mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-31 15:25:57 +00:00
remove duplicated import
This commit is contained in:
parent
2d64ce5e8e
commit
86968e44d0
@ -46,7 +46,6 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/server/healthz"
|
"k8s.io/apiserver/pkg/server/healthz"
|
||||||
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
||||||
"k8s.io/apiserver/pkg/util/flag"
|
"k8s.io/apiserver/pkg/util/flag"
|
||||||
clientgoclientset "k8s.io/client-go/kubernetes"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
restclient "k8s.io/client-go/rest"
|
restclient "k8s.io/client-go/rest"
|
||||||
@ -331,7 +330,7 @@ func run(s *options.KubeletServer, kubeDeps *kubelet.Dependencies) (err error) {
|
|||||||
var kubeClient clientset.Interface
|
var kubeClient clientset.Interface
|
||||||
var eventClient v1core.EventsGetter
|
var eventClient v1core.EventsGetter
|
||||||
var heartbeatClient v1core.CoreV1Interface
|
var heartbeatClient v1core.CoreV1Interface
|
||||||
var externalKubeClient clientgoclientset.Interface
|
var externalKubeClient clientset.Interface
|
||||||
|
|
||||||
clientConfig, err := CreateAPIServerClientConfig(s)
|
clientConfig, err := CreateAPIServerClientConfig(s)
|
||||||
|
|
||||||
@ -357,7 +356,7 @@ func run(s *options.KubeletServer, kubeDeps *kubelet.Dependencies) (err error) {
|
|||||||
clientCertificateManager.SetCertificateSigningRequestClient(kubeClient.CertificatesV1beta1().CertificateSigningRequests())
|
clientCertificateManager.SetCertificateSigningRequestClient(kubeClient.CertificatesV1beta1().CertificateSigningRequests())
|
||||||
clientCertificateManager.Start()
|
clientCertificateManager.Start()
|
||||||
}
|
}
|
||||||
externalKubeClient, err = clientgoclientset.NewForConfig(clientConfig)
|
externalKubeClient, err = clientset.NewForConfig(clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Warningf("New kubeClient from clientConfig error: %v", err)
|
glog.Warningf("New kubeClient from clientConfig error: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -22,7 +22,6 @@ import (
|
|||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
"k8s.io/apimachinery/pkg/util/sets"
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
"k8s.io/apiserver/pkg/util/flag"
|
"k8s.io/apiserver/pkg/util/flag"
|
||||||
clientgoclientset "k8s.io/client-go/kubernetes"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
restclient "k8s.io/client-go/rest"
|
restclient "k8s.io/client-go/rest"
|
||||||
"k8s.io/client-go/tools/clientcmd"
|
"k8s.io/client-go/tools/clientcmd"
|
||||||
@ -103,7 +102,7 @@ func main() {
|
|||||||
glog.Fatalf("Failed to create a ClientConfig: %v. Exiting.", err)
|
glog.Fatalf("Failed to create a ClientConfig: %v. Exiting.", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
clientset, err := clientset.NewForConfig(clientConfig)
|
client, err := clientset.NewForConfig(clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Failed to create a ClientSet: %v. Exiting.", err)
|
glog.Fatalf("Failed to create a ClientSet: %v. Exiting.", err)
|
||||||
}
|
}
|
||||||
@ -126,7 +125,7 @@ func main() {
|
|||||||
|
|
||||||
hollowKubelet := kubemark.NewHollowKubelet(
|
hollowKubelet := kubemark.NewHollowKubelet(
|
||||||
config.NodeName,
|
config.NodeName,
|
||||||
clientset,
|
client,
|
||||||
cadvisorInterface,
|
cadvisorInterface,
|
||||||
fakeDockerClientConfig,
|
fakeDockerClientConfig,
|
||||||
config.KubeletPort,
|
config.KubeletPort,
|
||||||
@ -139,7 +138,7 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if config.Morph == "proxy" {
|
if config.Morph == "proxy" {
|
||||||
client, err := clientgoclientset.NewForConfig(clientConfig)
|
client, err := clientset.NewForConfig(clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Failed to create API Server client: %v", err)
|
glog.Fatalf("Failed to create API Server client: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -33,7 +33,6 @@ import (
|
|||||||
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
||||||
"k8s.io/apimachinery/pkg/api/resource"
|
"k8s.io/apimachinery/pkg/api/resource"
|
||||||
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
|
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
|
||||||
genericvalidation "k8s.io/apimachinery/pkg/api/validation"
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
unversionedvalidation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
unversionedvalidation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
@ -56,11 +55,11 @@ import (
|
|||||||
|
|
||||||
// TODO: delete this global variable when we enable the validation of common
|
// TODO: delete this global variable when we enable the validation of common
|
||||||
// fields by default.
