mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-04 01:40:07 +00:00
Merge pull request #128279 from Jefftree/compat-133
Bump DefaultKubeBinaryVersion to 1.33
This commit is contained in:
commit
9d82148924
@ -34,8 +34,8 @@ import (
|
||||
func TestServerRunOptionsValidate(t *testing.T) {
|
||||
testRegistry := featuregate.NewComponentGlobalsRegistry()
|
||||
featureGate := utilfeature.DefaultFeatureGate.DeepCopy()
|
||||
effectiveVersion := utilversion.NewEffectiveVersion("1.30")
|
||||
effectiveVersion.SetEmulationVersion(version.MajorMinor(1, 32))
|
||||
effectiveVersion := utilversion.NewEffectiveVersion("1.35")
|
||||
effectiveVersion.SetEmulationVersion(version.MajorMinor(1, 31))
|
||||
testComponent := "test"
|
||||
utilruntime.Must(testRegistry.Register(testComponent, effectiveVersion, featureGate))
|
||||
|
||||
@ -197,7 +197,7 @@ func TestServerRunOptionsValidate(t *testing.T) {
|
||||
ComponentName: testComponent,
|
||||
ComponentGlobalsRegistry: testRegistry,
|
||||
},
|
||||
expectErr: "emulation version 1.32 is not between [1.29, 1.30.0]",
|
||||
expectErr: "emulation version 1.31 is not between [1.32, 1.35.0]",
|
||||
},
|
||||
{
|
||||
name: "Test when ServerRunOptions is valid",
|
||||
|
@ -118,7 +118,7 @@ func TestVersionFlagOptions(t *testing.T) {
|
||||
func TestVersionFlagOptionsWithMapping(t *testing.T) {
|
||||
r := testRegistry(t)
|
||||
utilruntime.Must(r.SetEmulationVersionMapping(testComponent, DefaultKubeComponent,
|
||||
func(from *version.Version) *version.Version { return from.OffsetMinor(3) }))
|
||||
func(from *version.Version) *version.Version { return version.MajorMinor(1, from.Minor()+23) }))
|
||||
emuVers := strings.Join(r.unsafeVersionFlagOptions(true), "\n")
|
||||
expectedEmuVers := "test=2.8..2.8 (default=2.8)"
|
||||
if emuVers != expectedEmuVers {
|
||||
|
@ -66,5 +66,5 @@ const (
|
||||
// DefaultKubeBinaryVersion is the hard coded k8 binary version based on the latest K8s release.
|
||||
// It is supposed to be consistent with gitMajor and gitMinor, except for local tests, where gitMajor and gitMinor are "".
|
||||
// Should update for each minor release!
|
||||
DefaultKubeBinaryVersion = "1.32"
|
||||
DefaultKubeBinaryVersion = "1.33"
|
||||
)
|
||||
|
@ -25,6 +25,8 @@ import (
|
||||
apimachineryversion "k8s.io/apimachinery/pkg/version"
|
||||
)
|
||||
|
||||
var minimumKubeEmulationVersion *version.Version = version.MajorMinor(1, 31)
|
||||
|
||||
type EffectiveVersion interface {
|
||||
BinaryVersion() *version.Version
|
||||
EmulationVersion() *version.Version
|
||||
@ -121,8 +123,11 @@ func (m *effectiveVersion) Set(binaryVersion, emulationVersion, minCompatibility
|
||||
|
||||
func (m *effectiveVersion) SetEmulationVersion(emulationVersion *version.Version) {
|
||||
m.emulationVersion.Store(majorMinor(emulationVersion))
|
||||
// set the default minCompatibilityVersion to be emulationVersion - 1
|
||||
m.minCompatibilityVersion.Store(majorMinor(emulationVersion.SubtractMinor(1)))
|
||||
}
|
||||
|
||||
// SetMinCompatibilityVersion should be called after SetEmulationVersion
|
||||
func (m *effectiveVersion) SetMinCompatibilityVersion(minCompatibilityVersion *version.Version) {
|
||||
m.minCompatibilityVersion.Store(majorMinor(minCompatibilityVersion))
|
||||
}
|
||||
@ -134,15 +139,15 @@ func (m *effectiveVersion) Validate() []error {
|
||||
emulationVersion := m.emulationVersion.Load()
|
||||
minCompatibilityVersion := m.minCompatibilityVersion.Load()
|
||||
|
||||
// emulationVersion can only be 1.{binaryMinor-1}...1.{binaryMinor}.
