kubeadm: remove Initializers (still in alpha) from admission control
This commit is contained in:
		| @@ -42,9 +42,9 @@ import ( | ||||
| const ( | ||||
| 	DefaultCloudConfigPath = "/etc/kubernetes/cloud-config" | ||||
|  | ||||
| 	defaultV18AdmissionControl    = "Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota" | ||||
| 	deprecatedV19AdmissionControl = "Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| 	defaultV19AdmissionControl    = "Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| 	defaultV18AdmissionControl    = "NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota" | ||||
| 	deprecatedV19AdmissionControl = "NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| 	defaultV19AdmissionControl    = "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" | ||||
| ) | ||||
|  | ||||
| // CreateInitStaticPodManifestFiles will write all static pod manifest files needed to bring up the control plane. | ||||
|   | ||||
| @@ -150,7 +150,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -184,7 +184,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -218,7 +218,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -253,7 +253,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -290,7 +290,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -327,7 +327,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -364,7 +364,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -401,7 +401,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -437,7 +437,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
| @@ -473,7 +473,7 @@ func TestGetAPIServerCommand(t *testing.T) { | ||||
| 			expected: []string{ | ||||
| 				"kube-apiserver", | ||||
| 				"--insecure-port=0", | ||||
| 				"--admission-control=Initializers,NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota", | ||||
| 				"--service-cluster-ip-range=bar", | ||||
| 				"--service-account-key-file=" + testCertsDir + "/sa.pub", | ||||
| 				"--client-ca-file=" + testCertsDir + "/ca.crt", | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Di Xu
					Di Xu