kubeadm: clean up unnecessary references to UnknownCRISocket

This commit is contained in:
SataQiu 2023-10-08 16:57:45 +08:00
parent 10827a193a
commit c3bf541ede
12 changed files with 15 additions and 56 deletions

View File

@ -134,7 +134,7 @@ func (o *genCSRConfig) addFlagSet(flagSet *pflag.FlagSet) {
func (o *genCSRConfig) load() (err error) { func (o *genCSRConfig) load() (err error) {
o.kubeadmConfig, err = configutil.LoadOrDefaultInitConfiguration( o.kubeadmConfig, err = configutil.LoadOrDefaultInitConfiguration(
o.kubeadmConfigPath, o.kubeadmConfigPath,
cmdutil.DefaultInitConfiguration(), &kubeadmapiv1.InitConfiguration{},
&kubeadmapiv1.ClusterConfiguration{}, &kubeadmapiv1.ClusterConfiguration{},
true, /* skipCRIDetect */ true, /* skipCRIDetect */
) )
@ -354,7 +354,7 @@ func getInternalCfg(cfgPath string, kubeconfigPath string, cfg kubeadmapiv1.Clus
} }
// Read config from --config if provided. Otherwise, use the default configuration // Read config from --config if provided. Otherwise, use the default configuration
return configutil.LoadOrDefaultInitConfiguration(cfgPath, cmdutil.DefaultInitConfiguration(), &cfg, true /* skipCRIDetect */) return configutil.LoadOrDefaultInitConfiguration(cfgPath, &kubeadmapiv1.InitConfiguration{}, &cfg, true /* skipCRIDetect */)
} }
// newCmdCertsExpiration creates a new `cert check-expiration` command. // newCmdCertsExpiration creates a new `cert check-expiration` command.

View File

@ -442,7 +442,7 @@ func newCmdConfigImagesList(out io.Writer, mockK8sVersion *string) *cobra.Comman
// NewImagesList returns the underlying struct for the "kubeadm config images list" command // NewImagesList returns the underlying struct for the "kubeadm config images list" command
func NewImagesList(cfgPath string, cfg *kubeadmapiv1old.ClusterConfiguration) (*ImagesList, error) { func NewImagesList(cfgPath string, cfg *kubeadmapiv1old.ClusterConfiguration) (*ImagesList, error) {
initcfg, err := configutil.LoadOrDefaultInitConfiguration(cfgPath, cmdutil.DefaultInitConfiguration(), cfg, true /* skipCRIDetect */) initcfg, err := configutil.LoadOrDefaultInitConfiguration(cfgPath, &kubeadmapiv1old.InitConfiguration{}, cfg, true /* skipCRIDetect */)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "could not convert cfg to an internal cfg") return nil, errors.Wrap(err, "could not convert cfg to an internal cfg")
} }

View File

@ -82,13 +82,8 @@ func TestImagesListRunWithCustomConfigPath(t *testing.T) {
}, },
configContents: []byte(dedent.Dedent(fmt.Sprintf(` configContents: []byte(dedent.Dedent(fmt.Sprintf(`
apiVersion: %s apiVersion: %s
kind: InitConfiguration
nodeRegistration:
criSocket: %s
---
apiVersion: %[1]s
kind: ClusterConfiguration kind: ClusterConfiguration
kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.UnknownCRISocket, constants.CurrentKubernetesVersion))), kubernetesVersion: %s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.CurrentKubernetesVersion))),
}, },
{ {
name: "use coredns", name: "use coredns",
@ -98,13 +93,8 @@ kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.U
}, },
configContents: []byte(dedent.Dedent(fmt.Sprintf(` configContents: []byte(dedent.Dedent(fmt.Sprintf(`
apiVersion: %s apiVersion: %s
kind: InitConfiguration
nodeRegistration:
criSocket: %s
---
apiVersion: %[1]s
kind: ClusterConfiguration kind: ClusterConfiguration
kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.UnknownCRISocket, constants.MinimumControlPlaneVersion))), kubernetesVersion: %s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.MinimumControlPlaneVersion))),
}, },
} }