|
||||
// emulationVersion can only be 1.{binaryMinor-3}...1.{binaryMinor}
|
||||
maxEmuVer := binaryVersion
|
||||
minEmuVer := binaryVersion.SubtractMinor(1)
|
||||
minEmuVer := binaryVersion.SubtractMinor(3)
|
||||
if emulationVersion.GreaterThan(maxEmuVer) || emulationVersion.LessThan(minEmuVer) {
|
||||
errs = append(errs, fmt.Errorf("emulation version %s is not between [%s, %s]", emulationVersion.String(), minEmuVer.String(), maxEmuVer.String()))
|
||||
}
|
||||
// minCompatibilityVersion can only be 1.{binaryMinor-1} for alpha.
|
||||
maxCompVer := binaryVersion.SubtractMinor(1)
|
||||
minCompVer := binaryVersion.SubtractMinor(1)
|
||||
// minCompatibilityVersion can only be 1.{binaryMinor-3} to 1.{binaryMinor}
|
||||
maxCompVer := emulationVersion
|
||||
minCompVer := binaryVersion.SubtractMinor(4)
|
||||
if minCompatibilityVersion.GreaterThan(maxCompVer) || minCompatibilityVersion.LessThan(minCompVer) {
|
||||
errs = append(errs, fmt.Errorf("minCompatibilityVersion version %s is not between [%s, %s]", minCompatibilityVersion.String(), minCompVer.String(), maxCompVer.String()))
|
||||
}
|
||||
@ -187,13 +192,15 @@ func DefaultKubeEffectiveVersion() MutableEffectiveVersion {
|
||||
return newEffectiveVersion(binaryVersion, false)
|
||||
}
|
||||
|
||||
// ValidateKubeEffectiveVersion validates the EmulationVersion is equal to the binary version at 1.31 for kube components.
|
||||
// emulationVersion is introduced in 1.31, so it is only allowed to be equal to the binary version at 1.31.
|
||||
// ValidateKubeEffectiveVersion validates the EmulationVersion is at least 1.31 and MinCompatibilityVersion
|
||||
// is at least 1.30 for kube components.
|
||||
func ValidateKubeEffectiveVersion(effectiveVersion EffectiveVersion) error {
|
||||
binaryVersion := version.MajorMinor(effectiveVersion.BinaryVersion().Major(), effectiveVersion.BinaryVersion().Minor())
|
||||
if binaryVersion.EqualTo(version.MajorMinor(1, 31)) && !effectiveVersion.EmulationVersion().EqualTo(binaryVersion) {
|
||||
return fmt.Errorf("emulation version needs to be equal to binary version(%s) in compatibility-version alpha, got %s",
|
||||
binaryVersion.String(), effectiveVersion.EmulationVersion().String())
|
||||
if !effectiveVersion.EmulationVersion().AtLeast(minimumKubeEmulationVersion) {
|
||||
return fmt.Errorf("emulation version needs to be greater or equal to 1.31, got %s", effectiveVersion.EmulationVersion().String())
|
||||
}
|
||||
if !effectiveVersion.MinCompatibilityVersion().AtLeast(minimumKubeEmulationVersion.SubtractMinor(1)) {
|
||||
return fmt.Errorf("minCompatibilityVersion version needs to be greater or equal to 1.30, got %s", effectiveVersion.MinCompatibilityVersion().String())
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
@ -43,9 +43,22 @@ func TestValidate(t *testing.T) {
|
||||
minCompatibilityVersion: "v1.31.0",
|
||||
},
|
||||
{
|
||||
name: "emulation version two minor lower than binary not ok",
|
||||
name: "emulation version two minor lower than binary ok",
|
||||
binaryVersion: "v1.33.2",
|
||||
emulationVersion: "v1.31.0",
|
||||
minCompatibilityVersion: "v1.31.0",
|
||||
expectErrors: false,
|
||||
},
|
||||
{
|
||||
name: "emulation version three minor lower than binary ok",
|
||||
binaryVersion: "v1.35.0",
|
||||
emulationVersion: "v1.32.0",
|
||||
minCompatibilityVersion: "v1.32.0",
|
||||
},
|
||||
{
|
||||
name: "emulation version four minor lower than binary not ok",
|
||||
