mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-24 20:24:09 +00:00
Merge pull request #51955 from danwinship/update-networkpolicy-storage
Automatic merge from submit-queue (batch tested with PRs 55648, 55274, 54982, 51955, 55639). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Swap NetworkPolicy storage to networking.k8s.io/v1 Finishes(?) the NetworkPolicy v1 migration. Fixes #50604 The integration test passes. I copied the test-update-storage-objects.sh change from #50327 and have no idea if it's right. /cc @sttts @caesarxuchao @thockin **Release note**: ```release-note ```
This commit is contained in:
commit
9058769dad
@ -53,6 +53,7 @@ declare -a resources=(
|
|||||||
"rolebindings.rbac.authorization.k8s.io"
|
"rolebindings.rbac.authorization.k8s.io"
|
||||||
"clusterroles.rbac.authorization.k8s.io"
|
"clusterroles.rbac.authorization.k8s.io"
|
||||||
"clusterrolebindings.rbac.authorization.k8s.io"
|
"clusterrolebindings.rbac.authorization.k8s.io"
|
||||||
|
"networkpolicies.networking.k8s.io"
|
||||||
)
|
)
|
||||||
|
|
||||||
# Find all the namespaces.
|
# Find all the namespaces.
|
||||||
|
@ -566,11 +566,12 @@ func BuildStorageFactory(s *options.ServerRunOptions) (*serverstorage.DefaultSto
|
|||||||
return nil, fmt.Errorf("error in initializing storage factory: %s", err)
|
return nil, fmt.Errorf("error in initializing storage factory: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// keep Deployments, NetworkPolicies, Daemonsets and ReplicaSets in extensions for backwards compatibility, we'll have to migrate at some point, eventually
|
storageFactory.AddCohabitatingResources(networking.Resource("networkpolicies"), extensions.Resource("networkpolicies"))
|
||||||
|
|
||||||
|
// keep Deployments, Daemonsets and ReplicaSets in extensions for backwards compatibility, we'll have to migrate at some point, eventually
|
||||||
storageFactory.AddCohabitatingResources(extensions.Resource("deployments"), apps.Resource("deployments"))
|
storageFactory.AddCohabitatingResources(extensions.Resource("deployments"), apps.Resource("deployments"))
|
||||||
storageFactory.AddCohabitatingResources(extensions.Resource("daemonsets"), apps.Resource("daemonsets"))
|
storageFactory.AddCohabitatingResources(extensions.Resource("daemonsets"), apps.Resource("daemonsets"))
|
||||||
storageFactory.AddCohabitatingResources(extensions.Resource("replicasets"), apps.Resource("replicasets"))
|
storageFactory.AddCohabitatingResources(extensions.Resource("replicasets"), apps.Resource("replicasets"))
|
||||||
storageFactory.AddCohabitatingResources(extensions.Resource("networkpolicies"), networking.Resource("networkpolicies"))
|
|
||||||
for _, override := range s.Etcd.EtcdServersOverrides {
|
for _, override := range s.Etcd.EtcdServersOverrides {
|
||||||
tokens := strings.Split(override, "#")
|
tokens := strings.Split(override, "#")
|
||||||
if len(tokens) != 2 {
|
if len(tokens) != 2 {
|
||||||
|
@ -263,6 +263,7 @@ var etcdStorageData = map[schema.GroupVersionResource]struct {
|
|||||||
gvr("extensions", "v1beta1", "networkpolicies"): {
|
gvr("extensions", "v1beta1", "networkpolicies"): {
|
||||||
stub: `{"metadata": {"name": "np1"}, "spec": {"podSelector": {"matchLabels": {"e": "f"}}}}`,
|
stub: `{"metadata": {"name": "np1"}, "spec": {"podSelector": {"matchLabels": {"e": "f"}}}}`,
|
||||||
expectedEtcdPath: "/registry/networkpolicies/etcdstoragepathtestnamespace/np1",
|
expectedEtcdPath: "/registry/networkpolicies/etcdstoragepathtestnamespace/np1",
|
||||||
|
expectedGVK: gvkP("networking.k8s.io", "v1", "NetworkPolicy"),
|
||||||
},
|
},
|
||||||
gvr("extensions", "v1beta1", "deployments"): {
|
gvr("extensions", "v1beta1", "deployments"): {
|
||||||
stub: `{"metadata": {"name": "deployment1"}, "spec": {"selector": {"matchLabels": {"f": "z"}}, "template": {"metadata": {"labels": {"f": "z"}}, "spec": {"containers": [{"image": "fedora:latest", "name": "container6"}]}}}}`,
|
stub: `{"metadata": {"name": "deployment1"}, "spec": {"selector": {"matchLabels": {"f": "z"}}, "template": {"metadata": {"labels": {"f": "z"}}, "spec": {"containers": [{"image": "fedora:latest", "name": "container6"}]}}}}`,
|
||||||
@ -278,7 +279,6 @@ var etcdStorageData = map[schema.GroupVersionResource]struct {
|
|||||||
gvr("networking.k8s.io", "v1", "networkpolicies"): {
|
gvr("networking.k8s.io", "v1", "networkpolicies"): {
|
||||||
stub: `{"metadata": {"name": "np2"}, "spec": {"podSelector": {"matchLabels": {"e": "f"}}}}`,
|
stub: `{"metadata": {"name": "np2"}, "spec": {"podSelector": {"matchLabels": {"e": "f"}}}}`,
|
||||||
expectedEtcdPath: "/registry/networkpolicies/etcdstoragepathtestnamespace/np2",
|
expectedEtcdPath: "/registry/networkpolicies/etcdstoragepathtestnamespace/np2",
|
||||||
expectedGVK: gvkP("extensions", "v1beta1", "NetworkPolicy"),
|
|
||||||
},
|
},
|
||||||
// --
|
// --
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user