|
// fields by default.
|
||||||
var RepairMalformedUpdates bool = genericvalidation.RepairMalformedUpdates
|
var RepairMalformedUpdates bool = apimachineryvalidation.RepairMalformedUpdates
|
||||||
|
|
||||||
const isNegativeErrorMsg string = apimachineryvalidation.IsNegativeErrorMsg
|
const isNegativeErrorMsg string = apimachineryvalidation.IsNegativeErrorMsg
|
||||||
const isInvalidQuotaResource string = `must be a standard resource for quota`
|
const isInvalidQuotaResource string = `must be a standard resource for quota`
|
||||||
const fieldImmutableErrorMsg string = genericvalidation.FieldImmutableErrorMsg
|
const fieldImmutableErrorMsg string = apimachineryvalidation.FieldImmutableErrorMsg
|
||||||
const isNotIntegerErrorMsg string = `must be an integer`
|
const isNotIntegerErrorMsg string = `must be an integer`
|
||||||
const isZeroErrorMsg string = `must be greater than zero`
|
const isZeroErrorMsg string = `must be greater than zero`
|
||||||
|
|
||||||
@ -68,7 +67,7 @@ var pdPartitionErrorMsg string = validation.InclusiveRangeError(1, 255)
|
|||||||
var volumeModeErrorMsg string = "must be a number between 0 and 0777 (octal), both inclusive"
|
var volumeModeErrorMsg string = "must be a number between 0 and 0777 (octal), both inclusive"
|
||||||
|
|
||||||
// BannedOwners is a black list of object that are not allowed to be owners.
|
// BannedOwners is a black list of object that are not allowed to be owners.
|
||||||
var BannedOwners = genericvalidation.BannedOwners
|
var BannedOwners = apimachineryvalidation.BannedOwners
|
||||||
|
|
||||||
var iscsiInitiatorIqnRegex = regexp.MustCompile(`iqn\.\d{4}-\d{2}\.([[:alnum:]-.]+)(:[^,;*&$|\s]+)$`)
|
var iscsiInitiatorIqnRegex = regexp.MustCompile(`iqn\.\d{4}-\d{2}\.([[:alnum:]-.]+)(:[^,;*&$|\s]+)$`)
|
||||||
var iscsiInitiatorEuiRegex = regexp.MustCompile(`^eui.[[:alnum:]]{16}$`)
|
var iscsiInitiatorEuiRegex = regexp.MustCompile(`^eui.[[:alnum:]]{16}$`)
|
||||||
@ -92,7 +91,7 @@ func ValidateHasLabel(meta metav1.ObjectMeta, fldPath *field.Path, key, expected
|
|||||||
|
|
||||||
// ValidateAnnotations validates that a set of annotations are correctly defined.
|
// ValidateAnnotations validates that a set of annotations are correctly defined.
|
||||||
func ValidateAnnotations(annotations map[string]string, fldPath *field.Path) field.ErrorList {
|
func ValidateAnnotations(annotations map[string]string, fldPath *field.Path) field.ErrorList {
|
||||||
return genericvalidation.ValidateAnnotations(annotations, fldPath)
|
return apimachineryvalidation.ValidateAnnotations(annotations, fldPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
func ValidateDNS1123Label(value string, fldPath *field.Path) field.ErrorList {
|
func ValidateDNS1123Label(value string, fldPath *field.Path) field.ErrorList {
|
||||||
@ -202,7 +201,7 @@ func ValidateEndpointsSpecificAnnotations(annotations map[string]string, fldPath
|
|||||||
}
|
}
|
||||||
|
|
||||||
func ValidateOwnerReferences(ownerReferences []metav1.OwnerReference, fldPath *field.Path) field.ErrorList {
|
func ValidateOwnerReferences(ownerReferences []metav1.OwnerReference, fldPath *field.Path) field.ErrorList {
|
||||||
return genericvalidation.ValidateOwnerReferences(ownerReferences, fldPath)
|
return apimachineryvalidation.ValidateOwnerReferences(ownerReferences, fldPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ValidateNameFunc validates that the provided name is valid for a given resource type.
|
// ValidateNameFunc validates that the provided name is valid for a given resource type.
|
||||||
@ -274,7 +273,7 @@ var ValidateServiceAccountName = apimachineryvalidation.ValidateServiceAccountNa
|
|||||||
var ValidateEndpointsName = NameIsDNSSubdomain
|
var ValidateEndpointsName = NameIsDNSSubdomain
|
||||||
|
|
||||||
// ValidateClusterName can be used to check whether the given cluster name is valid.
