Skip to content

Commit 3be8f52

Browse files
committed
use v1beta2 in runtime extension
Signed-off-by: sivchari <shibuuuu5@gmail.com>
1 parent 140fd29 commit 3be8f52

File tree

2 files changed

+83
-83
lines changed

2 files changed

+83
-83
lines changed

test/extension/handlers/topologymutation/handler.go

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,13 @@ import (
3333
intstrutil "k8s.io/apimachinery/pkg/util/intstr"
3434
ctrl "sigs.k8s.io/controller-runtime"
3535

36-
bootstrapv1beta1 "sigs.k8s.io/cluster-api/api/bootstrap/kubeadm/v1beta1"
37-
controlplanev1beta1 "sigs.k8s.io/cluster-api/api/controlplane/kubeadm/v1beta1"
36+
bootstrapv1 "sigs.k8s.io/cluster-api/api/bootstrap/kubeadm/v1beta2"
37+
controlplanev1 "sigs.k8s.io/cluster-api/api/controlplane/kubeadm/v1beta2"
3838
clusterv1beta1 "sigs.k8s.io/cluster-api/api/core/v1beta1"
3939
runtimehooksv1 "sigs.k8s.io/cluster-api/api/runtime/hooks/v1alpha1"
4040
"sigs.k8s.io/cluster-api/exp/runtime/topologymutation"
41-
infrav1beta1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/api/v1beta1"
42-
infraexpv1beta1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/exp/api/v1beta1"
41+
infrav1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/api/v1beta2"
42+
infraexpv1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/exp/api/v1beta2"
4343
"sigs.k8s.io/cluster-api/test/infrastructure/kind"
4444
)
4545

@@ -57,16 +57,16 @@ type ExtensionHandlers struct {
5757
// NewExtensionHandlers returns a new ExtensionHandlers for the topology mutation hook handlers.
5858
func NewExtensionHandlers() *ExtensionHandlers {
5959
scheme := runtime.NewScheme()
60-
_ = infrav1beta1.AddToScheme(scheme)
61-
_ = infraexpv1beta1.AddToScheme(scheme)
62-
_ = bootstrapv1beta1.AddToScheme(scheme)
63-
_ = controlplanev1beta1.AddToScheme(scheme)
60+
_ = infrav1.AddToScheme(scheme)
61+
_ = infraexpv1.AddToScheme(scheme)
62+
_ = bootstrapv1.AddToScheme(scheme)
63+
_ = controlplanev1.AddToScheme(scheme)
6464
return &ExtensionHandlers{
6565
// Add the apiGroups being handled to the decoder
6666
decoder: serializer.NewCodecFactory(scheme).UniversalDecoder(
67-
infrav1beta1.GroupVersion,
68-
bootstrapv1beta1.GroupVersion,
69-
controlplanev1beta1.GroupVersion,
67+
infrav1.GroupVersion,
68+
bootstrapv1.GroupVersion,
69+
controlplanev1.GroupVersion,
7070
),
7171
}
7272
}
@@ -87,18 +87,18 @@ func (h *ExtensionHandlers) GeneratePatches(ctx context.Context, req *runtimehoo
8787
log := ctrl.LoggerFrom(ctx)
8888

8989
switch obj := obj.(type) {
90-
case *infrav1beta1.DockerClusterTemplate:
90+
case *infrav1.DockerClusterTemplate:
9191
if err := patchDockerClusterTemplate(ctx, obj, variables); err != nil {
9292
log.Error(err, "Error patching DockerClusterTemplate")
9393
return errors.Wrap(err, "error patching DockerClusterTemplate")
9494
}
95-
case *controlplanev1beta1.KubeadmControlPlaneTemplate:
95+
case *controlplanev1.KubeadmControlPlaneTemplate:
9696
err := patchKubeadmControlPlaneTemplate(ctx, obj, variables)
9797
if err != nil {
9898
log.Error(err, "Error patching KubeadmControlPlaneTemplate")
9999
return errors.Wrapf(err, "error patching KubeadmControlPlaneTemplate")
100100
}
101-
case *bootstrapv1beta1.KubeadmConfigTemplate:
101+
case *bootstrapv1.KubeadmConfigTemplate:
102102
// NOTE: KubeadmConfigTemplate could be linked to one or more of the existing MachineDeployment class;
103103
// the patchKubeadmConfigTemplate func shows how to implement patches only for KubeadmConfigTemplates
104104
// linked to a specific MachineDeployment class; another option is to check the holderRef value and call
@@ -107,7 +107,7 @@ func (h *ExtensionHandlers) GeneratePatches(ctx context.Context, req *runtimehoo
107107
log.Error(err, "Error patching KubeadmConfigTemplate")
108108
return errors.Wrap(err, "error patching KubeadmConfigTemplate")
109109
}
110-
case *infrav1beta1.DockerMachineTemplate:
110+
case *infrav1.DockerMachineTemplate:
111111
// NOTE: DockerMachineTemplate could be linked to the ControlPlane or one or more of the existing MachineDeployment class;
112112
// the patchDockerMachineTemplate func shows how to implement different patches for DockerMachineTemplate
113113
// linked to ControlPlane or for DockerMachineTemplate linked to MachineDeployment classes; another option
@@ -116,7 +116,7 @@ func (h *ExtensionHandlers) GeneratePatches(ctx context.Context, req *runtimehoo
116116
log.Error(err, "Error patching DockerMachineTemplate")
117117
return errors.Wrap(err, "error patching DockerMachineTemplate")
118118
}
119-
case *infraexpv1beta1.DockerMachinePoolTemplate:
119+
case *infraexpv1.DockerMachinePoolTemplate:
120120
if err := patchDockerMachinePoolTemplate(ctx, obj, variables); err != nil {
121121
log.Error(err, "Error patching DockerMachinePoolTemplate")
122122
return errors.Wrap(err, "error patching DockerMachinePoolTemplate")
@@ -129,7 +129,7 @@ func (h *ExtensionHandlers) GeneratePatches(ctx context.Context, req *runtimehoo
129129
// patchDockerClusterTemplate patches the DockerClusterTemplate.
130130
// It sets the LoadBalancer.ImageRepository if the imageRepository variable is provided.
131131
// NOTE: this patch is not required for any special reason, it is used for testing the patch machinery itself.
132-
func patchDockerClusterTemplate(_ context.Context, dockerClusterTemplate *infrav1beta1.DockerClusterTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
132+
func patchDockerClusterTemplate(_ context.Context, dockerClusterTemplate *infrav1.DockerClusterTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
133133
imageRepo, err := topologymutation.GetStringVariable(templateVariables, "imageRepository")
134134
if err != nil {
135135
if topologymutation.IsNotFoundError(err) {
@@ -146,7 +146,7 @@ func patchDockerClusterTemplate(_ context.Context, dockerClusterTemplate *infrav
146146
// patchKubeadmControlPlaneTemplate patches the ControlPlaneTemplate.
147147
// It sets the RolloutStrategy.RollingUpdate.MaxSurge if the kubeadmControlPlaneMaxSurge is provided.
148148
// NOTE: RolloutStrategy.RollingUpdate.MaxSurge patch is not required for any special reason, it is used for testing the patch machinery itself.
149-
func patchKubeadmControlPlaneTemplate(ctx context.Context, kcpTemplate *controlplanev1beta1.KubeadmControlPlaneTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
149+
func patchKubeadmControlPlaneTemplate(ctx context.Context, kcpTemplate *controlplanev1.KubeadmControlPlaneTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
150150
log := ctrl.LoggerFrom(ctx)
151151

152152
// 1) Patch RolloutStrategy RollingUpdate MaxSurge with the value from the Cluster Topology variable.
@@ -163,17 +163,17 @@ func patchKubeadmControlPlaneTemplate(ctx context.Context, kcpTemplate *controlp
163163
kubeadmControlPlaneMaxSurgeIntOrString := intstrutil.Parse(kcpControlPlaneMaxSurge)
164164
log.Info(fmt.Sprintf("Setting KubeadmControlPlaneMaxSurge to %q", kubeadmControlPlaneMaxSurgeIntOrString.String()))
165165
if kcpTemplate.Spec.Template.Spec.RolloutStrategy == nil {
166-
kcpTemplate.Spec.Template.Spec.RolloutStrategy = &controlplanev1beta1.RolloutStrategy{}
166+
kcpTemplate.Spec.Template.Spec.RolloutStrategy = &controlplanev1.RolloutStrategy{}
167167
}
168168
if kcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate == nil {
169-
kcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate = &controlplanev1beta1.RollingUpdate{}
169+
kcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate = &controlplanev1.RollingUpdate{}
170170
}
171171
kcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate.MaxSurge = &kubeadmControlPlaneMaxSurgeIntOrString
172172
return nil
173173
}
174174

