kubeadm: clean up unnecessary references to UnknownCRISocket
This commit is contained in:
		| @@ -134,7 +134,7 @@ func (o *genCSRConfig) addFlagSet(flagSet *pflag.FlagSet) { | ||||
| func (o *genCSRConfig) load() (err error) { | ||||
| 	o.kubeadmConfig, err = configutil.LoadOrDefaultInitConfiguration( | ||||
| 		o.kubeadmConfigPath, | ||||
| 		cmdutil.DefaultInitConfiguration(), | ||||
| 		&kubeadmapiv1.InitConfiguration{}, | ||||
| 		&kubeadmapiv1.ClusterConfiguration{}, | ||||
| 		true, /* skipCRIDetect */ | ||||
| 	) | ||||
| @@ -354,7 +354,7 @@ func getInternalCfg(cfgPath string, kubeconfigPath string, cfg kubeadmapiv1.Clus | ||||
| 	} | ||||
|  | ||||
| 	// Read config from --config if provided. Otherwise, use the default configuration | ||||
| 	return configutil.LoadOrDefaultInitConfiguration(cfgPath, cmdutil.DefaultInitConfiguration(), &cfg, true /* skipCRIDetect */) | ||||
| 	return configutil.LoadOrDefaultInitConfiguration(cfgPath, &kubeadmapiv1.InitConfiguration{}, &cfg, true /* skipCRIDetect */) | ||||
| } | ||||
|  | ||||
| // newCmdCertsExpiration creates a new `cert check-expiration` command. | ||||
|   | ||||
| @@ -442,7 +442,7 @@ func newCmdConfigImagesList(out io.Writer, mockK8sVersion *string) *cobra.Comman | ||||
|  | ||||
| // NewImagesList returns the underlying struct for the "kubeadm config images list" command | ||||
| func NewImagesList(cfgPath string, cfg *kubeadmapiv1old.ClusterConfiguration) (*ImagesList, error) { | ||||
| 	initcfg, err := configutil.LoadOrDefaultInitConfiguration(cfgPath, cmdutil.DefaultInitConfiguration(), cfg, true /* skipCRIDetect */) | ||||
| 	initcfg, err := configutil.LoadOrDefaultInitConfiguration(cfgPath, &kubeadmapiv1old.InitConfiguration{}, cfg, true /* skipCRIDetect */) | ||||
| 	if err != nil { | ||||
| 		return nil, errors.Wrap(err, "could not convert cfg to an internal cfg") | ||||
| 	} | ||||
|   | ||||
| @@ -82,13 +82,8 @@ func TestImagesListRunWithCustomConfigPath(t *testing.T) { | ||||
| 			}, | ||||
| 			configContents: []byte(dedent.Dedent(fmt.Sprintf(` | ||||
| apiVersion: %s | ||||
| kind: InitConfiguration | ||||
| nodeRegistration: | ||||
|   criSocket: %s | ||||
| --- | ||||
| apiVersion: %[1]s | ||||
| kind: ClusterConfiguration | ||||
| kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.UnknownCRISocket, constants.CurrentKubernetesVersion))), | ||||
| kubernetesVersion: %s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.CurrentKubernetesVersion))), | ||||
| 		}, | ||||
| 		{ | ||||
| 			name:               "use coredns", | ||||
| @@ -98,13 +93,8 @@ kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.U | ||||
| 			}, | ||||
| 			configContents: []byte(dedent.Dedent(fmt.Sprintf(` | ||||
| apiVersion: %s | ||||
| kind: InitConfiguration | ||||
| nodeRegistration: | ||||
|   criSocket: %s | ||||
| --- | ||||
| apiVersion: %[1]s | ||||
| kind: ClusterConfiguration | ||||
| kubernetesVersion: %[3]s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.UnknownCRISocket, constants.MinimumControlPlaneVersion))), | ||||
| kubernetesVersion: %s`, kubeadmapiv1.SchemeGroupVersion.String(), constants.MinimumControlPlaneVersion))), | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
|   | ||||
| @@ -65,7 +65,7 @@ func newCmdKubeConfigUtility(out io.Writer) *cobra.Command { | ||||
| // newCmdUserKubeConfig returns sub commands for kubeconfig phase | ||||
| func newCmdUserKubeConfig(out io.Writer) *cobra.Command { | ||||
|  | ||||
| 	initCfg := cmdutil.DefaultInitConfiguration() | ||||
| 	initCfg := &kubeadmapiv1.InitConfiguration{} | ||||
| 	clusterCfg := &kubeadmapiv1.ClusterConfiguration{} | ||||
|  | ||||
| 	var ( | ||||
|   | ||||
| @@ -45,9 +45,6 @@ func generateTestKubeadmConfig(dir, id, certDir, clusterName string) (string, er | ||||
| 			AdvertiseAddress: "1.2.3.4", | ||||
| 			BindPort:         1234, | ||||
| 		}, | ||||
| 		NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 			CRISocket: kubeadmconstants.UnknownCRISocket, | ||||
| 		}, | ||||
| 	} | ||||
| 	clusterCfg := kubeadmapiv1.ClusterConfiguration{ | ||||
| 		TypeMeta: metav1.TypeMeta{ | ||||
|   | ||||
| @@ -138,11 +138,12 @@ func getCertPhaseFlags(name string) []string { | ||||
| } | ||||
|  | ||||
| func getSANDescription(certSpec *certsphase.KubeadmCert) string { | ||||
| 	//Defaulted config we will use to get SAN certs | ||||
| 	defaultConfig := cmdutil.DefaultInitConfiguration() | ||||
| 	// GetAPIServerAltNames errors without an AdvertiseAddress; this is as good as any. | ||||
| 	defaultConfig.LocalAPIEndpoint = kubeadmapiv1.APIEndpoint{ | ||||
| 		AdvertiseAddress: "127.0.0.1", | ||||
| 	// Defaulted config we will use to get SAN certs | ||||
| 	defaultConfig := &kubeadmapiv1.InitConfiguration{ | ||||
| 		LocalAPIEndpoint: kubeadmapiv1.APIEndpoint{ | ||||
| 			// GetAPIServerAltNames errors without an AdvertiseAddress; this is as good as any. | ||||
| 			AdvertiseAddress: "127.0.0.1", | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
| 	defaultInternalConfig := &kubeadmapi.InitConfiguration{} | ||||
|   | ||||
| @@ -90,7 +90,7 @@ func newCmdToken(out io.Writer, errW io.Writer) *cobra.Command { | ||||
| 	tokenCmd.PersistentFlags().BoolVar(&dryRun, | ||||
| 		options.DryRun, dryRun, "Whether to enable dry-run mode or not") | ||||
|  | ||||
| 	cfg := cmdutil.DefaultInitConfiguration() | ||||
| 	cfg := &kubeadmapiv1.InitConfiguration{} | ||||
|  | ||||
| 	// Default values for the cobra help text | ||||
| 	kubeadmscheme.Scheme.Default(cfg) | ||||
|   | ||||
| @@ -36,7 +36,6 @@ import ( | ||||
| 	outputapischeme "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/scheme" | ||||
| 	outputapiv1alpha2 "k8s.io/kubernetes/cmd/kubeadm/app/apis/output/v1alpha2" | ||||
| 	cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util" | ||||
| 	"k8s.io/kubernetes/cmd/kubeadm/app/constants" | ||||
| 	"k8s.io/kubernetes/cmd/kubeadm/app/util/output" | ||||
| ) | ||||
|  | ||||
| @@ -173,9 +172,6 @@ func TestRunCreateToken(t *testing.T) { | ||||
| 						Groups: tc.extraGroups, | ||||
| 					}, | ||||
| 				}, | ||||
| 				NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 					CRISocket: constants.UnknownCRISocket, | ||||
| 				}, | ||||
| 			} | ||||
|  | ||||
| 			err = RunCreateToken(&buf, fakeClient, "", cfg, tc.printJoin, "", "") | ||||
|   | ||||
| @@ -31,7 +31,6 @@ import ( | ||||
| 	"k8s.io/client-go/tools/clientcmd" | ||||
| 	"k8s.io/klog/v2" | ||||
|  | ||||
| 	kubeadmapiv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3" | ||||
| 	"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options" | ||||
| 	kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants" | ||||
| 	kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util" | ||||
| @@ -103,17 +102,6 @@ func AddCRISocketFlag(flagSet *pflag.FlagSet, criSocket *string) { | ||||
| 	) | ||||