View File

@ -65,7 +65,7 @@ func newCmdKubeConfigUtility(out io.Writer) *cobra.Command {
// newCmdUserKubeConfig returns sub commands for kubeconfig phase // newCmdUserKubeConfig returns sub commands for kubeconfig phase
func newCmdUserKubeConfig(out io.Writer) *cobra.Command { func newCmdUserKubeConfig(out io.Writer) *cobra.Command {
initCfg := cmdutil.DefaultInitConfiguration() initCfg := &kubeadmapiv1.InitConfiguration{}
clusterCfg := &kubeadmapiv1.ClusterConfiguration{} clusterCfg := &kubeadmapiv1.ClusterConfiguration{}
var ( var (

View File

@ -45,9 +45,6 @@ func generateTestKubeadmConfig(dir, id, certDir, clusterName string) (string, er
AdvertiseAddress: "1.2.3.4", AdvertiseAddress: "1.2.3.4",
BindPort: 1234, BindPort: 1234,
}, },
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
CRISocket: kubeadmconstants.UnknownCRISocket,
},
} }
clusterCfg := kubeadmapiv1.ClusterConfiguration{ clusterCfg := kubeadmapiv1.ClusterConfiguration{
TypeMeta: metav1.TypeMeta{ TypeMeta: metav1.TypeMeta{

View File

@ -138,11 +138,12 @@ func getCertPhaseFlags(name string) []string {
} }
func getSANDescription(certSpec *certsphase.KubeadmCert) string { func getSANDescription(certSpec *certsphase.KubeadmCert) string {
//Defaulted config we will use to get SAN certs // Defaulted config we will use to get SAN certs
defaultConfig := cmdutil.DefaultInitConfiguration() defaultConfig := &kubeadmapiv1.InitConfiguration{
LocalAPIEndpoint: kubeadmapiv1.APIEndpoint{
// GetAPIServerAltNames errors without an AdvertiseAddress; this is as good as any. // GetAPIServerAltNames errors without an AdvertiseAddress; this is as good as any.
defaultConfig.LocalAPIEndpoint = kubeadmapiv1.APIEndpoint{
AdvertiseAddress: "127.0.0.1", AdvertiseAddress: "127.0.0.1",
},
} }
defaultInternalConfig := &kubeadmapi.InitConfiguration{} defaultInternalConfig := &kubeadmapi.InitConfiguration{}

View File

@ -90,7 +90,7 @@ func newCmdToken(out io.Writer, errW io.Writer) *cobra.Command {
tokenCmd.PersistentFlags().BoolVar(&dryRun, tokenCmd.PersistentFlags().BoolVar(&dryRun,
options.DryRun, dryRun, "Whether to enable dry-run mode or not") options.DryRun, dryRun, "Whether to enable dry-run mode or not")
cfg := cmdutil.DefaultInitConfiguration() cfg := &kubeadmapiv1.InitConfiguration{}
// Default values for the cobra help text // Default values for the cobra help text
kubeadmscheme.Scheme.Default(cfg) kubeadmscheme.Scheme.Default(cfg)

View File

@ -36,7 +36,6 @@ import (
outputapischeme "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/scheme" outputapischeme "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/scheme"
outputapiv1alpha2 "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/v1alpha2" outputapiv1alpha2 "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/v1alpha2"
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util" cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
"k8s.io/kubernetes/cmd/kubeadm/app/util/output" "k8s.io/kubernetes/cmd/kubeadm/app/util/output"
) )
@ -173,9 +172,6 @@ func TestRunCreateToken(t *testing.T) {
Groups: tc.extraGroups, Groups: tc.extraGroups,
}, },
}, },
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
CRISocket: constants.UnknownCRISocket,
},
} }
err = RunCreateToken(&buf, fakeClient, "", cfg, tc.printJoin, "", "") err = RunCreateToken(&buf, fakeClient, "", cfg, tc.printJoin, "", "")

