-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove k8s.io/kubernetes from project dependency #129
Conversation
Signed-off-by: Dyanngg <dingyang@vmware.com>
✅ Deploy Preview for kubernetes-sigs-network-policy-api ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Dyanngg The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Signed-off-by: Dyanngg <dingyang@vmware.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am all for removing the k8s dependency.. But I need to test these changes to make sure it doesn't beak my d/s PR, give me some time...
DeleteTimeout: 10 * time.Second, | ||
GetTimeout: 10 * time.Second, | ||
DeleteTimeout: 20 * time.Second, | ||
GetTimeout: 20 * time.Second, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
haha I actually had a PR ready to push to do this because we also hack it up: ovn-kubernetes/ovn-kubernetes@7b071de#diff-2894f83ecaa29479d162ded3f17561f1bbe1b4df762c7d65d06ff829c6f5aa9bR47 along with some other cleanup I wanted to do...
but lgtm to this commit since its useful and makes sense. (I have an upcoming cleanup PR for conformance including this so you could drop it from this one and keep it focused on removing k8s dependency but I'll leave it to you..)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
actually nvm because my cleanup commit touches a log of framework.ExpectNoError
parts, so i will wait for this to go in before i open my PR.. let this merge...
err I just realized I don't have an easy way to test this unless this lands and @astoycos includes this in his tagging and I re-pull, so going to approve this for now and then test it. |
/lgtm |
Currently the
network-policy-api
usesk8s.io/kubernetes
module as a dependency, which is being clearly stated as unsupported in kubernetes/kubernetes#79384.Upon review, it seems that the only module which uses
k8s.io/kubernetes
is conformance, and all references could be refactored so that the project no longer directly imports k8s:k8s.io/kubernetes/test/e2e/framework.ExpectNoError
=>github.com/stretchr/testify/require.NoErrorf
, which is also common in other conformance suites like Gateway API.client-go
to issue exec commands to Pods instead ofk8s.io/kubernetes/test/e2e/framework/kubectl.RunKubectl
This PR also partially addresses #108 as it cleans up the
pokeServer
utility function a bit.Conformance test passes before and after this change, on a local testbed with Antrea deployed: