Skip to content

Commit f8e49af

Browse files
authored
Merge pull request #8694 from adrianmoisey/some-e2e-cleanups
Small e2e test cleanup
2 parents a17217b + 124fd10 commit f8e49af

File tree

5 files changed

+16
-30
lines changed

5 files changed

+16
-30
lines changed

vertical-pod-autoscaler/e2e/utils/certs.go

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ package utils
2020

2121
import (
2222
"crypto/x509"
23-
"io/ioutil"
2423
"os"
2524

2625
"k8s.io/client-go/util/cert"
@@ -38,7 +37,7 @@ type certContext struct {
3837
// SetupWebhookCert sets up the server cert. For example, user, apiservers and admission webhooks
3938
// can use the cert to prove their identity to the kube-apiserver.
4039
func SetupWebhookCert(namespaceName string) *certContext {
41-
certDir, err := ioutil.TempDir("", "test-e2e-server-cert")
40+
certDir, err := os.MkdirTemp("", "test-e2e-server-cert")
4241
if err != nil {
4342
framework.Failf("Failed to create a temp dir for cert generation %v", err)
4443
}
@@ -51,11 +50,11 @@ func SetupWebhookCert(namespaceName string) *certContext {
5150
if err != nil {
5251
framework.Failf("Failed to create CA cert for apiserver %v", err)
5352
}
54-
caCertFile, err := ioutil.TempFile(certDir, "ca.crt")
53+
caCertFile, err := os.CreateTemp(certDir, "ca.crt")
5554
if err != nil {
5655
framework.Failf("Failed to create a temp file for ca cert generation %v", err)
5756
}
58-
if err := ioutil.WriteFile(caCertFile.Name(), utils.EncodeCertPEM(signingCert), 0644); err != nil {
57+
if err := os.WriteFile(caCertFile.Name(), utils.EncodeCertPEM(signingCert), 0644); err != nil {
5958
framework.Failf("Failed to write CA cert %v", err)
6059
}
6160
key, err := utils.NewPrivateKey()
@@ -73,22 +72,22 @@ func SetupWebhookCert(namespaceName string) *certContext {
7372
if err != nil {
7473
framework.Failf("Failed to create cert%v", err)
7574
}
76-
certFile, err := ioutil.TempFile(certDir, "server.crt")
75+
certFile, err := os.CreateTemp(certDir, "server.crt")
7776
if err != nil {
7877
framework.Failf("Failed to create a temp file for cert generation %v", err)
7978
}
80-
keyFile, err := ioutil.TempFile(certDir, "server.key")
79+
keyFile, err := os.CreateTemp(certDir, "server.key")
8180
if err != nil {
8281
framework.Failf("Failed to create a temp file for key generation %v", err)
8382
}
84-
if err = ioutil.WriteFile(certFile.Name(), utils.EncodeCertPEM(signedCert), 0600); err != nil {
83+
if err = os.WriteFile(certFile.Name(), utils.EncodeCertPEM(signedCert), 0600); err != nil {
8584
framework.Failf("Failed to write cert file %v", err)
8685
}
8786
privateKeyPEM, err := keyutil.MarshalPrivateKeyToPEM(key)
8887
if err != nil {
8988
framework.Failf("Failed to marshal key %v", err)
9089
}
91-
if err = ioutil.WriteFile(keyFile.Name(), privateKeyPEM, 0644); err != nil {
90+
if err = os.WriteFile(keyFile.Name(), privateKeyPEM, 0644); err != nil {
9291
framework.Failf("Failed to write key file %v", err)
9392
}
9493
return &certContext{

vertical-pod-autoscaler/e2e/utils/webhook.go

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ import (
3737
clientset "k8s.io/client-go/kubernetes"
3838
"k8s.io/kubernetes/test/e2e/framework"
3939
e2edeploy "k8s.io/kubernetes/test/e2e/framework/deployment"
40-
"k8s.io/utils/pointer"
40+
"k8s.io/utils/ptr"
4141
)
4242

4343
const (
@@ -49,8 +49,6 @@ const (
4949
deploymentName = "sample-webhook-deployment"
5050
)
5151

