Merge pull request #54078 from bcreane/update_clientset

Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

NetworkPolicy e2e: use ClientSet and update to CoreV1 and NetworkingV1 apis.

**What this PR does / why we need it**:
Update NetworkPolicy e2e test: use the public ClientSet and update to CoreV1 and NetworkingV1 apis.

**Release note**:

```release-note
NONE
```
This commit is contained in:
Kubernetes Submit Queue 2017-10-23 20:22:57 -07:00 committed by GitHub
commit e95672de45
2 changed files with 51 additions and 51 deletions

View File

@ -31,7 +31,6 @@ go_library(
deps = [ deps = [
"//pkg/api:go_default_library", "//pkg/api:go_default_library",
"//pkg/api/testapi:go_default_library", "//pkg/api/testapi:go_default_library",
"//pkg/apis/networking:go_default_library",
"//pkg/client/clientset_generated/internalclientset:go_default_library", "//pkg/client/clientset_generated/internalclientset:go_default_library",
"//pkg/cloudprovider:go_default_library", "//pkg/cloudprovider:go_default_library",
"//pkg/cloudprovider/providers/gce:go_default_library", "//pkg/cloudprovider/providers/gce:go_default_library",
@ -47,6 +46,7 @@ go_library(
"//vendor/github.com/onsi/gomega:go_default_library", "//vendor/github.com/onsi/gomega:go_default_library",
"//vendor/google.golang.org/api/compute/v0.alpha:go_default_library", "//vendor/google.golang.org/api/compute/v0.alpha:go_default_library",
"//vendor/k8s.io/api/core/v1:go_default_library", "//vendor/k8s.io/api/core/v1:go_default_library",
"//vendor/k8s.io/api/networking/v1:go_default_library",
"//vendor/k8s.io/api/rbac/v1beta1:go_default_library", "//vendor/k8s.io/api/rbac/v1beta1:go_default_library",
"//vendor/k8s.io/apimachinery/pkg/api/errors:go_default_library", "//vendor/k8s.io/apimachinery/pkg/api/errors:go_default_library",
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library", "//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",