binaryVersion: "v1.36.0",
|
||||
emulationVersion: "v1.32.0",
|
||||
minCompatibilityVersion: "v1.32.0",
|
||||
expectErrors: true,
|
||||
},
|
||||
@ -64,18 +77,25 @@ func TestValidate(t *testing.T) {
|
||||
expectErrors: true,
|
||||
},
|
||||
{
|
||||
name: "compatibility version same as binary not ok",
|
||||
name: "compatibility version same as binary ok",
|
||||
binaryVersion: "v1.32.2",
|
||||
emulationVersion: "v1.32.0",
|
||||
minCompatibilityVersion: "v1.32.0",
|
||||
expectErrors: true,
|
||||
expectErrors: false,
|
||||
},
|
||||
{
|
||||
name: "compatibility version two minor lower than binary not ok",
|
||||
name: "compatibility version two minor lower than binary ok",
|
||||
binaryVersion: "v1.32.2",
|
||||
emulationVersion: "v1.32.0",
|
||||
minCompatibilityVersion: "v1.30.0",
|
||||
expectErrors: true,
|
||||
expectErrors: false,
|
||||
},
|
||||
{
|
||||
name: "compatibility version three minor lower than binary ok",
|
||||
binaryVersion: "v1.34.2",
|
||||
emulationVersion: "v1.33.0",
|
||||
minCompatibilityVersion: "v1.31.0",
|
||||
expectErrors: false,
|
||||
},
|
||||
{
|
||||
name: "compatibility version one minor higher than binary not ok",
|
||||
@ -84,6 +104,13 @@ func TestValidate(t *testing.T) {
|
||||
minCompatibilityVersion: "v1.33.0",
|
||||
expectErrors: true,
|
||||
},
|
||||
{
|
||||
name: "emulation version lower than compatibility version not ok",
|
||||
binaryVersion: "v1.34.2",
|
||||
emulationVersion: "v1.32.0",
|
||||
minCompatibilityVersion: "v1.33.0",
|
||||
expectErrors: true,
|
||||
},
|
||||
}
|
||||
|
||||
for _, test := range tests {
|
||||
@ -105,3 +132,54 @@ func TestValidate(t *testing.T) {
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidateKubeEffectiveVersion(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
emulationVersion string
|
||||
minCompatibilityVersion string
|
||||
expectErr bool
|
||||
}{
|
||||
{
|
||||
name: "valid versions",
|
||||
emulationVersion: "v1.31.0",
|
||||
minCompatibilityVersion: "v1.31.0",
|
||||
expectErr: false,
|
||||
},
|
||||
{
|
||||
name: "emulationVersion too low",
|
||||
emulationVersion: "v1.30.0",
|
||||
minCompatibilityVersion: "v1.31.0",
|
||||
expectErr: true,
|
||||
},
|
||||
{
|
||||
name: "minCompatibilityVersion too low",
|
||||
emulationVersion: "v1.31.0",
|
||||
minCompatibilityVersion: "v1.29.0",
|
||||
expectErr: true,
|
||||
},
|
||||
{
|
||||
name: "both versions too low",
|
||||
emulationVersion: "v1.30.0",
|
||||
minCompatibilityVersion: "v1.30.0",
|
||||
expectErr: true,
|
||||
},
|
||||
}
|
||||
|
||||
for _, test := range tests {
|
||||
t.Run(test.name, func(t *testing.T) {
|
||||
|
||||
effective := NewEffectiveVersion("1.32")
|
||||
effective.SetEmulationVersion(version.MustParseGeneric(test.emulationVersion))
|
||||
effective.SetMinCompatibilityVersion(version.MustParseGeneric(test.minCompatibilityVersion))
|
||||
|
||||
err := ValidateKubeEffectiveVersion(effective)
|
||||
if test.expectErr && err == nil {
|
||||
t.Error("expected error, but got nil")
|
||||
}
|
||||
if !test.expectErr && err != nil {
|
||||
t.Errorf("unexpected error: %v", err)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
@ -2975,20 +2975,6 @@ func TestEmulatedStorageVersion(t *testing.T) {
|
||||
expectedStorageVersion schema.GroupVersion
|
||||
}
|
||||
cases := []testCase{
|
||||
{
|
||||
name: "vap first ga release",
|
||||
emulatedVersion: "1.30",
|
||||
gvr: schema.GroupVersionResource{
|
||||