|
// ValidateClusterName can be used to check whether the given cluster name is valid.
|
||||||
var ValidateClusterName = genericvalidation.ValidateClusterName
|
var ValidateClusterName = apimachineryvalidation.ValidateClusterName
|
||||||
|
|
||||||
// ValidateClassName can be used to check whether the given class name is valid.
|
// ValidateClassName can be used to check whether the given class name is valid.
|
||||||
// It is defined here to avoid import cycle between pkg/apis/storage/validation
|
// It is defined here to avoid import cycle between pkg/apis/storage/validation
|
||||||
@ -285,7 +284,7 @@ var ValidateClassName = NameIsDNSSubdomain
|
|||||||
// class name is valid.
|
// class name is valid.
|
||||||
var ValidatePriorityClassName = NameIsDNSSubdomain
|
var ValidatePriorityClassName = NameIsDNSSubdomain
|
||||||
|
|
||||||
// TODO update all references to these functions to point to the genericvalidation ones
|
// TODO update all references to these functions to point to the apimachineryvalidation ones
|
||||||
// NameIsDNSSubdomain is a ValidateNameFunc for names that must be a DNS subdomain.
|
// NameIsDNSSubdomain is a ValidateNameFunc for names that must be a DNS subdomain.
|
||||||
func NameIsDNSSubdomain(name string, prefix bool) []string {
|
func NameIsDNSSubdomain(name string, prefix bool) []string {
|
||||||
return apimachineryvalidation.NameIsDNSSubdomain(name, prefix)
|
return apimachineryvalidation.NameIsDNSSubdomain(name, prefix)
|
||||||
@ -316,7 +315,7 @@ func ValidateNonnegativeQuantity(value resource.Quantity, fldPath *field.Path) f
|
|||||||
}
|
}
|
||||||
|
|
||||||
func ValidateImmutableField(newVal, oldVal interface{}, fldPath *field.Path) field.ErrorList {
|
func ValidateImmutableField(newVal, oldVal interface{}, fldPath *field.Path) field.ErrorList {
|
||||||
return genericvalidation.ValidateImmutableField(newVal, oldVal, fldPath)
|
return apimachineryvalidation.ValidateImmutableField(newVal, oldVal, fldPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
func ValidateImmutableAnnotation(newVal string, oldVal string, annotation string, fldPath *field.Path) field.ErrorList {
|
func ValidateImmutableAnnotation(newVal string, oldVal string, annotation string, fldPath *field.Path) field.ErrorList {
|
||||||
@ -333,7 +332,7 @@ func ValidateImmutableAnnotation(newVal string, oldVal string, annotation string
|
|||||||
// It doesn't return an error for rootscoped resources with namespace, because namespace should already be cleared before.
|
// It doesn't return an error for rootscoped resources with namespace, because namespace should already be cleared before.
|
||||||
// TODO: Remove calls to this method scattered in validations of specific resources, e.g., ValidatePodUpdate.
|
// TODO: Remove calls to this method scattered in validations of specific resources, e.g., ValidatePodUpdate.
|
||||||
func ValidateObjectMeta(meta *metav1.ObjectMeta, requiresNamespace bool, nameFn ValidateNameFunc, fldPath *field.Path) field.ErrorList {
|
func ValidateObjectMeta(meta *metav1.ObjectMeta, requiresNamespace bool, nameFn ValidateNameFunc, fldPath *field.Path) field.ErrorList {
|
||||||
allErrs := genericvalidation.ValidateObjectMeta(meta, requiresNamespace, apimachineryvalidation.ValidateNameFunc(nameFn), fldPath)
|
allErrs := apimachineryvalidation.ValidateObjectMeta(meta, requiresNamespace, apimachineryvalidation.ValidateNameFunc(nameFn), fldPath)
|
||||||
// run additional checks for the finalizer name
|
// run additional checks for the finalizer name
|
||||||
for i := range meta.Finalizers {
|
for i := range meta.Finalizers {
|
||||||
allErrs = append(allErrs, validateKubeFinalizerName(string(meta.Finalizers[i]), fldPath.Child("finalizers").Index(i))...)
|
allErrs = append(allErrs, validateKubeFinalizerName(string(meta.Finalizers[i]), fldPath.Child("finalizers").Index(i))...)
