@@ -26,7 +26,6 @@ import (
26
26
27
27
"github.com/stretchr/testify/assert"
28
28
"github.com/stretchr/testify/require"
29
- computealpha "google.golang.org/api/compute/v0.alpha"
30
29
compute "google.golang.org/api/compute/v1"
31
30
32
31
"github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud"
@@ -103,9 +102,9 @@ func TestEnsureStaticIPWithTier(t *testing.T) {
103
102
assert .NotEqual (t , ip , "" )
104
103
// Get the Address from the fake address service and verify that the tier
105
104
// is set correctly.
106
- alphaAddr , err := s .GetAlphaRegionAddress (tc .name , s .region )
105
+ Addr , err := s .GetRegionAddress (tc .name , s .region )
107
106
require .NoError (t , err )
108
- assert .Equal (t , tc .expected , alphaAddr .NetworkTier )
107
+ assert .Equal (t , tc .expected , Addr .NetworkTier )
109
108
})
110
109
}
111
110
}
@@ -119,14 +118,14 @@ func TestVerifyRequestedIP(t *testing.T) {
119
118
requestedIP string
120
119
fwdRuleIP string
121
120
netTier cloud.NetworkTier
122
- addrList []* computealpha .Address
121
+ addrList []* compute .Address
123
122
expectErr bool
124
123
expectUserOwned bool
125
124
}{
126
125
"requested IP exists" : {
127
126
requestedIP : "1.1.1.1" ,
128
127
netTier : cloud .NetworkTierPremium ,
129
- addrList : []* computealpha .Address {{Name : "foo" , Address : "1.1.1.1" , NetworkTier : "PREMIUM" }},
128
+ addrList : []* compute .Address {{Name : "foo" , Address : "1.1.1.1" , NetworkTier : "PREMIUM" }},
130
129
expectErr : false ,
131
130
expectUserOwned : true ,
132
131
},
@@ -149,7 +148,7 @@ func TestVerifyRequestedIP(t *testing.T) {
149
148
"requested IP exists, but network tier does not match" : {
150
149
requestedIP : "1.1.1.1" ,
151
150
netTier : cloud .NetworkTierStandard ,
152
- addrList : []* computealpha .Address {{Name : "foo" , Address : "1.1.1.1" , NetworkTier : "PREMIUM" }},
151
+ addrList : []* compute .Address {{Name : "foo" , Address : "1.1.1.1" , NetworkTier : "PREMIUM" }},
153
152
expectErr : true ,
154
153
},
155
154
} {
@@ -158,7 +157,7 @@ func TestVerifyRequestedIP(t *testing.T) {
158
157
require .NoError (t , err )
159
158
160
159
for _ , addr := range tc .addrList {
161
- s .ReserveAlphaRegionAddress (addr , s .region )
160
+ s .ReserveRegionAddress (addr , s .region )
162
161
}
163
162
isUserOwnedIP , err := verifyUserRequestedIP (s , s .region , tc .requestedIP , tc .fwdRuleIP , lbRef , tc .netTier )
164
163
assert .Equal (t , tc .expectErr , err != nil , fmt .Sprintf ("err: %v" , err ))
@@ -180,11 +179,11 @@ func TestCreateForwardingRuleWithTier(t *testing.T) {
180
179
181
180
for desc , tc := range map [string ]struct {
182
181
netTier cloud.NetworkTier
183
- expectedRule * computealpha .ForwardingRule
182
+ expectedRule * compute .ForwardingRule
184
183
}{
185
184
"Premium tier" : {
186
185
netTier : cloud .NetworkTierPremium ,
187
- expectedRule : & computealpha .ForwardingRule {
186
+ expectedRule : & compute .ForwardingRule {
188
187
Name : "lb-1" ,
189
188
Description : `{"kubernetes.io/service-name":"foo-svc"}` ,
190
189
IPAddress : "1.1.1.1" ,
@@ -197,15 +196,15 @@ func TestCreateForwardingRuleWithTier(t *testing.T) {
197
196
},
198
197
"Standard tier" : {
199
198
netTier : cloud .NetworkTierStandard ,
200
- expectedRule : & computealpha .ForwardingRule {
199
+ expectedRule : & compute .ForwardingRule {
201
200
Name : "lb-2" ,
202
201
Description : `{"kubernetes.io/service-name":"foo-svc"}` ,
203
202
IPAddress : "2.2.2.2" ,
204
203
IPProtocol : "TCP" ,
205
204
PortRange : "123-123" ,
206
205
Target : target ,
207
206
NetworkTier : "STANDARD" ,
208
