diff --git a/test/e2e_node/critical_pod_test.go b/test/e2e_node/critical_pod_test.go index 45eda9ffa21..2135fc99ab6 100644 --- a/test/e2e_node/critical_pod_test.go +++ b/test/e2e_node/critical_pod_test.go @@ -25,7 +25,6 @@ import ( metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" kubeapi "k8s.io/kubernetes/pkg/apis/core" "k8s.io/kubernetes/pkg/apis/scheduling" - kubeletconfig "k8s.io/kubernetes/pkg/kubelet/apis/config" kubelettypes "k8s.io/kubernetes/pkg/kubelet/types" "k8s.io/kubernetes/test/e2e/framework" e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper" @@ -44,12 +43,6 @@ const ( var _ = SIGDescribe("CriticalPod [Serial] [Disruptive] [NodeFeature:CriticalPod]", func() { f := framework.NewDefaultFramework("critical-pod-test") ginkgo.Context("when we need to admit a critical pod", func() { - tempSetCurrentKubeletConfig(f, func(initialConfig *kubeletconfig.KubeletConfiguration) { - if initialConfig.FeatureGates == nil { - initialConfig.FeatureGates = make(map[string]bool) - } - }) - ginkgo.It("[Flaky] should be able to create and delete a critical pod", func() { configEnabled, err := isKubeletConfigEnabled(f) framework.ExpectNoError(err) diff --git a/test/e2e_node/device_plugin_test.go b/test/e2e_node/device_plugin_test.go index c579c7a5ed8..b4be666213f 100644 --- a/test/e2e_node/device_plugin_test.go +++ b/test/e2e_node/device_plugin_test.go @@ -34,8 +34,6 @@ import ( "k8s.io/apimachinery/pkg/util/uuid" kubeletpodresourcesv1 "k8s.io/kubelet/pkg/apis/podresources/v1" kubeletpodresourcesv1alpha1 "k8s.io/kubelet/pkg/apis/podresources/v1alpha1" - "k8s.io/kubernetes/pkg/features" - kubeletconfig "k8s.io/kubernetes/pkg/kubelet/apis/config" "k8s.io/kubernetes/test/e2e/framework" e2enode "k8s.io/kubernetes/test/e2e/framework/node" e2epod "k8s.io/kubernetes/test/e2e/framework/pod" @@ -113,12 +111,6 @@ func testDevicePlugin(f *framework.Framework, pluginSockDir string) { pluginSockDir = filepath.Join(pluginSockDir) + "/" ginkgo.Context("DevicePlugin", func() { ginkgo.By("Enabling support for Kubelet Plugins Watcher") - tempSetCurrentKubeletConfig(f, func(initialConfig *kubeletconfig.KubeletConfiguration) { - if initialConfig.FeatureGates == nil { - initialConfig.FeatureGates = map[string]bool{} - } - initialConfig.FeatureGates[string(features.KubeletPodResources)] = true - }) ginkgo.It("[Flaky] Verifies the Kubelet device plugin functionality.", func() { ginkgo.By("Wait for node is ready to start with") e2enode.WaitForNodeToBeReady(f.ClientSet, framework.TestContext.NodeName, 5*time.Minute) diff --git a/test/e2e_node/node_shutdown_linux_test.go b/test/e2e_node/node_shutdown_linux_test.go index e24f492d1e9..3a6a70c4283 100644 --- a/test/e2e_node/node_shutdown_linux_test.go +++ b/test/e2e_node/node_shutdown_linux_test.go @@ -32,7 +32,6 @@ import ( "github.com/onsi/ginkgo" "github.com/onsi/gomega" "k8s.io/kubernetes/pkg/apis/scheduling" - "k8s.io/kubernetes/pkg/features" "k8s.io/kubernetes/test/e2e/framework" v1 "k8s.io/api/core/v1" @@ -42,7 +41,7 @@ import ( testutils "k8s.io/kubernetes/test/utils" ) -var _ = SIGDescribe("GracefulNodeShutdown [Serial] [NodeAlphaFeature:GracefulNodeShutdown]", func() { +var _ = SIGDescribe("GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown]", func() { f := framework.NewDefaultFramework("graceful-node-shutdown") ginkgo.Context("when gracefully shutting down", func() { @@ -56,9 +55,6 @@ var _ = SIGDescribe("GracefulNodeShutdown [Serial] [NodeAlphaFeature:GracefulNod ) tempSetCurrentKubeletConfig(f, func(initialConfig *kubeletconfig.KubeletConfiguration) { - initialConfig.FeatureGates = map[string]bool{ - string(features.GracefulNodeShutdown): true, - } initialConfig.ShutdownGracePeriod = metav1.Duration{Duration: nodeShutdownGracePeriod} initialConfig.ShutdownGracePeriodCriticalPods = metav1.Duration{Duration: nodeShutdownGracePeriodCriticalPods} }) diff --git a/test/e2e_node/podresources_test.go b/test/e2e_node/podresources_test.go index e070ecc2815..1b27dda6fab 100644 --- a/test/e2e_node/podresources_test.go +++ b/test/e2e_node/podresources_test.go @@ -791,11 +791,7 @@ func configurePodResourcesInKubelet(f *framework.Framework, cleanStateFile bool, oldCfg, err := getCurrentKubeletConfig() framework.ExpectNoError(err) newCfg := oldCfg.DeepCopy() - if newCfg.FeatureGates == nil { - newCfg.FeatureGates = make(map[string]bool) - } - newCfg.FeatureGates["CPUManager"] = true - newCfg.FeatureGates["KubeletPodResourcesGetAllocatable"] = true + newCfg.FeatureGates[string(kubefeatures.KubeletPodResourcesGetAllocatable)] = true // After graduation of the CPU Manager feature to Beta, the CPU Manager // "none" policy is ON by default. But when we set the CPU Manager policy to