@@ -34,7 +34,6 @@ import (
34
34
bootstrapv1 "sigs.k8s.io/cluster-api/bootstrap/kubeadm/api/v1beta1"
35
35
"sigs.k8s.io/cluster-api/controllers/external"
36
36
controlplanev1 "sigs.k8s.io/cluster-api/controlplane/kubeadm/api/v1beta1"
37
- "sigs.k8s.io/cluster-api/internal/test/builder"
38
37
"sigs.k8s.io/cluster-api/util/conditions"
39
38
"sigs.k8s.io/cluster-api/util/kubeconfig"
40
39
"sigs.k8s.io/cluster-api/util/secret"
@@ -139,75 +138,6 @@ func TestReconcileKubeconfigMissingCACertificate(t *testing.T) {
139
138
g .Expect (r .Client .Get (ctx , secretName , kubeconfigSecret )).To (MatchError (ContainSubstring ("not found" )))
140
139
}
141
140
142
- func TestReconcileKubeconfigSecretAdoptsV1alpha2Secrets (t * testing.T ) {
143
- g := NewWithT (t )
144
-
145
- cluster := & clusterv1.Cluster {
146
- TypeMeta : metav1.TypeMeta {
147
- Kind : "Cluster" ,
148
- APIVersion : clusterv1 .GroupVersion .String (),
149
- },
150
- ObjectMeta : metav1.ObjectMeta {
151
- Name : "foo" ,
152
- Namespace : metav1 .NamespaceDefault ,
153
- },
154
- Spec : clusterv1.ClusterSpec {
155
- ControlPlaneEndpoint : clusterv1.APIEndpoint {Host : "test.local" , Port : 8443 },
156
- },
157
- }
158
-
159
- kcp := & controlplanev1.KubeadmControlPlane {
160
- TypeMeta : metav1.TypeMeta {
161
- Kind : "KubeadmControlPlane" ,
162
- APIVersion : controlplanev1 .GroupVersion .String (),
163
- },
164
- ObjectMeta : metav1.ObjectMeta {
165
- Name : "foo" ,
166
- Namespace : metav1 .NamespaceDefault ,
167
- },
168
- Spec : controlplanev1.KubeadmControlPlaneSpec {
169
- Version : "v1.16.6" ,
170
- },
171
- }
172
-
173
- existingKubeconfigSecret := kubeconfig .GenerateSecretWithOwner (
174
- client.ObjectKey {Name : "foo" , Namespace : metav1 .NamespaceDefault },
175
- []byte {},
176
- metav1.OwnerReference {
177
- APIVersion : clusterv1 .GroupVersion .String (),
178
- Kind : "Cluster" ,
179
- Name : cluster .Name ,
180
- UID : cluster .UID ,
181
- }, // the Cluster ownership defines v1alpha2 controlled secrets
182
- )
183
-
184
- fakeClient := newFakeClient (kcp .DeepCopy (), existingKubeconfigSecret .DeepCopy ())
185
- r := & KubeadmControlPlaneReconciler {
186
- Client : fakeClient ,
187
- recorder : record .NewFakeRecorder (32 ),
188
- }
189
-
190
- result , err := r .reconcileKubeconfig (ctx , cluster , kcp )
191
- g .Expect (err ).ToNot (HaveOccurred ())
192
- g .Expect (result ).To (Equal (ctrl.Result {}))
193
-
194
- kubeconfigSecret := & corev1.Secret {}
195
- secretName := client.ObjectKey {
196
- Namespace : metav1 .NamespaceDefault ,
197
- Name : secret .Name (cluster .Name , secret .Kubeconfig ),
198
- }
199
- g .Expect (r .Client .Get (ctx , secretName , kubeconfigSecret )).To (Succeed ())
200
- g .Expect (kubeconfigSecret .Labels ).To (Equal (existingKubeconfigSecret .Labels ))
201
- g .Expect (kubeconfigSecret .Data ).To (Equal (existingKubeconfigSecret .Data ))
202
- g .Expect (kubeconfigSecret .OwnerReferences ).ToNot (ContainElement (metav1.OwnerReference {
203
- APIVersion : clusterv1 .GroupVersion .String (),
204
- Kind : "Cluster" ,
205
- Name : cluster .Name ,
206
- UID : cluster .UID ,
207
- }))
208
- g .Expect (kubeconfigSecret .OwnerReferences ).To (ContainElement (* metav1 .NewControllerRef (kcp , controlplanev1 .GroupVersion .WithKind ("KubeadmControlPlane" ))))
209
- }
210
-
211
141
func TestReconcileKubeconfigSecretDoesNotAdoptsUserSecrets (t * testing.T ) {
212
142
g := NewWithT (t )
213
143
@@ -755,12 +685,10 @@ func TestKubeadmControlPlaneReconciler_adoptKubeconfigSecret(t *testing.T) {
755
685
Controller : pointer .Bool (true ),
756
686
BlockOwnerDeletion : pointer .Bool (true ),
757
687
}
758
- clusterName := "test1"
759
- cluster := builder .Cluster (metav1 .NamespaceDefault , clusterName ).Build ()
760
688
761
689
// A KubeadmConfig secret created by CAPI controllers with no owner references.