Group: "admissionregistration.k8s.io",
|
||||
Version: "v1",
|
||||
Resource: "validatingadmissionpolicies",
|
||||
},
|
||||
object: validVap,
|
||||
expectedStorageVersion: schema.GroupVersion{
|
||||
Group: "admissionregistration.k8s.io",
|
||||
Version: "v1beta1",
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "vap after ga release",
|
||||
emulatedVersion: "1.31",
|
||||
|
@ -618,9 +618,6 @@ resources:
|
||||
endpoint: unix:///@encrypt-all-kms-provider.sock
|
||||
`
|
||||
|
||||
// KUBE_APISERVER_SERVE_REMOVED_APIS_FOR_ONE_RELEASE allows for APIs pending removal to not block tests
|
||||
t.Setenv("KUBE_APISERVER_SERVE_REMOVED_APIS_FOR_ONE_RELEASE", "true")
|
||||
|
||||
t.Run("encrypt all resources", func(t *testing.T) {
|
||||
_ = mock.NewBase64Plugin(t, "@encrypt-all-kms-provider.sock")
|
||||
// To ensure we are checking all REST resources
|
||||
|
@ -17,26 +17,54 @@ limitations under the License.
|
||||
package etcd
|
||||
|
||||
import (
|
||||
"strings"
|
||||
|
||||
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
||||
"k8s.io/apiextensions-apiserver/test/integration/fixtures"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
utilversion "k8s.io/component-base/version"
|
||||
|
||||
"k8s.io/kubernetes/test/utils/image"
|
||||
)
|
||||
|
||||
// GetEtcdStorageData returns etcd data for all persisted objects.
|
||||
// GetSupportedEmulatedVersions provides the list of supported emulated versions in the etcd data.
|
||||
// Tests aiming for full coverage of versions should test fixtures of all supported versions.
|
||||
func GetSupportedEmulatedVersions() []string {
|
||||
return []string{
|
||||
utilversion.DefaultKubeEffectiveVersion().BinaryVersion().SubtractMinor(2).String(),
|
||||
utilversion.DefaultKubeEffectiveVersion().BinaryVersion().SubtractMinor(1).String(),
|
||||
utilversion.DefaultKubeEffectiveVersion().BinaryVersion().String(),
|
||||
}
|
||||
}
|
||||
|
||||
// GetEtcdStorageData returns etcd data for all persisted objects at the latest release version.
|
||||
// It is exported so that it can be reused across multiple tests.
|
||||
// It returns a new map on every invocation to prevent different tests from mutating shared state.
|
||||
func GetEtcdStorageData() map[schema.GroupVersionResource]StorageData {
|
||||
return GetEtcdStorageDataForNamespace("etcdstoragepathtestnamespace")
|
||||
return GetEtcdStorageDataServedAt(utilversion.DefaultKubeBinaryVersion, false)
|
||||
}
|
||||
|
||||
// GetEtcdStorageDataForNamespace returns etcd data for all persisted objects.
|
||||
// GetEtcdStorageDataServedAt returns etcd data for all persisted objects at a particular release version.
|
||||
// It is exported so that it can be reused across multiple tests.
|
||||
// It returns a new map on every invocation to prevent different tests from mutating shared state.
|
||||
func GetEtcdStorageDataServedAt(version string, removeAlphas bool) map[schema.GroupVersionResource]StorageData {
|
||||
return GetEtcdStorageDataForNamespaceServedAt("etcdstoragepathtestnamespace", version, removeAlphas)
|
||||
}
|
||||
|
||||
// GetEtcdStorageDataForNamespace returns etcd data for all persisted objects at the latest release version.
|
||||
// It is exported so that it can be reused across multiple tests.
|
||||
// It returns a new map on every invocation to prevent different tests from mutating shared state.
|
||||
// Namespaced objects keys are computed for the specified namespace.
