Merge pull request #58428 from dixudx/kubeadm_remove_initializers
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. kubeadm: remove Initializers (still in alpha) from admission control **What this PR does / why we need it**: Currently `Initializers` is still in alpha version, which should not be enabled by default, until promoted to beta. For kubeadm users, who still want to use `Initializers`, they can use `apiServerExtraArgs` through kubeadm config file to enable it when booting up the cluster. **Which issue(s) this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close the issue(s) when PR gets merged)*: Fixes kubernetes/kubeadm#629 **Special notes for your reviewer**: /assign @luxas /area kubeadm /cc @kubernetes/sig-cluster-lifecycle-pr-reviews /cc @liggitt @jamiehannaford @timothysc **Release note**: ```release-note Remove alpha Initializers from kubadm admission control ```
This commit is contained in:
		| @@ -42,9 +42,9 @@ import ( | ||||
| const ( | ||||
| 	DefaultCloudConfigPath = "/etc/kubernetes/cloud-config" | ||||
|  | ||||
| 	defaultV18AdmissionControl    = "Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota" | ||||
| 	deprecatedV19AdmissionControl = "Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| 	defaultV19AdmissionControl    = "Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| 	defaultV18AdmissionControl    = "NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota" | ||||
| 	deprecatedV19AdmissionControl = "NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| 	defaultV19AdmissionControl    = "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| ) | ||||
|  | ||||
| // CreateInitStaticPodManifestFiles will write all static pod manifest files needed to bring up the control plane. | ||||
|   | ||||
| @@ -150,7 +150,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -184,7 +184,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -218,7 +218,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -253,7 +253,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -290,7 +290,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -327,7 +327,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -364,7 +364,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -401,7 +401,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -437,7 +437,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -473,7 +473,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Kubernetes Submit Queue
					Kubernetes Submit Queue