mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 13:37:30 +00:00
kubeadm: clean up unnecessary references to UnknownCRISocket
This commit is contained in:
parent
10827a193a
commit
c3bf541ede
@ -134,7 +134,7 @@ func (o *genCSRConfig) addFlagSet(flagSet *pflag.FlagSet) {
|
|||||||
func (o *genCSRConfig) load() (err error) {
|
func (o *genCSRConfig) load() (err error) {
|
||||||
o.kubeadmConfig, err = configutil.LoadOrDefaultInitConfiguration(
|
o.kubeadmConfig, err = configutil.LoadOrDefaultInitConfiguration(
|
||||||
o.kubeadmConfigPath,
|
o.kubeadmConfigPath,
|
||||||
cmdutil.DefaultInitConfiguration(),
|
&kubeadmapiv1.InitConfiguration{},
|
||||||
&kubeadmapiv1.ClusterConfiguration{},
|
&kubeadmapiv1.ClusterConfiguration{},
|
||||||
true, /* skipCRIDetect */
|
true, /* skipCRIDetect */
|
||||||
)
|
)
|
||||||
@ -354,7 +354,7 @@ func getInternalCfg(cfgPath string, kubeconfigPath string, cfg kubeadmapiv1.Clus
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Read config from --config if provided. Otherwise, use the default configuration
|
// Read config from --config if provided. Otherwise, use the default configuration
|
||||||
return configutil.LoadOrDefaultInitConfiguration(cfgPath, cmdutil.DefaultInitConfiguration(), &cfg, true /* skipCRIDetect */)
|
return configutil.LoadOrDefaultInitConfiguration(cfgPath, &kubeadmapiv1.InitConfiguration{}, &cfg, true /* skipCRIDetect */)
|
||||||
}
|
}
|
||||||
|
|
||||||
// newCmdCertsExpiration creates a new `cert check-expiration` command.
|
// newCmdCertsExpiration creates a new `cert check-expiration` command.
|
||||||
|
@ -442,7 +442,7 @@ func newCmdConfigImagesList(out io.Writer, mockK8sVersion *string) *cobra.Comman
|
|||||||
|
|
||||||
// NewImagesList returns the underlying struct for the "kubeadm config images list" command
|
// NewImagesList returns the underlying struct for the "kubeadm config images list" command
|
||||||
func NewImagesList(cfgPath string, cfg *kubeadmapiv1old.ClusterConfiguration) (*ImagesList, error) {
|
func NewImagesList(cfgPath string, cfg *kubeadmapiv1old.ClusterConfiguration) (*ImagesList, error) {
|
||||||
initcfg, err := configutil.LoadOrDefaultInitConfiguration(cfgPath, cmdutil.DefaultInitConfiguration(), cfg, true /* skipCRIDetect */)
|
initcfg, err := configutil.LoadOrDefaultInitConfiguration(cfgPath, &kubeadmapiv1old.InitConfiguration{}, cfg, true /* skipCRIDetect */)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(err, "could not convert cfg to an internal cfg")
|
return nil, errors.Wrap(err, "could not convert cfg to an internal cfg")
|
||||||
}
|
}
|
||||||
|
@ -82,13 +82,8 @@ func TestImagesListRunWithCustomConfigPath(t *testing.T) {
|
|||||||
},
|
},
|
||||||
configContents: []byte(dedent.Dedent(fmt.Sprintf(`
|
configContents: []byte(dedent.Dedent(fmt.Sprintf(`
|
||||||
apiVersion: %s
|
apiVersion: %s
|
||||||
kind: InitConfiguration
|
|
||||||
nodeRegistration:
|
|
||||||
criSocket: %s
|
|
||||||
---
|
|
||||||
apiVersion: %[1]s
|
|
||||||
kind: ClusterConfiguration
|
kind: ClusterConfiguration
|
||||||
kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.UnknownCRISocket, constants.CurrentKubernetesVersion))),
|
kubernetesVersion: %s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.CurrentKubernetesVersion))),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "use coredns",
|
name: "use coredns",
|
||||||
@ -98,13 +93,8 @@ kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.U
|
|||||||
},
|
},
|
||||||
configContents: []byte(dedent.Dedent(fmt.Sprintf(`
|
configContents: []byte(dedent.Dedent(fmt.Sprintf(`
|
||||||
apiVersion: %s
|
apiVersion: %s
|
||||||
kind: InitConfiguration
|
|
||||||
nodeRegistration:
|
|
||||||
criSocket: %s
|
|
||||||
---
|
|
||||||
apiVersion: %[1]s
|
|
||||||
kind: ClusterConfiguration
|
kind: ClusterConfiguration
|
||||||
kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.UnknownCRISocket, constants.MinimumControlPlaneVersion))),
|
kubernetesVersion: %s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.MinimumControlPlaneVersion))),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -65,7 +65,7 @@ func newCmdKubeConfigUtility(out io.Writer) *cobra.Command {
|
|||||||
// newCmdUserKubeConfig returns sub commands for kubeconfig phase
|
// newCmdUserKubeConfig returns sub commands for kubeconfig phase
|
||||||
func newCmdUserKubeConfig(out io.Writer) *cobra.Command {
|