175175
// patchKubeadmConfigTemplate patches the ControlPlaneTemplate.
176-
func patchKubeadmConfigTemplate(_ context.Context, _ *bootstrapv1beta1.KubeadmConfigTemplate, _ map[string]apiextensionsv1.JSON) error {
176+
func patchKubeadmConfigTemplate(_ context.Context, _ *bootstrapv1.KubeadmConfigTemplate, _ map[string]apiextensionsv1.JSON) error {
177177
return nil
178178
}
179179

@@ -182,7 +182,7 @@ func patchKubeadmConfigTemplate(_ context.Context, _ *bootstrapv1beta1.KubeadmCo
182182
// the DockerMachineTemplate belongs to.
183183
// NOTE: this patch is not required anymore after the introduction of the kind mapper in kind, however we keep it
184184
// as example of version aware patches.
185-
func patchDockerMachineTemplate(ctx context.Context, dockerMachineTemplate *infrav1beta1.DockerMachineTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
185+
func patchDockerMachineTemplate(ctx context.Context, dockerMachineTemplate *infrav1.DockerMachineTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
186186
log := ctrl.LoggerFrom(ctx)
187187

188188
// If the DockerMachineTemplate belongs to the ControlPlane, set the images using the ControlPlane version.
@@ -237,7 +237,7 @@ func patchDockerMachineTemplate(ctx context.Context, dockerMachineTemplate *infr
237237
// It sets the CustomImage to an image for the version in use by the MachinePool.
238238
// NOTE: this patch is not required anymore after the introduction of the kind mapper in kind, however we keep it
239239
// as example of version aware patches.
240-
func patchDockerMachinePoolTemplate(ctx context.Context, dockerMachinePoolTemplate *infraexpv1beta1.DockerMachinePoolTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
240+
func patchDockerMachinePoolTemplate(ctx context.Context, dockerMachinePoolTemplate *infraexpv1.DockerMachinePoolTemplate, templateVariables map[string]apiextensionsv1.JSON) error {
241241
log := ctrl.LoggerFrom(ctx)
242242

243243
// If the DockerMachinePoolTemplate belongs to a MachinePool, set the images the MachinePool version.

test/extension/handlers/topologymutation/handler_test.go

Lines changed: 60 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -30,52 +30,52 @@ import (
3030
"k8s.io/apimachinery/pkg/util/intstr"
3131
. "sigs.k8s.io/controller-runtime/pkg/envtest/komega"
3232

33-
bootstrapv1beta1 "sigs.k8s.io/cluster-api/api/bootstrap/kubeadm/v1beta1"
34-
controlplanev1beta1 "sigs.k8s.io/cluster-api/api/controlplane/kubeadm/v1beta1"
33+
bootstrapv1 "sigs.k8s.io/cluster-api/api/bootstrap/kubeadm/v1beta2"
34+
controlplanev1 "sigs.k8s.io/cluster-api/api/controlplane/kubeadm/v1beta2"
3535
runtimehooksv1 "sigs.k8s.io/cluster-api/api/runtime/hooks/v1alpha1"
36-
infrav1beta1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/api/v1beta1"
37-
infraexpv1beta1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/exp/api/v1beta1"
36+
infrav1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/api/v1beta2"
37+
infraexpv1 "sigs.k8s.io/cluster-api/test/infrastructure/docker/exp/api/v1beta2"
3838
)
3939

4040
var (
4141
testScheme = runtime.NewScheme()
4242
)
4343

4444
func init() {
45-
_ = infrav1beta1.AddToScheme(testScheme)
46-
_ = infraexpv1beta1.AddToScheme(testScheme)
47-
_ = controlplanev1beta1.AddToScheme(testScheme)
48-
_ = bootstrapv1beta1.AddToScheme(testScheme)
45+
_ = infrav1.AddToScheme(testScheme)
46+
_ = infraexpv1.AddToScheme(testScheme)
47+
_ = controlplanev1.AddToScheme(testScheme)
48+
_ = bootstrapv1.AddToScheme(testScheme)
4949
}
5050

