@@ -34,15 +34,13 @@ import (
3434 "k8s.io/apimachinery/pkg/runtime"
3535 "k8s.io/apimachinery/pkg/types"
3636 clientgoscheme "k8s.io/client-go/kubernetes/scheme"
37- utilfeature "k8s.io/component-base/featuregate/testing"
3837 "k8s.io/utils/ptr"
3938 infrav1 "sigs.k8s.io/cluster-api-provider-azure/api/v1beta1"
4039 "sigs.k8s.io/cluster-api-provider-azure/azure/scope"
4140 "sigs.k8s.io/cluster-api-provider-azure/internal/test/mock_log"
4241 clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
4342 clusterctlv1 "sigs.k8s.io/cluster-api/cmd/clusterctl/api/v1alpha3"
4443 expv1 "sigs.k8s.io/cluster-api/exp/api/v1beta1"
45- capifeature "sigs.k8s.io/cluster-api/feature"
4644 "sigs.k8s.io/controller-runtime/pkg/client"
4745 "sigs.k8s.io/controller-runtime/pkg/client/fake"
4846 "sigs.k8s.io/controller-runtime/pkg/event"
@@ -110,7 +108,6 @@ func TestGetCloudProviderConfig(t *testing.T) {
110108 azureCluster * infrav1.AzureCluster
111109 identityType infrav1.VMIdentity
112110 identityID string
113- machinePoolFeature bool
114111 expectedControlPlaneConfig string
115112 expectedWorkerNodeConfig string
116113 }{
@@ -161,7 +158,6 @@ func TestGetCloudProviderConfig(t *testing.T) {
161158 cluster : cluster ,
162159 azureCluster : azureCluster ,
163160 identityType : infrav1 .VMIdentityNone ,
164- machinePoolFeature : true ,
165161 expectedControlPlaneConfig : vmssCloudConfig ,
166162 expectedWorkerNodeConfig : vmssCloudConfig ,
167163 },
@@ -173,9 +169,6 @@ func TestGetCloudProviderConfig(t *testing.T) {
173169
174170 for name , tc := range cases {
175171 t .Run (name , func (t * testing.T ) {
176- if tc .machinePoolFeature {
177- defer utilfeature .SetFeatureGateDuringTest (t , capifeature .Gates , capifeature .MachinePool , true )()
178- }
179172 fakeIdentity := & infrav1.AzureClusterIdentity {
180173 ObjectMeta : metav1.ObjectMeta {
181174 Name : "fake-identity" ,
@@ -532,7 +525,8 @@ const (
532525 "loadBalancerName": "",
533526 "maximumLoadBalancerRuleCount": 250,
534527 "useManagedIdentityExtension": false,
535- "useInstanceMetadata": true
528+ "useInstanceMetadata": true,
529+ "enableVmssFlexNodes": true
536530}`
537531 //nolint:gosec // Ignore "G101: Potential hardcoded credentials" check.
538532 spWorkerNodeCloudConfig = `{
@@ -554,7 +548,8 @@ const (
554548 "loadBalancerName": "",
555549 "maximumLoadBalancerRuleCount": 250,
556550 "useManagedIdentityExtension": false,
557- "useInstanceMetadata": true
551+ "useInstanceMetadata": true,
552+ "enableVmssFlexNodes": true
558553}`
559554
560555 systemAssignedControlPlaneCloudConfig = `{
@@ -574,7 +569,8 @@ const (
574569 "loadBalancerName": "",
575570 "maximumLoadBalancerRuleCount": 250,
576571 "useManagedIdentityExtension": true,
577- "useInstanceMetadata": true
572+ "useInstanceMetadata": true,
573+ "enableVmssFlexNodes": true
578574}`
579575 systemAssignedWorkerNodeCloudConfig = `{
580576 "cloud": "AzurePublicCloud",
@@ -593,7 +589,8 @@ const (
593589 "loadBalancerName": "",
594590 "maximumLoadBalancerRuleCount": 250,
595591 "useManagedIdentityExtension": true,
596- "useInstanceMetadata": true
592+ "useInstanceMetadata": true,
593+ "enableVmssFlexNodes": true
597594}`
598595
599596 userAssignedControlPlaneCloudConfig = `{
@@ -614,6 +611,7 @@ const (
614611 "maximumLoadBalancerRuleCount": 250,
615612 "useManagedIdentityExtension": true,
616613 "useInstanceMetadata": true,
614+ "enableVmssFlexNodes": true,
617615 "userAssignedIdentityID": "foobar"
618616}`
619617 userAssignedWorkerNodeCloudConfig = `{
@@ -634,6 +632,7 @@ const (
634632 "maximumLoadBalancerRuleCount": 250,
635633 "useManagedIdentityExtension": true,
636634 "useInstanceMetadata": true,
635+ "enableVmssFlexNodes": true,
637636 "userAssignedIdentityID": "foobar"
638637}`
639638 spCustomVnetControlPlaneCloudConfig = `{
@@ -655,7 +654,8 @@ const (
655654 "loadBalancerName": "",
656655 "maximumLoadBalancerRuleCount": 250,
657656 "useManagedIdentityExtension": false,
658- "useInstanceMetadata": true
657+ "useInstanceMetadata": true,
658+ "enableVmssFlexNodes": true
659659}`
660660 spCustomVnetWorkerNodeCloudConfig = `{
661661 "cloud": "AzurePublicCloud",
@@ -676,7 +676,8 @@ const (
676676 "loadBalancerName": "",
677677 "maximumLoadBalancerRuleCount": 250,
678678 "useManagedIdentityExtension": false,
679- "useInstanceMetadata": true
679+ "useInstanceMetadata": true,
680+ "enableVmssFlexNodes": true
680681}`
681682 rateLimitsControlPlaneCloudConfig = `{
682683 "cloud": "AzurePublicCloud",
@@ -698,6 +699,7 @@ const (
698699 "maximumLoadBalancerRuleCount": 250,
699700 "useManagedIdentityExtension": false,
700701 "useInstanceMetadata": true,
702+ "enableVmssFlexNodes": true,
701703 "cloudProviderRateLimit": true,
702704 "cloudProviderRateLimitQPS": 1.2,
703705 "loadBalancerRateLimit": {
@@ -724,6 +726,7 @@ const (
724726 "maximumLoadBalancerRuleCount": 250,
725727 "useManagedIdentityExtension": false,
726728 "useInstanceMetadata": true,
729+ "enableVmssFlexNodes": true,
727730 "cloudProviderRateLimit": true,
728731 "cloudProviderRateLimitQPS": 1.2,
729732 "loadBalancerRateLimit": {
@@ -750,6 +753,7 @@ const (
750753 "maximumLoadBalancerRuleCount": 250,
751754 "useManagedIdentityExtension": false,
752755 "useInstanceMetadata": true,
756+ "enableVmssFlexNodes": true,
753757 "cloudProviderBackoff": true,
754758 "cloudProviderBackoffRetries": 1,
755759 "cloudProviderBackoffExponent": 1.2000000000000002,
0 commit comments