|
||||||
@ -343,7 +342,7 @@ func ValidateObjectMeta(meta *metav1.ObjectMeta, requiresNamespace bool, nameFn
|
|||||||
|
|
||||||
// ValidateObjectMetaUpdate validates an object's metadata when updated
|
// ValidateObjectMetaUpdate validates an object's metadata when updated
|
||||||
func ValidateObjectMetaUpdate(newMeta, oldMeta *metav1.ObjectMeta, fldPath *field.Path) field.ErrorList {
|
func ValidateObjectMetaUpdate(newMeta, oldMeta *metav1.ObjectMeta, fldPath *field.Path) field.ErrorList {
|
||||||
allErrs := genericvalidation.ValidateObjectMetaUpdate(newMeta, oldMeta, fldPath)
|
allErrs := apimachineryvalidation.ValidateObjectMetaUpdate(newMeta, oldMeta, fldPath)
|
||||||
// run additional checks for the finalizer name
|
// run additional checks for the finalizer name
|
||||||
for i := range newMeta.Finalizers {
|
for i := range newMeta.Finalizers {
|
||||||
allErrs = append(allErrs, validateKubeFinalizerName(string(newMeta.Finalizers[i]), fldPath.Child("finalizers").Index(i))...)
|
allErrs = append(allErrs, validateKubeFinalizerName(string(newMeta.Finalizers[i]), fldPath.Child("finalizers").Index(i))...)
|
||||||
@ -353,7 +352,7 @@ func ValidateObjectMetaUpdate(newMeta, oldMeta *metav1.ObjectMeta, fldPath *fiel
|
|||||||
}
|
}
|
||||||
|
|
||||||
func ValidateNoNewFinalizers(newFinalizers []string, oldFinalizers []string, fldPath *field.Path) field.ErrorList {
|
func ValidateNoNewFinalizers(newFinalizers []string, oldFinalizers []string, fldPath *field.Path) field.ErrorList {
|
||||||
return genericvalidation.ValidateNoNewFinalizers(newFinalizers, oldFinalizers, fldPath)
|
return apimachineryvalidation.ValidateNoNewFinalizers(newFinalizers, oldFinalizers, fldPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
func ValidateVolumes(volumes []core.Volume, fldPath *field.Path) (sets.String, field.ErrorList) {
|
func ValidateVolumes(volumes []core.Volume, fldPath *field.Path) (sets.String, field.ErrorList) {
|
||||||
@ -4197,7 +4196,7 @@ func ValidateNamespace(namespace *core.Namespace) field.ErrorList {
|
|||||||
|
|
||||||
// Validate finalizer names
|
// Validate finalizer names
|
||||||
func validateFinalizerName(stringValue string, fldPath *field.Path) field.ErrorList {
|
func validateFinalizerName(stringValue string, fldPath *field.Path) field.ErrorList {
|
||||||
allErrs := genericvalidation.ValidateFinalizerName(stringValue, fldPath)
|
allErrs := apimachineryvalidation.ValidateFinalizerName(stringValue, fldPath)
|
||||||
for _, err := range validateKubeFinalizerName(stringValue, fldPath) {
|
for _, err := range validateKubeFinalizerName(stringValue, fldPath) {
|
||||||
allErrs = append(allErrs, err)
|
allErrs = append(allErrs, err)
|
||||||
}
|
}
|
||||||
|
@ -28,7 +28,6 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/watch"
|
"k8s.io/apimachinery/pkg/watch"
|
||||||
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
clientgoclientset "k8s.io/client-go/kubernetes"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
v1authentication "k8s.io/client-go/kubernetes/typed/authentication/v1"
|
v1authentication "k8s.io/client-go/kubernetes/typed/authentication/v1"
|
||||||
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
@ -47,8 +46,8 @@ type ControllerClientBuilder interface {
|
|||||||
ConfigOrDie(name string) *restclient.Config
|
ConfigOrDie(name string) *restclient.Config
|
||||||
Client(name string) (clientset.Interface, error)
|
Client(name string) (clientset.Interface, error)
|
||||||
ClientOrDie(name string) clientset.Interface
|
ClientOrDie(name string) clientset.Interface
|
||||||
ClientGoClient(name string) (clientgoclientset.Interface, error)
|
ClientGoClient(name string) (clientset.Interface, error)
|
||||||
ClientGoClientOrDie(name string) clientgoclientset.Interface
|
ClientGoClientOrDie(name string) clientset.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// SimpleControllerClientBuilder returns a fixed client with different user agents
|
// SimpleControllerClientBuilder returns a fixed client with different user agents