5151
func Test_patchDockerClusterTemplate(t *testing.T) {
5252
g := NewWithT(t)
5353

5454
tests := []struct {
5555
name string
56-
template *infrav1beta1.DockerClusterTemplate
56+
template *infrav1.DockerClusterTemplate
5757
variables map[string]apiextensionsv1.JSON
58-
expectedTemplate *infrav1beta1.DockerClusterTemplate
58+
expectedTemplate *infrav1.DockerClusterTemplate
5959
expectedErr bool
6060
}{
6161
{
6262
name: "no op if imageRepository is not set",
63-
template: &infrav1beta1.DockerClusterTemplate{},
63+
template: &infrav1.DockerClusterTemplate{},
6464
variables: nil,
65-
expectedTemplate: &infrav1beta1.DockerClusterTemplate{},
65+
expectedTemplate: &infrav1.DockerClusterTemplate{},
6666
},
6767
{
6868
name: "set LoadBalancer.ImageRepository if imageRepository is set",
69-
template: &infrav1beta1.DockerClusterTemplate{},
69+
template: &infrav1.DockerClusterTemplate{},
7070
variables: map[string]apiextensionsv1.JSON{
7171
"imageRepository": {Raw: toJSON("testImage")},
7272
},
73-
expectedTemplate: &infrav1beta1.DockerClusterTemplate{
74-
Spec: infrav1beta1.DockerClusterTemplateSpec{
75-
Template: infrav1beta1.DockerClusterTemplateResource{
76-
Spec: infrav1beta1.DockerClusterSpec{
77-
LoadBalancer: infrav1beta1.DockerLoadBalancer{
78-
ImageMeta: infrav1beta1.ImageMeta{
73+
expectedTemplate: &infrav1.DockerClusterTemplate{
74+
Spec: infrav1.DockerClusterTemplateSpec{
75+
Template: infrav1.DockerClusterTemplateResource{
76+
Spec: infrav1.DockerClusterSpec{
77+
LoadBalancer: infrav1.DockerLoadBalancer{
78+
ImageMeta: infrav1.ImageMeta{
7979
ImageRepository: "testImage",
8080
},
8181
},
@@ -101,14 +101,14 @@ func Test_patchDockerClusterTemplate(t *testing.T) {
101101
func Test_patchKubeadmControlPlaneTemplate(t *testing.T) {
102102
tests := []struct {
103103
name string
104-
template *controlplanev1beta1.KubeadmControlPlaneTemplate
104+
template *controlplanev1.KubeadmControlPlaneTemplate
105105
variables map[string]apiextensionsv1.JSON
106-
expectedTemplate *controlplanev1beta1.KubeadmControlPlaneTemplate
106+
expectedTemplate *controlplanev1.KubeadmControlPlaneTemplate
107107
expectedErr bool
108108
}{
109109
{
110110
name: "sets RolloutStrategy.RollingUpdate.MaxSurge if the kubeadmControlPlaneMaxSurge is provided",
111-
template: &controlplanev1beta1.KubeadmControlPlaneTemplate{},
111+
template: &controlplanev1.KubeadmControlPlaneTemplate{},
112112
variables: map[string]apiextensionsv1.JSON{
113113
runtimehooksv1.BuiltinsName: {Raw: toJSON(runtimehooksv1.Builtins{
114114
ControlPlane: &runtimehooksv1.ControlPlaneBuiltins{
@@ -117,12 +117,12 @@ func Test_patchKubeadmControlPlaneTemplate(t *testing.T) {
117117
})},
118118
"kubeadmControlPlaneMaxSurge": {Raw: toJSON("1")},
119119
},
120-
expectedTemplate: &controlplanev1beta1.KubeadmControlPlaneTemplate{
121-
Spec: controlplanev1beta1.KubeadmControlPlaneTemplateSpec{
122-
Template: controlplanev1beta1.KubeadmControlPlaneTemplateResource{
123-
Spec: controlplanev1beta1.KubeadmControlPlaneTemplateResourceSpec{
124-
RolloutStrategy: &controlplanev1beta1.RolloutStrategy{
125-
RollingUpdate: &controlplanev1beta1.RollingUpdate{MaxSurge: &intstr.IntOrString{IntVal: 1}},
120+
expectedTemplate: &controlplanev1.KubeadmControlPlaneTemplate{
121+
Spec: controlplanev1.KubeadmControlPlaneTemplateSpec{
122+
Template: controlplanev1.KubeadmControlPlaneTemplateResource{
123+
Spec: controlplanev1.KubeadmControlPlaneTemplateResourceSpec{
124+
RolloutStrategy: &controlplanev1.RolloutStrategy{
125+
RollingUpdate: &controlplanev1.RollingUpdate{MaxSurge: &intstr.IntOrString{IntVal: 1}},
126126
},
127127
},
128128
},
@@ -150,32 +150,32 @@ func Test_patchDockerMachineTemplate(t *testing.T) {
150150

