AppsV1().Deployments(namespace).Delete(name, options)
|
||||||
case extensionsinternal.Kind("DaemonSet"):
|
case extensionsinternal.Kind("DaemonSet"):
|
||||||
return c.ExtensionsV1beta1().DaemonSets(namespace).Delete(name, options)
|
return c.AppsV1().DaemonSets(namespace).Delete(name, options)
|
||||||
case batchinternal.Kind("Job"):
|
case batchinternal.Kind("Job"):
|
||||||
return c.BatchV1().Jobs(namespace).Delete(name, options)
|
return c.BatchV1().Jobs(namespace).Delete(name, options)
|
||||||
case api.Kind("Secret"):
|
case api.Kind("Secret"):
|
||||||
|
@ -25,9 +25,9 @@ import (
|
|||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apps "k8s.io/api/apps/v1"
|
||||||
batch "k8s.io/api/batch/v1"
|
batch "k8s.io/api/batch/v1"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
|
||||||
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
||||||
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
||||||
"k8s.io/apimachinery/pkg/api/resource"
|
"k8s.io/apimachinery/pkg/api/resource"
|
||||||
@ -300,11 +300,11 @@ func (config *DeploymentConfig) GetGroupResource() schema.GroupResource {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (config *DeploymentConfig) create() error {
|
func (config *DeploymentConfig) create() error {
|
||||||
deployment := &extensions.Deployment{
|
deployment := &apps.Deployment{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: config.Name,
|
Name: config.Name,
|
||||||
},
|
},
|
||||||
Spec: extensions.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
Replicas: func(i int) *int32 { x := int32(i); return &x }(config.Replicas),
|
Replicas: func(i int) *int32 { x := int32(i); return &x }(config.Replicas),
|
||||||
Selector: &metav1.LabelSelector{
|
Selector: &metav1.LabelSelector{
|
||||||
MatchLabels: map[string]string{
|
MatchLabels: map[string]string{
|
||||||
@ -375,11 +375,11 @@ func (config *ReplicaSetConfig) GetGroupResource() schema.GroupResource {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (config *ReplicaSetConfig) create() error {
|
func (config *ReplicaSetConfig) create() error {
|
||||||
rs := &extensions.ReplicaSet{
|
rs := &apps.ReplicaSet{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: config.Name,
|
Name: config.Name,
|
||||||
},
|
},
|
||||||
Spec: extensions.ReplicaSetSpec{
|
Spec: apps.ReplicaSetSpec{
|
||||||
Replicas: func(i int) *int32 { x := int32(i); return &x }(config.Replicas),
|
Replicas: func(i int) *int32 { x := int32(i); return &x }(config.Replicas),
|
||||||
Selector: &metav1.LabelSelector{
|
Selector: &metav1.LabelSelector{
|
||||||
MatchLabels: map[string]string{
|
MatchLabels: map[string]string{
|
||||||
@ -1327,11 +1327,11 @@ func (config *DaemonConfig) Run() error {
|
|||||||
nameLabel := map[string]string{
|
nameLabel := map[string]string{
|
||||||
"name": config.Name + "-daemon",
|
"name": config.Name + "-daemon",
|
||||||
}
|
}
|
||||||
daemon := &extensions.DaemonSet{
|
daemon := &apps.DaemonSet{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: config.Name,
|
Name: config.Name,
|
||||||
},
|
},
|
||||||
Spec: extensions.DaemonSetSpec{
|
Spec: apps.DaemonSetSpec{
|
||||||
Template: v1.PodTemplateSpec{
|
Template: v1.PodTemplateSpec{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Labels: nameLabel,
|
Labels: nameLabel,
|
||||||
|
Loading…
Reference in New Issue
Block a user