mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-29 22:46:12 +00:00
Fixing integrations test
This commit is contained in:
parent
39e461b7f9
commit
a0c038982e
@ -390,8 +390,19 @@ func TestAuthModeAlwaysAllow(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
m.Handler.ServeHTTP(w, req)
|
m.Handler.ServeHTTP(w, req)
|
||||||
@ -408,7 +419,7 @@ func TestAuthModeAlwaysAllow(t *testing.T) {
|
|||||||
APIPrefix: "/api",
|
APIPrefix: "/api",
|
||||||
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
transport := http.DefaultTransport
|
transport := http.DefaultTransport
|
||||||
@ -508,8 +519,18 @@ func TestAuthModeAlwaysDeny(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
@ -527,7 +548,7 @@ func TestAuthModeAlwaysDeny(t *testing.T) {
|
|||||||
APIPrefix: "/api",
|
APIPrefix: "/api",
|
||||||
Authorizer: apiserver.NewAlwaysDenyAuthorizer(),
|
Authorizer: apiserver.NewAlwaysDenyAuthorizer(),
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
transport := http.DefaultTransport
|
transport := http.DefaultTransport
|
||||||
@ -578,8 +599,18 @@ func TestAliceNotForbiddenOrUnauthorized(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
@ -598,7 +629,7 @@ func TestAliceNotForbiddenOrUnauthorized(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: allowAliceAuthorizer{},
|
Authorizer: allowAliceAuthorizer{},
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
previousResourceVersion := make(map[string]float64)
|
previousResourceVersion := make(map[string]float64)
|
||||||
@ -668,8 +699,18 @@ func TestBobIsForbidden(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
@ -688,7 +729,7 @@ func TestBobIsForbidden(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: allowAliceAuthorizer{},
|
Authorizer: allowAliceAuthorizer{},
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
transport := http.DefaultTransport
|
transport := http.DefaultTransport
|
||||||
@ -732,8 +773,18 @@ func TestUnknownUserIsUnauthorized(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
@ -752,7 +803,7 @@ func TestUnknownUserIsUnauthorized(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: allowAliceAuthorizer{},
|
Authorizer: allowAliceAuthorizer{},
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
transport := http.DefaultTransport
|
transport := http.DefaultTransport
|
||||||
@ -819,8 +870,18 @@ func TestAuthorizationAttributeDetermination(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
trackingAuthorizer := &trackingAuthorizer{}
|
trackingAuthorizer := &trackingAuthorizer{}
|
||||||
|
|
||||||
@ -841,7 +902,7 @@ func TestAuthorizationAttributeDetermination(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: trackingAuthorizer,
|
Authorizer: trackingAuthorizer,
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
transport := http.DefaultTransport
|
transport := http.DefaultTransport
|
||||||
@ -902,8 +963,18 @@ func TestNamespaceAuthorization(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
a := newAuthorizerWithContents(t, `{"namespace": "foo"}
|
a := newAuthorizerWithContents(t, `{"namespace": "foo"}
|
||||||
`)
|
`)
|
||||||
@ -925,7 +996,7 @@ func TestNamespaceAuthorization(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: a,
|
Authorizer: a,
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
previousResourceVersion := make(map[string]float64)
|
previousResourceVersion := make(map[string]float64)
|
||||||
@ -1020,8 +1091,18 @@ func TestKindAuthorization(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
a := newAuthorizerWithContents(t, `{"resource": "services"}
|
a := newAuthorizerWithContents(t, `{"resource": "services"}
|
||||||
`)
|
`)
|
||||||
@ -1043,7 +1124,7 @@ func TestKindAuthorization(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: a,
|
Authorizer: a,
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
previousResourceVersion := make(map[string]float64)
|
previousResourceVersion := make(map[string]float64)
|
||||||
@ -1126,8 +1207,18 @@ func TestReadOnlyAuthorization(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
a := newAuthorizerWithContents(t, `{"readonly": true}`)
|
a := newAuthorizerWithContents(t, `{"readonly": true}`)
|
||||||
|
|
||||||
@ -1148,7 +1239,7 @@ func TestReadOnlyAuthorization(t *testing.T) {