|
||||
func GetEtcdStorageDataForNamespace(namespace string) map[schema.GroupVersionResource]StorageData {
|
||||
return GetEtcdStorageDataForNamespaceServedAt(namespace, utilversion.DefaultKubeBinaryVersion, false)
|
||||
}
|
||||
|
||||
// GetEtcdStorageDataForNamespaceServedAt returns etcd data for all persisted objects at a particular release version.
|
||||
// It is exported so that it can be reused across multiple tests.
|
||||
// It returns a new map on every invocation to prevent different tests from mutating shared state.
|
||||
// Namespaced objects keys are computed for the specified namespace.
|
||||
func GetEtcdStorageDataForNamespaceServedAt(namespace string, version string, removeAlphas bool) map[schema.GroupVersionResource]StorageData {
|
||||
image := image.GetE2EImage(image.BusyBox)
|
||||
etcdStorageData := map[schema.GroupVersionResource]StorageData{
|
||||
// k8s.io/kubernetes/pkg/api/v1
|
||||
@ -465,22 +493,46 @@ func GetEtcdStorageDataForNamespace(namespace string) map[schema.GroupVersionRes
|
||||
},
|
||||
// --
|
||||
|
||||
// k8s.io/kubernetes/pkg/apis/storage/v1
|
||||
gvr("storage.k8s.io", "v1", "csinodes"): {
|
||||
Stub: `{"metadata": {"name": "csini2"}, "spec": {"drivers": [{"name": "test-driver", "nodeID": "localhost", "topologyKeys": ["company.com/zone1", "company.com/zone2"]}]}}`,
|
||||
ExpectedEtcdPath: "/registry/csinodes/csini2",
|
||||
},
|
||||
// --
|
||||
|
||||
// k8s.io/kubernetes/pkg/apis/storage/v1
|
||||
gvr("storage.k8s.io", "v1", "csidrivers"): {
|
||||
Stub: `{"metadata": {"name": "csid2"}, "spec": {"attachRequired": true, "podInfoOnMount": true}}`,
|
||||
ExpectedEtcdPath: "/registry/csidrivers/csid2",
|
||||
},
|
||||
// --
|
||||
}
|
||||
|
||||
// add csinodes
|
||||
// k8s.io/kubernetes/pkg/apis/storage/v1
|
||||
etcdStorageData[gvr("storage.k8s.io", "v1", "csinodes")] = StorageData{
|
||||
Stub: `{"metadata": {"name": "csini2"}, "spec": {"drivers": [{"name": "test-driver", "nodeID": "localhost", "topologyKeys": ["company.com/zone1", "company.com/zone2"]}]}}`,
|
||||
ExpectedEtcdPath: "/registry/csinodes/csini2",
|
||||
// Delete types no longer served or not yet added at a particular emulated version.
|
||||
// When adding a brand new type non-alpha type in the latest release, please ensure that
|
||||
// it is removed in previous emulated versions otherwise emulated version tests will fail.
|
||||
// TODO: derive this programatically from gvk --> instance --> APILifecycle info
|
||||
switch version {
|
||||
case "1.33":
|
||||
delete(etcdStorageData, gvr("flowcontrol.apiserver.k8s.io", "v1beta3", "flowschemas"))
|
||||
delete(etcdStorageData, gvr("flowcontrol.apiserver.k8s.io", "v1beta3", "prioritylevelconfigurations"))
|
||||
case "1.32":
|
||||
delete(etcdStorageData, gvr("flowcontrol.apiserver.k8s.io", "v1beta3", "flowschemas"))
|
||||
delete(etcdStorageData, gvr("flowcontrol.apiserver.k8s.io", "v1beta3", "prioritylevelconfigurations"))
|
||||
case "1.31":
|
||||
delete(etcdStorageData, gvr("resource.k8s.io", "v1beta1", "deviceclasses"))
|
||||
delete(etcdStorageData, gvr("resource.k8s.io", "v1beta1", "resourceclaims"))
|
||||
delete(etcdStorageData, gvr("resource.k8s.io", "v1beta1", "resourceclaimtemplates"))
|
||||
delete(etcdStorageData, gvr("resource.k8s.io", "v1beta1", "resourceslices"))
|
||||
}
|
||||
|
||||
// add csidrivers
|
||||
// k8s.io/kubernetes/pkg/apis/storage/v1
|
||||
etcdStorageData[gvr("storage.k8s.io", "v1", "csidrivers")] = StorageData{
|
||||
Stub: `{"metadata": {"name": "csid2"}, "spec": {"attachRequired": true, "podInfoOnMount": true}}`,
|
||||