762
690
capiKubeadmConfigSecretNoOwner := kubeconfig .GenerateSecretWithOwner (
763
- client.ObjectKey {Name : clusterName , Namespace : metav1 .NamespaceDefault },
691
+ client.ObjectKey {Name : "test1" , Namespace : metav1 .NamespaceDefault },
764
692
[]byte {},
765
693
metav1.OwnerReference {})
766
694
capiKubeadmConfigSecretNoOwner .OwnerReferences = []metav1.OwnerReference {}
@@ -771,7 +699,7 @@ func TestKubeadmControlPlaneReconciler_adoptKubeconfigSecret(t *testing.T) {
771
699
772
700
// A user provided KubeadmConfig secret with no owner reference.
773
701
userProvidedKubeadmConfigSecretNoOwner := kubeconfig .GenerateSecretWithOwner (
774
- client.ObjectKey {Name : clusterName , Namespace : metav1 .NamespaceDefault },
702
+ client.ObjectKey {Name : "test1" , Namespace : metav1 .NamespaceDefault },
775
703
[]byte {},
776
704
metav1.OwnerReference {})
777
705
userProvidedKubeadmConfigSecretNoOwner .Type = corev1 .SecretTypeOpaque
@@ -787,7 +715,7 @@ func TestKubeadmControlPlaneReconciler_adoptKubeconfigSecret(t *testing.T) {
787
715
},
788
716
ObjectMeta : metav1.ObjectMeta {
789
717
Name : "testControlPlane" ,
790
- Namespace : cluster . Namespace ,
718
+ Namespace : metav1 . NamespaceDefault ,
791
719
},
792
720
}
793
721
tests := []struct {
@@ -832,12 +760,12 @@ func TestKubeadmControlPlaneReconciler_adoptKubeconfigSecret(t *testing.T) {
832
760
}
833
761
for _ , tt := range tests {
834
762
t .Run (tt .name , func (t * testing.T ) {
835
- fakeClient := newFakeClient (cluster , kcp , tt .configSecret )
763
+ fakeClient := newFakeClient (kcp , tt .configSecret )
836
764
r := & KubeadmControlPlaneReconciler {
837
765
APIReader : fakeClient ,
838
766
Client : fakeClient ,
839
767
}
840
- g .Expect (r .adoptKubeconfigSecret (ctx , cluster , tt .configSecret , kcp )).To (Succeed ())
768
+ g .Expect (r .adoptKubeconfigSecret (ctx , tt .configSecret , kcp )).To (Succeed ())
841
769
actualSecret := & corev1.Secret {}
842
770
g .Expect (fakeClient .Get (ctx , client.ObjectKey {Namespace : tt .configSecret .Namespace , Name : tt .configSecret .Namespace }, actualSecret ))
843
771
g .Expect (tt .configSecret .GetOwnerReferences ()).To (ConsistOf (tt .expectedOwnerRef ))
0 commit comments