|
||||||
@ -86,15 +85,15 @@ func (b SimpleControllerClientBuilder) ClientOrDie(name string) clientset.Interf
|
|||||||
return client
|
return client
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b SimpleControllerClientBuilder) ClientGoClient(name string) (clientgoclientset.Interface, error) {
|
func (b SimpleControllerClientBuilder) ClientGoClient(name string) (clientset.Interface, error) {
|
||||||
clientConfig, err := b.Config(name)
|
clientConfig, err := b.Config(name)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return clientgoclientset.NewForConfig(clientConfig)
|
return clientset.NewForConfig(clientConfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b SimpleControllerClientBuilder) ClientGoClientOrDie(name string) clientgoclientset.Interface {
|
func (b SimpleControllerClientBuilder) ClientGoClientOrDie(name string) clientset.Interface {
|
||||||
client, err := b.ClientGoClient(name)
|
client, err := b.ClientGoClient(name)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatal(err)
|
glog.Fatal(err)
|
||||||
@ -276,15 +275,15 @@ func (b SAControllerClientBuilder) ClientOrDie(name string) clientset.Interface
|
|||||||
return client
|
return client
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b SAControllerClientBuilder) ClientGoClient(name string) (clientgoclientset.Interface, error) {
|
func (b SAControllerClientBuilder) ClientGoClient(name string) (clientset.Interface, error) {
|
||||||
clientConfig, err := b.Config(name)
|
clientConfig, err := b.Config(name)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return clientgoclientset.NewForConfig(clientConfig)
|
return clientset.NewForConfig(clientConfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b SAControllerClientBuilder) ClientGoClientOrDie(name string) clientgoclientset.Interface {
|
func (b SAControllerClientBuilder) ClientGoClientOrDie(name string) clientset.Interface {
|
||||||
client, err := b.ClientGoClient(name)
|
client, err := b.ClientGoClient(name)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatal(err)
|
glog.Fatal(err)
|
||||||
|
@ -33,8 +33,6 @@ import (
|
|||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
clientgoclientset "k8s.io/client-go/kubernetes"
|
|
||||||
|
|
||||||
cadvisorapi "github.com/google/cadvisor/info/v1"
|
cadvisorapi "github.com/google/cadvisor/info/v1"
|
||||||
cadvisorapiv2 "github.com/google/cadvisor/info/v2"
|
cadvisorapiv2 "github.com/google/cadvisor/info/v2"
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
@ -253,7 +251,7 @@ type Dependencies struct {
|
|||||||
EventClient v1core.EventsGetter
|
EventClient v1core.EventsGetter
|
||||||
HeartbeatClient v1core.CoreV1Interface
|
HeartbeatClient v1core.CoreV1Interface
|
||||||
KubeClient clientset.Interface
|
KubeClient clientset.Interface
|
||||||
ExternalKubeClient clientgoclientset.Interface
|
ExternalKubeClient clientset.Interface
|
||||||
Mounter mount.Interface
|
Mounter mount.Interface
|
||||||
NetworkPlugins []network.NetworkPlugin
|
NetworkPlugins []network.NetworkPlugin
|
||||||
OOMAdjuster *oom.OOMAdjuster
|
OOMAdjuster *oom.OOMAdjuster
|
||||||
|
@ -41,7 +41,6 @@ import (
|
|||||||
utiltesting "k8s.io/client-go/util/testing"
|
utiltesting "k8s.io/client-go/util/testing"
|
||||||
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
||||||
containertesting "k8s.io/kubernetes/pkg/kubelet/container/testing"
|
containertesting "k8s.io/kubernetes/pkg/kubelet/container/testing"
|
||||||
kubetesting "k8s.io/kubernetes/pkg/kubelet/container/testing"
|
|
||||||
"k8s.io/kubernetes/pkg/kubelet/lifecycle"
|
"k8s.io/kubernetes/pkg/kubelet/lifecycle"
|
||||||
"k8s.io/kubernetes/pkg/kubelet/network"
|
"k8s.io/kubernetes/pkg/kubelet/network"
|
||||||
"k8s.io/kubernetes/pkg/kubelet/network/kubenet"
|
"k8s.io/kubernetes/pkg/kubelet/network/kubenet"
|
||||||
@ -1398,7 +1397,7 @@ func TestGenerateRunCommand(t *testing.T) {
|
|||||||
|
|
||||||
rkt := &Runtime{
|
rkt := &Runtime{
|
||||||
nsenterPath: "/usr/bin/nsenter",
|
nsenterPath: "/usr/bin/nsenter",
|