func newCmdUserKubeConfig(out io.Writer) *cobra.Command {
|
||||||
|
|
||||||
initCfg := cmdutil.DefaultInitConfiguration()
|
initCfg := &kubeadmapiv1.InitConfiguration{}
|
||||||
clusterCfg := &kubeadmapiv1.ClusterConfiguration{}
|
clusterCfg := &kubeadmapiv1.ClusterConfiguration{}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -45,9 +45,6 @@ func generateTestKubeadmConfig(dir, id, certDir, clusterName string) (string, er
|
|||||||
AdvertiseAddress: "1.2.3.4",
|
AdvertiseAddress: "1.2.3.4",
|
||||||
BindPort: 1234,
|
BindPort: 1234,
|
||||||
},
|
},
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
|
||||||
CRISocket: kubeadmconstants.UnknownCRISocket,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
clusterCfg := kubeadmapiv1.ClusterConfiguration{
|
clusterCfg := kubeadmapiv1.ClusterConfiguration{
|
||||||
TypeMeta: metav1.TypeMeta{
|
TypeMeta: metav1.TypeMeta{
|
||||||
|
@ -138,11 +138,12 @@ func getCertPhaseFlags(name string) []string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func getSANDescription(certSpec *certsphase.KubeadmCert) string {
|
func getSANDescription(certSpec *certsphase.KubeadmCert) string {
|
||||||
//Defaulted config we will use to get SAN certs
|
// Defaulted config we will use to get SAN certs
|
||||||
defaultConfig := cmdutil.DefaultInitConfiguration()
|
defaultConfig := &kubeadmapiv1.InitConfiguration{
|
||||||
|
LocalAPIEndpoint: kubeadmapiv1.APIEndpoint{
|
||||||
// GetAPIServerAltNames errors without an AdvertiseAddress; this is as good as any.
|
// GetAPIServerAltNames errors without an AdvertiseAddress; this is as good as any.
|
||||||
defaultConfig.LocalAPIEndpoint = kubeadmapiv1.APIEndpoint{
|
|
||||||
AdvertiseAddress: "127.0.0.1",
|
AdvertiseAddress: "127.0.0.1",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
defaultInternalConfig := &kubeadmapi.InitConfiguration{}
|
defaultInternalConfig := &kubeadmapi.InitConfiguration{}
|
||||||
|
@ -90,7 +90,7 @@ func newCmdToken(out io.Writer, errW io.Writer) *cobra.Command {
|
|||||||
tokenCmd.PersistentFlags().BoolVar(&dryRun,
|
tokenCmd.PersistentFlags().BoolVar(&dryRun,
|
||||||
options.DryRun, dryRun, "Whether to enable dry-run mode or not")
|
options.DryRun, dryRun, "Whether to enable dry-run mode or not")
|
||||||
|
|
||||||
cfg := cmdutil.DefaultInitConfiguration()
|
cfg := &kubeadmapiv1.InitConfiguration{}
|
||||||
|
|
||||||
// Default values for the cobra help text
|
// Default values for the cobra help text
|
||||||
kubeadmscheme.Scheme.Default(cfg)
|
kubeadmscheme.Scheme.Default(cfg)
|
||||||
|
@ -36,7 +36,6 @@ import (
|
|||||||
outputapischeme "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/scheme"
|
outputapischeme "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/scheme"
|
||||||
outputapiv1alpha2 "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/v1alpha2"
|
outputapiv1alpha2 "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/v1alpha2"
|
||||||
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
|
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/util/output"
|
"k8s.io/kubernetes/cmd/kubeadm/app/util/output"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -173,9 +172,6 @@ func TestRunCreateToken(t *testing.T) {
|
|||||||
Groups: tc.extraGroups,
|
Groups: tc.extraGroups,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
|
||||||
CRISocket: constants.UnknownCRISocket,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
err = RunCreateToken(&buf, fakeClient, "", cfg, tc.printJoin, "", "")
|
err = RunCreateToken(&buf, fakeClient, "", cfg, tc.printJoin, "", "")
|
||||||
|
@ -31,7 +31,6 @@ import (
|
|||||||
"k8s.io/client-go/tools/clientcmd"
|
"k8s.io/client-go/tools/clientcmd"
|
||||||
"k8s.io/klog/v2"
|
"k8s.io/klog/v2"
|
||||||
|
|
||||||
kubeadmapiv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3"
|
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
|
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
|
||||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||||
kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util"
|
kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util"
|
||||||
@ -103,17 +102,6 @@ func AddCRISocketFlag(flagSet *pflag.FlagSet, criSocket *string) {
|
|||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DefaultInitConfiguration return default InitConfiguration. Avoid running the CRI auto-detection
|
|
||||||
// code as we don't need it.