ExpectedEtcdPath: "/registry/csidrivers/csid2",
|
||||
if removeAlphas {
|
||||
for key := range etcdStorageData {
|
||||
if strings.Contains(key.Version, "alpha") {
|
||||
delete(etcdStorageData, key)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return etcdStorageData
|
||||
}
|
||||
|
||||
|
@ -39,9 +39,12 @@ import (
|
||||
"k8s.io/apimachinery/pkg/runtime/serializer/recognizer"
|
||||
utiljson "k8s.io/apimachinery/pkg/util/json"
|
||||
"k8s.io/apimachinery/pkg/util/sets"
|
||||
"k8s.io/apimachinery/pkg/util/version"
|
||||
"k8s.io/apiserver/pkg/util/feature"
|
||||
"k8s.io/client-go/dynamic"
|
||||
featuregatetesting "k8s.io/component-base/featuregate/testing"
|
||||
componentbaseversion "k8s.io/component-base/version"
|
||||
"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
|
||||
)
|
||||
|
||||
// Only add kinds to this list when this a virtual resource with get and create verbs that doesn't actually
|
||||
@ -75,13 +78,32 @@ var allowMissingTestdataFixtures = map[schema.GroupVersionKind]bool{
|
||||
// It will also fail when a type gets moved to a different location. Be very careful in this situation because
|
||||
// it essentially means that you will be break old clusters unless you create some migration path for the old data.
|
||||
func TestEtcdStoragePath(t *testing.T) {
|
||||
// KUBE_APISERVER_SERVE_REMOVED_APIS_FOR_ONE_RELEASE allows for APIs pending removal to not block tests
|
||||
t.Setenv("KUBE_APISERVER_SERVE_REMOVED_APIS_FOR_ONE_RELEASE", "true")
|
||||
supportedVersions := GetSupportedEmulatedVersions()
|
||||
for _, v := range supportedVersions {
|
||||
t.Run(v, func(t *testing.T) {
|
||||
testEtcdStoragePathWithVersion(t, v)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
featuregatetesting.SetFeatureGateDuringTest(t, feature.DefaultFeatureGate, "AllAlpha", true)
|
||||
featuregatetesting.SetFeatureGateDuringTest(t, feature.DefaultFeatureGate, "AllBeta", true)
|
||||
func testEtcdStoragePathWithVersion(t *testing.T, v string) {
|
||||
if v == componentbaseversion.DefaultKubeBinaryVersion {
|
||||
featuregatetesting.SetFeatureGateDuringTest(t, feature.DefaultFeatureGate, "AllAlpha", true)
|
||||
featuregatetesting.SetFeatureGateDuringTest(t, feature.DefaultFeatureGate, "AllBeta", true)
|
||||
} else {
|
||||
// Only test for beta and GA APIs with emulated version.
|
||||
featuregatetesting.SetFeatureGateEmulationVersionDuringTest(t, feature.DefaultFeatureGate, version.MustParse(v))
|
||||
featuregatetesting.SetFeatureGateDuringTest(t, feature.DefaultFeatureGate, "AllBeta", true)
|
||||
registerEffectiveEmulationVersion(t)
|
||||
}
|
||||
|
||||
apiServer := StartRealAPIServerOrDie(t, func(opts *options.ServerRunOptions) {
|
||||
// Disable alphas when emulating previous versions.
|
||||
if v != componentbaseversion.DefaultKubeBinaryVersion {
|
||||
opts.Options.APIEnablement.RuntimeConfig["api/alpha"] = "false"
|
||||
}
|
||||
})
|
||||
|
||||
apiServer := StartRealAPIServerOrDie(t)
|
||||
defer apiServer.Cleanup()
|
||||
defer dumpEtcdKVOnFailure(t, apiServer.KV)
|
||||
|
||||
@ -91,7 +113,14 @@ func TestEtcdStoragePath(t *testing.T) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
etcdStorageData := GetEtcdStorageData()
|
||||
var etcdStorageData map[schema.GroupVersionResource]StorageData
|
||||
if v == componentbaseversion.DefaultKubeBinaryVersion {
|
||||
etcdStorageData = GetEtcdStorageDataForNamespaceServedAt("etcdstoragepathtestnamespace", v, false)
|
||||
} else {
|
||||
// Drop alphas from etcd data fixtures when emulating previous versions
|
||||
// as alphas are not supported with emulation.