View File

@ -18,9 +18,9 @@ package network
import ( import (
"k8s.io/api/core/v1" "k8s.io/api/core/v1"
networkingv1 "k8s.io/api/networking/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/intstr" "k8s.io/apimachinery/pkg/util/intstr"
"k8s.io/kubernetes/pkg/apis/networking"
"k8s.io/kubernetes/test/e2e/framework" "k8s.io/kubernetes/test/e2e/framework"
imageutils "k8s.io/kubernetes/test/utils/image" imageutils "k8s.io/kubernetes/test/utils/image"
@ -65,17 +65,17 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}) })
It("should support a 'default-deny' policy [Feature:NetworkPolicy]", func() { It("should support a 'default-deny' policy [Feature:NetworkPolicy]", func() {
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "deny-all", Name: "deny-all",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
PodSelector: metav1.LabelSelector{}, PodSelector: metav1.LabelSelector{},
Ingress: []networking.NetworkPolicyIngressRule{}, Ingress: []networkingv1.NetworkPolicyIngressRule{},
}, },
} }
policy, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy) policy, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
@ -86,11 +86,11 @@ var _ = SIGDescribe("NetworkPolicy", func() {
It("should enforce policy based on PodSelector [Feature:NetworkPolicy]", func() { It("should enforce policy based on PodSelector [Feature:NetworkPolicy]", func() {
By("Creating a network policy for the server which allows traffic from the pod 'client-a'.") By("Creating a network policy for the server which allows traffic from the pod 'client-a'.")
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-client-a-via-pod-selector", Name: "allow-client-a-via-pod-selector",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Apply this policy to the Server // Apply this policy to the Server
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
@ -98,8 +98,8 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
}, },
// Allow traffic only from client-a // Allow traffic only from client-a
Ingress: []networking.NetworkPolicyIngressRule{{ Ingress: []networkingv1.NetworkPolicyIngressRule{{
From: []networking.NetworkPolicyPeer{{ From: []networkingv1.NetworkPolicyPeer{{
PodSelector: &metav1.LabelSelector{ PodSelector: &metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
"pod-name": "client-a", "pod-name": "client-a",
@ -110,7 +110,7 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
} }
policy, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy) policy, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
@ -140,11 +140,11 @@ var _ = SIGDescribe("NetworkPolicy", func() {
// Create Policy for that service that allows traffic only via namespace B // Create Policy for that service that allows traffic only via namespace B
By("Creating a network policy for the server which allows traffic from namespace-b.") By("Creating a network policy for the server which allows traffic from namespace-b.")
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-ns-b-via-namespace-selector", Name: "allow-ns-b-via-namespace-selector",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Apply to server // Apply to server
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
@ -152,8 +152,8 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
}, },
// Allow traffic only from NS-B // Allow traffic only from NS-B
Ingress: []networking.NetworkPolicyIngressRule{{ Ingress: []networkingv1.NetworkPolicyIngressRule{{
From: []networking.NetworkPolicyPeer{{ From: []networkingv1.NetworkPolicyPeer{{
NamespaceSelector: &metav1.LabelSelector{ NamespaceSelector: &metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
"ns-name": nsBName, "ns-name": nsBName,
@ -163,7 +163,7 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}}, }},
}, },
} }
policy, err = f.InternalClientset.Networking().NetworkPolicies(nsA.Name).Create(policy) policy, err = f.ClientSet.NetworkingV1().NetworkPolicies(nsA.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
@ -173,11 +173,11 @@ var _ = SIGDescribe("NetworkPolicy", func() {
It("should enforce policy based on Ports [Feature:NetworkPolicy]", func() { It("should enforce policy based on Ports [Feature:NetworkPolicy]", func() {
By("Creating a network policy for the Service which allows traffic only to one port.") By("Creating a network policy for the Service which allows traffic only to one port.")
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-ingress-on-port-81", Name: "allow-ingress-on-port-81",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Apply to server // Apply to server
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
@ -185,14 +185,14 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
}, },
// Allow traffic only to one port. // Allow traffic only to one port.
Ingress: []networking.NetworkPolicyIngressRule{{ Ingress: []networkingv1.NetworkPolicyIngressRule{{
Ports: []networking.NetworkPolicyPort{{ Ports: []networkingv1.NetworkPolicyPort{{
Port: &intstr.IntOrString{IntVal: 81}, Port: &intstr.IntOrString{IntVal: 81},
}}, }},
}}, }},
}, },
} }
policy, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy) policy, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
@ -203,11 +203,11 @@ var _ = SIGDescribe("NetworkPolicy", func() {
It("should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy]", func() { It("should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy]", func() {
By("Creating a network policy for the Service which allows traffic only to one port.") By("Creating a network policy for the Service which allows traffic only to one port.")