View File

@ -31,7 +31,6 @@ import (
"k8s.io/client-go/tools/clientcmd" "k8s.io/client-go/tools/clientcmd"
"k8s.io/klog/v2" "k8s.io/klog/v2"
kubeadmapiv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3"
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options" "k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants" kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util" kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util"
@ -103,17 +102,6 @@ func AddCRISocketFlag(flagSet *pflag.FlagSet, criSocket *string) {
) )
} }
// DefaultInitConfiguration return default InitConfiguration. Avoid running the CRI auto-detection
// code as we don't need it.
func DefaultInitConfiguration() *kubeadmapiv1.InitConfiguration {
initCfg := &kubeadmapiv1.InitConfiguration{
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
CRISocket: kubeadmconstants.UnknownCRISocket, // avoid CRI detection
},
}
return initCfg
}
// InteractivelyConfirmAction asks the user whether they _really_ want to take the action. // InteractivelyConfirmAction asks the user whether they _really_ want to take the action.
func InteractivelyConfirmAction(action, question string, r io.Reader) error { func InteractivelyConfirmAction(action, question string, r io.Reader) error {
fmt.Printf("[%s] %s [y/N]: ", action, question) fmt.Printf("[%s] %s [y/N]: ", action, question)

View File

@ -1072,9 +1072,6 @@ func TestJoinIPCheck(t *testing.T) {
t.Skip("not a privileged user") t.Skip("not a privileged user")
} }
internalcfg, err := configutil.DefaultedJoinConfiguration(&kubeadmapiv1.JoinConfiguration{ internalcfg, err := configutil.DefaultedJoinConfiguration(&kubeadmapiv1.JoinConfiguration{
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
CRISocket: constants.UnknownCRISocket,
},
Discovery: kubeadmapiv1.Discovery{ Discovery: kubeadmapiv1.Discovery{
BootstrapToken: &kubeadmapiv1.BootstrapTokenDiscovery{ BootstrapToken: &kubeadmapiv1.BootstrapTokenDiscovery{
Token: configutil.PlaceholderToken.Token.String(), Token: configutil.PlaceholderToken.Token.String(),

View File

@ -49,9 +49,7 @@ var cfgFiles = map[string][]byte{
"InitConfiguration_v1beta3": []byte(fmt.Sprintf(` "InitConfiguration_v1beta3": []byte(fmt.Sprintf(`
apiVersion: %s apiVersion: %s
kind: InitConfiguration kind: InitConfiguration
nodeRegistration: `, kubeadmapiv1.SchemeGroupVersion.String())),
criSocket: %s
`, kubeadmapiv1.SchemeGroupVersion.String(), kubeadmconstants.UnknownCRISocket)),
"ClusterConfiguration_v1beta3": []byte(fmt.Sprintf(` "ClusterConfiguration_v1beta3": []byte(fmt.Sprintf(`
apiVersion: %s apiVersion: %s
kind: ClusterConfiguration kind: ClusterConfiguration

View File

@ -126,9 +126,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(), APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
Kind: constants.InitConfigurationKind, Kind: constants.InitConfigurationKind,
}, },
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
CRISocket: constants.UnknownCRISocket,
},
}, },
expectedTaintCnt: 1, expectedTaintCnt: 1,
}, },
@ -139,9 +136,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(), APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
Kind: constants.InitConfigurationKind, Kind: constants.InitConfigurationKind,
}, },
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
CRISocket: constants.UnknownCRISocket,
},
}, },
expectedTaintCnt: 1, expectedTaintCnt: 1,
}, },
@ -154,7 +148,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
}, },
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
Taints: []v1.Taint{}, Taints: []v1.Taint{},
CRISocket: constants.UnknownCRISocket,
}, },
}, },
expectedTaintCnt: 0, expectedTaintCnt: 0,
@ -171,7 +164,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) {
{Key: "taint1"}, {Key: "taint1"},
{Key: "taint2"}, {Key: "taint2"},
}, },
CRISocket: constants.UnknownCRISocket,
}, },
}, },
expectedTaintCnt: 2, expectedTaintCnt: 2,