|
||||
etcdStorageData = GetEtcdStorageDataForNamespaceServedAt("etcdstoragepathtestnamespace", v, true)
|
||||
}
|
||||
|
||||
kindSeen := sets.NewString()
|
||||
pathSeen := map[string][]schema.GroupVersionResource{}
|
||||
|
@ -36,14 +36,19 @@ import (
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
utilerrors "k8s.io/apimachinery/pkg/util/errors"
|
||||
"k8s.io/apimachinery/pkg/util/json"
|
||||
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
||||
"k8s.io/apimachinery/pkg/util/wait"
|
||||
genericapiserveroptions "k8s.io/apiserver/pkg/server/options"
|
||||
"k8s.io/apiserver/pkg/util/feature"
|
||||
cacheddiscovery "k8s.io/client-go/discovery/cached/memory"
|
||||
"k8s.io/client-go/dynamic"
|
||||
clientset "k8s.io/client-go/kubernetes"
|
||||
restclient "k8s.io/client-go/rest"
|
||||
"k8s.io/client-go/restmapper"
|
||||
utiltesting "k8s.io/client-go/util/testing"
|
||||
"k8s.io/component-base/featuregate"
|
||||
featuregatetesting "k8s.io/component-base/featuregate/testing"
|
||||
utilversion "k8s.io/component-base/version"
|
||||
"k8s.io/kubernetes/cmd/kube-apiserver/app"
|
||||
"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
|
||||
"k8s.io/kubernetes/test/integration"
|
||||
@ -62,11 +67,23 @@ AwEHoUQDQgAEH6cuzP8XuD5wal6wf9M6xDljTOPLX2i8uIp/C/ASqiIGUeeKQtX0
|
||||
/IR3qCXyThP/dbCiHrF3v1cuhBOHY8CLVg==
|
||||
-----END EC PRIVATE KEY-----`
|
||||
|
||||
func registerEffectiveEmulationVersion(t *testing.T) {
|
||||
featureGate := feature.DefaultMutableFeatureGate
|
||||
featureGate.AddMetrics()
|
||||
|
||||
effectiveVersion := utilversion.DefaultKubeEffectiveVersion()
|
||||
effectiveVersion.SetEmulationVersion(featureGate.EmulationVersion())
|
||||
featuregatetesting.SetFeatureGateEmulationVersionDuringTest(t, featureGate, effectiveVersion.EmulationVersion())
|
||||
featuregate.DefaultComponentGlobalsRegistry.Reset()
|
||||
utilruntime.Must(featuregate.DefaultComponentGlobalsRegistry.Register(featuregate.DefaultKubeComponent, effectiveVersion, featureGate))
|
||||
}
|
||||
|
||||
// StartRealAPIServerOrDie starts an API server that is appropriate for use in tests that require one of every resource
|
||||
func StartRealAPIServerOrDie(t *testing.T, configFuncs ...func(*options.ServerRunOptions)) *APIServer {
|
||||
tCtx := ktesting.Init(t)
|
||||
|
||||
certDir, err := os.MkdirTemp("", t.Name())
|
||||
// Strip out "/" in subtests
|
||||
certDir, err := os.MkdirTemp("", strings.ReplaceAll(t.Name(), "/", ""))
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
@ -119,7 +119,7 @@ func TestAPIServerMetrics(t *testing.T) {
|
||||
}
|
||||
|
||||
// Make a request to a deprecated API to ensure there's at least one data point
|
||||
if _, err := client.FlowcontrolV1beta3().FlowSchemas().List(context.TODO(), metav1.ListOptions{}); err != nil {
|
||||
if _, err := client.AdmissionregistrationV1beta1().ValidatingAdmissionPolicies().List(context.TODO(), metav1.ListOptions{}); err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user