||||||
os: &kubetesting.FakeOS{HostName: hostName},
|
os: &containertesting.FakeOS{HostName: hostName},
|
||||||
config: &Config{
|
config: &Config{
|
||||||
Path: "/bin/rkt/rkt",
|
Path: "/bin/rkt/rkt",
|
||||||
Stage1Image: "/bin/rkt/stage1-coreos.aci",
|
Stage1Image: "/bin/rkt/stage1-coreos.aci",
|
||||||
@ -1635,7 +1634,7 @@ func TestGarbageCollect(t *testing.T) {
|
|||||||
fr := newFakeRktInterface()
|
fr := newFakeRktInterface()
|
||||||
fs := newFakeSystemd()
|
fs := newFakeSystemd()
|
||||||
cli := newFakeRktCli()
|
cli := newFakeRktCli()
|
||||||
fakeOS := kubetesting.NewFakeOS()
|
fakeOS := containertesting.NewFakeOS()
|
||||||
deletionProvider := newFakePodDeletionProvider()
|
deletionProvider := newFakePodDeletionProvider()
|
||||||
fug := newfakeUnitGetter()
|
fug := newfakeUnitGetter()
|
||||||
frh := &containertesting.FakeRuntimeHelper{}
|
frh := &containertesting.FakeRuntimeHelper{}
|
||||||
@ -2030,7 +2029,7 @@ func TestConstructSyslogIdentifier(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestGetPodSystemdServiceFiles(t *testing.T) {
|
func TestGetPodSystemdServiceFiles(t *testing.T) {
|
||||||
fs := kubetesting.NewFakeOS()
|
fs := containertesting.NewFakeOS()
|
||||||
r := &Runtime{os: fs}
|
r := &Runtime{os: fs}
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
|
@ -54,7 +54,6 @@ import (
|
|||||||
storagefactory "k8s.io/apiserver/pkg/storage/storagebackend/factory"
|
storagefactory "k8s.io/apiserver/pkg/storage/storagebackend/factory"
|
||||||
corev1client "k8s.io/client-go/kubernetes/typed/core/v1"
|
corev1client "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
api "k8s.io/kubernetes/pkg/apis/core"
|
api "k8s.io/kubernetes/pkg/apis/core"
|
||||||
kapi "k8s.io/kubernetes/pkg/apis/core"
|
|
||||||
coreclient "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
|
coreclient "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
|
||||||
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
|
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
|
||||||
kubeletclient "k8s.io/kubernetes/pkg/kubelet/client"
|
kubeletclient "k8s.io/kubernetes/pkg/kubelet/client"
|
||||||
@ -196,7 +195,7 @@ func (c *Config) createNoneReconciler() reconcilers.EndpointReconciler {
|
|||||||
|
|
||||||
func (c *Config) createLeaseReconciler() reconcilers.EndpointReconciler {
|
func (c *Config) createLeaseReconciler() reconcilers.EndpointReconciler {
|
||||||
ttl := c.ExtraConfig.MasterEndpointReconcileTTL
|
ttl := c.ExtraConfig.MasterEndpointReconcileTTL
|
||||||
config, err := c.ExtraConfig.StorageFactory.NewConfig(kapi.Resource("apiServerIPInfo"))
|
config, err := c.ExtraConfig.StorageFactory.NewConfig(api.Resource("apiServerIPInfo"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Error determining service IP ranges: %v", err)
|
glog.Fatalf("Error determining service IP ranges: %v", err)
|
||||||
}
|
}
|
||||||
@ -204,7 +203,7 @@ func (c *Config) createLeaseReconciler() reconcilers.EndpointReconciler {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Error creating storage factory: %v", err)
|
glog.Fatalf("Error creating storage factory: %v", err)
|
||||||
}
|
}
|
||||||
endpointConfig, err := c.ExtraConfig.StorageFactory.NewConfig(kapi.Resource("endpoints"))
|
endpointConfig, err := c.ExtraConfig.StorageFactory.NewConfig(api.Resource("endpoints"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Error getting storage config: %v", err)
|
glog.Fatalf("Error getting storage config: %v", err)
|
||||||
}
|
}
|
||||||
@ -212,7 +211,7 @@ func (c *Config) createLeaseReconciler() reconcilers.EndpointReconciler {
|
|||||||
StorageConfig: endpointConfig,
|
StorageConfig: endpointConfig,
|
||||||
Decorator: generic.UndecoratedStorage,
|
Decorator: generic.UndecoratedStorage,
|
||||||
DeleteCollectionWorkers: 0,
|
DeleteCollectionWorkers: 0,
|
||||||
ResourcePrefix: c.ExtraConfig.StorageFactory.ResourcePrefix(kapi.Resource("endpoints")),
|
ResourcePrefix: c.ExtraConfig.StorageFactory.ResourcePrefix(api.Resource("endpoints")),
|
||||||
})
|
})
|