151151
tests := []struct {
152152
name string
153-
template *infrav1beta1.DockerMachineTemplate
153+
template *infrav1.DockerMachineTemplate
154154
variables map[string]apiextensionsv1.JSON
155-
expectedTemplate *infrav1beta1.DockerMachineTemplate
155+
expectedTemplate *infrav1.DockerMachineTemplate
156156
expectedErr bool
157157
}{
158158
{
159159
name: "fails if builtin.controlPlane.version nor builtin.machineDeployment.version is not set",
160-
template: &infrav1beta1.DockerMachineTemplate{},
160+
template: &infrav1.DockerMachineTemplate{},
161161
variables: nil,
162-
expectedTemplate: &infrav1beta1.DockerMachineTemplate{},
162+
expectedTemplate: &infrav1.DockerMachineTemplate{},
163163
expectedErr: true,
164164
},
165165
{
166166
name: "sets customImage for templates linked to ControlPlane",
167-
template: &infrav1beta1.DockerMachineTemplate{},
167+
template: &infrav1.DockerMachineTemplate{},
168168
variables: map[string]apiextensionsv1.JSON{
169169
runtimehooksv1.BuiltinsName: {Raw: toJSON(runtimehooksv1.Builtins{
170170
ControlPlane: &runtimehooksv1.ControlPlaneBuiltins{
171171
Version: "v1.23.0",
172172
},
173173
})},
174174
},
175-
expectedTemplate: &infrav1beta1.DockerMachineTemplate{
176-
Spec: infrav1beta1.DockerMachineTemplateSpec{
177-
Template: infrav1beta1.DockerMachineTemplateResource{
178-
Spec: infrav1beta1.DockerMachineSpec{
175+
expectedTemplate: &infrav1.DockerMachineTemplate{
176+
Spec: infrav1.DockerMachineTemplateSpec{
177+
Template: infrav1.DockerMachineTemplateResource{
178+
Spec: infrav1.DockerMachineSpec{
179179
CustomImage: "kindest/node:v1.23.0",
180180
},
181181
},
@@ -184,18 +184,18 @@ func Test_patchDockerMachineTemplate(t *testing.T) {
184184
},
185185
{
186186
name: "sets customImage for templates linked to ControlPlane for pre versions",
187-
template: &infrav1beta1.DockerMachineTemplate{},
187+
template: &infrav1.DockerMachineTemplate{},
188188
variables: map[string]apiextensionsv1.JSON{
189189
runtimehooksv1.BuiltinsName: {Raw: toJSON(runtimehooksv1.Builtins{
190190
ControlPlane: &runtimehooksv1.ControlPlaneBuiltins{
191191
Version: "v1.23.0-rc.0",
192192
},
193193
})},
194194
},
195-
expectedTemplate: &infrav1beta1.DockerMachineTemplate{
196-
Spec: infrav1beta1.DockerMachineTemplateSpec{
197-
Template: infrav1beta1.DockerMachineTemplateResource{
198-
Spec: infrav1beta1.DockerMachineSpec{
195+
expectedTemplate: &infrav1.DockerMachineTemplate{
196+
Spec: infrav1.DockerMachineTemplateSpec{
197+
Template: infrav1.DockerMachineTemplateResource{
198+
Spec: infrav1.DockerMachineSpec{
199199
CustomImage: "kindest/node:v1.23.0-rc.0",
200200
},
201201
},
@@ -221,21 +221,21 @@ func Test_patchDockerMachinePoolTemplate(t *testing.T) {
221221

