Skip to content
This repository was archived by the owner on Aug 12, 2025. It is now read-only.

Commit 71172a4

Browse files
authored
Merge pull request #384 from cprivitere:remove-capp-e2e-tags
✨ Remove-capp-e2e-tags
2 parents 0e32271 + 43e764b commit 71172a4

File tree

3 files changed

+9
-12
lines changed

3 files changed

+9
-12
lines changed

Makefile

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,6 @@ E2E_DIR ?= $(REPO_ROOT)/test/e2e
148148
KUBETEST_CONF_PATH ?= $(abspath $(E2E_DIR)/data/kubetest/conformance.yaml)
149149
E2E_CONF_FILE_SOURCE ?= $(E2E_DIR)/config/packet-ci.yaml
150150
E2E_CONF_FILE ?= $(E2E_DIR)/config/packet-ci-envsubst.yaml
151-
E2E_LD_FLAGS ?= "-X 'sigs.k8s.io/cluster-api-provider-packet/pkg/cloud/packet.clientName=capp-e2e' -X 'sigs.k8s.io/cluster-api-provider-packet/pkg/cloud/packet.clientUAFormat=capp-e2e/%s %s'"
152151

153152
.PHONY: $(E2E_CONF_FILE)
154153
$(E2E_CONF_FILE): $(ENVSUBST) $(E2E_CONF_FILE_SOURCE)
@@ -160,7 +159,6 @@ run-e2e-tests: $(KUBECTL) $(KUSTOMIZE) $(KIND) $(GINKGO) $(E2E_CONF_FILE) e2e-te
160159
$(MAKE) set-manifest-image MANIFEST_IMG=$(REGISTRY)/$(IMAGE_NAME) MANIFEST_TAG=$(TAG)
161160
$(MAKE) set-manifest-pull-policy PULL_POLICY=IfNotPresent
162161
cd test/e2e; time $(GINKGO) -v -trace -progress -v -tags=e2e \
163-
-ldflags $(E2E_LD_FLAGS) \
164162
--randomizeAllSpecs -race $(GINKGO_ADDITIONAL_ARGS) \
165163
-focus=$(GINKGO_FOCUS) -skip=$(GINKGO_SKIP) \
166164
-nodes=$(GINKGO_NODES) --noColor=$(GINKGO_NOCOLOR) \

cmd/ci-clean/main.go

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ import (
2828
"github.com/spf13/cobra"
2929
kerrors "k8s.io/apimachinery/pkg/util/errors"
3030

31-
"sigs.k8s.io/cluster-api-provider-packet/version"
31+
"sigs.k8s.io/cluster-api-provider-packet/pkg/cloud/packet"
3232
)
3333

3434
const (
@@ -65,8 +65,7 @@ func main() {
6565
}
6666

6767
func cleanup(metalAuthToken, metalProjectID string) error {
68-
metalClient := packngo.NewClientWithAuth("capp-e2e", metalAuthToken, nil)
69-
metalClient.UserAgent = fmt.Sprintf("capp-e2e/%s %s", version.Get(), metalClient.UserAgent)
68+
metalClient := packet.NewClient(metalAuthToken)
7069
listOpts := &packngo.ListOptions{}
7170
var errs []error
7271

@@ -100,7 +99,7 @@ func cleanup(metalAuthToken, metalProjectID string) error {
10099
return kerrors.NewAggregate(errs)
101100
}
102101

103-
func deleteDevices(metalClient *packngo.Client, devices []packngo.Device) error {
102+
func deleteDevices(metalClient *packet.Client, devices []packngo.Device) error {
104103
var errs []error
105104

106105
for _, d := range devices {
@@ -121,7 +120,7 @@ func deleteDevices(metalClient *packngo.Client, devices []packngo.Device) error
121120
return kerrors.NewAggregate(errs)
122121
}
123122

124-
func deleteIPs(metalClient *packngo.Client, ips []packngo.IPAddressReservation) error {
123+
func deleteIPs(metalClient *packet.Client, ips []packngo.IPAddressReservation) error {
125124
var errs []error
126125

127126
for _, ip := range ips {
@@ -149,7 +148,7 @@ func deleteIPs(metalClient *packngo.Client, ips []packngo.IPAddressReservation)
149148
return kerrors.NewAggregate(errs)
150149
}
151150

152-
func deleteKeys(metalClient *packngo.Client, keys []packngo.SSHKey) error {
151+
func deleteKeys(metalClient *packet.Client, keys []packngo.SSHKey) error {
153152
var errs []error
154153

155154
for _, k := range keys {

pkg/cloud/packet/client.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ func GetClient() (*Client, error) {
8181
}
8282

8383
func (p *Client) GetDevice(deviceID string) (*packngo.Device, error) {
84-
dev, _, err := p.Client.Devices.Get(deviceID, nil)
84+
dev, _, err := p.Devices.Get(deviceID, nil)
8585
return dev, err
8686
}
8787

@@ -121,7 +121,7 @@ func (p *Client) NewDevice(ctx context.Context, req CreateDeviceRequest) (*packn
121121

122122
if req.MachineScope.IsControlPlane() {
123123
// control plane machines should get the API key injected
124-
userDataValues["apiKey"] = p.Client.APIKey
124+
userDataValues["apiKey"] = p.APIKey
125125

126126
if req.ControlPlaneEndpoint != "" {
127127
userDataValues["controlPlaneEndpoint"] = req.ControlPlaneEndpoint
@@ -160,7 +160,7 @@ func (p *Client) NewDevice(ctx context.Context, req CreateDeviceRequest) (*packn
160160

161161
// If there are no reservationIDs to process, go ahead and return early
162162
if len(reservationIDs) == 0 {
163-
dev, _, err := p.Client.Devices.Create(serverCreateOpts)
163+
dev, _, err := p.Devices.Create(serverCreateOpts)
164164
return dev, err
165165
}
166166

@@ -171,7 +171,7 @@ func (p *Client) NewDevice(ctx context.Context, req CreateDeviceRequest) (*packn
171171

172172
for _, resID := range reservationIDs {
173173
serverCreateOpts.HardwareReservationID = resID
174-
dev, _, err := p.Client.Devices.Create(serverCreateOpts)
174+
dev, _, err := p.Devices.Create(serverCreateOpts)
175175
if err != nil {
176176
lastErr = err
177177
continue

0 commit comments

Comments
 (0)