Merge pull request #11737 from thockin/cleanup-remove-v1beta3
Remove v1beta3
This commit is contained in:
@@ -56,7 +56,7 @@ type Cluster struct {
|
||||
LocationOfOrigin string
|
||||
// Server is the address of the kubernetes cluster (https://hostname:port).
|
||||
Server string `json:"server"`
|
||||
// APIVersion is the preferred api version for communicating with the kubernetes cluster (v1beta1, v1beta2, v1beta3, etc).
|
||||
// APIVersion is the preferred api version for communicating with the kubernetes cluster (v1, v2, etc).
|
||||
APIVersion string `json:"api-version,omitempty"`
|
||||
// InsecureSkipTLSVerify skips the validity check for the server's certificate. This will make your HTTPS connections insecure.
|
||||
InsecureSkipTLSVerify bool `json:"insecure-skip-tls-verify,omitempty"`
|
||||
|
@@ -54,7 +54,7 @@ type Preferences struct {
|
||||
type Cluster struct {
|
||||
// Server is the address of the kubernetes cluster (https://hostname:port).
|
||||
Server string `json:"server"`
|
||||
// APIVersion is the preferred api version for communicating with the kubernetes cluster (v1beta1, v1beta2, v1beta3, etc).
|
||||
// APIVersion is the preferred api version for communicating with the kubernetes cluster (v1, v2, etc).
|
||||
APIVersion string `json:"api-version,omitempty"`
|
||||
// InsecureSkipTLSVerify skips the validity check for the server's certificate. This will make your HTTPS connections insecure.
|
||||
InsecureSkipTLSVerify bool `json:"insecure-skip-tls-verify,omitempty"`
|
||||
|
@@ -312,40 +312,6 @@ func (v versionToResourceToFieldMapping) filterField(apiVersion, resourceType, f
|
||||
}
|
||||
|
||||
var fieldMappings = versionToResourceToFieldMapping{
|
||||
"v1beta3": resourceTypeToFieldMapping{
|
||||
"nodes": clientFieldNameToAPIVersionFieldName{
|
||||
ObjectNameField: "metadata.name",
|
||||
NodeUnschedulable: "spec.unschedulable",
|
||||
},
|
||||
"minions": clientFieldNameToAPIVersionFieldName{
|
||||
ObjectNameField: "metadata.name",
|
||||
NodeUnschedulable: "spec.unschedulable",
|
||||
},
|
||||
"pods": clientFieldNameToAPIVersionFieldName{
|
||||
PodHost: "spec.host",
|
||||
},
|
||||
"secrets": clientFieldNameToAPIVersionFieldName{
|
||||
SecretType: "type",
|
||||
},
|
||||
"serviceAccounts": clientFieldNameToAPIVersionFieldName{
|
||||
ObjectNameField: "metadata.name",
|
||||
},
|
||||
"endpoints": clientFieldNameToAPIVersionFieldName{
|
||||
ObjectNameField: "metadata.name",
|
||||
},
|
||||
"events": clientFieldNameToAPIVersionFieldName{
|
||||
ObjectNameField: "metadata.name",
|
||||
EventReason: "reason",
|
||||
EventSource: "source",
|
||||
EventInvolvedKind: "involvedObject.kind",
|
||||
EventInvolvedNamespace: "involvedObject.namespace",
|
||||
EventInvolvedName: "involvedObject.name",
|
||||
EventInvolvedUID: "involvedObject.uid",
|
||||
EventInvolvedAPIVersion: "involvedObject.apiVersion",
|
||||
EventInvolvedResourceVersion: "involvedObject.resourceVersion",
|
||||
EventInvolvedFieldPath: "involvedObject.fieldPath",
|
||||
},
|
||||
},
|
||||
"v1": resourceTypeToFieldMapping{
|
||||
"nodes": clientFieldNameToAPIVersionFieldName{
|
||||
ObjectNameField: "metadata.name",
|
||||
|
@@ -1049,13 +1049,6 @@ func TestUnversionedPath(t *testing.T) {
|
||||
t.Errorf("test case %d failed: unexpected path: %s, expected %s", i+1, r.path, tc.expectedPath)
|
||||
}
|
||||
}
|
||||
for i, tc := range tt {
|
||||
c := NewOrDie(&Config{Host: tc.host, Prefix: tc.prefix, Version: "v1beta3"})
|
||||
r := c.Post().Prefix("/alpha").UnversionedPath(tc.unversioned)
|
||||
if r.path != tc.expectedPath {
|
||||
t.Errorf("test case %d failed: unexpected path: %s, expected %s", i+1, r.path, tc.expectedPath)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestAbsPath(t *testing.T) {
|
||||
|
Reference in New Issue
Block a user