222222
tests := []struct {
223223
name string
224-
template *infraexpv1beta1.DockerMachinePoolTemplate
224+
template *infraexpv1.DockerMachinePoolTemplate
225225
variables map[string]apiextensionsv1.JSON
226-
expectedTemplate *infraexpv1beta1.DockerMachinePoolTemplate
226+
expectedTemplate *infraexpv1.DockerMachinePoolTemplate
227227
expectedErr bool
228228
}{
229229
{
230230
name: "fails if builtin.controlPlane.version nor builtin.machinePool.version is not set",
231-
template: &infraexpv1beta1.DockerMachinePoolTemplate{},
231+
template: &infraexpv1.DockerMachinePoolTemplate{},
232232
variables: nil,
233-
expectedTemplate: &infraexpv1beta1.DockerMachinePoolTemplate{},
233+
expectedTemplate: &infraexpv1.DockerMachinePoolTemplate{},
234234
expectedErr: true,
235235
},
236236
{
237237
name: "sets customImage for templates linked to ControlPlane",
238-
template: &infraexpv1beta1.DockerMachinePoolTemplate{},
238+
template: &infraexpv1.DockerMachinePoolTemplate{},
239239
variables: map[string]apiextensionsv1.JSON{
240240
runtimehooksv1.BuiltinsName: {Raw: toJSON(runtimehooksv1.Builtins{
241241
ControlPlane: &runtimehooksv1.ControlPlaneBuiltins{
@@ -247,11 +247,11 @@ func Test_patchDockerMachinePoolTemplate(t *testing.T) {
247247
},
248248
})},
249249
},
250-
expectedTemplate: &infraexpv1beta1.DockerMachinePoolTemplate{
251-
Spec: infraexpv1beta1.DockerMachinePoolTemplateSpec{
252-
Template: infraexpv1beta1.DockerMachinePoolTemplateResource{
253-
Spec: infraexpv1beta1.DockerMachinePoolSpec{
254-
Template: infraexpv1beta1.DockerMachinePoolMachineTemplate{
250+
expectedTemplate: &infraexpv1.DockerMachinePoolTemplate{
251+
Spec: infraexpv1.DockerMachinePoolTemplateSpec{
252+
Template: infraexpv1.DockerMachinePoolTemplateResource{
253+
Spec: infraexpv1.DockerMachinePoolSpec{
254+
Template: infraexpv1.DockerMachinePoolMachineTemplate{
255255
CustomImage: "kindest/node:v1.23.0",
256256
},
257257
},
@@ -305,28 +305,28 @@ func TestHandler_GeneratePatches(t *testing.T) {
305305
},
306306
}),
307307
}
308-
kubeadmControlPlaneTemplate := controlplanev1beta1.KubeadmControlPlaneTemplate{
308+
kubeadmControlPlaneTemplate := controlplanev1.KubeadmControlPlaneTemplate{
309309
TypeMeta: metav1.TypeMeta{
310310
Kind: "KubeadmControlPlaneTemplate",
311-
APIVersion: controlplanev1beta1.GroupVersion.String(),
311+
APIVersion: controlplanev1.GroupVersion.String(),
312312
},
313313
}
314-
dockerMachineTemplate := infrav1beta1.DockerMachineTemplate{
314+
dockerMachineTemplate := infrav1.DockerMachineTemplate{
315315
TypeMeta: metav1.TypeMeta{
316316
Kind: "DockerMachineTemplate",
317-
APIVersion: infrav1beta1.GroupVersion.String(),
317+
APIVersion: infrav1.GroupVersion.String(),
318318
},
319319
}
320-
dockerMachinePoolTemplate := infraexpv1beta1.DockerMachinePoolTemplate{
320+
dockerMachinePoolTemplate := infraexpv1.DockerMachinePoolTemplate{
321321
TypeMeta: metav1.TypeMeta{
322322
Kind: "DockerMachinePoolTemplate",
323-
APIVersion: infrav1beta1.GroupVersion.String(),
323+
APIVersion: infrav1.GroupVersion.String(),
324324
},
325325
}
326-
dockerClusterTemplate := infrav1beta1.DockerClusterTemplate{
326+
dockerClusterTemplate := infrav1.DockerClusterTemplate{
327327
TypeMeta: metav1.TypeMeta{
328328
Kind: "DockerClusterTemplate",
329-
APIVersion: infrav1beta1.GroupVersion.String(),
329+
APIVersion: infrav1.GroupVersion.String(),
330330
},
331331
}
332332
tests := []struct {

0 commit comments

Comments
 (0)