52-
func strPtr(s string) *string { return &s }
53-
5452
// LabelNamespace applies unique label to the namespace.
5553
func LabelNamespace(f *framework.Framework, namespace string) {
5654
client := f.ClientSet
@@ -107,8 +105,8 @@ func RegisterMutatingWebhookForPod(f *framework.Framework, configName string, ce
107105
Service: &admissionregistrationv1.ServiceReference{
108106
Namespace: namespace,
109107
Name: WebhookServiceName,
110-
Path: strPtr("/mutating-pods-sidecar"),
111-
Port: pointer.Int32Ptr(servicePort),
108+
Path: ptr.To("/mutating-pods-sidecar"),
109+
Port: ptr.To(servicePort),
112110
},
113111
CABundle: certContext.signingCert,
114112
},
@@ -167,8 +165,8 @@ func newMutatingIsReadyWebhookFixture(f *framework.Framework, certContext *certC
167165
Service: &admissionregistrationv1.ServiceReference{
168166
Namespace: f.Namespace.Name,
169167
Name: WebhookServiceName,
170-
Path: strPtr("/always-deny"),
171-
Port: pointer.Int32Ptr(servicePort),
168+
Path: ptr.To("/always-deny"),
169+
Port: ptr.To(servicePort),
172170
},
173171
CABundle: certContext.signingCert,
174172
},

vertical-pod-autoscaler/e2e/v1/actuation.go

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ import (
2222
"time"
2323

2424
"k8s.io/autoscaler/vertical-pod-autoscaler/pkg/utils/test"
25-
"k8s.io/utils/pointer"
25+
"k8s.io/utils/ptr"
2626

2727
appsv1 "k8s.io/api/apps/v1"
2828
autoscaling "k8s.io/api/autoscaling/v1"
@@ -884,7 +884,7 @@ func testEvictsSingletonPodWhenConfigured(f *framework.Framework, controller *au
884884
WithName("hamster-vpa").
885885
WithNamespace(f.Namespace.Name).
886886
WithTargetRef(controller).
887-
WithMinReplicas(pointer.Int32(1)).
887+
WithMinReplicas(ptr.To(int32(1))).
888888
WithContainer(containerName).
889889
AppendRecommendation(
890890
test.Recommendation().
@@ -1003,12 +1003,6 @@ func setupPDB(f *framework.Framework, name string, maxUnavailable int) *policyv1
10031003
return pdb
10041004
}
10051005

1006-
func getCurrentPodSetForDeployment(c clientset.Interface, d *appsv1.Deployment) PodSet {
1007-
podList, err := framework_deployment.GetPodsForDeployment(context.TODO(), c, d)
1008-
gomega.Expect(err).NotTo(gomega.HaveOccurred())
1009-
return MakePodSet(podList)
1010-
}
1011-
10121006
func createReplicaSetWithRetries(c clientset.Interface, namespace string, obj *appsv1.ReplicaSet) error {
10131007
if obj == nil {
10141008
return fmt.Errorf("object provided to create is empty")

vertical-pod-autoscaler/e2e/v1/e2e.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ package autoscaling
2121
import (
2222
"context"
2323
"fmt"
24-
"io/ioutil"
24+
"os"
2525
"path"
2626
"testing"
2727
"time"
@@ -334,7 +334,7 @@ func gatherTestSuiteMetrics() error {
334334
metricsJSON := metricsForE2E.PrintJSON()
335335
if framework.TestContext.ReportDir != "" {
336336
filePath := path.Join(framework.TestContext.ReportDir, "MetricsForE2ESuite_"+time.Now().Format(time.RFC3339)+".json")
337-
if err := ioutil.WriteFile(filePath, []byte(metricsJSON), 0644); err != nil {
337+
if err := os.WriteFile(filePath, []byte(metricsJSON), 0644); err != nil {
338338
return fmt.Errorf("error writing to %q: %v", filePath, err)
339339
}
340340
} else {

vertical-pod-autoscaler/e2e/v1/e2e_test.go

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,8 @@ package autoscaling
1919
import (
2020
"flag"
2121
"fmt"
22-
"math/rand"
2322
"os"
2423
"testing"
25-
"time"
2624

2725
// Never, ever remove the line with "/ginkgo". Without it,
2826
// the ginkgo test runner will not detect that this
@@ -36,8 +34,6 @@ import (
3634
"k8s.io/kubernetes/test/utils/image"
3735
)
3836

39-
var viperConfig = flag.String("viper-config", "", "The name of a viper config file (https://github.com/spf13/viper#what-is-viper). All e2e command line parameters can also be configured in such a file. May contain a path and may or may not contain the file suffix. The default is to look for an optional file with `e2e` as base name. If a file is specified explicitly, it must be present.")
40-
4137
// handleFlags sets up all flags and parses the command line.
4238
func handleFlags() {
4339
config.CopyFlags(config.Flags, flag.CommandLine)
@@ -68,7 +64,6 @@ func TestMain(m *testing.M) {
6864
testfiles.AddFileSource(testfiles.RootFileSource{Root: framework.TestContext.RepoRoot})
6965
}
7066

71-
rand.Seed(time.Now().UnixNano())
7267
os.Exit(m.Run())
7368
}
7469

0 commit comments

Comments
 (0)