|
|||||||
Authenticator: getTestTokenAuth(),
|
Authenticator: getTestTokenAuth(),
|
||||||
Authorizer: a,
|
Authorizer: a,
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
transport := http.DefaultTransport
|
transport := http.DefaultTransport
|
||||||
|
@ -44,6 +44,13 @@ func NewEtcdStorage() (storage.Interface, error) {
|
|||||||
return master.NewEtcdStorage(NewEtcdClient(), latest.GroupOrDie("").InterfacesFor, testapi.Default.Version(), etcdtest.PathPrefix())
|
return master.NewEtcdStorage(NewEtcdClient(), latest.GroupOrDie("").InterfacesFor, testapi.Default.Version(), etcdtest.PathPrefix())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func NewExtensionsEtcdStorage(client *etcd.Client) (storage.Interface, error) {
|
||||||
|
if client == nil {
|
||||||
|
client = NewEtcdClient()
|
||||||
|
}
|
||||||
|
return master.NewEtcdStorage(client, latest.GroupOrDie("extensions").InterfacesFor, testapi.Extensions.GroupAndVersion(), etcdtest.PathPrefix())
|
||||||
|
}
|
||||||
|
|
||||||
func RequireEtcd() {
|
func RequireEtcd() {
|
||||||
if _, err := NewEtcdClient().Get("/", false, false); err != nil {
|
if _, err := NewEtcdClient().Get("/", false, false); err != nil {
|
||||||
glog.Fatalf("unable to connect to etcd for testing: %v", err)
|
glog.Fatalf("unable to connect to etcd for testing: %v", err)
|
||||||
|
@ -131,8 +131,8 @@ func startMasterOrDie(masterConfig *master.Config) (*master.Master, *httptest.Se
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Failed to create etcd storage for master %v", err)
|
glog.Fatalf("Failed to create etcd storage for master %v", err)
|
||||||
}
|
}
|
||||||
expEtcdStorage, err := master.NewEtcdStorage(etcdClient, latest.GroupOrDie("extensions").InterfacesFor, latest.GroupOrDie("extensions").GroupVersion, etcdtest.PathPrefix())
|
expEtcdStorage, err := NewExtensionsEtcdStorage(etcdClient)
|
||||||
storageVersions["extensions"] = latest.GroupOrDie("extensions").GroupVersion
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Failed to create etcd storage for master %v", err)
|
glog.Fatalf("Failed to create etcd storage for master %v", err)
|
||||||
}
|
}
|
||||||
@ -274,7 +274,7 @@ func RunAMaster(t *testing.T) (*master.Master, *httptest.Server) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
expEtcdStorage, err := master.NewEtcdStorage(etcdClient, latest.GroupOrDie("extensions").InterfacesFor, testapi.Extensions.GroupAndVersion(), etcdtest.PathPrefix())
|
expEtcdStorage, err := NewExtensionsEtcdStorage(etcdClient)
|
||||||
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
@ -38,7 +38,7 @@ func TestKubectlValidation(t *testing.T) {
|
|||||||
|
|
||||||
// The following test the experimental api.
|
// The following test the experimental api.
|
||||||
// TOOD: Replace with something more robust. These may move.
|
// TOOD: Replace with something more robust. These may move.
|
||||||
{`{"apiVersion": "extensions/v1beta1", "kind": "DaemonSet"}`, false},
|
{`{"apiVersion": "extensions/v1beta1", "kind": "Ingress"}`, false},
|
||||||
{`{"apiVersion": "extensions/v1beta1", "kind": "Job"}`, false},
|
{`{"apiVersion": "extensions/v1beta1", "kind": "Job"}`, false},
|
||||||
{`{"apiVersion": "vNotAVersion", "kind": "Job"}`, true},
|
{`{"apiVersion": "vNotAVersion", "kind": "Job"}`, true},
|
||||||
}
|
}
|
||||||
|
@ -59,8 +59,19 @@ func TestUnschedulableNodes(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Couldn't create etcd storage: %v", err)
|
t.Fatalf("Couldn't create etcd storage: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
framework.DeleteAllEtcdKeys()
|
framework.DeleteAllEtcdKeys()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
@ -79,7 +90,7 @@ func TestUnschedulableNodes(t *testing.T) {
|
|||||||
APIPrefix: "/api",
|
APIPrefix: "/api",
|
||||||
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
restClient := client.NewOrDie(&client.Config{Host: s.URL, Version: testapi.Default.Version()})
|
restClient := client.NewOrDie(&client.Config{Host: s.URL, Version: testapi.Default.Version()})
|
||||||
@ -298,8 +309,19 @@ func BenchmarkScheduling(b *testing.B) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
b.Fatalf("Couldn't create etcd storage: %v", err)