|
|
||||||
func DefaultInitConfiguration() *kubeadmapiv1.InitConfiguration {
|
|
||||||
initCfg := &kubeadmapiv1.InitConfiguration{
|
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
|
||||||
CRISocket: kubeadmconstants.UnknownCRISocket, // avoid CRI detection
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return initCfg
|
|
||||||
}
|
|
||||||
|
|
||||||
// InteractivelyConfirmAction asks the user whether they _really_ want to take the action.
|
// InteractivelyConfirmAction asks the user whether they _really_ want to take the action.
|
||||||
func InteractivelyConfirmAction(action, question string, r io.Reader) error {
|
func InteractivelyConfirmAction(action, question string, r io.Reader) error {
|
||||||
fmt.Printf("[%s] %s [y/N]: ", action, question)
|
fmt.Printf("[%s] %s [y/N]: ", action, question)
|
||||||
|
@ -1072,9 +1072,6 @@ func TestJoinIPCheck(t *testing.T) {
|
|||||||
t.Skip("not a privileged user")
|
t.Skip("not a privileged user")
|
||||||
}
|
}
|
||||||
internalcfg, err := configutil.DefaultedJoinConfiguration(&kubeadmapiv1.JoinConfiguration{
|
internalcfg, err := configutil.DefaultedJoinConfiguration(&kubeadmapiv1.JoinConfiguration{
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
|
||||||
CRISocket: constants.UnknownCRISocket,
|
|
||||||
},
|
|
||||||
Discovery: kubeadmapiv1.Discovery{
|
Discovery: kubeadmapiv1.Discovery{
|
||||||
BootstrapToken: &kubeadmapiv1.BootstrapTokenDiscovery{
|
BootstrapToken: &kubeadmapiv1.BootstrapTokenDiscovery{
|
||||||
Token: configutil.PlaceholderToken.Token.String(),
|
Token: configutil.PlaceholderToken.Token.String(),
|
||||||
|
@ -49,9 +49,7 @@ var cfgFiles = map[string][]byte{
|
|||||||
"InitConfiguration_v1beta3": []byte(fmt.Sprintf(`
|
"InitConfiguration_v1beta3": []byte(fmt.Sprintf(`
|
||||||
apiVersion: %s
|
apiVersion: %s
|
||||||
kind: InitConfiguration
|
kind: InitConfiguration
|
||||||
nodeRegistration:
|
`, kubeadmapiv1.SchemeGroupVersion.String())),
|
||||||
criSocket: %s
|
|
||||||
`, kubeadmapiv1.SchemeGroupVersion.String(), kubeadmconstants.UnknownCRISocket)),
|
|
||||||
"ClusterConfiguration_v1beta3": []byte(fmt.Sprintf(`
|
"ClusterConfiguration_v1beta3": []byte(fmt.Sprintf(`
|
||||||
apiVersion: %s
|
apiVersion: %s
|
||||||
kind: ClusterConfiguration
|
kind: ClusterConfiguration
|
||||||
|
@ -126,9 +126,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
|
|||||||
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
|
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
|
||||||
Kind: constants.InitConfigurationKind,
|
Kind: constants.InitConfigurationKind,
|
||||||
},
|
},
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
|
||||||
CRISocket: constants.UnknownCRISocket,
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
expectedTaintCnt: 1,
|
expectedTaintCnt: 1,
|
||||||
},
|
},
|
||||||
@ -139,9 +136,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
|
|||||||
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
|
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
|
||||||
Kind: constants.InitConfigurationKind,
|
Kind: constants.InitConfigurationKind,
|
||||||
},
|
},
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
|
||||||
CRISocket: constants.UnknownCRISocket,
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
expectedTaintCnt: 1,
|
expectedTaintCnt: 1,
|
||||||
},
|
},
|
||||||
@ -154,7 +148,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
|
|||||||
},
|
},
|
||||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
||||||
Taints: []v1.Taint{},
|
Taints: []v1.Taint{},
|
||||||
CRISocket: constants.UnknownCRISocket,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
expectedTaintCnt: 0,
|
expectedTaintCnt: 0,
|
||||||
@ -171,7 +164,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
|
|||||||
{Key: "taint1"},
|
{Key: "taint1"},
|
||||||
{Key: "taint2"},
|
{Key: "taint2"},
|
||||||
},
|
},
|
||||||
CRISocket: constants.UnknownCRISocket,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
expectedTaintCnt: 2,
|
expectedTaintCnt: 2,
|
||||||
|
Loading…
Reference in New Issue
Block a user