| } | ||||
|  | ||||
| // DefaultInitConfiguration return default InitConfiguration. Avoid running the CRI auto-detection | ||||
| // code as we don't need it. | ||||
| func DefaultInitConfiguration() *kubeadmapiv1.InitConfiguration { | ||||
| 	initCfg := &kubeadmapiv1.InitConfiguration{ | ||||
| 		NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 			CRISocket: kubeadmconstants.UnknownCRISocket, // avoid CRI detection | ||||
| 		}, | ||||
| 	} | ||||
| 	return initCfg | ||||
| } | ||||
|  | ||||
| // InteractivelyConfirmAction asks the user whether they _really_ want to take the action. | ||||
| func InteractivelyConfirmAction(action, question string, r io.Reader) error { | ||||
| 	fmt.Printf("[%s] %s [y/N]: ", action, question) | ||||
|   | ||||
| @@ -1072,9 +1072,6 @@ func TestJoinIPCheck(t *testing.T) { | ||||
| 		t.Skip("not a privileged user") | ||||
| 	} | ||||
| 	internalcfg, err := configutil.DefaultedJoinConfiguration(&kubeadmapiv1.JoinConfiguration{ | ||||
| 		NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 			CRISocket: constants.UnknownCRISocket, | ||||
| 		}, | ||||
| 		Discovery: kubeadmapiv1.Discovery{ | ||||
| 			BootstrapToken: &kubeadmapiv1.BootstrapTokenDiscovery{ | ||||
| 				Token:                    configutil.PlaceholderToken.Token.String(), | ||||
|   | ||||
| @@ -49,9 +49,7 @@ var cfgFiles = map[string][]byte{ | ||||
| 	"InitConfiguration_v1beta3": []byte(fmt.Sprintf(` | ||||
| apiVersion: %s | ||||
| kind: InitConfiguration | ||||
| nodeRegistration: | ||||
|   criSocket: %s | ||||
| `, kubeadmapiv1.SchemeGroupVersion.String(), kubeadmconstants.UnknownCRISocket)), | ||||
| `, kubeadmapiv1.SchemeGroupVersion.String())), | ||||
| 	"ClusterConfiguration_v1beta3": []byte(fmt.Sprintf(` | ||||
| apiVersion: %s | ||||
| kind: ClusterConfiguration | ||||
|   | ||||
| @@ -126,9 +126,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) { | ||||
| 					APIVersion: kubeadmapiv1.SchemeGroupVersion.String(), | ||||
| 					Kind:       constants.InitConfigurationKind, | ||||
| 				}, | ||||
| 				NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 					CRISocket: constants.UnknownCRISocket, | ||||
| 				}, | ||||
| 			}, | ||||
| 			expectedTaintCnt: 1, | ||||
| 		}, | ||||
| @@ -139,9 +136,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) { | ||||
| 					APIVersion: kubeadmapiv1.SchemeGroupVersion.String(), | ||||
| 					Kind:       constants.InitConfigurationKind, | ||||
| 				}, | ||||
| 				NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 					CRISocket: constants.UnknownCRISocket, | ||||
| 				}, | ||||
| 			}, | ||||
| 			expectedTaintCnt: 1, | ||||
| 		}, | ||||
| @@ -153,8 +147,7 @@ func TestDefaultTaintsMarshaling(t *testing.T) { | ||||
| 					Kind:       constants.InitConfigurationKind, | ||||
| 				}, | ||||
| 				NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{ | ||||
| 					Taints:    []v1.Taint{}, | ||||
| 					CRISocket: constants.UnknownCRISocket, | ||||
| 					Taints: []v1.Taint{}, | ||||
| 				}, | ||||
| 			}, | ||||
| 			expectedTaintCnt: 0, | ||||
| @@ -171,7 +164,6 @@ func TestDefaultTaintsMarshaling(t *testing.T) { | ||||
| 						{Key: "taint1"}, | ||||
| 						{Key: "taint2"}, | ||||
| 					}, | ||||
| 					CRISocket: constants.UnknownCRISocket, | ||||
| 				}, | ||||
| 			}, | ||||
| 			expectedTaintCnt: 2, | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 SataQiu
					SataQiu