|
b.Fatalf("Couldn't create etcd storage: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
framework.DeleteAllEtcdKeys()
|
framework.DeleteAllEtcdKeys()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
@ -318,7 +340,7 @@ func BenchmarkScheduling(b *testing.B) {
|
|||||||
APIPrefix: "/api",
|
APIPrefix: "/api",
|
||||||
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
c := client.NewOrDie(&client.Config{
|
c := client.NewOrDie(&client.Config{
|
||||||
|
@ -51,8 +51,18 @@ func TestSecrets(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
@ -70,7 +80,7 @@ func TestSecrets(t *testing.T) {
|
|||||||
APIPrefix: "/api",
|
APIPrefix: "/api",
|
||||||
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
Authorizer: apiserver.NewAlwaysAllowAuthorizer(),
|
||||||
AdmissionControl: admit.NewAlwaysAdmit(),
|
AdmissionControl: admit.NewAlwaysAdmit(),
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
framework.DeleteAllEtcdKeys()
|
framework.DeleteAllEtcdKeys()
|
||||||
|
@ -33,7 +33,6 @@ import (
|
|||||||
|
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/errors"
|
"k8s.io/kubernetes/pkg/api/errors"
|
||||||
"k8s.io/kubernetes/pkg/api/latest"
|
|
||||||
"k8s.io/kubernetes/pkg/api/testapi"
|
"k8s.io/kubernetes/pkg/api/testapi"
|
||||||
"k8s.io/kubernetes/pkg/auth/authenticator"
|
"k8s.io/kubernetes/pkg/auth/authenticator"
|
||||||
"k8s.io/kubernetes/pkg/auth/authenticator/bearertoken"
|
"k8s.io/kubernetes/pkg/auth/authenticator/bearertoken"
|
||||||
@ -44,11 +43,11 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/fields"
|
"k8s.io/kubernetes/pkg/fields"
|
||||||
"k8s.io/kubernetes/pkg/labels"
|
"k8s.io/kubernetes/pkg/labels"
|
||||||
"k8s.io/kubernetes/pkg/master"
|
"k8s.io/kubernetes/pkg/master"
|
||||||
"k8s.io/kubernetes/pkg/tools/etcdtest"
|
|
||||||
"k8s.io/kubernetes/pkg/util/sets"
|
"k8s.io/kubernetes/pkg/util/sets"
|
||||||
"k8s.io/kubernetes/pkg/util/wait"
|
"k8s.io/kubernetes/pkg/util/wait"
|
||||||
serviceaccountadmission "k8s.io/kubernetes/plugin/pkg/admission/serviceaccount"
|
serviceaccountadmission "k8s.io/kubernetes/plugin/pkg/admission/serviceaccount"
|
||||||
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/request/union"
|
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/request/union"
|
||||||
|
"k8s.io/kubernetes/test/integration/framework"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -341,12 +340,23 @@ func startServiceAccountTestServer(t *testing.T) (*client.Client, client.Config,
|
|||||||
deleteAllEtcdKeys()
|
deleteAllEtcdKeys()
|
||||||
|
|
||||||
// Etcd
|
// Etcd
|
||||||
etcdStorage, err := master.NewEtcdStorage(newEtcdClient(), latest.GroupOrDie("").InterfacesFor, testapi.Default.Version(), etcdtest.PathPrefix())
|
etcdStorage, err := framework.NewEtcdStorage()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
expEtcdStorage, err := framework.NewExtensionsEtcdStorage(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
storageDestinations := master.NewStorageDestinations()
|
storageDestinations := master.NewStorageDestinations()
|
||||||
storageDestinations.AddAPIGroup("", etcdStorage)
|
storageDestinations.AddAPIGroup("", etcdStorage)
|
||||||
|
storageDestinations.AddAPIGroup("extensions", expEtcdStorage)
|
||||||
|
|
||||||
|
storageVersions := make(map[string]string)
|
||||||
|
storageVersions[""] = testapi.Default.Version()
|
||||||
|
storageVersions["extensions"] = testapi.Extensions.GroupAndVersion()
|
||||||
|
|
||||||
// Listener
|
// Listener
|
||||||
var m *master.Master
|
var m *master.Master
|
||||||
@ -422,7 +432,7 @@ func startServiceAccountTestServer(t *testing.T) (*client.Client, client.Config,
|
|||||||
Authenticator: authenticator,
|
Authenticator: authenticator,
|
||||||
Authorizer: authorizer,
|
Authorizer: authorizer,
|
||||||
AdmissionControl: serviceAccountAdmission,
|
AdmissionControl: serviceAccountAdmission,
|
||||||
StorageVersions: map[string]string{"": testapi.Default.Version()},
|
StorageVersions: storageVersions,
|
||||||
})
|
})
|
||||||
|
|
||||||
// Start the service account and service account token controllers
|
// Start the service account and service account token controllers
|
||||||
|
Loading…
Reference in New Issue
Block a user