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-ingress-on-port-80", Name: "allow-ingress-on-port-80",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Apply to server // Apply to server
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
@ -215,23 +215,23 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
}, },
// Allow traffic only to one port. // Allow traffic only to one port.
Ingress: []networking.NetworkPolicyIngressRule{{ Ingress: []networkingv1.NetworkPolicyIngressRule{{
Ports: []networking.NetworkPolicyPort{{ Ports: []networkingv1.NetworkPolicyPort{{
Port: &intstr.IntOrString{IntVal: 80}, Port: &intstr.IntOrString{IntVal: 80},
}}, }},
}}, }},
}, },
} }
policy, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy) policy, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
By("Creating a network policy for the Service which allows traffic only to another port.") By("Creating a network policy for the Service which allows traffic only to another port.")
policy2 := &networking.NetworkPolicy{ policy2 := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-ingress-on-port-81", Name: "allow-ingress-on-port-81",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Apply to server // Apply to server
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
@ -239,14 +239,14 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
}, },
// Allow traffic only to one port. // Allow traffic only to one port.
Ingress: []networking.NetworkPolicyIngressRule{{ Ingress: []networkingv1.NetworkPolicyIngressRule{{
Ports: []networking.NetworkPolicyPort{{ Ports: []networkingv1.NetworkPolicyPort{{
Port: &intstr.IntOrString{IntVal: 81}, Port: &intstr.IntOrString{IntVal: 81},
}}, }},
}}, }},
}, },
} }
policy2, err = f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy2) policy2, err = f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy2)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy2) defer cleanupNetworkPolicy(f, policy2)
@ -257,19 +257,19 @@ var _ = SIGDescribe("NetworkPolicy", func() {
It("should support allow-all policy [Feature:NetworkPolicy]", func() { It("should support allow-all policy [Feature:NetworkPolicy]", func() {
By("Creating a network policy which allows all traffic.") By("Creating a network policy which allows all traffic.")
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-all", Name: "allow-all",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Allow all traffic // Allow all traffic
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{}, MatchLabels: map[string]string{},
}, },
Ingress: []networking.NetworkPolicyIngressRule{{}}, Ingress: []networkingv1.NetworkPolicyIngressRule{{}},
}, },
} }
policy, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy) policy, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
@ -279,11 +279,11 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}) })
It("should allow ingress access on one named port [Feature:NetworkPolicy]", func() { It("should allow ingress access on one named port [Feature:NetworkPolicy]", func() {
policy := &networking.NetworkPolicy{ policy := &networkingv1.NetworkPolicy{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "allow-client-a-via-named-port-ingress-rule", Name: "allow-client-a-via-named-port-ingress-rule",
}, },
Spec: networking.NetworkPolicySpec{ Spec: networkingv1.NetworkPolicySpec{
// Apply this policy to the Server // Apply this policy to the Server
PodSelector: metav1.LabelSelector{ PodSelector: metav1.LabelSelector{
MatchLabels: map[string]string{ MatchLabels: map[string]string{
@ -291,15 +291,15 @@ var _ = SIGDescribe("NetworkPolicy", func() {
}, },
}, },
// Allow traffic to only one named port: "serve-80". // Allow traffic to only one named port: "serve-80".
Ingress: []networking.NetworkPolicyIngressRule{{ Ingress: []networkingv1.NetworkPolicyIngressRule{{
Ports: []networking.NetworkPolicyPort{{ Ports: []networkingv1.NetworkPolicyPort{{
Port: &intstr.IntOrString{Type: intstr.String, StrVal: "serve-80"}, Port: &intstr.IntOrString{Type: intstr.String, StrVal: "serve-80"},
}}, }},
}}, }},
}, },
} }
policy, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).Create(policy) policy, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).Create(policy)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
defer cleanupNetworkPolicy(f, policy) defer cleanupNetworkPolicy(f, policy)
@ -318,7 +318,7 @@ func testCanConnect(f *framework.Framework, ns *v1.Namespace, podName string, se
podClient := createNetworkClientPod(f, ns, podName, service, targetPort) podClient := createNetworkClientPod(f, ns, podName, service, targetPort)
defer func() { defer func() {
By(fmt.Sprintf("Cleaning up the pod %s", podName)) By(fmt.Sprintf("Cleaning up the pod %s", podName))
if err := f.ClientSet.Core().Pods(ns.Name).Delete(podClient.Name, nil); err != nil { if err := f.ClientSet.CoreV1().Pods(ns.Name).Delete(podClient.Name, nil); err != nil {
framework.Failf("unable to cleanup pod %v: %v", podClient.Name, err) framework.Failf("unable to cleanup pod %v: %v", podClient.Name, err)
} }
}() }()
@ -337,7 +337,7 @@ func testCanConnect(f *framework.Framework, ns *v1.Namespace, podName string, se
} }
// Collect current NetworkPolicies applied in the test namespace. // Collect current NetworkPolicies applied in the test namespace.
policies, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).List(metav1.ListOptions{}) policies, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).List(metav1.ListOptions{})
if err != nil { if err != nil {