||||||
endpointRegistry := endpoint.NewRegistry(endpointsStorage)
|
endpointRegistry := endpoint.NewRegistry(endpointsStorage)
|
||||||
masterLeases := reconcilers.NewLeases(leaseStorage, "/masterleases/", ttl)
|
masterLeases := reconcilers.NewLeases(leaseStorage, "/masterleases/", ttl)
|
||||||
|
@ -40,7 +40,6 @@ import (
|
|||||||
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
||||||
"k8s.io/client-go/informers"
|
"k8s.io/client-go/informers"
|
||||||
coreinformers "k8s.io/client-go/informers/core/v1"
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
||||||
clientgoclientset "k8s.io/client-go/kubernetes"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
restclient "k8s.io/client-go/rest"
|
restclient "k8s.io/client-go/rest"
|
||||||
@ -537,7 +536,7 @@ func createClients(config componentconfig.ClientConnectionConfiguration, masterO
|
|||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
eventClient, err := clientgoclientset.NewForConfig(kubeConfig)
|
eventClient, err := clientset.NewForConfig(kubeConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -24,7 +24,6 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/endpoints/metrics"
|
"k8s.io/apiserver/pkg/endpoints/metrics"
|
||||||
apirequest "k8s.io/apiserver/pkg/endpoints/request"
|
apirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
|
||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
)
|
)
|
||||||
@ -46,7 +45,7 @@ func WithMaxInFlightLimit(
|
|||||||
handler http.Handler,
|
handler http.Handler,
|
||||||
nonMutatingLimit int,
|
nonMutatingLimit int,
|
||||||
mutatingLimit int,
|
mutatingLimit int,
|
||||||
requestContextMapper genericapirequest.RequestContextMapper,
|
requestContextMapper apirequest.RequestContextMapper,
|
||||||
longRunningRequestCheck apirequest.LongRunningRequestCheck,
|
longRunningRequestCheck apirequest.LongRunningRequestCheck,
|
||||||
) http.Handler {
|
) http.Handler {
|
||||||
if nonMutatingLimit == 0 && mutatingLimit == 0 {
|
if nonMutatingLimit == 0 && mutatingLimit == 0 {
|
||||||
|
@ -48,7 +48,6 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/endpoints/discovery"
|
"k8s.io/apiserver/pkg/endpoints/discovery"
|
||||||
genericapifilters "k8s.io/apiserver/pkg/endpoints/filters"
|
genericapifilters "k8s.io/apiserver/pkg/endpoints/filters"
|
||||||
apirequest "k8s.io/apiserver/pkg/endpoints/request"
|
apirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
|
||||||
"k8s.io/apiserver/pkg/registry/rest"
|
"k8s.io/apiserver/pkg/registry/rest"
|
||||||
genericfilters "k8s.io/apiserver/pkg/server/filters"
|
genericfilters "k8s.io/apiserver/pkg/server/filters"
|
||||||
etcdtesting "k8s.io/apiserver/pkg/storage/etcd/testing"
|
etcdtesting "k8s.io/apiserver/pkg/storage/etcd/testing"
|
||||||
@ -93,7 +92,7 @@ func setUp(t *testing.T) (*etcdtesting.EtcdTestServer, Config, *assert.Assertion
|
|||||||
|
|
||||||
config := NewConfig(codecs)
|
config := NewConfig(codecs)
|
||||||
config.PublicAddress = net.ParseIP("192.168.10.4")
|
config.PublicAddress = net.ParseIP("192.168.10.4")
|
||||||
config.RequestContextMapper = genericapirequest.NewRequestContextMapper()
|
config.RequestContextMapper = apirequest.NewRequestContextMapper()
|
||||||
config.LegacyAPIGroupPrefixes = sets.NewString("/api")
|
config.LegacyAPIGroupPrefixes = sets.NewString("/api")
|
||||||
config.LoopbackClientConfig = &restclient.Config{}
|
config.LoopbackClientConfig = &restclient.Config{}
|
||||||
|
|
||||||
@ -484,7 +483,7 @@ func (p *testGetterStorage) New() runtime.Object {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *testGetterStorage) Get(ctx genericapirequest.Context, name string, options *metav1.GetOptions) (runtime.Object, error) {
|
func (p *testGetterStorage) Get(ctx apirequest.Context, name string, options *metav1.GetOptions) (runtime.Object, error) {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -28,7 +28,6 @@ import (
|
|||||||
|
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
uapi "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/util/sets"