- SelfLink : fmt .Sprintf (baseLinkURL , "alpha " , vals .ProjectID , vals .Region , "lb-2" ),
207
+ SelfLink : fmt .Sprintf (baseLinkURL , "v1 " , vals .ProjectID , vals .Region , "lb-2" ),
209
208
},
210
209
},
211
210
} {
@@ -219,9 +218,9 @@ func TestCreateForwardingRuleWithTier(t *testing.T) {
219
218
err = createForwardingRule (s , lbName , serviceName , s .region , ipAddr , target , ports , tc .netTier )
220
219
assert .NoError (t , err )
221
220
222
- alphaRule , err := s .GetAlphaRegionForwardingRule (lbName , s .region )
221
+ Rule , err := s .GetRegionForwardingRule (lbName , s .region )
223
222
assert .NoError (t , err )
224
- assert .Equal (t , tc .expectedRule , alphaRule )
223
+ assert .Equal (t , tc .expectedRule , Rule )
225
224
})
226
225
}
227
226
}
@@ -240,35 +239,35 @@ func TestDeleteAddressWithWrongTier(t *testing.T) {
240
239
for desc , tc := range map [string ]struct {
241
240
addrName string
242
241
netTier cloud.NetworkTier
243
- addrList []* computealpha .Address
242
+ addrList []* compute .Address
244
243
expectDelete bool
245
244
}{
246
245
"Network tiers (premium) match; do nothing" : {
247
246
addrName : "foo1" ,
248
247
netTier : cloud .NetworkTierPremium ,
249
- addrList : []* computealpha .Address {{Name : "foo1" , Address : "1.1.1.1" , NetworkTier : "PREMIUM" }},
248
+ addrList : []* compute .Address {{Name : "foo1" , Address : "1.1.1.1" , NetworkTier : "PREMIUM" }},
250
249
},
251
250
"Network tiers (standard) match; do nothing" : {
252
251
addrName : "foo2" ,
253
252
netTier : cloud .NetworkTierStandard ,
254
- addrList : []* computealpha .Address {{Name : "foo2" , Address : "1.1.1.2" , NetworkTier : "STANDARD" }},
253
+ addrList : []* compute .Address {{Name : "foo2" , Address : "1.1.1.2" , NetworkTier : "STANDARD" }},
255
254
},
256
255
"Wrong network tier (standard); delete address" : {
257
256
addrName : "foo3" ,
258
257
netTier : cloud .NetworkTierPremium ,
259
- addrList : []* computealpha .Address {{Name : "foo3" , Address : "1.1.1.3" , NetworkTier : "STANDARD" }},
258
+ addrList : []* compute .Address {{Name : "foo3" , Address : "1.1.1.3" , NetworkTier : "STANDARD" }},
260
259
expectDelete : true ,
261
260
},
262
261
"Wrong network tier (premium); delete address" : {
263
262
addrName : "foo4" ,
264
263
netTier : cloud .NetworkTierStandard ,
265
- addrList : []* computealpha .Address {{Name : "foo4" , Address : "1.1.1.4" , NetworkTier : "PREMIUM" }},
264
+ addrList : []* compute .Address {{Name : "foo4" , Address : "1.1.1.4" , NetworkTier : "PREMIUM" }},
266
265
expectDelete : true ,
267
266
},
268
267
} {
269
268
t .Run (desc , func (t * testing.T ) {
270
269
for _ , addr := range tc .addrList {
271
- s .ReserveAlphaRegionAddress (addr , s .region )
270
+ s .ReserveRegionAddress (addr , s .region )
272
271
}
273
272
274
273
// Sanity check to ensure we inject the right address.
@@ -428,13 +427,13 @@ func TestLoadBalancerWrongTierResourceDeletion(t *testing.T) {
428
427
)
429
428
require .NoError (t , err )
430
429
431
- addressObj := & computealpha .Address {
430
+ addressObj := & compute .Address {
432
431
Name : lbName ,
433
432
Description : serviceName .String (),
434
433
NetworkTier : cloud .NetworkTierStandard .ToGCEValue (),
435
434
}
436
435
437
- err = gce .ReserveAlphaRegionAddress (addressObj , gce .region )
436
+ err = gce .ReserveRegionAddress (addressObj , gce .region )
438
437
require .NoError (t , err )
439
438
440
439
_ , err = createExternalLoadBalancer (gce , svc , []string {"test-node-1" }, vals .ClusterName , vals .ClusterID , vals .ZoneName )
0 commit comments