framework.Logf("error getting current NetworkPolicies for %s namespace: %s", f.Namespace.Name, err) framework.Logf("error getting current NetworkPolicies for %s namespace: %s", f.Namespace.Name, err)
} }
@ -365,7 +365,7 @@ func testCannotConnect(f *framework.Framework, ns *v1.Namespace, podName string,
podClient := createNetworkClientPod(f, ns, podName, service, targetPort) podClient := createNetworkClientPod(f, ns, podName, service, targetPort)
defer func() { defer func() {
By(fmt.Sprintf("Cleaning up the pod %s", podName)) By(fmt.Sprintf("Cleaning up the pod %s", podName))
if err := f.ClientSet.Core().Pods(ns.Name).Delete(podClient.Name, nil); err != nil { if err := f.ClientSet.CoreV1().Pods(ns.Name).Delete(podClient.Name, nil); err != nil {
framework.Failf("unable to cleanup pod %v: %v", podClient.Name, err) framework.Failf("unable to cleanup pod %v: %v", podClient.Name, err)
} }
}() }()
@ -383,7 +383,7 @@ func testCannotConnect(f *framework.Framework, ns *v1.Namespace, podName string,
} }
// Collect current NetworkPolicies applied in the test namespace. // Collect current NetworkPolicies applied in the test namespace.
policies, err := f.InternalClientset.Networking().NetworkPolicies(f.Namespace.Name).List(metav1.ListOptions{}) policies, err := f.ClientSet.NetworkingV1().NetworkPolicies(f.Namespace.Name).List(metav1.ListOptions{})
if err != nil { if err != nil {
framework.Logf("error getting current NetworkPolicies for %s namespace: %s", f.Namespace.Name, err) framework.Logf("error getting current NetworkPolicies for %s namespace: %s", f.Namespace.Name, err)
} }
@ -453,7 +453,7 @@ func createServerPodAndService(f *framework.Framework, namespace *v1.Namespace,
} }
By(fmt.Sprintf("Creating a server pod %s in namespace %s", podName, namespace.Name)) By(fmt.Sprintf("Creating a server pod %s in namespace %s", podName, namespace.Name))
pod, err := f.ClientSet.Core().Pods(namespace.Name).Create(&v1.Pod{ pod, err := f.ClientSet.CoreV1().Pods(namespace.Name).Create(&v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: podName, Name: podName,
Labels: map[string]string{ Labels: map[string]string{
@ -470,7 +470,7 @@ func createServerPodAndService(f *framework.Framework, namespace *v1.Namespace,
svcName := fmt.Sprintf("svc-%s", podName) svcName := fmt.Sprintf("svc-%s", podName)
By(fmt.Sprintf("Creating a service %s for pod %s in namespace %s", svcName, podName, namespace.Name)) By(fmt.Sprintf("Creating a service %s for pod %s in namespace %s", svcName, podName, namespace.Name))
svc, err := f.ClientSet.Core().Services(namespace.Name).Create(&v1.Service{ svc, err := f.ClientSet.CoreV1().Services(namespace.Name).Create(&v1.Service{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: svcName, Name: svcName,
}, },
@ -489,11 +489,11 @@ func createServerPodAndService(f *framework.Framework, namespace *v1.Namespace,
func cleanupServerPodAndService(f *framework.Framework, pod *v1.Pod, service *v1.Service) { func cleanupServerPodAndService(f *framework.Framework, pod *v1.Pod, service *v1.Service) {
By("Cleaning up the server.") By("Cleaning up the server.")
if err := f.ClientSet.Core().Pods(pod.Namespace).Delete(pod.Name, nil); err != nil { if err := f.ClientSet.CoreV1().Pods(pod.Namespace).Delete(pod.Name, nil); err != nil {
framework.Failf("unable to cleanup pod %v: %v", pod.Name, err) framework.Failf("unable to cleanup pod %v: %v", pod.Name, err)
} }
By("Cleaning up the server's service.") By("Cleaning up the server's service.")
if err := f.ClientSet.Core().Services(service.Namespace).Delete(service.Name, nil); err != nil { if err := f.ClientSet.CoreV1().Services(service.Namespace).Delete(service.Name, nil); err != nil {
framework.Failf("unable to cleanup svc %v: %v", service.Name, err) framework.Failf("unable to cleanup svc %v: %v", service.Name, err)
} }
} }
@ -502,7 +502,7 @@ func cleanupServerPodAndService(f *framework.Framework, pod *v1.Pod, service *v1
// This client will attempt a one-shot connection, then die, without restarting the pod. // This client will attempt a one-shot connection, then die, without restarting the pod.
// Test can then be asserted based on whether the pod quit with an error or not. // Test can then be asserted based on whether the pod quit with an error or not.
func createNetworkClientPod(f *framework.Framework, namespace *v1.Namespace, podName string, targetService *v1.Service, targetPort int) *v1.Pod { func createNetworkClientPod(f *framework.Framework, namespace *v1.Namespace, podName string, targetService *v1.Service, targetPort int) *v1.Pod {
pod, err := f.ClientSet.Core().Pods(namespace.Name).Create(&v1.Pod{ pod, err := f.ClientSet.CoreV1().Pods(namespace.Name).Create(&v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: podName, Name: podName,
Labels: map[string]string{ Labels: map[string]string{
@ -531,9 +531,9 @@ func createNetworkClientPod(f *framework.Framework, namespace *v1.Namespace, pod
return pod return pod
} }
func cleanupNetworkPolicy(f *framework.Framework, policy *networking.NetworkPolicy) { func cleanupNetworkPolicy(f *framework.Framework, policy *networkingv1.NetworkPolicy) {
By("Cleaning up the policy.") By("Cleaning up the policy.")
if err := f.InternalClientset.Networking().NetworkPolicies(policy.Namespace).Delete(policy.Name, nil); err != nil { if err := f.ClientSet.NetworkingV1().NetworkPolicies(policy.Namespace).Delete(policy.Name, nil); err != nil {
framework.Failf("unable to cleanup policy %v: %v", policy.Name, err) framework.Failf("unable to cleanup policy %v: %v", policy.Name, err)
} }
} }