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
@ -87,7 +86,7 @@ func TestServerSupportsVersion(t *testing.T) {
|
|||||||
NegotiatedSerializer: scheme.Codecs,
|
NegotiatedSerializer: scheme.Codecs,
|
||||||
Resp: &http.Response{
|
Resp: &http.Response{
|
||||||
StatusCode: test.statusCode,
|
StatusCode: test.statusCode,
|
||||||
Body: objBody(&uapi.APIVersions{Versions: test.serverVersions}),
|
Body: objBody(&metav1.APIVersions{Versions: test.serverVersions}),
|
||||||
},
|
},
|
||||||
Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
|
Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
|
||||||
if test.sendErr != nil {
|
if test.sendErr != nil {
|
||||||
@ -95,7 +94,7 @@ func TestServerSupportsVersion(t *testing.T) {
|
|||||||
}
|
}
|
||||||
header := http.Header{}
|
header := http.Header{}
|
||||||
header.Set("Content-Type", runtime.ContentTypeJSON)
|
header.Set("Content-Type", runtime.ContentTypeJSON)
|
||||||
return &http.Response{StatusCode: test.statusCode, Header: header, Body: objBody(&uapi.APIVersions{Versions: test.serverVersions})}, nil
|
return &http.Response{StatusCode: test.statusCode, Header: header, Body: objBody(&metav1.APIVersions{Versions: test.serverVersions})}, nil
|
||||||
}),
|
}),
|
||||||
}
|
}
|
||||||
c := discovery.NewDiscoveryClientForConfigOrDie(&restclient.Config{})
|
c := discovery.NewDiscoveryClientForConfigOrDie(&restclient.Config{})
|
||||||
|
@ -22,7 +22,6 @@ import (
|
|||||||
|
|
||||||
certificates "k8s.io/api/certificates/v1beta1"
|
certificates "k8s.io/api/certificates/v1beta1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
watch "k8s.io/apimachinery/pkg/watch"
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
certificatesclient "k8s.io/client-go/kubernetes/typed/certificates/v1beta1"
|
certificatesclient "k8s.io/client-go/kubernetes/typed/certificates/v1beta1"
|
||||||
certutil "k8s.io/client-go/util/cert"
|
certutil "k8s.io/client-go/util/cert"
|
||||||
@ -98,11 +97,11 @@ func (c *fakeClient) Create(*certificates.CertificateSigningRequest) (*certifica
|
|||||||
return &csr, nil
|
return &csr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *fakeClient) List(opts v1.ListOptions) (*certificates.CertificateSigningRequestList, error) {
|
func (c *fakeClient) List(opts metav1.ListOptions) (*certificates.CertificateSigningRequestList, error) {
|
||||||
return &certificates.CertificateSigningRequestList{}, nil
|
return &certificates.CertificateSigningRequestList{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *fakeClient) Watch(opts v1.ListOptions) (watch.Interface, error) {
|
func (c *fakeClient) Watch(opts metav1.ListOptions) (watch.Interface, error) {
|
||||||
c.watch = watch.NewFakeWithChanSize(1, false)
|
c.watch = watch.NewFakeWithChanSize(1, false)
|
||||||
c.watch.Add(c.generateCSR())
|
c.watch.Add(c.generateCSR())
|
||||||
c.watch.Stop()
|
c.watch.Stop()
|
||||||
|
@ -57,7 +57,6 @@ import (
|
|||||||
"k8s.io/client-go/informers"
|
"k8s.io/client-go/informers"
|
||||||
extinformers "k8s.io/client-go/informers"
|
extinformers "k8s.io/client-go/informers"
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
extclient "k8s.io/client-go/kubernetes"
|
|
||||||
restclient "k8s.io/client-go/rest"
|
restclient "k8s.io/client-go/rest"
|
||||||
"k8s.io/client-go/tools/record"
|
"k8s.io/client-go/tools/record"
|
||||||
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
||||||
@ -246,7 +245,7 @@ func startMasterOrDie(masterConfig *master.Config, incomingServer *httptest.Serv
|
|||||||
|
|
||||||
masterConfig.GenericConfig.LoopbackClientConfig.BearerToken = privilegedLoopbackToken
|
masterConfig.GenericConfig.LoopbackClientConfig.BearerToken = privilegedLoopbackToken
|
||||||
|
|
||||||
clientset, err := extclient.NewForConfig(masterConfig.GenericConfig.LoopbackClientConfig)
|
clientset, err := clientset.NewForConfig(masterConfig.GenericConfig.LoopbackClientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatal(err)
|
glog.Fatal(err)
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user